text
stringlengths
149
637k
id
stringlengths
47
47
dump
stringclasses
1 value
url
stringlengths
14
499
file_path
stringclasses
669 values
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
39
130k
score
float64
1.5
5.03
int_score
int64
2
5
1854-89 THREE DOLLARS INDIAN HEAD In 1853 the United States negotiated the "Gadsden Purchase"settlement of a boundary dispute with Mexico that resulted in the U.S. acquiring what would become the southern portions of Arizona and New Mexico for ten million dollars. The following year Commodore Matthew Perry embarked upon his famed expedition to re-open Japan to the Western world and establish trade. Spreading beyond its borders in many ways, a few years earlier the United States had joined the worldwide move to uniform postage rates and printed stamps when the Congressional Act of March 3, 1845 authorized the first U.S. postage stamps, and set the local prepaid letter rate at five cents. This set the stage for a close connection between postal and coinage history. Exactly six years later, the postage rate was reduced to three cents when New York Senator Daniel S. Dickinson fathered legislation that simultaneously initiated coinage of the tiny silver three-cent piece as a public convenience. The large cents then in circulation were cumbersome and unpopular, and the new denomination was designed to facilitate the purchase of stamps without using the hated "coppers." This reasoning was carried a step further when the Mint Act of February 21, 1853 authorized a three-dollar gold coin. Congress and Mint Director Robert Maskell Patterson were convinced that the new coin would speed purchases of three-cent stamps by the sheet and of the silver three-cent coins in roll quantities. Unfortunately, at no time during the 35-year span of this denomination did public demand justify these hopes. Chief Engraver James Barton Longacre chose an "Indian Princess" for his obverse not a Native American profile, but actually a profile modeled after the Greco-Roman Venus Accroupie statue then in a Philadelphia museum. Longacre used this distinctive sharp-nosed profile on his gold dollar of 1849 and would employ it again on the Indian Head cent of 1859. On the three-dollar coin Liberty is wearing a feathered headdress of equal-sized plumes with a band bearing LIBERTY in raised letters. She's surrounded by the inscription UNITED STATES OF AMERICA. Such a headdress dates back to the earliest known drawings of American Indians by French artist Jacques le Moyne du Morgue's sketches of the Florida Timucua tribe who lived near the tragic French colony of Fort Caroline in 1562. It was accepted by engravers and medalists of the day as the design shorthand for "America." Longacre's reverse depicted a wreath of tobacco, wheat, corn and cotton with a plant at top bearing two conical seed masses. The original wax models of this wreath still exist on brass discs in a Midwestern collection and show how meticulous Longacre was in preparing his design. Encircled by the wreath is the denomination 3 DOLLARS and the date. There are two boldly different reverse types, the small DOLLARS appearing only in 1854 and the large DOLLARS on coins of 1855-89. Many dates show bold "outlining" of letters and devices, resembling a double strike but probably the result of excessive forcing of the design punches into the die steel, causing a hint of their sloping "shoulders" to appear as part of the coin's design. The high points of the obverse design that first show wear are the cheek and hair above the eye; on the reverse, check the bow knot and leaves. A total of just over 535,000 pieces were issued along with 2058 proofs. The first coins struck were the 15 proofs of 1854. Regular coinage began on May 1, and that first year saw 138,618 pieces struck at Philadelphia (no mintmark), 1,120 at Dahlonega (D), and 24,000 at New Orleans (O). These two branch mints would strike coins only in 1854. San Francisco produced the three-dollar denomination in 1855, 1856, and 1857, again in 1860, and apparently one final piece in 1870. Mintmarks are found below the wreath. Every U.S. denomination boasts a number of major rarities. The three-dollar gold coinage of 1854-1889 is studded with so many low-mintage dates that the entire series may fairly be called rare. In mint state 1878 is the most common date, followed by the 1879, 1888, 1854 and 1889 issues. Every other date is very rare in high grade, particularly 1858, 1865, 1873 Closed 3 and all the San Francisco issues. Minuscule mintages were the rule in the later years. Proof coins prior to 1859 are extremely rare and more difficult to find than the proof-only issues of 1873 Open 3, 1875 and 1876, but many dates are even rarer in the higher Mint State grades. This is because at least some proofs were saved by well- heeled collectors while few lower-budget collectors showed any interest in higher-grade business strikes of later-date gold. Counterfeits are known for many dates; any suspicious piece should be authenticated. The rarest date of all is the unique 1870-S, of which only one example was struck for inclusion in the new Mint's cornerstone. Either the coin escaped, or a second was struck as a pocket piece for San Francisco Mint Coiner J.B. Harmstead. In any event, one coin showing traces of jewelry use surfaced in the numismatic market in 1907. It was sold to prominent collector William H. Woodin, and when Thomas L. Elder sold the Woodin collection in 1911, the coin went to Baltimore's Waldo C. Newcomer. Later owned by Virgil Brand, it was next sold by Ted and Carl Brandts of Ohio's Celina Coin Co. and Stack's of New York to Louis C. Eliasberg in 1946 for $11,500. In Bowers and Merena's October 1982 sale of the U.S. Gold Collection, this famous coin sold for a record $687,500. The three-dollar denomination quietly expired in 1889 along with the gold dollar and nickel three-cent piece. America's coinage was certainly more prosaic without this odd denomination gold piece, but its future popularity with collectors would vastly outstrip the lukewarm public reception it enjoyed during its circulating life.
<urn:uuid:ce5e0d75-e5f8-4ce2-8b94-86d9527d0dd4>
CC-MAIN-2013-20
http://www.coinsite.com/CoinSite-PF/PParticles/$3goldix.asp
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.963839
1,295
3.671875
4
Creature Feature: American Beech (Fagus grandifolia) By Emma Dean, CG Science Editor Though once believed to have a range that covered what would be the continental United States until the glacial period, American beech currently maintains a slightly lesser native geographic habitat, which is still quite impressive. American beech covers the eastern U.S. and Canada from Florida to Quebec, as well as Utah. Indigenous to North America, European colonists recognized the tree as a relative of the European beech and gathered the beechnuts to extract the oil which is similar to olive oil. The beechnuts, which persist through winter, can become somewhat of a litter problem, but not the leaf litter due to the fact that after turning a lovely bronze color, the leaves stay on the tree throughout winter. As autumn ends and winter begins, the leaves become less bronze and resemble thin, curled parchment paper. Due to a shallow root system, grass does not sprout beneath the tree. This is not entirely noticeable because the short trunk allows the branches to nearly touch the ground. Its roots are unique, also, in that they routinely develop root suckers, which is when the root system is the site of new growth that then grows upward and out of the ground to form new branches and essentially a clone of the original tree. Entire beech groves have been known to grow from the roots of a single tree. American beech is notorious for having incredibly smooth, light grey bark even as it advances in age. Though not necessarily beneficial for the tree, American beech is also notorious for being a favorite for carved initials and dates which are preserved indefinitely. - American beech is a larval host as well as a nectar source for Early Hairstreak. - American beech is at home in the following states: Alabama, Arkansas, Connecticut, Delaware, Florida, Georgia, Illinois, Indiana, Kentucky, Louisiana, Massachusetts, Maryland, Maine, Michigan, Minnesota, Missouri, Mississippi, North Carolina, New Hampshire, New Jersey, New York, Ohio, Oklahoma, Pennsylvania, Rhode Island, South Carolina, Tennessee, Texas, Utah, Virginia, Vermont, Wisconsin, West Virginia and also Washington D.C. - This beech is often associated with the extinct Passenger Pigeon, which consumed beechnuts and roosted in its branches. - A few minor pest issues that affect American beech include powdery mildew, aphids, canker and beech bark disease. - Though it has a slow growth rate, American beech will grow to a height between 50-70 feet. - The general lifespan for an American beech is 300-400 years.
<urn:uuid:03be70af-a8d8-4a7c-a3fd-96a187a05983>
CC-MAIN-2013-20
http://www.collegegreenmag.com/creature-feature-american-beech-fagus-grandifolia
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.9437
553
3.53125
4
Accreditation is a form of independent, professional certification that focuses on schools and programs in a particular field. Accreditation of universities in the USA therefore assures you and your parents that the school adheres to high quality standards. Which means the programs are delivered by qualified faculty and are constantly updated to follow the changes and meet the needs of the relevant industry or working world. Attending an accredited school or program is often thought to make you more competitive on the job market. University accreditation in the USA takes place at different levels. At the highest level, governmental and other agencies govern and recognize the accrediting bodies. For instance, the US Department of Education, the Council for Higher Education Association (CHEA) and the Association of Specialized and Professional Accreditors (ASPA) grant power to associations that oversee accreditation at the regional, institutional or program level. Regional: The US Department of Education recognizes 6 distinct higher educational regions, each of which is overseen by a different accrediting body. This is the type of accreditation most commonly referred to and is for a university as a whole, not for individual programs. Accreditation by these regional agencies isn't automatic: this is voluntary accreditation. Institutional: Depending on the kind of university or college it is (e.g., private, public, Christian, etc.) it may also be accredited by institute-type specific agencies. America's universities are extremely different in character, size, location and in the programs they offer. Therefore a school may be accredited by one or more organizations. Specialized: Specialized accreditation focuses on specific areas of study and individual university programs. This is sometimes called professional accreditation, because it means specific programs meet the national standards for that field of study. Universities in the USA cover a huge range of programs, and each institution usually has a page on its website listing both institutional and individual program accreditation. When assessing quality, international students can also look at whether a school or program has any memberships in, or endorsements by, professional associations which reflect certain standards of quality, but this is not the same as official accreditation. For instance, the American Association of State Colleges and Universities does not accredit programs, but is a national organization committed to maintaining and promoting the quality of America's higher education system. Regional Accrediting Agencies for Universities in the USA Middle States Association of Colleges and Schools, Commission on Higher Education New England Association of Schools and Colleges, Commission on Institutions of Higher Education North Central Association of Colleges and Schools, The Higher Learning Commission Northwest Commission on Colleges and Universities Southern Association of Colleges and Schools, Commission on Colleges Western Association of Schools and Colleges, Accrediting Commission for Senior Colleges and Universities Why Accreditation? The goal of university accreditation in the USA is to ensure that education provided by institutions of higher education meets acceptable levels of quality. Accrediting agencies have no legal control over institutions or programs; they promote certain standards and approve or renew membership of institutions that apply and meet the accreditation standards or criteria. Certain licensing programs may require that you've been through a course of study with specialized accreditation, because it ensures that you have been taught by faculty qualified to teach in that field. The US Secretary of Education and CHEA each maintain and publish a list of nationally recognized accrediting agencies, and most institutions attain eligibility for Federal funds by holding accredited or pre-accredited status with one of the recognized accrediting agencies. Take a Virtual Tour of a featured Campus e-tours allow students to view the facilities and student life at featured Universities in the USA, giving you the opportunity to see what the University looks like, as well as facts about the campus, courses, etc. Once you’ve completed your tour you can read the in-depth profile to get more detailed information, or click the Request FREE Info link to request specific information such as scholarships and financial aid directly from that institution. Click here to view Virtual Tours of Featured Universities in the USA Request FREE Info! Request FREE info directly from featured Featured institutions want to send you more information on their to receive free information directly from the school. To see a complete list of featured schools, Note: Your request is sent directly to the institution and is not maintained on this website. Your privacy is completely protected.
<urn:uuid:88118f3e-d711-4509-8010-9954e8e6100c>
CC-MAIN-2013-20
http://www.collegesintheusa.com/University-Accreditation-in-the-USA.cfm
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.942056
890
2.859375
3
Priority of Service is given to Veterans and eligible spouses. Veteran, for the sole purpose of Priority of Service, means a person who served at least one day in the active military, naval, or air service, and who was discharged or released under conditions other than dishonorable. Active service includes full-time Federal service in the National Guard or a Reserve component. Our mission is to provide Veterans and transitioning service members with the resources and services to succeed in the 21st Century workforce by meeting labor-market demands with qualified Veterans. Click on one of the below topics related to veterans.
<urn:uuid:0269e938-eca1-40ad-95e6-d63e8da9c1d8>
CC-MAIN-2013-20
http://www.colorado.gov/cs/Satellite?c=Page&childpagename=CDLE-EmployTrain%2FCDLELayout&cid=1248095317855&pagename=CDLEWrapper
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.943826
118
1.632813
2
A bachelor's degree earned in the United States usually takes a minimum of four years. Degrees are earned by taking a combination of required courses which meet liberal arts distribution requirements (humanities, social sciences, and natural sciences), a required number of courses in the major field of study (called a "major"in the United States), and the balance of courses as electives. Each course taken is assigned a value called "points" (also called "credits" or "units"). To earn a bachelor's degree, one must earn a minimum of 124 points (usually more) and, at the same time, meet the distribution and major requirements. Advisement on course selection is available in each school at the time of registration. Undergraduate studies are offered in three divisions of the University. Each division offers a distinct program of studies. The divisions that offer the undergraduate (B.A. or B.S.) degree are: College (CC) - Study of the liberal arts and sciences leading to the B.A. degree traditionally, but not exclusively, for students just out of secondary school, usually between the ages of 17 and 22. With an enrollment of approximately 4,000, Columbia College is the smallest college in the 2. Fu Foundation School of Engineering and Applied Science (SEAS) - Offers the B.S. degree in engineering and applied science fields. 3. School of General Studies (GS) - Offers the B.A. or B.S. degree to students who have had a break of a year or more in their education since high school. All other divisions of the University are graduate schools and, as such, offer degrees beyond the bachelor's degree, usually master's or doctoral degrees. Master's degrees take from one to three years to earn depending on the course work and research/writing requirements. Ph.D. requirements may vary but usually require one to two years of course work beyond the master's degree, comprehensive examinations, a major original contribution to research in the field of study, and oral defense of one's research. The research and writing requirement can take from two to five years beyond the course work. A Ph.D. candidate should plan on a minimum of four and an average of six years of study to complete the degree requirements. It is not unusual for a student to be at Columbia seven or eight years to complete a doctorate. To be admitted to these schools, the applicant must have completed a degree considered in the United States to be equivalent to a U.S. bachelor's degree with a strong academic record. There are also other admissions requirements. The Columbia schools and programs that offer graduate degrees are: |College of Physicians and Surgeons||Program in Physical Therapy| |Fu Foundation School of Engineering and Applied Science||School of Continuing Education| |Graduate School of Architecture, Planning, and Preservation||College of Dental Medicine| |Graduate School of Arts and Sciences||School of International and Public Affairs| |Graduate School of Business||School of Law| |Graduate School of Journalism||School of Nursing| |Institute of Human Nutrition||School of Social Work| |Mailman School of Public Health||School of the Arts| |Program in Occupational Therapy| The School of Continuing Education offers, in addition to its masters' degree program, opportunities for non-degree study at Columbia to qualified applicants. Both undergraduate and graduate level courses from the University's arts and sciences course offerings may be taken for credit. This option is particularly appropriate for international students who wish to visit at Columbia for a semester or two. To qualify for an I-20 to be in F-1 student status in the U.S., students must register for at least 12 points of credit-bearing coursework each semester. This is usually equivalent to four courses each semester. Of particular interest to international students is the School of Continuing Education's American Language Program. The ALP is one of the oldest English as a Second Language programs in the United States and offers a carefully integrated sequence of courses to students, business and professional people, and international visitors who wish to improve their command of English. There are two institutions which are affiliated with, located adjacent to, and bear the name of Columbia University. They are administered separately and applications for admission must be made directly to these institutions. Barnard College, Columbia University An undergraduate liberal arts college for women affiliated with Columbia University. For more information, write to Barnard College Admissions, 111 Milbank,3009 Broadway, New York, NY 10027, U.S.A. Teachers College, Columbia University A graduate school for students interested in education, offering only the master's and doctoral degrees. For more information, write to Teachers College Admissions, 146 Horace Mann, 551 West 120 Street, New York, NY 10027, U.S.A.
<urn:uuid:139cb27b-d4c2-4365-afcf-895d3c1e5636>
CC-MAIN-2013-20
http://www.columbia.edu/cu/isso/admit/admit_tx.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.943447
1,006
2.578125
3
The Division of Pediatric Oncology at Columbia's College of Physicians & Surgeons (P&S) and the Children's Hospital of NewYork-Presbyterian have received a three-year, $3 million grant from the Pediatric Cancer Research Foundation (PCRF) of Irvine, California, to establish a state-of-the-art pediatric oncology research laboratory. The award will help Columbia pediatric cancer researchers facilitate investigations into a number of promising research areas -- allowing them to probe the genetics, immunology, biochemistry and cellular processes of childhood lymphomas and develop exciting new diagnostic tools, preventative measures and treatment modalities for childhood cancers. "I am thrilled that PCRF has chosen us to receive such a substantial, generous award," said Mitchell S. Cairo, principal investigator and assistant professor of pediatrics at P&S, head of the pediatric cancer research program at Children's Hospital of NewYork-Presbyterian, and director of the new laboratory. "It is a testament to both the incredible talent and dedication of our pediatric cancer specialists and to the strong partnership that my colleagues and I have been able to forge with PCRF." "PCRF is delighted to contribute to the progress that Cairo and his team continue to make from bench side to bedside," says Nancy Franks, executive director of PCRF. "With their help, brainpower and commitment, we may very well be able to generate the kind of knowledge that can be applied directly to the prevention, diagnosis and treatment of pediatric cancer -- benefiting sick and suffering children not just in New York, but all over the United States." A renowned expert in stem cell biology, molecular oncology and experimental immunology, Cairo joined the Columbia staff as a full-time faculty member in March 2000, after successful stints as director of pediatric cancer research and bone marrow transplantation at the Children's Hospital of Orange County in Irvine, California and as a professor of pediatrics, medicine, and pathology, and director of bone marrow transplantation at Georgetown University. He is presently the principal investigator and chairman of several stem cell transplantation studies that use unrelated cord blood and donor stem cells to help eradicate pediatric cancers and also has substantial clinical responsibilities as director of the Children's Hospital of NewYork-Presbyterian's blood and marrow transplant and experimental therapeutics programs for children with cancer. The new 2,000-square-foot laboratory will incorporate a suite of research facilities -- three interconnected laboratories and a tissue culture room -- that feature the latest, most high-tech equipment available, providing ample research space and ideal working conditions for the 20 members of Cairo's research team. The Pediatric Cancer Research Foundation (PCRF) was founded in 1982 to improve the care, quality of life and survival rate of children with malignant diseases. Since its inception, PCRF has raised more than $10 million to fund cutting-edge research that leads to medically sound treatment protocols for childhood cancers. PCRF is privately supported through donations from individuals, charitable foundations, and businesses that recognize the urgent need to improve treatment and find cures for pediatric cancers. Despite tremendous progress in research and patient care, cancer remains the number-one killer of young people, afflicting more children under 18 years of age each year than any other disease. In 2002, enough children to fill two classrooms are diagnosed with cancer each school day. Although survival rates are improving, one out of every 330 young people will develop cancer by age 20, and 35 percent of children with cancer will die from the disease.
<urn:uuid:09caa47d-1f10-4c3d-9654-03fc48c065e3>
CC-MAIN-2013-20
http://www.columbia.edu/cu/news/02/03/ps_pediatric_cancer.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.946209
714
1.625
2
States may get more power to fight food stamp fraud Benefit cards being illegally sold for cash Thursday, May 24, 2012 State's rank on list may not indicate fraud Washington state ranks fifth in the nation for the highest percentage of food stamp recipients habitually seeking replacement Supplemental Nutrition Assistance Program cards. About 2.63 percent of the state’s food stamp recipients have requested four or more replacement cards a year, according to the U.S. Department of Agriculture’s Food, Nutrition and Consumer Services. But unlike other states, replacement cards in Washington include recipients who have reapplied for benefits after going off food stamps, said Thomas Shapley, spokesman for the state Department of Social and Health Services. “That throws a wrench in the state-by-state comparison,” Shapley said. New proposed federal rules aimed at curbing fraud would authorize states to require a formal explanation when a recipient seeks three or more replacement cards a year. “We serve elderly, intellectually disabled, and homeless (people) who sometimes have trouble managing their cards, so requests for multiple replacements does not automatically denote fraud,” said Regan Hopper of Food, Nutrition and Consumer Services. “The card replacement rule gives states a tool to either educate and train those who may not understand how to care for or manage their cards. Just as important, it helps states determine if there are other indications of potential fraud to investigate.” The state formed the DSHS Office of Fraud and Accountability in March 2011 to catch and root out cases of fraud among recipients of food stamps and other public assistance benefits. Since then, the office has been involved in undercover operations to expose attempts to sell public assistance benefits for cash. In one case, an undercover DSHS investigator from the Office of Fraud and Accountability posed as a potential buyer for a food stamp card a Marysville woman had advertised on her Facebook profile, according to a DSHS news release. The investigator met her in a public parking lot in Snohomish County to make the purchase, which was filmed by other DSHS investigators. The woman was not named in the news release, and it was not immediately available Thursday. — Paris Achen, Columbian staff writer WASHINGTON — Food stamp recipients are ripping off the government for millions of dollars by illegally selling their benefit cards for cash — sometimes even in the open, on eBay or Craigslist -- and then asking the government for replacement cards. The Agriculture Department wants to curb the practice by giving states more power to investigate people who repeatedly claim to lose their benefit cards. It proposed new rules Thursday that would allow states to demand formal explanations from people who seek replacement cards more than three times a year. Those who don't comply can be denied further cards. "Up to this point, the state's hands have been tied unless they absolutely suspected fraudulent activity," said Kevin Concannon, the department's undersecretary for food, nutrition and consumer services. Overall, food stamp fraud costs taxpayers about $750 million a year, or 1 percent of the $75 billion program that makes up the bulk of the department's total budget for the Supplemental Nutrition Assistance Program. Most fraud occurs when unscrupulous retailers allow customers to turn in their benefits cards for lesser amounts of cash. But USDA officials are also concerned about people selling or trading cards in the open market, including through websites. Last year, the department sent letters urging eBay and Craigslist to notify customers that it's illegal to buy and sell food stamps. USDA officials followed up last month, saying they are still getting complaints that people are using the websites to illegally market food stamps. Both eBay and Craigslist have told the government they are actively reviewing their sites for illegal activity and would take down ads offering food stamp benefits for cash. The USDA also has warned Facebook and Twitter about the practice. South Dakota, Oklahoma, Washington, D.C., Minnesota and Washington state have the highest percentage of recipients seeking four or more replacement cards during the course of a year. But USDA officials said that doesn't necessarily indicate a high rate of fraud. All states are required by law to reissue lost or stolen cards to those who are eligible for benefits. Wyoming, Idaho, New Hampshire, North Carolina and Alabama have the lowest percentage of households requesting four or more cards in a 12-month period. In North Carolina, the state already issues warning letters to people who request four replacement cards in a year, letting them know that officials are monitoring them closely. Dean Simpson, chief of economic family services for the North Carolina Division of Social Services, said the new rules would give her state even more of a boost in curbing food stamp fraud. "I think it would help with the trafficking and let individuals know they are being observed and watched," said Simpson, who oversees the state's distribution of food stamps. More than 46 million people receive food stamps, nearly half of them children. The average monthly benefit is $132 per person. Benefit cards work like debit cards, allowing users to swipe them for food purchases at some 231,000 stores around the country that are authorized to take part in the food stamp program
<urn:uuid:8320bf65-133f-4ab3-9b64-1bda042b1993>
CC-MAIN-2013-20
http://www.columbian.com/news/2012/may/24/states-may-get-more-power-to-fight-food-stamp-frau/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.960535
1,053
1.742188
2
Hospitals crack down on workers refusing flu shots Some nurses, other employees leave jobs over requirement Sunday, January 13, 2013 In Clark County CHICAGO -- Patients can refuse a flu shot. Should doctors and nurses have that right? That is the thorny question surfacing as U.S. hospitals increasingly crack down on employees who won't get flu shots, with some workers losing their jobs over their refusal. Several Clark County health facilities reported in September that their vaccination rates were over 90 percent. "Where does it say that I am no longer a patient if I'm a nurse?" wondered Carrie Calhoun, a longtime critical care nurse at Alexian Brothers Medical Center in Elk Grove Village, Ill., who was fired last month after refusing a flu shot. Hospitals' get-tougher measures coincide with an earlier-than-usual flu season hitting harder than in recent mild seasons. Flu is widespread in most states, and at least 20 children have died. Most doctors and nurses do get flu shots. But in the past two months, at least 15 hospital employees in four states have been fired for refusing, and others have resigned. In Rhode Island, one of three states with tough penalties behind a mandatory vaccine policy for health care workers, more than 1,000 workers recently signed a petition opposing the policy, according to a labor union that has filed suit to end the regulation. Why would people whose job is to protect sick patients refuse a flu shot? The reasons vary: allergies to flu vaccine, which are rare; religious objections; and skepticism about whether vaccinating health workers will protect patients. Dr. Carolyn Bridges, associate director for adult immunization at the federal Centers for Disease Control and Prevention, says the strongest evidence is from studies in nursing homes, linking flu vaccination among health care workers with fewer patient deaths from all causes. Medical ethicist Art Caplan says health care workers' ethical obligation to protect patients trumps their individual rights. "If you don't want to do it, you shouldn't work in that environment," said Caplan, medical ethics chief at New York University. "Patients should demand that their health care provider gets flu shots -- and they should ask them." For some people, flu causes only mild symptoms. But it can also lead to pneumonia, and there are thousands of hospitalizations and deaths each year. The number of deaths has varied in recent decades from about 3,000 to 49,000. At Alexian Brothers, unvaccinated workers granted exemptions must wear masks and tell patients, "I'm wearing the mask for your safety," Calhoun says. PeaceHealth Southwest Medical Center and the Vancouver Clinic have similar rules. Calhoun says that's discriminatory and may make patients want to avoid "the dirty nurse" with the mask. The hospital justified its vaccination policy in an email, citing the CDC's warning that this year's flu outbreak was "expected to be among the worst in a decade" and noted that Illinois has already been hit especially hard. The mandatory vaccine policy "is consistent with our health system's mission to provide the safest environment possible." According to the most recent federal data, about 63 percent of U.S. health care workers had flu shots as of November. That's up from previous years, but the government wants 90 percent coverage of health care workers by 2020. Starting this year, the government's Centers for Medicare & Medicaid Services is requiring hospitals to report employees' flu vaccination rates as a means to boost the rates, the CDC's Bridges said. Eventually the data will be posted on the agency's "Hospital Compare" website. Courts have endorsed forced vaccination laws affecting the general population during disease outbreaks, and have upheld vaccination requirements for schoolchildren. "Most of the hospitals in my area are all implementing these policies," Calhoun said. "This conflict could end the career I have dedicated myself to."
<urn:uuid:815c6419-13a3-4423-9faa-4bd49387f89e>
CC-MAIN-2013-20
http://www.columbian.com/news/2013/jan/13/hospitals-crack-down-on-workers-refusing-flu-shots/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.968097
799
1.734375
2
EMAIL SIGN UP! Most Popular This Week - Corporate Win: Supreme Court Says Monsanto Has 'Control Over Product of Life' - How the US Turned Three Pacifists into Violent Terrorists - Cornel West: Obama 'Is a War Criminal' - In 'March Toward Disaster,' World Hits 400 PPM Milestone - Revealed: How US State Department 'Twists Arms' on Monsanto's Behalf Today's Top News Missile Defense: 'Longest Running Scam' Exposed In Congress yesterday, Representative John Tierney, Chair of the House National Security and Foreign Affairs Subcommittee, convened the first in a series of hearings to examine a US missile defense program that is out of control, straining relations with allies, and renewing an arms race with Russia. This is the first comprehensive review of the program since 1993 - the year before Republicans took control of Congress - and it's long overdue. The focus yesterday was on the extent of the missile threat - as compared to other security vulnerabilities - and whether spending more than $10 billion annually on ballistic missile defense (BMD) is justifiable from that perspective. In his opening statement, Rep. Tierney pointed out that we have spent over $120 billion on missile defense in the past 25 years; that the annual budget is expected to double by 2013 to $19 billion; and that the current $10 billion per year is equal to one-third of the Homeland Security budget, roughly equal to the State Department budget, greater than the FEMA budget, 20 times greater than public diplomacy expenditures, and 30 times greater than Peace Corps. Dr. Stephen Flynn, Senior Fellow for National Security Studies at the Council on Foreign Relations and a retired Coast Guard Commander, testified that the "non-missile risk" - smuggling a weapon of mass destruction into the US by ship, train, truck, or private jet - is "far greater than the ballistic missile threat...." He noted that smuggling is the only realistic option for a terrorist group like al Qaeda; it offers anonymity to any attacking nation and therefore protection from retaliation; seaports, borders, and overseas flights "provide a rich menu of non-missile options"; and it has greater potential to "generate cascading economic consequences by disrupting global supply chains." Despite these risks, Flynn said, "The combined budgets for funding all the domestic and international port of entry interdiction efforts... is equal to roughly one-half of the annual budget for developing missile defense. Nowhere in the US government has there been or is there now an evaluation of whether that represents an appropriate balance....The amount of resources we dedicate to the [more serious threat of cargo delivery] is miniscule compared to the kinds of resources we invest in dealing with the ballistic missile threat. That's the kind of disconnect we're operating in." Joseph Cirincione, president of the Ploughshares Fund and author of Bomb Scare: The History and Future of Nuclear Weapons, provided the Committee with an even more pointed assessment. He recalled his past work for the House Armed Services Committee and the National Security Subcommittee during the Cold War. "At that time, we were not worried about a prototype Iranian missile that might or might not be deployed. We were worried about 5,000 Soviet warheads... destroying not just our country but most likely this planet. I have known ballistic missile threats, I have researched ballistic missile threats. Mr. Chairman, this is not a serious ballistic missile threat that we face today.... [It] is limited and changing relatively slowly. There is every reason to believe that it can be addressed through measured military preparedness and aggressive diplomacy." Cirincione, who organized the last serious hearings on the program as a staff member of the Government Operations Committee, pointed out that there are fewer ballistic missiles today than 10-20 years ago; fewer hostile missiles potentially threatening the US; there are five more countries that have started medium-range missile programs but they are poorer and less technologically advanced than the countries that had long-range ballistic missile programs some 20 years ago, and the total number of medium-range missiles has decreased by 80 percent. "The vast majority of nations with ballistic missiles have only short-range missiles with ranges under 1000 kilometers, basically Scuds," Cirincione said. "This is often ignored when officials or experts cite the '30 countries with ballistic missile capability.' That's true, there are approximately 28. But of these, 17 have only Scud-B missiles or similar. Most of these are friends or allies." Rep. Stephen Lynch asked whether the allocation of resources is proportional to the threat. "Absolutely not. I believe that the Ballistic Missile Defense program is the longest running scam in the history of the Department of Defense," Cirincione said. "This is an enormous waste of money, and if you leave this decision to the Joint Chiefs they won't spend anything near what this Administration is requesting. In fact, the last time the Joint Chiefs were asked about this in 1993, [they] recommended to then-Pres. Clinton that we spend only $3 billion a year on these kinds of programs, and of that $2.3 billion should be spent on efforts to intercept short-range missiles - the ones that are a real threat to our troops and allies.... We're no further along in our ability to actually hit a real ballistic missile now than we were 20 years ago." Both Cirincione and Flynn pointed to the disturbing fact that there is no comprehensive threat assessment comparing missile and non-missile threats to our security. "We haven't done a good threat assessment - an intelligence estimate that looks at the non-missile threat and the missile threat," Flynn said. Cirincione agreed. "I believe that in order for Congress to judge whether these sums are necessary they need a comprehensive assessment of the ballistic missile threat. Congress has never - never - gotten this kind of assessment.... We need a comprehensive threat assessment of what the most serious security threats are facing the United States, and then budget allocations based on that." Steven Hildreth, specialist in missile defense and nonproliferation for the Congressional Research Service, also warned that threats about a nuclear-armed Korea or Iran might be exaggerated. He testified to "the importance of examining assertions concerning weapon system development and performance." Hildreth noted that in 50 years, only five countries have been able "to develop, test and field ICBMs armed with nuclear warheads" because "the technical, organizational, and management challenges... [are] daunting.... Each and every [aspect] presents a multitude of technological challenges and hurdles to overcome that is not easily done." Hildreth also said that these weapons cannot be hidden, and that they have to be tested in an "observable" way. Despite these facts, Hildreth said, "There have been any number of intelligence assessments and studies that predicted there would be more than five nations that could have accomplished this capability at various times in the past 40 to 50 years....This perspective is lacking in so many of the discussions about ICBM threats today." With the Administration requesting a record $12.3 billion for missile defense this year, pushing its European-based missile defense system on Czech and Polish citizens who want nothing to do with it, and fueling a new arms race with Russia, the need to put an end to this madness is clear. The jig is up, and hopefully Tierney's hearings will reveal the absolute folly at the root of the Missile Defense Program, and return us to a sane and proven path of diplomacy and nuclear nonproliferation negotiations. Katrina vanden Heuvel is Editor and Publisher of The Nation. © 2008 The Nation
<urn:uuid:131a64bd-7d2e-49a8-a0d2-5bc4eb1ced90>
CC-MAIN-2013-20
http://www.commondreams.org/archive/2008/03/07/7548
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.951587
1,577
1.578125
2
Website Detail Page edited by Robert Teese published by the Rochester Institute of Technology This page contains a set of three short video clips of wave pulses on a slinky spring. One shows a single pulse reflected from a fixed end, the second shows two pulses passing over each other, and the third is a longitudinal pulse. LivePhoto Physics uses high-speed DV format videography in which action may be stepped frame-by-frame, thus enabling easy use of video analysis software. The videos are 10-30 frames in length and may be viewed in step motion or real-time. Position and time data may be measured and collected by using video-analysis tools. SEE RELATED ITEMS ON THIS PAGE for a link to download free Tracker video analysis software. Tracker allows students to not only analyze the video in slow-motion, but also to overlay the videos with dynamical models to see how well the model matches the real world. This video is part of a larger collection of short physics videos developed by the Rochester Institute of Technology Live Photo Physics Project. Please note that this resource requires Quicktime. This resource is part of a Physics Front Topical Unit. Topic: Wave Energy Unit Title: Types of Mechanical Waves A set of 3 high-quality video clips that show wave pulses on a Slinky spring. One depicts a transverse wave pulse and its reflection off an fixed end. A second shows a longitudinal pulse, and the third shows two wave pulses passing over each other. For free software tools to do computer analysis of these videos frame-by-frame, see the "Tracker Video Analysis" item below.Link to Unit: ComPADRE is beta testing Citation Styles! Disclaimer: ComPADRE offers citation styles as a guide only. We cannot offer interpretations about citations as this is an automated procedure. Please refer to the style manuals in the Citation Source Information area for clarifications. Citation Source Information The APA Style presented is based on information from APA Style.org: Electronic References. The Chicago Style presented is based on information from Examples of Chicago-Style Documentation. The MLA Style presented is based on information from the MLA FAQ. LivePhoto Physics: Wave Pulse Propagation on a Slinky Spring: Is Supplemented By Tracker Video Analysis This is the web site to obtain a free download of Tracker Video Analysis software, a tool to analyze video clips frame-by-frame and also combine the videos with computer-generated dynamical models. Full instructions for use in the classroom are included.relation by Caroline Hall Is a Teaching Guide For Physics Classroom: Boundary Behavior Is a Teaching Guide For Physics Classroom: Interference of Waves< Know of another related resource? Login to relate this resource to it. Is Supplemented By
<urn:uuid:06238655-513c-46ae-bd3a-41689d456bd7>
CC-MAIN-2013-20
http://www.compadre.org/Precollege/items/detail.cfm?ID=8633
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.85333
574
2.40625
2
"Your #1 source for information about how to compost." HOW TO COMPOST What a Good Pile Needs What You Need Extras & Additives What to Use - or Not! Building the Pile When is it Finished? Just Do It More Than Just Dirt Water & Soil Remediation A Few Concerns What You Can Do Welcome to COMPOSTERconnection.com, a comprehensive source of information on the making and using of compost. The Connection provides first-time composters with everything they need to know to get started and be successful. Experienced composters will find new techniques and detailed information on the practice and science of composting. Whether you're a serious gardener with a desire for large quantities of rich, soil-enhancing compost, or a homeowner who wants to keep your yard and kitchen scraps from the landfill by turning them into nature's best soil amendment, COMPOSTERconnection.com is the place for all things compost. Just getting started? Go to the "Making Compost" section listed at left for the basics. Ready to jump in? Visit Planet Natural for our complete line of composting bins and tumblers, tools and other composting supplies. In the Bin, the Garden, and the EnvironmentWhen I started composting several years ago, I was like a lot of gardeners: I knew that compost was good for my garden, but I had no idea why. As I began research for this article, my questions merely multiplied. Some of the claims made about compost seemed too good to be true and others made no sense at all. How could compost fight plant diseases? What did it mean to say, as so many sources do, that compost "buffered" or "balanced" soil pH levels? If compost did bind nutrients in the soil, how did it do so? Lots of sources list "adds beneficial micro-organisms" under compost benefits; did it really do this, and if so, what are the benefits? And then there were the practical questions. Many sources said to layer ingredients for a pile -- why? What was the simplest bin for the manually un-dexterous (me) that would still look good? Was there any way to get out of turning a pile? (If so, I wanted to know about it.) What advantage was there to hot composting, other than speed? Some sources said a hot pile would kill weed seeds; others said to keep weed seeds out of the pile. How hot, then, did a pile have to be, and for how long, in order to kill seeds? What about pathogens? Oh, and was it possible to add too much compost to soil? In writing this article, therefore, I wanted to cover the nuts and bolts of composting as thoroughly as possible, but I also wanted to answer those questions about how compost does what it does, which meant delving into compost physics, chemistry, biology, and soil science. For those who share my insatiable curiosity, I've included most of the scientific information I came across, but in deference to those who want to get started on a pile without wading through all kinds of background information, the science is largely confined to its own sections. As it turns out, all those claims about what garden compost can achieve are true. Compost suppresses soil-borne diseases? True. Compost prevents nutrients from leaching out of soil? Also true. So are the claims about beneficial micro-organisms, for which I feel a new and probably unrequited affection. And the claims about "balancing" soil pH, which turns out to mean that compost will help raise pH if it's low and lower it if it's high. Not to mention the claims that it improves water retention in sandy soil and water drainage in clay soils. And that's just the start. Author's Note: If you find this site to be useful, please consider adding a link to http://www.COMPOSTERconnection.com/.
<urn:uuid:444a3a3b-2cc8-4420-8234-d1003326e31c>
CC-MAIN-2013-20
http://www.composterconnection.com/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.940864
828
2.296875
2
It’s relatively easy to spice up your photos in Photoshop. But how about taking it one step further? The key to success is to fix your colours and enhance them. That way you’ll be sure to achieve eye-catching results - Software Photoshop CS - Time needed 1.5-2 hours Okay, so you’ve grasped the techniques, but you need more than that if you’re to produce a range of original eye-catching work. Don’t underestimate the power of composition or the importance of balance. This tutorial will teach you to create stunning effects using glows, loads of Colour Dodge, and lots and lots of neon – hot pinks and lemon yellows are prominent here. You’ll also learn how to utilise white in all the right places, so that white areas look less like negative space and more like the result of added energy and light. The finer details are very important, too. The small glowing dots used throughout this image may be small, but they add so much. Always pay attention to detail in anything you create – simplicity is good but there are always details that, when added, make all the difference. This tutorial stresses the importance of strong colour. The background of this piece contains a faint floral pattern, which is key, but very subtle. It does not call your attention or stand out on its own. Rather, it serves its purpose as a background correctly. In addition, another dimension is added using flowers and scanned imagery, giving the image a truly organic feel. So keep in mind the importance of strong colours and solid composition in all your work and you’ll see instant results. 1 Open Model1.tif from the support files. Adjust the Brightness/Contrast to -50 and +30, respectively. Now go to Filter>Sharpen> Sharpen to ensure that the whole image appears as crisp as possible. 2 Using the Pen tool, draw an outline around the girl’s body. Do not worry about the finer details around the hair, but do make sure that you outline inside the area where her arms bend upwards. Save this Path and label it “Outline”. 3 Create a new layer named Colour Fades. Set the Blending style to Colour Burn. Select the Path you made in step two and click on Load Path as a Selection. 4 Now select a default circle-shaped Brush with soft edges and make the size roughly 550. Using bright pinks, yellows, greens and blues, brush lightly on the girl’s skin using single clicks to add subtle colour to the shadows already present. 5 Make a new layer and label it Colour Fades Background. Again, click on Load Path as a Selection before choosing Select>Inverse. Repeat step four, but add the soft colour to the background, mostly around the girl’s body. 6 Open BackgroundDesign.tif from the support files, Select All and Copy. Go back to the main image, click on Load Path as a Selection and then choose Select>Inverse and then Edit>PasteInto. Rename this layer “Background Design”. 7 Duplicate and move the Background Design layer until you have enough to fill the background. Then merge all of these duplicated layers into one and again label it “Background Design”. Finally, set the Opacity to about 15-20 per cent – whatever looks good to you.
<urn:uuid:0a6f6a7b-4056-417d-bceb-390c32e10417>
CC-MAIN-2013-20
http://www.computerarts.co.uk/tutorials/add-another-dimension
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.899081
712
1.59375
2
A couple of weeks ago dozens of volunteers fanned out across Fairfax County and Falls Church City to interview those who are living under bridges and in the woods because they are homeless. As difficult as the task was to find the homeless, 462 individuals were surveyed. The purpose of the activity, which is part of the “100,000 Homes” national campaign (www.100khomes.org), was to identify the most vulnerable persons through a process called Registry Week. As a result of this effort we now know who the homeless are, and we know more about them in terms of their health and needs. Such information will allow the agencies and organizations doing work on behalf of the homeless to prioritize those most in need of housing and other services. I attended a community debriefing last week and heard team members talk about their very moving experiences in meeting the homeless where they sleep and getting to know more about them. Nearly a fourth of the homeless interviewed were between the ages of 18 and 34 years old. A little over a fourth were 55 years or older. Forty-two percent were working full or part-time. As the 100,000 Homes campaign points out, medical research has highlighted several health and social conditions that make people more likely to die on the street. Of those interviewed in Fairfax, 105, or 23 percent, have permanent physical disabilities that limit their mobility. Eighty individuals, or 17 percent, have had serious brain injury or head trauma. Of those surveyed, 165, or 36 percent, are mentally ill. Using the survey indicators, that means there are 107 individuals or nearly a quarter of those interviewed who are at risk of mortality because they are homeless. Lack of affordable housing is the main cause of homelessness. The majority of people without homes in our community are children and working families who face both low incomes and expensive housing. It is impossible to pay for an apartment when earning minimum wage—even if you work 24 hours per day, 7 days a week. Monthly rent for a typical one-bedroom apartment is $1,134. A family must earn $22.25 an hour to afford a one-bedroom apartment. Eighty-two percent of homeless families earn less than $14.24 an hour. Tied to the inability to afford housing is the statistic that close to 45 percent of persons in families are homeless due to incidents of domestic violence. This registry is the first of its kind for Fairfax County, putting a real face on homelessness. The government agencies and community partners like FACETS and Reston Interfaith are now at work to house the most vulnerable. The goal is to move 150 of the most vulnerable homeless into homes within three years. It is important for the community at large to become engaged in helping to meet the goal. Continue your support and increase it if you can of Reston Interfaith, FACETS and other community organizations working with the homeless or donate at www.fairfaxcounty.gov/homeless/100khomes/.
<urn:uuid:d6cbc3e4-452c-4f18-8edd-0e00b1919aec>
CC-MAIN-2013-20
http://www.connectionnewspapers.com/news/2013/mar/13/column-no-place-home/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.973191
604
2.375
2
In the American electoral system, a primary election is an election that determines the nominee for each political party, who then competes for the office in the general election. A presidential primary is a state election that picks the delegates committed to nominate particular candidates for president of the United States. A presidential caucus, as in Iowa, requires voters to meet together for several hours in face-to-face meetings that select county delegates, who eventually pick the delegates to the national convention. No other country uses primaries; they choose their candidates in party conventions. Primaries were introduced in the Progressive Era in the early 20th century to weaken the power of bosses and make the system more democratic. In presidential elections, they became important starting in 1952, when the first-in-the-nation New Hampshire Primary helped give Dwight D. Eisenhower the Republican nomination, and knocked Harry S. Truman out of the Democratic race because of his poor showing. In 1964, Lyndon B. Johnson ended his reelection campaign after doing poorly in New Hampshire. After 1968, both parties changed their rules to emphasize presidential primaries, although some states still use the caucus system. In recent decades, New Hampshire holds the first primary a few days after Iowa holds the first caucus. That gives these two states enormous leverage, as the candidates and the media focus there. New Hampshire and Iowa receive about half of all the media attention given all primaries. The primary allows voters to choose between different candidates of the some political parties, perhaps representing different wings of the party. For example, a Republican primary may choose between a range of candidates from moderate to conservative. Gallup's 2008 polling data indicated a trend in primary elections towards more conservative candidates, despite the more liberal result in the general election. In recent years the primary seasons has come earlier and earlier, as states move up to earlier dates in the hope it will give them more leverage. For example, Barry Goldwater won the 1964 nomination because he won the last primary in California. The logic is faulty--in highly contested races the later primaries have more leverage. Thus in 2008 California gave up its traditional last-in-the-nation role and joined 20 other states on Super Tuesday. Neither the candidates not the voters paid it much attention. Michigan and Florida moved up their primaries in defiance of national Democratic Party rules and were penalized. The result is the primary season is extended, and is far more expensive, and no state gets an advantage--except for Iowa and New Hampshire, which now have dates in early January. In late 2009 the two national parties are meeting to find a common solution. - Duncan, Dayton. Grass roots: one year in the life of the New Hampshire presidential primary (1991) 436 pages; on 1988 campaign - Johnson, Haynes, and Dan Balz. The Battle for America 2008: The Story of an Extraordinary Election (2009), excellent history of 2008 primaries - Kamarck, Elaine C. Primary Politics: How Presidential Candidates Have Shaped the Modern Nominating System (2009) excerpt and text search
<urn:uuid:c66cbd20-f2be-4f73-902d-7b0198351323>
CC-MAIN-2013-20
http://www.conservapedia.com/Primary_election
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.951015
615
4.03125
4
Privilege for a Private Corporation The Florida Constitution prohibits the legislature from granting a privilege to a private corporation. "There shall be no special law or general law of local application pertaining to ... private incorporation or grant of privilege to a private corporation." Article III, Section 11(a)(12). This has a conceptual similarity to rules in some states against government taking private property from one to give to another. The Virginia Constitution has a similar prohibition against granting a privilege to a private corporation.
<urn:uuid:6f44c818-b77f-4f81-ba0e-1fa9a1028748>
CC-MAIN-2013-20
http://www.conservapedia.com/Privilege_for_a_Private_Corporation
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.884205
98
1.851563
2
Conservation International’s (CI) Internship Sponsored By The Trott Family Foundation seeks students interested in gaining career skills in the non-profit sector. As a leader in conservation, local capacity-building, and partnership work, Conservation International offers a unique learning platform and environment for interns to gain real-world, practical experience. We believe that developing emerging talent is an important way for CI to invest in the future and to sustain conservation goals for the benefit of humanity. Our internships are designed for committed individuals who want to serve the organization in a field and discipline needed to successfully advance our mission. We provide opportunities for future professionals and leaders to become familiar with our mission, strategy, and values and expose students to the business and management of an NGO, field work and research, and partnerships. For more information, please visit Conservation International at www.conservation.org Coordination of Territorial (OT) Technical Management of CI-Peru contributes to the management of geographic and thematic information to facilitate planning and land management in different areas of the country. We are currently working on a conservation initiative in the Alto Mayo Protected Forest, San Martin Region, reason for which is developing a baseline of geographic, biological and socio-economic area and will contribute to better management. The objectives of the internship would be the following: - Assist in maintenance of Geographic Information System (GIS) office in Lima, Peru CI. - Support the implementation of the baseline mapping, biological and socioeconomic Alto Mayo Initiative based on the development of a GIS. - Preparation and updating of project maps and related areas. - Assist in other tasks assigned coordination. The objectives are the internship will be to: - Apply knowledge, skills and abilities by performing in a real work situation. - Learn to use GIS software to enter, edit and analyze data subject. - Become trained in the development of databases to generate information. The headquarters of the internship is the city of Lima, in the office of Conservation International Peru, with a field trip to the Alto Mayo in the region of San Martin. - Working towards an undergraduate degree in Geography or related field - Knowledge of Geographic Information Systems - Office 2007 - Experience working with databases - Remote sensing experience To apply for this position, send a CV and cover letter to email@example.com
<urn:uuid:7358c3b6-f5bd-4d42-8e25-f00b89f2e2ab>
CC-MAIN-2013-20
http://www.conservation.org/about/careers/intl_interns/Pages/Intern_GIS_Peru.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.898976
487
1.679688
2
Curbs Imposed on Muslims in Western China During Ramadan BEIJING — Local governments in a Muslim desert region in western China have imposed strict limits on religious practices during the traditional Muslim fasting month of Ramadan, which began last week, according to the Web sites of four of those governments. The rules include prohibiting women from wearing veils and men from growing beards, as well as barring government officials from observing Ramadan. One town, Yingmaili, requires that local officials check up on mosques at least twice a week during Ramadan. The local governments administer areas in the western part of Xinjiang, a vast autonomous region that is home to the Uighurs, a Muslim Turkic people who often chafe under rule by the ethnic Han Chinese. In August, a wave of attacks swept through Xinjiang, the largest surge of violence in the region in years. Some local officials blamed separatist groups for the instability, and the central government sent security forces to the area. The limits on religious practices put in place by local governments appear to be part of the broader security crackdown. The areas affected by the new rules are near Kuqa, a town struck by multiple bombings on Aug. 10. It was unclear whether the rules would be relaxed after Ramadan, an observance that some Islamic extremists have used elsewhere as a symbolic backdrop for attacks on their perceived enemies. It was also unclear how the Chinese authorities intended to enforce the rules, which appeared to run the risk of antagonizing devout Muslims who present no obvious security threat. The Web site of the town of Yingmaili lists nine rules put in place to “maintain stability during Ramadan.” They include barring teachers and students from observing Ramadan, prohibiting retired government officials from entering mosques and requiring men to shave off beards and women to doff veils. Mosques cannot let people from outside of town stay overnight and restaurants must maintain normal hours of business. Because of the sunrise-to-sunset fasting, many restaurants would normally close during daytime for Ramadan.
<urn:uuid:ec754bf0-445f-45cc-a540-41d90b2ab67f>
CC-MAIN-2013-20
http://www.conservativeunderground.com/forum505/showthread.php?4512-quot-The-Chinese-Government-Sure-Doesn-t-Fool-Around-With-Their-Muslem-Population-!-quot&p=47783&viewfull=1
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.964205
411
1.914063
2
"Pushing the Boundaries of Constructivism: Collaborating across Theories, Applications, and Methods" Opening Session Star Wars Crawl / Site Last Updated 29 July 2011 Michael Bamberg, Hubert Hermans, Ellyn Jay Efran, Scott Johnson, Larry Leitner, Sheila McNamee, Spencer McWilliams, Robert Neimeyer, Jörn Beverly Walker, Bill Warren, David Winter with personal construct psychology in 1955, constructivist-influenced theories have been used in multiple ways in psychology, other social sciences, and the humanities. The goal of this congress is to bring together incorporating one or more modes of constructivist thought into research, theory, scholarship, and professional practice. The congress was held at the John Hancock Hotel & Conference Center in the heart of Boston. Accommodations and congress sessions were in one convenient and affordable location! narrative psychology, and science—can be found on the Psychology Network website. educational videos are readily available. Jack S. Kahn (congress Jonathan D. Raskin (program chair)
<urn:uuid:42c1c544-aad2-4b4d-ae7b-cc02ba1b4e48>
CC-MAIN-2013-20
http://www.constructivistpsych.org/2011/index.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.803909
250
1.75
2
2 Products Found |Results per page: 24 48 72|| In terms of ecologically friendly flooring, bamboo is one of the top contenders. Not only is bamboo flooring made from totally renewable resources, but it also is available in a wide variety of design options. For those who desire the look of hardwood flooring but are concerned about the environmental consequences of harvesting trees, bamboo offers the perfect solution. While bamboo is not technically wood flooring, its appearance is close enough to fool even the most discerning eye. Why is Bamboo Flooring Considered Environmentally Friendly? Although bamboo is actually a type of grass, it is harder than red oak. It reaches full maturity in just 3 to 5 years rather than several decades and re-growth appears naturally without the need for replanting. Harvesting bamboo is actually somewhat required because it is so hardy that leaving it to its own devices would put a strain on the environment. It would be a terrible shame to waste the harvested material, so people have designed many ways to put it to good use from thatched roofs to flooring material. Bamboo also has no requirements for irrigation, fertilizers, or pesticides when grown in its natural environment. Bamboo is naturally resistant to insects and pests. The lack of need for harsh chemicals during its growth only does more to keep the carbon footprint down. How is Bamboo Flooring Manufactured? There are several steps involved in creating a material suitable for flooring from bamboo. Upon harvest, the bamboo is boiled to remove its natural starches and moisture which could become a wonderful environment for termites if not remedied. The outer skin is then removed and the stalk is cut into strips for flooring. These strips are then boiled again to make them even harder or carbonized; the longer the carbonation process, the darker the color of the final product. When the strips are ready they are formed into flooring either by gluing strips together or gluing a single layer of bamboo strips on top of another solid surface, resulting in either solid bamboo flooring or engineered bamboo flooring respectively. The flooring also goes through other processes to strengthen it further by applying laminate materials to increase scratch resistance. What are the design options with bamboo flooring? - Bamboo flooring is available in widths ranging from 3 ž inches to 7 inches and thicknesses of 5/8 inches and 9/16 inches. - Finish options for bamboo flooring are available from unfinished and natural from the FSC Unfinished Bamboo collection to nearly black and a choice of either horizontal or vertical graining as found in the FSC Designer collection. - The two edge types of bamboo flooring are micro-beveled edges and square edges. Bamboo is also available in floating floor styles and nail or glue down styles. How Durable is Bamboo Flooring? Bamboo is naturally hard and durable, and the process it goes through during the manufacture of flooring only increases this strength. While one should avoid sliding furniture across the floor or allowing water to stand, bamboo flooring will do well in most any low moisture room. Bamboo flooring from the EcoBamboo Collection to the FSC Prestige Collection will be an investment in beauty and durability that is sure to add value to any home with minimal environmental impact.
<urn:uuid:d0d737e4-1962-4d64-87de-fe82bc79661a>
CC-MAIN-2013-20
http://www.contempofloorcoverings.com/floors/bamboo-flooring.html?bamboo_usage=Light+Commercial&bamboo_width=7+inch
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.949857
681
2.78125
3
LONDON -- British chip designer ARM on Tuesday launched its first 64-bit processors to power the next generation of smartphones and tablets and offer low-energy solutions for servers. The Cambridge-based company, whose technology is in Apple's (AAPL) iPhone 5 and Samsung's Galaxy S3, said its latest blueprints would deliver three times today's processing power using the same amount of energy. The move to 64-bit architecture, from ARM's current 32-bit designs, will give ARM-based chips increased processing power but retain the energy efficiency central to its technology, the company said. ARM's processor division marketing VP Noel Hurley said demand for more power came from the proliferation of data driven by smartphones and tablets. "When we are looking at 'superphones' and tablets, the consumer is having to deal with much more data, particularly if they start to originate material on these devices," he said. Advanced Micro Devices said on Monday it would start making ARM-based processors Licensees of ARM's new 64-bit Cortex A-50 series include AMD, Broadcom, Calxeda, HiSilicon, Samsung and STMicroelectronics, the company said, and the first chips are expected to ship in 2014.
<urn:uuid:4d6125ca-2de1-4617-8d8b-a0f56290a766>
CC-MAIN-2013-20
http://www.contracostatimes.com/business/ci_21887886/arm-unveils-faster-64-bit-processors-smartphones-servers
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.942889
254
2.1875
2
We all know that breakfast is the most important meal of the day, but many of us struggle with knowing exactly what types of food our bodies need to function efficiently. Each of us probably knows that eating a plateful of cinnamon rolls or donuts is not the ideal way to start the day. However, do you know how much fiber or protein your breakfast should include? What are some good options for people that are on-the-go first thing in the morning? If you would like some answers to these questions, come and join me in an online discussion tomorrow with two dietitians. What: You’re invited to a Kellogg virtual breakfast to discuss morning nutrition and the recently released 2010 Dietary Guidelines. When: The virtual breakfast is happening on Wednesday, April 20, at 11 a.m. ET. Where: In TheMotherhood – – here is the link to the page where the class will be held: http://themotherhood.com/talk/show/id/62187 Who: Join Sarah Woodside, registered dietitian for Kellogg, and Liz Ward, registered dietitian, author and one of the Kellogg’s Breakfast Council members, to discuss the nutrients a good breakfast should provide, options for healthy breakfasts on the go, recent research findings on nutrition, and more. Sarah and Liz will speak to us via live streaming video, while we chat and ask questions through a real-time, text-based conversation.
<urn:uuid:0e5b0127-b092-46cd-ae6d-6222b91f9ecf>
CC-MAIN-2013-20
http://www.cookincanuck.com/2011/04/online-class-with-cooking-connections-breakfast-nutrition/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.937335
303
2.15625
2
Published September 1, 2012. From Cook's Illustrated. To rescue this bread from mediocrity, start by taking the canned flavor out of the pumpkin. Pumpkin bread is boring. No loaf is remarkably bad, but none is remarkably good. They’re all just fine. We wanted a bread that had just the right texture—neither too dense nor too cakey—and a rich pumpkin flavor that was properly tempered with sweetness and gently enhanced rather than obscured by spices. Our first task was improving the flavor of canned pumpkin puree, which tasted raw. So why not cook it? We dumped a can of puree into a saucepan and stirred it over medium heat until it just barely began to caramelize. The pumpkin bread made with this puree tasted full and rich rather than raw or metallic. The only problem was that by cooking the puree, we had driven off some of the moisture and increased its sweetness, which threw off the balance of flavors. Adding buttermilk solved the dryness problem, and incorporating cream cheese into the mix regained some of the tanginess that the sweetness was overpowering. Since we had to melt the cream cheese, we just added it into the pan of hot puree, achieving the dual goals of melting it and cooling the puree. Once the puree was cool, we were able to use the pot as the mixing bowl and avoid dirtying another dish. For textural contrast, we included toasted walnuts and a simple streusel topping, which gave the perfect amount of sweet crunch to each slice. As a bonus, the topping prevented the surface of the loaf from getting soggy when stored overnight, so our bread was just as delicious the next day.list of recipes
<urn:uuid:e16f9b2a-d078-487c-b8e1-97b4c6c1413f>
CC-MAIN-2013-20
http://www.cooksillustrated.com/recipes/print/article.asp?docid=38410&parentdocid=37160
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.975745
358
1.546875
2
No, it's not an unseen CG image from Inception, though it's certainly cool enough to be. These are pictures of BoomBox, an installation made entirely out of cardboard boxes by French architect, Stephane Malka. Created for the 2011 EME3 International Architecture Festival in Barcelona, Boombox somehow escaped everyone's notice, including ours, until now. We think that's a real shame because it's rare to see such an immersive, experiential installation made from such simple materials. By simply projecting various lighting configurations onto a wall of cardboard boxes, Malka completely transforms an everyday object into a powerful environment. The concept for BoomBox stems from Malka's belief in democratizing architecture. He calls it his "eulogy to cardboard, a cheap material symbolizing nomadism [in] contrast to stone, a noble material representing longevity in all its static weight. Although separate entities, there is nevertheless an exchange between two bodies, a cultural and social fusion between the academic and contemporary, at the crossroads between a work of art and a work of architecture." Unlike a marble monument, BoomBox is immediately accessible and, I'll venture, entertaining. Malka projects a light show of color patterns and images that make it more than just a wall in the background of an arts exhibition, but a focal point all on its own. He likens the sequence of projections to graffiti, with the cardboard acting as a blank wall for the artist to make their mark on. Malka's other projects take a similar approach of bridging high concept with low materials. Ame-Lot, which he installed in Paris last year, uses discarded wooden pallets for a student housing project with a geometrical aesthetic that echoes BoomBox's formal qualities. Check out Malka's other projects and see what simple materials are capable of. [Thanks for the tip, Burnlab]
<urn:uuid:72ff3b29-9838-430a-ad2f-653e4dc41b70>
CC-MAIN-2013-20
http://www.core77.com/blog/architecture/high_concept_meets_low_materials_in_boombox_23070.asp
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.948569
381
1.734375
2
In my opinion, the recent selloff in stocks defies commonsense and logic, but in truth and fact it usually does. In other words, it's not uncommon to see investors selling at precisely the time they should be buying and vice versa. Moreover, when investor pessimism is at a high, like it is today, stocks become cheap causing people to panic and sell. Of course, the more people sell the worse it gets and simultaneously the cheaper stocks get. When investors are in this negative state of mind, it amazes me how even good news can become bad news. For example, one of the common arguments for a pending market collapse is based on the notion that corporate margins are high, and therefore must get worse. Therefore, the pessimist takes really good news and immediately wants to turn it into a negative. The following is a summary of the S&P 500's Q1 earnings results taken directly from Standard & Poor's website:Article continues... |1.||Obama’s $3 Million IRA Cap| |2.||Here’s Why Next Week’s Economic Reports Are The Most Critical in Months| |3.||What Next When Dividend Stock Holdings Become Overvalued?| |4.||Warning Signs For Market Are Becoming Ominous| |5.||Real Estate, Especially Commercial Real Estate, Still A Major Problem| |6.||Can a Court Revoke your Advance Health Care Directive?| |7.||Bond-Choking Central Banks Expand Investment Menu| |8.||Understanding How Seasonal Market Strategies Work| |9.||M&A Bankers Away as Elephant Hunters Play| |10.||4 Key Facts About Gold Investing That You Might Not Know|
<urn:uuid:3886474b-c109-4d9e-ac72-500ac7af37d8>
CC-MAIN-2013-20
http://www.corecompass.com/index.php?option=com_content&view=article&id=1165:my-best-investment-advice-watch-your-fellow-investors-and-do-the-opposite&catid=3:public-financial-markets&Itemid=67
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.885793
367
1.695313
2
DAVOS -- United Nations Secretary General Kofi Annan called here on Sunday for more corporations to get serious about environmental protection, human rights and labor standards -- and lobbied them to come on board the UN's Global Compact for corporate responsibility. The UN chief also announced that he had enlisted the help of a top executive, Goran Lindahl, former President and CEO of the Swiss company ABB, Ltd., to recruit more businesses to join the compact. The Compact is set of nine principles on environmental protection, human rights and labor standards that was born out of a speech the Secretary General delivered at the World Economic Forum's Annual Meeting in 1999. Annan asked business leaders on Sunday to not wait for governments to establish laws in these areas but to adopt their own code of conduct based on the Compact's principles. ''Global systems of rules to protect intellectual property are stronger than rules to protect human rights,'' Annan said. The UN has set the target of trying to get 1,000 corporations to endorse the Compact by 2002. So far it has been endorsed by about 300 companies. Annan also announced the convening of a meeting in March to work on how corporations can behave responsibly in zones of conflict. He said that UN agencies on the ground in areas of conflict would work with companies operating in those regions. Georg Kell, Annan's top adviser on the Compact, told the Forum News Daily in an interview at his office at UN Headquarters in New York that the 1999 speech was so well received by governments that they lobbied Annan to take the Compact beyond words even though it was only intended to give a boost to the elements of the UN system that watch over these areas: the UN Environment Programme (UNEP), UN High Commissioner for Human Rights (UNHCHR) and the International Labour Organization (ILO). If the Compact's principles appear to be vague or obscure, then Kell and his associates at the UN have accomplished their mission. According to Kell, the goal was to provide a ''broad tent'' which companies could work under as they shape their practices, taking into account their own The Compact is not a code of conduct, Kell said. Companies do not have to report on their compliance with it. The UN has neither the mandate nor the resources to hold the companies accountable, said Kell. Among the Compact's signatories are 40 top-flight companies (including BP Amoco, DuPont, Unilever and Nike), several business associations including the International Chamber of Commerce, and NGOs such as Amnesty International and the World Wildlife Fund. Many of the signatories say they have been busy trying to incorporate the principles into their business practices, and some are even acting as publicists for the Compact. Volvo Car Corp. has helped build a ''Scandinavian Network'' of companies in the region that have met to discuss best practices in following the Compact's principles, according to Kaarina Dubee, a Corporate Diversity Manager with Volvo. ''We wanted to create a forum for sharing of best practice and experiences,'' she said, ''because it is extremely complex for a company that is not used to thinking about human rights. When it comes to human rights and labor standards, companies tend to work at a very local level, following the laws. But things are changing so quickly.'' The network includes the Norwegian energy company Statoil, ABB and regional offices of Deloitte Touche Tohmatsu. According to Dubee, getting corporations, particularly high-tech companies, to think about human rights and labor standards is more difficult than getting them to think about environmental issues. A high tech company may have to look far down its supply chain to be sure that its suppliers are not violating human rights, labor or environmental standards, said Dubee. The Compact has also caught on with corporations in developing countries. Some 220 Brazilian companies and a local business association have expressed support for the Compact, said Kell. In the Asia-Pacific region, 19 employers' organizations have voiced their support of the Compact, as have business leaders in Malaysia and India. Some companies have tried to improve the conditions of the countries in which they operate. Statoil donated $115,000 to the Norwegian Refugee Council to support refugees and displaced persons in countries where it operates, including Angola, Azerbaijan and Georgia. WebMD, which operates Internet sites providing health care information, is in the process of launching 10,000 online ''tele-medicine'' sites in developing While many groups have supported the Compact, including some of the toughest critics of many of companies that have also endorsed its principles, it does have its critics. Among them is CorpWatch, which says these companies are getting a free ride by not being held accountable for how they follow the Compact's principles in their operations. It argues that if the UN does not have the ability to enforce its principles it should not work with these companies. The Compact's ''vague and voluntary character means that it will likely do more harm than good,'' writes Corporate Europe Observer, a corporate watchdog group. ''Annan has made it no secret that the Global Compact is a chance for corporations to improve their public image and counter the backlash against trade and investment liberalization,'' it wrote. ''It is certain that through the Global Compact the UN will contribute to the largely incorrect impression that corporations are on the way to becoming socially and environmentally responsible actors.'' Kell said this argument is weak. Many of the companies that are endorsing the Compact were not on the radar screens of NGOs and the media, he said, adding that when these companies publicly endorse the Compact they open themselves up to scrutiny. These companies can ''no longer just look at the financial bottom line,'' said Kell. ''You can make change only where there is a need for change.'' When the British mining giant Rio Tinto said it wanted to start mining uranium out of Australia's Kakadu National Park, environmental groups cited the company's endorsement of the Compact as a reason they should abandon the project, according to Kell. Another charge leveled by these groups is that the companies get to ''wrap themselves in the UN flag.'' Kell conceded that, in terms of public image of the Compact, he and his colleagues had been naive. Since this criticism was raised, Kell has made it clear that the UN flag or logo may not be used by any company without clearance from the UN Legal Critics of the Compact have also focused on the natural resources extracting companies that have endorsed the principles Rio Tinto, Royal Dutch/Shell Group, Statoil and Norsk Hydro. Such companies are among those most likely to be working in conflict zones, and in many cases the tax revenues they generate for local governments has exacerbated conflicts. Annan cited how the South African diamond cartel DeBeers was working to ensure it was not purchasing diamonds from areas where there is reason to believe the money would be used to fuel conflict and buy ''Because the oil companies are sometimes among the first foreign investors to arrive in a country,'' said Geir Westgaard, Statoil's Vice President for Country Analysis and Social Responsibility, ''we tend to lead the charge in terms of opening the country to integration into the Westgaard said that oil companies are increasingly being asked to take on responsibilities beyond the scope of their ability, such as ensuring that revenue generated by their operations is used by governments for the public good. ''While we don't want to be seen as shirking our corporate social responsibilities,'' said Westgaard, ''we are not at all comfortable with expectations that we should tell our host governments how to spend their revenues. I believe it's important to acknowledge and draw some clear distinctions between the roles and responsibilities that can and should be assumed by business, NGOs, governments and the UN system Kell and his colleagues at the UN say they agree with this position. Kell has said that governments must not divest themselves of responsibility to their citizens to protect the principles outlined in ''Already governments are divesting responsibilities, and there is a temptation to use the notion of corporate citizenship or social responsibility to justify this,'' said Kell. ''But governments continue to hold the key to unlocking economic opportunities; leaders failing their own people continue to constitute the single biggest source of human This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc. We believe this constitutes a 'fair use' of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml. If you wish to use copyrighted material from this site for purposes of your own that go beyond 'fair use', you must obtain permission from the copyright owner.
<urn:uuid:417f0c96-756c-4fb6-9c8f-bf5f85b07bb8>
CC-MAIN-2013-20
http://www.corpwatch.org/article.php/%20http:/section.php?id=188
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.95559
1,993
1.546875
2
A proposal that's off target? Sheriff, others concerned over proposed gun laws Michael Maresh/Cortez Journal file photo Montezuma County Sheriff Dennis Spruell's views on gun control and proposed new laws relating to this matter mirror what other numerous law enforcement agencies across the country are saying. President Barack Obama's comprehensive plan to address gun violence that was based on the recommendations from a task force led by Vice President Joe Biden, calls for legislation to ban some assault weapons as well as a variety of executive actions. Obama's plan has come under fire since the president unveiled it on Wednesday afternoon. Spruell rarely minces words and made his stance on the issue very clear. "I am a strong believer in the Second Amendment, and I believe people have a right to bear arms," Spruell said on Thursday. "It's a mental problem, a mental health issue. It is not a gun issue." Spruell, speaking from his perspective, said there are enough laws on the books now that deal with gun crime. "We have the right to carry arms," the sheriff said. "We have enough laws, and I am opposed to creating (new ones)." Cities, counties and states across the nation are attempting to create legislation to make it a felony for the federal government to come in to try to confiscate certain types of firearms. However, a University of Denver law professor said federal law trumps state law. Cortez gun business owners also are disappointed with what was included in the president's proposal. They agreed with Spruell that the plan does not address the real problem of keeping firearms away from "crazy" people. Ken Banks, owner of Shooter's World, said nothing in the proposal made much sense or addressed the real problem. "He is just talking words. He is not addressing the problem of insane people having guns," he said. Banks also questioned why the government calls insane people mentally challenged because insane is the proper word. "You have to take the guns out of the hands of the crazy people," he said adding the new proposed laws are aimed at the people who are already obeying the law to the fullest. Larry Chandler, owner of Summit Shooting Center, had a similar view. "We all know that this does not solve anything," he said. "This will not solve any problems whatsoever." He also said more gun laws will not reduce crime, and pointed to Chicago's high gun-related crime rate despite the fact that city has some of the toughest gun laws on the books. "Guns don't kill people, people kill people," he said. "This is ridiculous that this man, the so-called president, is doing this." He said the proposed law and any possible future laws could result in his business closing someday. "It's just going to make it hard on the citizens (who want to have firearms)," he said. Chandler also thinks criminals are not going to submit to any new stringent measures to get guns and will instead get them in a different, and often illegal way, so any new regulations will not affect the people who should not be allowed to own a firearm. Included in the proposal is to have more federally funded school resource officers stationed at schools. Montezuma-Cortez School District Re-1 Superintendent Alex Carter said he would support such a measure to have an officer at every school in the district - if funding was indeed provided to pay those salaries. "We have two excellent school resource officers assigned to Montezuma-Cortez School District Re-1," Carter said via email. Vern Rucker works mainly with the elementary schools and is the lead on the D.A.R.E. program district-wide, and Buck Woodman works mostly with the secondary schools. "They are great partners with our schools and we value their participation in our program hugely," Carter said. "They are both members of our district safety team and provide great insights and support for the development and improvement of our district Emergency Operations Plans." That being said, Carter said if someone offered to give the school district more support in the form of funding for additional school resource officers, he would welcome it. "I would jump at the opportunity," Carter wrote in the email. "In my opinion, there is nothing that makes our schools more safe and secure than having on-duty uniformed officers present. I would love to have one stationed at every school."
<urn:uuid:06d91384-633a-434e-9c71-0855646c6350>
CC-MAIN-2013-20
http://www.cortezjournal.com/article/20130118/NEWS01/130119811/0/COLUMNISTS08/A-proposal-that's-off-target
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.982462
928
1.664063
2
The Fall of a Racist Union Buster Not only did conservative Australian Prime Minister John Howard lose the election last Saturday, he may have lost his seat as well. Labor now controls all nine Australian governments: State, Territory and federal. Industrial relations was the key issue in the election. Years of campaigning against the anti-Aboriginal and xenophobic racism of the conservative Coalition of the Liberal and National Parties turned what had been their most effective political tool into a liability. The Australian union movement has been successfully mobilizing against the Government since over its 2005 legislation that dramatically undermined workers’ rights to organize and forced them onto individual contracts. The new law banned ‘pattern bargaining’ (industry-wide campaigns) and deciding on industrial action at mass meetings. It restricted union officials’ access to members at work and abolished the prohibition of unfair dismissals. The conservatives’ last, desperate racist maneuver was the distribution in one marginal electorate of a fake leaflet from a non-existent Muslim organization, which endorsed the Labor Party because it supposedly forgave the Islamist bombers who killed many Australians visiting Bali in 2003 and supported the construction of a new mosque. A member of the State Liberal Party council and the husbands of the retiring Liberal member and the Liberal candidate were caught stuffing the flyer into letterboxes three days before the election. Since before it won office at the federal level in 1996, the Coalition has drawn on and reinforced widespread racism in Australia to boost its popularity. In the 1996 and 1998 election campaigns, it attacked the land rights and organizations of Indigenous Australians. Invasion, genocidal policies and ongoing racism mean that Aborigines live 17 years less than other Australians, suffer far worse health_not matched by government expenditure on health services for them_have fewer years in formal education and are many times more likely to be imprisoned and unemployed. The Howard government legislated to restrict new Aboriginal land rights granted by the High Court. It abolished the elected, peak Indigenous representative body and many specialized services run for and by Aborigines. In June 2007, it intervened to seize control of Aboriginal land and organizations in the Northern Territory, and limited the right of Indigenous Australians there to decide on what they spent their welfare payments. In 2000 hundreds of thousands marched in favor of reconciliation between Aboriginal and other Australians, after Howard refused to apologize for the history of racist policies. Even though the Labor opposition endorsed the Northern Territory intervention, there were substantial protests against it earlier this year. After intensifying the previous Labor government’s policy of locking up refugees who arrived in Australia on leaky boats in concentration camps, the Coalition Government whipped up paranoia about them to win the 2001 election. Scandals in the detention system, including the deportation of a citizen, and especially the growing refugee solidarity movement forced it to soften its policies in 2005. So the conservatives started to explicitly target Muslims. Australia’s participation in the invasions and occupations of Afghanistan and Iraq, and carefully crafted, but implicit messages from the Government had already reinforced anti-Muslim prejudices. Commenting on mob violence against Muslims and Arabs in the Sydney beach-side suburb of Cronulla in late 2005, Howard denied that there was ‘underlying racism in this country’. But a majority of people in Australia now oppose not only involvement in Iraq but also in Afghanistan. While Labor has promised to bring the troops home from Iraq, the new Labor Prime Minister Kevin Rudd will keep Australian forces in Afghanistan. The Government’s attempts to use race in the run up to the election fell flat. People were not impressed by a new citizenship test, supposedly about ‘Australian values’, that amounts to a quiz on Australian history and sport. Mohamed Haneef, an Indian doctor working in Australia, was targeted because he was the cousin of one of the people involved in the terrorist attacks in the UK at the end of June. The trumped up case against him fell apart. In October the Immigration Minister announced that he had cut the intake of the mostly Christian refugees from Sudan because they weren’t integrating. This may have played well with convinced racists, but did not strike a chord with wider sections of the electorate. The return of class issues Australia has not had a recession since the early 1990s. The economy has been particularly buoyed by mining exports to China. Average real wages have been rising for years and unemployment is below five percent. These factors, largely beyond the Government’s control, helped keep Howard in office for years. Yet he has failed to live up to his 1996 claim that he would make Australians ‘comfortable and relaxed’. While the labor market is tight, most job growth under the Coalition has been in casual and part-time work. The conservatives’ industrial relations policies have led to declining job security and a vast growth in the amount of unpaid overtime. Meanwhile, inequality has increased, profits rates have climbed and managerial salaries have soared. Levels of household indebtedness are high. Howard won the 2004 election on the promise that only he could keep interest rates on home loans down. But, in response to rising inflation, the Reserve Bank increased official rates several times this year. The latest rise occurred during the election campaign. Concerns about debt have intersected with worries about work. Levels of strike action in Australia are at their lowest levels since before World War I, while trade union density has been falling for thirty years. Yet, even before the introduction of the Government’s ‘WorkChoices’ legislation, the Australian Council of Trade Unions organized large rallies. These continued and expanded after the law was passed. Some participants stopped work to attend what were the largest union demonstrations in Australian history. Early this year the ACTU campaign shifted from mobilizing unionists in direct action to election campaigning. Its slogan changed from ‘Your rights at work: worth fighting for’ to ‘Your rights at work: worth voting for’. Most union leaders even fell in behind the Labor Party’s very weak industrial relations policy, dubbed ‘WorkChoices Lite’ because it promised not to repeal the conservatives’ fundamental attacks on union rights. Although Howard has been defeated on a class issue, the Australian Labor Party today is more right wing, its connections with the working class weaker than ever before. Rudd (accurately) describes himself as ‘an economic conservative’. He has promised to ‘take a meat axe’ to the public service, is committed to the US alliance, to keeping troops in Afghanistan and endorses Australian imperialism in south-east Asia and the Pacific. Unions are still affiliated with the ALP, but the influence of union officials in the Party has declined and its working class membership is residual. It is symptomatic that Rudd was himself a very senior public servant and consultant before entering parliament, while his wife’s business earned her millions selling employment services which had been contracted out by the Coalition Government. Australian workers will lose out if they rely on the good will of the Rudd Government. Events during the election campaign indicated that preparedness to act in their own interests can achieve results. Nurses in Victoria took militant, illegal and successful action, that shut down many hospital beds, against the State Labor Government over wages and conditions. Three days before the election, ten thousand Victorian teachers struck over their claims. If other workers, their self-confidence boosted by Howard’s defeat, follow this lead they will not only improve their lives at work but also rebuild the union movement. RICK KUHN is a member of Socialist Alternative and a reader in political science at the Australian National University. He won the 2007 Isaac and Tamara Deutscher Memorial Prize for his Henryk Grossman and the recovery of Marxism. He can be reached at Rick.Kuhn@anu.edu.au
<urn:uuid:f29736f2-f68d-408b-9384-eff7c0111b57>
CC-MAIN-2013-20
http://www.counterpunch.org/2007/11/26/the-fall-of-a-racist-union-buster/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.972426
1,617
1.976563
2
By Karen Kaplan 5:53 PM EST, January 30, 2013 Attention dieters: Many of the “facts” you think you know about obesity and weight loss are wrong. So says a report published in Thursday’s edition of the New England Journal of Medicine. An international team of dietitians, doctors and other experts examined more than a dozen ideas about obesity that are widely believed to be true but aren’t actually supported by reliable medical evidence. It’s not just dieters who buy into these mistaken notions, the study authors note – much of this incorrect conventional wisdom is espoused by physicians, academic scientists, government agencies and (gulp) the media. Seven of these errant ideas were classified as “myths,” meaning they are “beliefs held to be true despite substantial refuting evidence.” Another six were categorized as “presumptions,” or “beliefs held to be true for which convincing evidence does not yet confirm or disprove their truth.” Without further ado, let’s get to the myth-busting: Eating a little less or exercising a little more will lead to large weight loss over time, as long as those behaviors are sustained. This myth is based on the idea that 3,500 calories are equal to one pound. That equation was based on short-term experiments. In the long-term, the body compensates in various ways that slow down weight loss. For instance, the equation predicts that a person who burns 100 extra calories per day will lose more than 50 pounds over five years; in reality, that exercise regimen will cause a person to shed only about 10 pounds (assuming calorie intake remains the same). It’s important to set realistic weight-loss goals so dieters don’t get frustrated. Studies that have examined this reasonable-sounding assumption have found that having realistic goals has no impact on the amount of weight lost. Indeed, some studies have found that those who set the most ambitious goals lost the most weight, even if they fell short of their initial expectations. Slow, gradual weight loss is easier to sustain than large, rapid weight loss. In fact, clinical trials have found that people who jump-start their diets by dropping a lot of weight in the beginning (by consuming only 800 to 1,200 calories per day, for instance) had the best results in long-term studies. In order to help someone lose weight, you must gauge their readiness to stick to a diet. Experimental evidence shows that readiness isn’t related to diet results. School P.E. classes help reduce and prevent childhood obesity. While there is certainly some amount of physical education that would help fight childhood obesity, P.E. classes in their current form have not been shown to reduce BMI or obesity in kids on a consistent basis. Babies who are breast-fed are less likely to become obese. If you think this is true, you’re in good company – the World Health Organization presented this “fact” in one of its reports. But a randomized, controlled clinical trial that followed 13,000 children for more than six years found “no compelling evidence” that breastfeeding staves off obesity, according to the New England Journal of Medicine report. (The authors did note that breastfeeding has other benefits and should be encouraged anyway.) You can burn 100 to 300 calories by having sex. In fact, having sex burns calories at about the same rate as walking at a pace of 2.5 mph. “Given that the average bout of sexual activity lasts about 6 minutes,” the authors write, a man in his early to mid-30s might burn 21 calories. But wait, it gets worse: Considering that this man could burn 7 calories just watching TV, the true benefit of having sex is only 14 additional calories burned. The report also says that these widely accepted ideas are just as likely to be false as true: * Eating breakfast instead of skipping it will help prevent obesity. * Long-term eating and exercise habits are set in early childhood. * Regardless of what else you do, eating more fruits and vegetables will lead to weight loss (or less weight gain). * Yo-yo dieting will take months or years off your life. * Snacking will make you gain weight. * The availability of sidewalks, parks and other aspects of the “built environment” influence the prevalence of obesity. How’s that for a reality check? You can read the full article for yourself here. Return to the Booster Shots blog. Follow me on Twitter @LATkarenkaplan Copyright © 2013, Los Angeles Times
<urn:uuid:47ca9e67-4f25-4611-86c4-df5f69a47bd0>
CC-MAIN-2013-20
http://www.courant.com/health/boostershots/la-heb-weight-loss-myths-20130130,0,7359705,print.story
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.957613
977
2.796875
3
Redistricting proposals to be detailed The Pope County Election Commission is inviting the public to view and discuss the proposed justice of the peace redistricting maps at 6 p.m. Monday. The public session will be at the Election Commission Headquarters, 1509 E. Main St., Suite 7. The 2010 census results showed Pope County's population at 61,754, up from the 2000 census number of 54,469, allowing for 13 justice of the peace districts, with each district comprised of about 4,750 residents. Approved criteria used by the Pope County Election Commission for the justice of the peace redistricting was the same criteria used by the Arkansas Board of Apportionment. The criteria include compliance with the 14th Amendment and Voting Rights Act. The commission is also expected to form geographically contiguous and compact districts, to keep cities within the districts intact as much as possible, to avoid the splitting of precincts as much as possible to maintain communities of interest intact within districts as much as possible and to maintain cores of existing districts as much as possible. The final approved maps of the Senate and House of Representatives districts will be overlaid to the Pope County map to compare district lines.
<urn:uuid:6fcb19cc-d499-4af9-a6ec-7fc0a2b86971>
CC-MAIN-2013-20
http://www.couriernews.com/pages/full_story/push?article-Public+invited+to+JP+meeting%20&id=15383620
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.953569
239
1.820313
2
When networks of people collaborate for good causes nationwide, the benefits to those in need of services are many. The downside to growth of nationwide networking groups is that it is easier for criminals to also benefit. The proliferation of gang activity nationwide and now locally is evidence of the power of networking. The youth we work with like to use the acronym “NIMBY.” While we would all like to think that gang activity is NIMBY (not in my backyard), it is. According to the Evansville Police Department’s Public Information Officer, Jason Cullum, the number of local gangs and their members fluctuate, but we have nine active gangs. “There may be more, but they do not draw enough attention to be on our radar,” Cullum said. “There may be less at times, depending on the mood of the gang members. We have around 300 people we believe to be gang members. That number also fluctuates.” Networks of gangs are also prevalent in surrounding communities. Gang members are involved in more than only violent crimes. According to the Department of Justice (www.justice.gov), a Bloods gang member was sentenced last fall in Nashville, Tenn., to eight years in prison for participating in racketeering activity related to his membership in the Bloods criminal enterprise. Antonio Washington, 22, aka “T.O.,” of Nashville, was ordered by U.S. District Judge Aleta Trauger to serve five years of supervised release following his prison term. Washington pleaded guilty to the racketeering conspiracy. According to court documents, Washington and other Bloods gang members and associates agreed to commit multiple acts of robbery, narcotics trafficking and bribery on behalf of the Bloods gang. But they were also violent. Washington and numerous other members met on a regular basis at various locations throughout Middle Tennessee to report on gang-related business, collect dues, commit disciplinary actions against fellow gang members, discuss acts of violence against rival gang members, and initiate or “jump in” new members by beating them for a period of time, among other things. The negative effects of gang activity on our community are widespread. “The gangs are an issue for our entire community because gang members are more likely to commit violent crimes than non-gang members,” Cullum said. “They are involved in crime more frequently because criminal acts are required to join and remain in a gang.” Teaching young people to develop appropriate pro-social skills, to understand and respect appropriate role models and to have victim empathy are the first steps to helping young people avoid joining gangs. “The youngsters involved in gangs see crime as ‘the norm,’” Cullum said. “Homes where kids are treated with respect, given consistent discipline, and led by good example are less likely to lose a kid to the gang lifestyle.” What can we do to help? According to Cullum, “the community must acknowledge the presence of gangs and accept that they are dangerous — to fight the problem. Once the problem is brought to the surface, then the community can act together to fight it. Education, good parenting skills, and community outreach must all come together to keep our kids and our city safe from gangs.”
<urn:uuid:726f33aa-0b3d-499a-afc6-da1394ee7d5d>
CC-MAIN-2013-20
http://www.courierpress.com/news/2013/feb/11/kids-from-positive-respectful-homes-seldom-join/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.966911
685
1.992188
2
What They Are and How to Learn More about the Appellate Courts and the Justices Who Serve on Them Every four years, more than a third of California’s 99 court of appeal justices face California voters for retention. In addition, several of the seven justices on the California Supreme Court face retention elections every four years. These are not contested elections; no one may run against the justices. Instead, the voters simply decide whether the justice shall continue to serve. If a majority of voters cast "yes" votes for a particular justice, that justice remains for another term. The Code of Judicial Ethics requires all judges "to be faithful to the law regardless of partisan interests, public clamor or fear of criticism . . . ." The retention election system, adopted by California voters as part of the State Constitution, is designed specifically to foster judges’ independence from improper external pressures. Because supreme court justices hold statewide offices, voters everywhere in California decide whether to retain them. In contrast, because court of appeal justices serve in districts, voters in each district alone decide whether to retain them. California’s 99 court of appeal justices are divided among six districts, centered in San Francisco, Los Angeles, Sacramento, San Diego, Fresno, and San Jose. Supreme and appellate court justices generally do not actively campaign for retention. The only promise they can make voters is to decide appeals impartially and according to the law, without fear or favor toward any individual or group. However, they do seek to provide helpful information to voters. The justices have worked closely and actively with the Secretary of State’s Office to help the public learn more about the appellate courts, who the appellate justices are, and what they do. As a consequence, voters everywhere in California can easily get biographical information on every justice who appears on the ballot. As to supreme court justices, the information is contained in the statewide ballot pamphlet sent to all voters by the Secretary of State. As to court of appeal justices, the official statewide voter pamphlet does not contain biographical sketches, but does refer voters to an Internet website and a toll-free telephone hotline so they may obtain justices’ biographies, either on-line or through receipt of the Judicial Information Bookleton request. The Secretary of State’s Internet website and Judicial Information Booklet also include brief descriptions of the appellate courts and how they differ from trial courts. To gain access to these materials, voters may go to the Secretary of State’s Internet website at http://www.ss.ca.gov/ or call the telephone hotline at 1(800) 345-VOTE. While supreme and appellate court justices perform their roles quietly and without fanfare, the public can find much of their work published in law books titled "California Reports," "California Appellate Reports" and "California Reporter." Each of California’s 58 counties has a public law library containing these books, as do law schools and most law offices. Recently issued opinions are available on the same day they are filed at 'Opinions' which is maintained by the Administrative Office of the Courts (AOC), State of California. Adding to the data supplied by the Secretary of State, the Judicial Branch’s website that you are currently reading from also contains biographical information about all the appellate court justices, as well as informative articles entitled "How Appellate and Supreme Court Justices are Selected" and "What Appellate Justices Do."
<urn:uuid:19b4e4f2-853a-4b46-baf8-25a9494b759b>
CC-MAIN-2013-20
http://www.courts.ca.gov/selfhelp/4192.htm
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.941553
706
2.609375
3
Handbag.com and Cancer Research UK have announced a new partnership with the launch of the first ever Handbag Amnesty. Taking place throughout the month of September – www.handbag.com’s dedicated handbag month – and climaxing in October, the Handbag Amnesty will give women across the country the opportunity to bid for the designer handbag of their favourite celebrity including just to name a few Keira Knightley, Sienna Miller and Dame Shirley Bassey, to raise money to help beat cancer. Handbag.com and Cancer Research UK are asking celebrities to make space in their wardrobes by donating one of their designer handbags to the Amnesty. The bags will then be auctioned on eBay from Friday 3rd – Sunday 14th October to tie in with Breast Cancer Awareness month. Open to everyone, all proceeds will go to Cancer Research UK, the largest single funder of research into breast cancer, one of the most common cancers in the UK. The Handbag Amnesty, however, is not just about celebrities. Handbag.com and Cancer Research UK are also asking members of the public to donate a handbag that is still in good condition to their local Cancer Research UK shop. Good handbags always sell like hot cakes in Cancer Research UK’s nationwide chain of charity shops. Claire Higgins, Head of Marketing at handbag.com, says: “As the leading lifestyle website for women in the UK, we are in the unique position of being able to reach more than 1.5 million women across the country. 44,000 cases of breast cancer are diagnosed every year in the UK so we are very proud to be working with Cancer Research UK to help make a difference – not only by raising a lot of money to fund research into preventing breast cancer, but also by helping to raise much needed awareness of the illness.” Paul Farthing, Director of High Value Relationships at Cancer Research UK, says: ‘We’re delighted to be working with handbag.com to launch Handbag Amnesty. The auction of celebrity handbags will be an exciting way to raise funds for our vital research into breast cancer. We also hope that by encouraging supporters to donate their own favourite handbag, and other unwanted quality items to our shops, we will be able to raise even more to help beat cancer.’ Other celebrities taking part are: America Ferrera – Ugly Betty Heidi Montag – From The Hills Dame Judi Dench Julie Benz – From Buffy the Vampire Slayer Lauren Conrad – From The Hills Rachel Stevens – S Club 7 Ruby Hammer – Ruby and Mille make up Sophie Ellis Bextor For more information please visit www.handbag.com/amnesty
<urn:uuid:3ccbdc46-aafe-47ed-a648-a152703656b0>
CC-MAIN-2013-20
http://www.coutureinthecity.com/2008/10/10/handbag-amnesty-is-launched-by-handbagcom-and-cancer-research-uk/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.898588
571
1.65625
2
Boston's Arnold Arboretum: A Place for Study and Recreation-- By looking at Boston's Arnold Arboretum: A Place for Study and Recreation, students discover how the first arboretum in the United States became part of the burgeoning urban park movement in the second half of the 19th century. Those interested in learning more will find that the Internet offers a variety of interesting materials. Frederick Law Olmsted National Historic Site Frederick Law Olmsted National Historic Site is a unit of the National Park System. Visit the park's Web pages for a detailed history of Olmsted as well as information about the Olmsted Archives that has historic documentation for Olmsted-designed landscapes. Also featured on the site is the Olmsted Center for Landscape Preservation (OCLP) providing technical assistance to historic properties in cultural landscape research, planning, stewardship and education. National Park Service (NPS) Historic Landscape Initiative Learn more about the National Park Service (NPS) Historic Landscape Initiative. This program promotes responsible preservation practices that protect our nation's irreplaceable legacy--designed landscapes such as parks and gardens, as well as vernacular historic landscapes such as farms and industrial sites. The Arnold Arboretum of Harvard University Visit the Arnold Arboretum website for more information about this research and educational institution. It manages a collection of hardy trees, shrubs, and vines located on 265 acres in Boston, Massachusetts and associated herbarium and library collections. The grounds were planned and designed by the Arboretum's first director, Charles Sprague Sargent, in collaboration with the landscape architect, Frederick Law Olmsted as part of Boston's Emerald Necklace park system. Visit Some of the Parks Created by Frederick Law Olmsted The Cultural Landscape Foundation The Cultural Landscape Foundation is the only not-for-profit foundation in America dedicated to increasing the publicís awareness of the importance and irreplaceable legacy of cultural landscapes. Visit their website for more information on what cultural landscapes are and what they represent. Also learn about endangered landscapes and grassroots efforts to preserve them. Library of Congress Visit the American Memory Collection Web page to search through the archives for the writings of Frederick Law Olmsted, pictures from his personal collection, and information on his various parks. Also search for information on the industrialization of America, the reactionary movements to the consequences, and Arnold Arboretum. Of special note are the environmental and landscape photographs of Arnold Arboretum. American Journal of Botany Browse the American Journal of Botany, a journal devoted to the study of plants, for a variety of articles on botany. The Industrial Revolution Visit the ThinkQuest Junior Web pages on the Industrial Revolution to explore this time period that helped spark the park movement in America. The site provides important facts about the Industrial Revolution, it offers fun things to do related to the facts learned, and it recommends other sources of information related to the revolution. For Further Reading Students (or educators) wishing to learn more about Frederick Law Olmsted, Charles Sprague Sargent, or the Arnold Arboretum may want to read: Ida Hay, Science in the Pleasure Ground: A History of Arnold Arboretum (Boston: Northeastern University Press, 1995); Witold Rybczynski, A Clearing in the Distance: Frederick Law Olmsted and America in the Nineteenth Century (New York: Scribner, 1999); S. B. Sutton, Charles Sprague Sargent and the Arnold Arboretum (Cambridge: Harvard University Press, 1970); and Cynthia Zaitzevsky, Frederick Law Olmsted and the Boston Park System (Cambridge: Belknap Press, 1982).
<urn:uuid:663377cb-a977-4210-a2cf-52cf8120193b>
CC-MAIN-2013-20
http://www.cr.nps.gov/nR/twhp/wwwlps/lessons/56arnold/56lrnmore.htm
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.885052
790
2.921875
3
What Is Mead? Mead, also known as honey wine, is regarded as the oldest of fermented beverage and has stood the test of time. From the dawn of pre-history to today mead has long been regarded as a delicacy, often referred to as the "nectar of the gods". The earliest archaeological evidence for the production of mead dates to around 7000 BC where pottery vessels containing a mixture of mead, rice and other fruits along with organic compounds of fermentation were found in Northern China. Crafted Artisan Meadery uses the finest raw, unfiltered, unpastuerized honey as well as fruits, spices, herbs, and other natural ingredients to create an experience that is solely "mead". Some of our meads are aged on oak and others not...oak does wonders to an already complex mead. Our use of honey might make you think that mead is only sweet. While mead can be made as sweet as a dessert wine it can also be made dry...and anywhere in between. Yes, you'll find a little of "traditional wine" and even a little of "craft beer" elements but mead is an experience all it's own. Where other beverages work within the confines of industry standards and style categories mead can be broken down into a few broad categories that allow us to be as creative and unique as we want...there are no rules. Traditional Traditional mead is purely Honey, Water, and Yeast. Traditionals allow the chosen honey to be showcased and the drinker to explore the characteristics of that honey. Tupelo, Clover, Orange Blossom, the list is long...there is a wide array of varietal honey available each with it's own unique flavor and aroma characteristics. Melomel Melomels are mead crafted using fruit, honey, water and yeast. Fresh and local: any fruit can be used but we tend to stick to fruits that we can source locally to ensure the freshest and best product possible. We build relationships with our vendors and often times find ourselves hauling a trailer load of cider or blueberries back from their family operations. Ask us, we'd love to share with you how to find these great local farms. Metheglin Metheglins are mead crafted using spices and/or herbs, honey, water and yeast. Cinnamon, vanilla and hibiscus are just a few examples of the countless ingredients we can use. The name "metheglin" finds it origins in the welsh translation "medicine" where these herbal elixirs were seen as have healing powers. We can't vouch for medicinal qualities but can say that a good metheglin is tough to beat. Pyment Pyments are mead crafted using wine grapes, honey, water, and yeast. While being a type of melomel pyments are worth noting for their combination of elements of both wine and mead. While using red or white grapes honey is used to create something that is truly unique. Cyser Cysers are mead crafted using apple cider, honey, and yeast. Being in Northeast Ohio we are in a prime location for some of the best tasting and freshest apple cider around. With our local sources we are usually able to begin a cyser fermentation within a day or two of the cider being pressed. With the number of apple and honey varieties available there is an endless array of flavors to create.
<urn:uuid:9f61095d-0f35-4cbb-862b-20ac132b3c03>
CC-MAIN-2013-20
http://www.craftedmead.com/what-is-mead/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.962861
706
2.59375
3
Arizona Common Core Standards - designed as a one-stop resource for all of your Common Core needs, this link includes specific content for teachers, administrators, students, families and community leaders. The Communications Toolkit has been created to help superintendents, principals, teachers and other community leaders easily communicate to parents, community partners and the public about the Standards. Additional resources for Common Core information: RESOURCE LINKS FOR STAFF Outlook Web Access Login -- to access your Outlook account, when you have the pop up box, type in 'crane/' then your E# and password associated with that login.
<urn:uuid:d9eacff6-e5ad-4c2a-b523-b2ee74939d32>
CC-MAIN-2013-20
http://www.craneschools.org/staffresources
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.902012
126
2.125
2
Join Us on Add To Favorites Discover the beauty, and functionality, of ancient Native American pottery! These replicas are a wonderful way to learn more about a culture. Pottery in any culture is an age-old practice that was originally practical and eventually became seen as an art form. Ancient Native American pieces are beautifully decorated ceramics that are not only functional but a pleasure to look at as well. Choose a style of pottery from one Native nation to replicate. Based on the style of the pot, choose an armature such as a recycled container or crumpled aluminum foil. Cover this basic form with a thin Crayola® Model Magic® layer. Add embellishments to your pot by creating ropes, leather cords, feathers, and beads, as appropriate to the culture and time period, and affixing them to your pot. For even edges, cut the compound with Crayola Scissors. One way to make beads is to cut a long piece of fishing line. Make small Model Magic balls and wrap them around the fishing line about half-way down the length. Leave enough fishing line uncovered so you can use it to wrap around the lip of the pot later. Try making different shapes of beads and alternating colors to get different patterns. Another way to make beads is by wrapping the Model Magic compound around short pieces of plastic straws. You can then string your beads any way you like. At the end of a string of beads on Native pottery, there are often large decorative feathers. Roll out Model Magic compound into feathers. Combine different colors for multicolor feathers. Then take a craft stick or other modeling tool to etch in the feather’s vein and the edges. Press the feather on the fishing line at the end of your beads. Cut off any fishing line that sticks out on the bottom. Wrap the extra fishing line around the lip of the pot and tie a knot. You can hide the fishing line by covering the lip with cords or other decorative elements. Adorn your pot with a beautiful rope by braiding three long pieces of Model Magic compound and then wrapping the braid around the lip. Add leather-like cords by rolling out long pieces of Model Magic compound and pressing them a little flat. Then twist and hang them on your pot. Model Magic® dries to the touch overnight and dries completely in 2 to 3 days. Study Native American use of animal hides for homes and clothing. Add To Favorites How do people communicate when the landscape is as barren and forbidding as Arctic tundra? Make a stone message board In Make a realistic replica of a Hopi messenger from the spirit world. Incorporate natural objects to explore this traditio Tell bigger-than-life raven stories from the Tlingit, Salish, and Haida nations. Build a miniature theatre to set the st Interview relatives about your family history. Write and illustrate the story of your family's past on a scroll you can Create an original pop-art repetitive portrait based on a study the life and work of Andy Warhol. Picasso’s art career spanned many decades and included a variety of styles and influences. Create a portrait collage ins Update an ancient craft with contemporary designs and art materials. These holiday ornaments are light and unbreakable, Our crayons have been rolling off the assembly line since 1903, and you can see how it’s done. Visit us » Be the first to know!
<urn:uuid:67bf451a-fd43-4295-971e-25c07fdc2b9d>
CC-MAIN-2013-20
http://www.crayola.com/lesson-plans/native-pottery-replicas-lesson-plan/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.923685
726
2.84375
3
Intensive Outpatient Program The IOP is twelve-weeks of three sessions of three hours duration per week. The sessions will be delivered in a group format. Each session has a similar structure but with different topics for each psycho-educational group and group session component. Components of a three hour session include a subset of the following: Community Meeting: The community meeting consists of four parts. - Introductions have all members introduce themselves. - Clinic announcements - Have each member of the group state something about which he or she are proud. - Have each member of the group state something with which he or she needs help. Group members and the counselor can offer to help the patient in the non-clinical area for which they are requesting help. This is not an issues group and the counselor should not delve into clinical issues, those should be handled in either group or individual sessions. Psycho-educational Group: Each group is interactive and should be presented in a manner to foster participation from the patients on the topic being discussed. (Refer to discussion/module schedules) Goals Group: Each patient should state his or her goals for the week. The patient will be working towards these goals both in sessions and as homework assignments and work outside of the session. Every week the patient will report on the progress of their weekly goals, as well as set new goals. Group Session: Each session will follow a topic that the counselor will use to encourage patients to have an open and interactive discussion. (Refer to discussion/module schedules) Session II of each week is for involvement of family members/significant others. Each patient should bring with them family members/significant others who will be important in their recovery process. Patients without any family/significant other support, will still be required to participate in these lectures and groups sessions. Multi-family Group is designed to further discuss the topics that are presented in the psycho-educational group and to also discuss how the patient’s addiction has impacted their family/support system. Relapse Prevention Group: This group is designed to help patients avoid relapse. The counselor will lead the group discussion based on the topics identified on the “discussion schedule”. Each patient should identify and discuss his or her own issues related to the discussion topics.
<urn:uuid:44b9cdf2-ce07-483a-a532-e4ff55bf3e88>
CC-MAIN-2013-20
http://www.crcotp.com/intensive_outpatient.php
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.950091
470
1.695313
2
Dinosaur Bones "Buried" By Evolutionists! A recent presentation at the 2012 Western Pacific Geophysics meeting in Singapore showed C-14 dates of soft tissue found in dinosaur bones to be in the range from 22,000 - 39,000 years old. Previously, it has been assumed that dinosaurs died out over 65 million years ago, so these new findings are astonishing and should have made international news. But shortly after the presentation was made at the meeting, the abstract was removed from the meeting’s website! So it appears that instead of making international news, these findings have been buried. First, let’s look at what was actually being presented. The organic matter (collagen) and hard carbonate bone mineral (bioapatite) in the bone samples were analyzed. The samples came from several species of dinosaurs (acrocanthosaur, hadrosaurus, triceratops and apatosaurus) taken from various sites in Texas, Colorado, Arkansas and Montana. The samples were meticulously handled and cleaned to avoid possible contamination. The carbon-14 (C-14) levels in these samples were measured using Accelerator Mass Spectrometry (AMS). The resultant C-14 ages obtained from these samples were consistently in the 22,000 - 39,000 years range. The fact that the samples were from a variety of species and sites all giving consistent results greatly reduces the chance that the results are from contamination. The theoretical upper limit for C-14 dating is ten times the half-life, or about 57,000 years. The proposed practical upper limit for C-14 dating is between 40,000 - 50,000 years. While some samples fell close to the 40,000 year upper limit, 16 out of 20 (80%) were aged at 35,000 years or younger, well within the acceptable upper C-14 dating limits. While other researchers have found soft tissue in dinosaur bones and C-14 dates in these ranges, this current study has been the most comprehensive. The fact that there is any collagen at all remaining in these bone samples is amazing, considering that they are supposed to be older than 65 million years. Protein just doesn’t hang around that long! And that there is any C-14 in them also is reason to possibly question conventional wisdom. But why have we not heard about any of this in the news? Shouldn't there have been at least a 15-second blip from one of the media outlets? But the media have been silent and the abstract pulled from the meeting proceedings. The sacred cow of evolution once again remains intact. We truly are living in an age of great deception. “And for this cause God shall send them strong delusion, that they should believe a lie.” (2 Thessalonians 2:11) This article, by Creation Moments board member Dr. Don Clark, is based on an interview broadcast by Broken Road Radio. To hear the interview and many others on biblical creation topics, go to http://brokenroadradio.com/morning-show-september-17-2012/
<urn:uuid:6cb92412-144d-4c9c-b1c1-b3638ba84556>
CC-MAIN-2013-20
http://www.creationmoments.net/resources/blog/201210/dinosaur-bones-buried-evolutionists
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.963144
636
3.09375
3
BRUSSELS (AP) -- The European Union's economic affairs commissioner says the eurozone is seriously considering forcing Greece to set up a separate fiscal account that would be dedicated to repay its debts as part of a new bailout. Such an account, which could take in the new bailout money or even part of Greece's general government revenue, would be an unprecedented intrusion into the fiscal affairs of a sovereign state. It was proposed by Germany and France earlier this week. Under that proposal, revenues would go first to servicing Greece's debt before paying for government services. Olli Rehn said Thursday such a separate account, which was proposed by Germany and France earlier this week, was "one relevant possibility of reinforcing surveillance and ensuring effective implementation of the (bailout) program."
<urn:uuid:6687fa23-42d4-400c-8e62-c94ef1229a1e>
CC-MAIN-2013-20
http://www.crescent-news.com/ap%20international/2012/02/09/eurozone-pushes-for-separate-greek-debt-account
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.972714
157
1.632813
2
Send us news by text, start your message CN News and your send photos and videos to 80360 Three wishes to find the next generation of Olympic stars in East Lancashire In the third of a four-part series into how East Lancashire can capitalise on the success of our athletes in the London Olympics, local government reporter Bill Jacobs asked a range of people across East Lancashire for their three wishes about how to get children involved in sport and find the next generation of medal winners from the area. David Whyte, principal of St Wilfrid’s Academy, Blackburn - Specialist PE ambassador for small groups of primary schools contributing to an area-coordinated approach to identify and develop talent. - Regional opportunities to offer a variety of training camps during holiday periods with top coaches. - Schools and clubs need to forge closer links whilst our best athletes should be drawn to other sports rather than being sucked into being almost successful footballers. Brendan Loughran, principal, Darwen Aldridge Community Academy and Specialist Sports College - Plan and establish a network of secondary schools specialising in sports. - We need a community approach where these schools place specialist PE staff into primary schools and there is support available to establish local school and sports club partnerships. - Promoting and supporting elite practice – bring highest quality coaches into schools. Jim Bowen, Accrington teacher turned TV and radio personality - We need to put a greater emphasis in schools on competitive sport not just with other schools but within the schools as the real world is competitive. - More dedicated physical education and sports teachers. - Greater respect in schools for PE and sports as part of the curriculum - the same as for maths, English and other academic subjects. Wayne Hemingway, a Blackburn designer - A change of media emphasis from empty-headed celebrities who have achieved nothing to people who have worked hard to achieve like our Olympic sports stars. - A shift in emphasis in schools means of measuring achievement from just in terms of achievement in GCSEs, English, Maths and A-levels to a wider measure. - Paying state teachers to supervise after-school coaching and Saturday matches. Janet Walsh, head teacher of Colne Primet High School - Further development of the School Sports Partnership Scheme – to also involve an element of brokerage for schools to contact or make links with sports people who can do work in schools. - A review of legislation which constrains some aspects of school sport – eg teachers’ minibus driving eligibility. - Help schools in encouraging the ‘sporting’ nature of supporting all competitors in a match or event. Samantha Murray, Clitheroe’s 2012 Modern Pentathlon Olympic silver medallist - More interschool sports competitions. - More people joining the Ribble Valley Modern Pentathlon team in Clitheroe. - Closer links between schools and sports clubs so that parents and children can find out how to access their local clubs. Sophie Hitchon, Blackburn Harrier and Burnley’s 2012 Olympic shot put finalist - I would like to see more sports available for children to try at school to help them find what they are naturally good at - More competitive sport in schools - More funding for sports clubs, to make it cheaper for participants. Steven Burke, Colne’s 2012 Olympic gold-medal winning cyclist - Now the Olympic Games have come to an end, I hope what the cycling team in particular has achieved will inspire people of all ages to ride their bikes. - More coverage in the media of bike races and events. - Future Olympians from Lancashire achieve Olympic glory Helen Tyson, school games organiser for Burnley School Sports Partnership - Continuation of secondary teacher release funding - local specialist secondary PE teachers to support primary schools to deliver high quality PE and School Sport – after the academic year 2012/13. - Cross Party Government Policy that places PE and School Sport as a priority alongside English and Maths, with a committed allocation of time for children to participate in school sport – both competitive and recreational. - Investment in a School Sport Coaching Programme that trains, deploys and funds coaches to deliver specialist sports coaching in schools.
<urn:uuid:3f2d93c6-4c76-4436-976e-f6f7c6e28465>
CC-MAIN-2013-20
http://www.creweguardian.co.uk/sport/london_olympics_2012/9884503.Three_wishes_to_find_the_next_generation_of_Olympic_stars_in_East_Lancashire/?ref=rss
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.940244
885
1.53125
2
[Note: in Japan, it is customary to refer to a person with their last name first. We have retained this practice in the below excerpt from Kurosawa’s text.] The gate was growing larger and larger in my mind’s eye. I was location-scouting in the ancient capital of Kyoto for Rashomon, my eleventh-century period film. The Daiei management was not very happy with the project. They said the content was difficult and the title had no appeal. They were reluctant to let the shooting begin. Day by day, as I waited, I walked around Kyoto and the still-more-ancient capital of Nara a few miles away, studying the classical architecture. The more I saw, the larger the image of the Rashomon gate became in my mind. At first I thought my gate should be about the size of the entrance gate to Toji Temple in Kyoto. Then it became as large as the Tengaimon gate in Nara, and finally as big as the main two-story gates of the Ninnaji and Todaiji temples in Nara. This image enlargement occurred not just because I had the opportunity to see real gates dating from that period, but because of what I was learning, from documents and relics, about the long-since-destroyed Rashomon gate itself. “Rashomon” actually refers to the Rajomon gate; the name was changed in a Noh play written by Kanze Nobumitsu. “Rajo” indicates the outer precincts of the castle, so “Rajomon” means the main gate to the castle’s outer grounds. The gate for my film Rashomon was the main gate to the outer precincts of the ancient capital--–--–Kyoto was at that time called “Heian-Kyo.” If one entered the capital through the Rajomon gate and continued due north along the main thoroughfare of the metropolis, one came to the Shujakumon gate at the end of it, and the Toji and Saiji temples to the east and west, respectively. Considering this city plan, it would have been strange had the outer main gate not been the biggest gate of all. There is tangible evidence that it in fact was: The blue roof tiles that survive from the original Rajomon gate show that it was large. But, no matter how much research we did, we couldn’t discover the actual dimensions of the vanished structure. As a result, we had to construct the Rashomon gate to the city based on what we could learn from looking at extant temple gates, knowing that the original was probably different. What we built as a set was gigantic. It was so immense that a complete roof would have buckled the support pillars. Using the artistic device of dilapidation as an excuse, we constructed only half a roof and were able to get away with our measurements. To be historically accurate, the imperial palace and the Shujakumon gate should have been visible looking north through our gate. But on the Daiei back lot such distances were out of the question, and even if we had been able to find the space, the budget would have made it impossible. We made do with a cut-out mountain to be seen through the gate. Even so, what we built was extraordinarily large for an open set. When I took this project to Daiei, I told them the only sets I would need were the gate and the tribunal courtyard wall where all the survivors, participants and witnesses of the rape and murder that form the story of the film are questioned. Everything else, I promised them, would be shot on location. Based on this low-budget set estimate, Daiei happily took on the project. Later, Kawaguchi Matsutaro, at that time a Daiei executive, complained that they had really been fed a line. To be sure, only the gate set had to be built, but for the price of that one mammoth set they could have had over a hundred ordinary sets. But, to tell the truth, I hadn’t intended so big a set to begin with. It was while I was kept waiting all that time that my research deepened and my image of the gate swelled to its startling proportions. When I had finished Scandal for the Shochiku studios, Daiei asked if I wouldn’t direct one more film for them. As I cast about for what to film, I suddenly remembered a script based on the short story “Yabu no naka” (“In a Grove”) by Akutagawa Ryunosuke. It had been written by Hashimoto Shinobu, who had been studying under director Itami Mansaku. It was a very well-written piece, but not long enough to make into a feature film. This Hashimoto had visited my home, and I talked with him for hours. He seemed to have substance, and I took a liking to him. He later wrote the screenplays for Ikiru (1952) and Shichinin no samurai (Seven Samurai, 1954) with me. The script I remembered was his Akutagawa adaptation called “Male-Female.” Probably my subconscious told me it was not right to have put that script aside; probably I was—without being aware of it–wondering all the while if I couldn’t do something with it. At that moment the memory of it jumped out of one of those creases in my brain and told me to give it a chance. At the same time I recalled that “In a Grove” is made up of three stories, and realized that if I added one more, the whole would be just the right length for a feature film. Then I remembered the Akutagawa story “Rashomon.” Like “In a Grove,” it was set in the Heian period (794-1184). The film Rashomon took shape in my mind. Since the advent of the talkies in the 1930s, I felt, we had misplaced and forgotten what was so wonderful about the old silent movies. I was aware of the aesthetic loss as a constant irritation. I sensed a need to go back to the origins of the motion picture to find this peculiar beauty again; I had to go back into the past. In particular, I believed that there was something to be learned from the spirit of the French avant-garde films of the 1920s. Yet in Japan at this time we had no film library. I had to forage for old films, and try to remember the structure of those I had seen as a boy, ruminating over the aesthetics that had made them special. Rashomon would be my testing ground, the place where I could apply the ideas and wishes growing out of my silent-film research. To provide the symbolic background atmosphere, I decided to use the Akutagawa “In a Grove” story, which goes into the depths of the human heart as if with a surgeon’s scalpel, laying bare its dark complexities and bizarre twists. These strange impulses of the human heart would be expressed through the use of an elaborately fashioned play of light and shadow. In the film, people going astray in the thicket of their hearts would wander into a wider wilderness, so I moved the setting to a large forest. I selected the virgin forest of the mountains surrounding Nara, and the forest belonging to the Komyoji temple outside Kyoto. There were only eight characters, but the story was both complex and deep. The script was done as straightforwardly and briefly as possible, so I felt I should be able to create a rich and expansive visual image in turning it into a film. Fortunately, I had as cinematographer a man I had long wanted to work with, Miyagawa Kazuo; I had Hayasaka to compose the music and Matsuyama as art director. The cast was Mifune Toshiro, Mori Masayuki, Kyo Machiko, Shimura Takashi, Chiaki Minoru, Ueda Kichijiro, Kato Daisuke and Honma Fumiko; all were actors whose temperaments I knew, and I could not have wished for a better line-up. Moreover, the story was supposed to take place in summer, and we had, ready to hand, the scintillating midsummer heat of Kyoto and Nara. With all these conditions so neatly met, I could ask nothing more. All that was left was to begin the film. However, one day just before the shooting was to start, the three assistant directors Daiei had assigned me came to see me at the inn where I was staying. I wondered what the problem could be. It turned out that they found the script baffling and wanted me to explain it to them. “Please read it again more carefully,” I told them. “If you read it diligently, you should be able to understand it because it was written with the intention of being comprehensible.” But they wouldn’t leave. “We believe we have read it carefully, and we still don’t understand it at all; that’s why we want you to explain it to us.” For their persistence I gave them this simple explanation: Human beings are unable to be honest with themselves about themselves. They cannot talk about themselves without embellishing. This script portrays such human beings–the kind who cannot survive without lies to make them feel they are better people than they really are. It even shows this sinful need for flattering falsehood going beyond the grave—even the character who dies cannot give up his lies when he speaks to the living through a medium. Egoism is a sin the human being carries with him from birth; it is the most difficult to redeem. This film is like a strange picture scroll that is unrolled and displayed by the ego. You say that you can’t understand this script at all, but that is because the human heart itself is impossible to understand. If you focus on the impossibility of truly understanding human psychology and read the script one more time, I think you will grasp the point of it. After I finished, two of the three assistant directors nodded and said they would try reading the script again. They got up to leave, but the third, who was the chief, remained unconvinced. He left with an angry look on his face. (As it turned out, this chief assistant director and I never did get along. I still regret that in the end I had to ask for his resignation. But, aside from this, the work went well.) During the rehearsals before the shooting I was left virtually speechless by Kyo Machiko’s dedication. She came in to where I was still sleeping in the morning and sat down with the script in her hand. “Please teach me what to do,” she requested, and I lay there amazed. The other actors, too, were all in their prime. Their spirit and enthusiasm was obvious in their work, and equally manifest in their eating and drinking habits. They invented a dish called Sanzoku-yaki, or “Mountain Bandit Broil,” and ate it frequently. It consisted of beef strips sautéed in oil and then dipped in a sauce made of curry powder in melted butter. But while they held their chopsticks in one hand, in the other they’d hold a raw onion. From time to time they’d put a strip of meat on the onion and take a bite out of it. Thoroughly barbaric. The shooting began at the Nara virgin forest. This forest was infested with mountain leeches. They dropped out of the trees onto us, they crawled up our legs from the ground to suck our blood. Even when they had had their fill, it was no easy task to pull them off, and once you managed to rip a glutted leech out of your flesh, the open sore seemed never to stop bleeding. Our solution was to put a tub of salt in the entry of the inn. Before we left for the location in the morning we would cover our necks, arms and socks with salt. Leeches are like slugs—they avoid salt. In those days the virgin forest around Nara harbored great numbers of massive cryptomerias and Japanese cypresses, and vines of lush ivy twined from tree to tree like pythons. It had the air of the deepest mountains and hidden glens. Every day I walked in this forest, partly to scout for shooting locations and partly for pleasure. Once a black shadow suddenly darted in front of me: a deer from the Nara park that had returned to the wild. Looking up, I saw a pack of monkeys in the big trees about my head. The inn we were housed in lay at the foot of Mount Wakakusa. Once a big monkey who seemed to be the leader of the pack came and sat on the roof of the inn to stare at us studiously throughout our boisterous evening meal. Another time the moon rose from behind Mount Wakakusa, and for an instant we saw the silhouette of a deer framed distinctly against its full brightness. Often after supper we climbed up Mount Wakakusa and formed a circle to dance in the moonlight. I was still young and the cast members were even younger and bursting with energy. We carried out our work with enthusiasm. When the location moved from the Nara Mountains to the Komyoji temple forest in Kyoto, it was Gion Festival time. The sultry summer sun hit with full force, but even though some members of my crew succumbed to heat stroke, our work pace never flagged. Every afternoon we pushed through without even stopping for a single swallow of water. When work was over, on the way back to the inn we stopped at a beer hall in Kyoto’s downtown Shijo-Kawaramachi district. There each of us downed about four of the biggest mugs of draft beer they had. But we ate dinner without any alcohol and, upon finishing, split up to go about our private affairs. Then at ten o’clock we’d gather again and pour whiskey down our throats with a vengeance. Every morning we were up bright and clear-headed to do our sweat-drenched work. Where the Komyoji temple forest was too thick to give us the light we needed for shooting, we cut down trees without a moment’s hesitation or explanation. The abbot of Komyoji glared fearfully as he watched us. But as the days went on, he began to take the initiative, showing us where he thought trees should be felled. When our shoot was finished at the Komyoji location, I went to pay my respects to the abbot. He looked at me with grave seriousness and spoke with deep feeling. “To be honest with you, at the outset we were very disturbed when you went about cutting down the temple trees as if they belonged to you. But in the end we were won over by your wholehearted enthusiasm. ‘Show the audience something good.’ This was the focus of all your energies, and you forgot yourselves. Until I had the chance to watch you, I had no idea that the making of a movie was a crystallization of such effort. I was very deeply impressed.” The abbot finished and set a folding fan before me. In commemoration of our filming, he had written on the fan three characters forming a Chinese poem: “Benefit All Mankind.” I was left speechless. We set up a parallel schedule for the use of the Komyoji location and open set of the Rashomon gate. On sunny days we filmed at Komyoji; on cloudy days we filmed the rain scenes at the gate set. Because the gate set was so huge, the job of creating rainfall on it was a major operation. We borrowed fire engines and turned on the studio’s fire hoses to full capacity. But when the camera was aimed upward at the cloudy sky over the gate, the sprinkle of the rain couldn’t be seen against it, so we made rainfall with black ink in it. Every day we worked in temperatures of more than 85º Fahrenheit, but when the wind blew through the wide-open gate with the terrific rainfall pouring down over it, it was enough to chill the skin. I had to be sure that this huge gate looked huge to the camera. And I had to figure out how to use the sun itself. This was a major concern because of the decision to use the light and shadows of the forest as the keynote of the whole film. I determined to solve the problem by actually filming the sun. These days it is not uncommon to point the camera directly at the sun, but at the time Rashomon was being made it was still one of the taboos of cinematography. It was even thought that the sun’s rays shining directly into your lens would burn the film in your camera. But my cameraman, Miyagawa Kazuo, boldly defied this convention and created superb images. The introductory section in particular, which leads the viewer through the light and shadow of the forest into a world where the human heart loses its way, was truly magnificent camera work. I feel that this scene, later praised at the Venice International Film Festival as the first instance of a camera entering the heart of a forest, was not only one of Miyagawa’s masterpieces but a world-class masterpiece of black-and-white cinematography. And yet, I don’t know what happened to me. Delighted as I was with Miyagawa’s work, it seems I forgot to tell him. When I said to myself, “Wonderful,” I guess I thought I had said “Wonderful” to him at the same time. I didn’t realize I hadn’t until one day Miyagawa’s old friend Shimura Takashi (who was playing the woodcutter in Rashomon) came to me and said, “Miyagawa’s very concerned about whether his camera work is satisfactory to you.” Recognizing my oversight for the first time, I hurriedly shouted “One hundred percent! One hundred for camera work! One hundred plus!” There is no end to my recollections of Rashomon. If I tried to write about all of them, I’d never finish, so I’d like to end with one incident that left an indelible impression on me. It has to do with the music. As I was writing the script, I heard the rhythms of a bolero in my head over the episode of the woman’s side of the story. I asked Hayasaka to write a bolero kind of music for the scene. When we came to the dubbing of that scene, Hayasaka sat down next to me and said, “I’ll try it with the music.” In his face I saw uneasiness and anticipation. My own nervousness and expectancy gave me a painful sensation in my chest. The screen lit up with the beginning of the scene, and the strains of the bolero music softly counted out the rhythm. As the scene progressed, the music rose, but the image and the sound failed to coincide and seemed to be at odds with each other. “Damn it,” I thought. The multiplication of sound and image that I had calculated in my head had failed, it seemed. It was enough to make me break out in a cold sweat. We kept going. The bolero music rose yet again, and suddenly picture and sound fell into perfect unison. The mood created was positively eerie. I felt an icy chill run down my spine, and unwittingly I turned to Hayasaka. He was looking at me. His face was pale, and I saw that he was shuddering with the same eerie emotion I felt. From that point on, sound and image proceeded with incredible speed to surpass even the calculations I had made in my head. The effect was strange and overwhelming. And that is how Rashomon was made. During the shooting there were two fires at the Daiei studios. But because we had mobilized the fire engines for our filming, they were already primed and drilled, so the studios escaped with very minor damage. After Rashomon I made a film of Dostoevsky’s The Idiot (Hakuchi, 1951) for the Shochiku studios. This Idiot was ruinous. I clashed directly with the studio heads, and then when the reviews on the completed film came out, it was as if they were a mirror reflection of the studio’s attitude toward me. Without exception, they were scathing. On the heels of this disaster, Daiei rescinded its offer for me to do another film with them. I listened to this cold announcement at the Chofu studios of Daiei in the Tokyo suburbs. I walked out through the gate in the gloomy daze, and, not having the will even to get on the train, I ruminated over my bleak situation as I walked all the way home to Komae. I concluded that for some time I would have to “eat cold rice” and resigned myself to this fact. Deciding that it would serve no purpose to get excited about it, I set out to go fishing at the Tamagawa River. I cast my line into the river. It immediately caught on something and snapped in two. Having no replacement with me, I hurriedly put my equipment away. Thinking this was what it was like when bad luck catches up with you, I headed back home. I arrived home depressed, with barely enough strength to slide open the door to the entry. Suddenly my wife came bounding out. “Congratulations!” I was unwittingly indignant: “For what?” “Rashomon has the Grand Prix.” Rashomon had won the Grand Prix at the Venice International Film Festival, and I was spared from having to eat cold rice. Once again an angel had appeared out of nowhere. I did not even know that Rashomon had been submitted to the Venice Film Festival. The Japan representative to Italiafilm, Giuliana Stramigioli, had seen it and recommended it to Venice. It was like pouring water into the sleeping ears of the Japanese film industry. Later Rashomon won the American Academy Award for Best Foreign Language Film. Japanese critics insisted that these two prizes were simply reflections of Westerners’ curiosity and taste for Oriental exoticism, which struck me then, and now, as terrible. Why is it that Japanese people have no confidence in the worth of Japan? Why do they elevate everything foreign and denigrate everything Japanese? Even the woodblock prints of Utamoro, Hokusai and Sharaku were not appreciated by Japanese until they were first discovered by the West. I don’t know how to explain this lack of discernment. I can only despair of the character of my own people. Excerpted from Something Like an Autobiography, trans., Audie E. Bock. Translation Copyright ©1982 by Vintage Books. Reprinted by permission of Vintage Books, a division of Random House.
<urn:uuid:7db29226-63a3-4e2a-9fff-87120625a08c>
CC-MAIN-2013-20
http://www.criterion.com/current/posts/196-akira-kurosawa-on-rashomon
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.982666
4,863
2.703125
3
Dr. Jennifer Rohn is a cell biologist, novelist, and founder of LabLit.com. In this episode, Jennifer and I talk about why there are not many stories that involve scientists as main characters. And so, LabLit.com was created to be a resource for storytelling and art that involve science, whether it’s characters or laboratory settings. Jennifer is also the writer of two novels, Experimental Heart, and The Honest Look…both of which are available online or can be obtained through your local bookstore. You can follow Jennifer on Twitter @JennyRohn. And you can also follow LabLit on Twitter @LabLit.
<urn:uuid:c968ed56-d630-4ed5-acc1-498794661b79>
CC-MAIN-2013-20
http://www.criticalwitpodcast.com/podcast/episode-51-lab-lit-stories-about-science-and-scientists/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.946517
134
1.890625
2
Crochet Lampshade from The Complete Book of Crochet I spent the last two weeks of December down in the Los Angeles area with my brother and sister. That was actually longer than I’d planned to stay but the three of us are almost never all together in one place so it was worth it. We did lots of stuff but there was one day that we really just wanted to chill out so we went to the Santa Monica library and spent the day reading. I know just about every crochet book in my own public library so I was curious to see what they had that was different. What I found was that they have several vintage 1970′s crochet books which my library doesn’t carry. Complete Book of Crochet One of the books that I found there was The Complete Book Of Crochet published in 1973 by London’s Octopus Books. It’s a fun crochet pattern book with an introduction to how to crochet and then patterns for home decor items as well as gifts, wearables and kids’ stuff. What I found most interesting about this book, cependant, was not the patterns but rather a section in the intro that tells you how to launder your crochet work as well as how to mount crochet to linen. Although it doesn’t call it “blocking”, the process it describes as a method of blocking crochet which should typically be done after a project is first made and each time that you wash it so that the item retains the shape that you want it to have. There are several sites with good tips on blocking crochet and this certainly isn’t the definitive guide but I thought what this book had to say was helpful and interesting. How to Block Crochet The basic steps of blocking offered in this 1973 crochet book include: - Place a piece of plain white paper on top of a clean, flat board. Use the correct measurements to draw out what the correct shape and size of the item is. A ruler, set square and compasses should be used to get the right shapes and angles. - Wash the crochet item by hand and leave it damp or half dry. - Pin your crochet item on to the paper, using the outline that you’ve drawn to make sure that you’re correctly shaping the item. Pin the general shape down first, leaving things like picots and chain spaces alone. Use rustless pins for this process. - Once you have the general shape down, pin the specific parts of the item. Make sure all picots are pulled out to their full shape, all flowers have their petals pinned in the right place, etc. Pay special attention to make sure that your loops, shells and other shapes are the same size and shape. - If you are pinning a filet crochet item then make sure that the spaces and blocks are square with even edges. Use a solution of starch in water to stiffen the item if necessary. Crochet Blocking Resources - Michaels has a good description of the different types of blocking that crocheters commonly used today depending on the yarn type used in the project. - Linda Permann has a great basic how to block guide that I think is a must-bookmark. - Futuregirl has some great posts on her site including celui-ci that shows how to block a scarf with blocking wires. - Kim Werker offers a great guide on CrochetMe about how to spray block crochet or knit squares.
<urn:uuid:8c8ac677-60a5-4586-aa9f-3153ba06bd63>
CC-MAIN-2013-20
http://www.crochetconcupiscence.com/fr/2012/01/1970s-tips-for-crochet-blocking/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.958144
715
1.757813
2
St. Francis, Animals and the Environment Dr. Marcellino D'Ambrosio You often see a garden statue of him with a bird on his shoulder. Yes, St. Francis of Assisi did have a special relationship with animals. He preached to the birds, pacified a wolf, and put together an animal cast for what is regarded as the very first live nativity scene. But he had no interest in “the environment.” No feeling for it whatsoever. Instead, he was in love with creation. And that’s because he was in love with the Creator, who he regarded not as some cosmic force or distant, detached monarch, but as “Father.” He so much loved God his Father that he had great affection for anything related to God – the sacraments, the Church, its very imperfect ministers, broken down country chapels, and all of God’s marvelous works of art – human beings first and foremost, but also the animals and even the inanimate objects that adorn the heavens and the earth. The fondness for and kinship St. Francis felt with “brother son and sister moon” was truly a gift. But it is gift that we all receive when we receive the Holy Spirit since it is one of the seven gifts mentioned in Isaiah 11:2-3. At least this is how St. Thomas Aquinas and many after him explained this beautiful, supernatural gift of piety. The natural virtue of piety was extolled by the Greeks and Romans – a love of those who gave you life, first and foremost your parents and after them, your fatherland. This entailed also a respect and affection for all that is connected with your parents and dear to them as well– your grandparents, uncles and aunts, and in the case of your country, its flag, its national anthem, its history and its heros. The term for piety towards one’s country is “patriotism” which actually has at its root, the term “pater” or “father.” St. Francis loved his home town of Assisi. But his deeper patriotism was for the Kingdom of God. His affection for the Kingdom included respect and reverence for all the King’s creatures and subjects, whether they be great or small. Now, this does not mean that Francis saw all creatures as his equals, as some animal rights advocates today seem to do. One animal rights philosopher, Peter Singer, goes so far as to teach that adult whales and chimpanzees are actually superior to human fetuses and infants in both dignity and value. He would save the whales but allow both abortion and infanticide. St. Francis would be appalled at such a concept. Biblical person that he was, he understood that woman and man are God’s supreme masterpieces, made in His image and likeness, unlike the animals. Human beings are given dominion over the rest of creation in Genesis 2 not to exploit however, but to cultivate, care for, and perfect. God entrusts Adam and Eve not with “the environment,” but with “the Garden” – a place of beauty in which we are made to walk with God. So St. Francis loves the birds, but also presses them into the service of the gospel. He saves the wolf of Gubbio from the wrath of angry townspeople, but rebukes it for its ferocity and calls men and wolf to live everafter in harmony. And the animals of the nativity scene? They are companions of the infant who is the Word made flesh. So the authentic biblical and Catholic approach to “the environment” is not to see it coldly and scientifically as “the environment.” But rather, in the fashion of St. Francis, to approach it as the expression of the Father’s beauty, as the gift of the Father’s love, as an icon, a window to the new creation. Reckless exploitation would never fit with such a vision. But neither would some secular environmentalism. Follow Us - Join us on Facebook Join us on Twitter Dr. Marcellino D’Ambrosio writes from Texas. For more information on his resources and his pilgrimages to Italy and the Holy Land, visit www.crossroadsinitiative.com or call 1.800.803.0118. Click here to download and print, click here! For more Catholic resources to feed your faith, visit the Crossroads Initiative Homepage. To sign up for our free weekly e-mail with Dr. D'Ambrosio's commentary on the Sunday readings, liturgical feasts, updates on where Dr. D will be speaking, a chance to WIN a FREE CD and MORE, CLICK HERE! Personal Prayer: Pathway to Joy Marcellino D'Ambrosio, Ph.D. Everyone knows that personal prayer is important. You can't expect to deepen a relationship with God talking with Him only once a week! But how, in the midst of the busy, noisy life we all lead, can we develop a pattern of daily prayer that really works? And if we are successful in carving out some moments for prayer, what do we do? How should we spend that time in way that would be most fruitful? Dr. Marcellino D'Ambrosio has taught spiritual theology academically, but, more importantly, he's had plenty of practice applying that tradition to everyday life. With a family of seven, a business, and a non-profit corporation to run, he knows the challenges that a busy, active life can pose to the Christian who wants to pray. In this talk, he lays down principles and gives practical suggestions on how busy laypeople can develop a prayer life that leads to joy and personal transformation. CD - $8.95 The Seven Deadly Sins - 3 CD Set What are the Seven Deadly Sins? There are books written about them and movies made about them, but what are they? From about the fifth century, Christian spiritual writers identified seven patterns of sin that, if not broken, would lead to spiritual death. In this fascinating series by Dr. Marcellino D'Ambrosio, we learn the destructive, addictive dynamics of these seven vices and how they infiltrate, and ultimately take over people's lives. Most importantly, we find out how to get free of the chains forged by these sins and the necessary qualities to cultivate to make us immune to them in the future. Beyond the Birds and the Bees "The Talk." It's one of the most daunting prospects parents face. Communicating the richness of Catholic teaching on sexuality in a faithful and effective way can be an overwhelming responsibility. But does it have to be so? In this thoroughly revised version of Beyond the Birds and the Bees, Greg and Lisa Popcak empower you with the tools needed to move well beyond "the Talk" by offering a comprehensive guide to raising sexually whole and holy children. Using the riches of Blessed John Paul II's Theology of the Body, the Popcaks help you safely navigate your children from infancy through the teenage years and beyond. Building Our House on Rock: The Sermon On The Mount Jesus’ Sermon on the Mount ends with the parable of the builders on rock or sand. Doing what Jesus asks results in building a life that endures; not doing it results in disaster. The choice is ours, and it’s a scary one. How can we read these words so that we can know what Jesus meant and do it?
<urn:uuid:8d7c0d8f-2e3c-47c2-83e9-05a17f5f46e5>
CC-MAIN-2013-20
http://www.crossroadsinitiative.com/library_article/1334/St._Francis__Animals_and_the_Environment.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.959403
1,571
2.703125
3
Did the OT Prophets Know What They Were Saying? - Thursday, November 17, 2011 By Matt Waymeyer When reading Scripture, the tendency of many Christians is to think in terms of what this verse means to me. What the Bible means to a given individual, however, is completely irrelevant, for the true meaning of Scripture is found not in the subjective impression of the contemporary reader but rather in the specific intention of the original author. For this reason, we often speak of “authorial intent” as the goal of Bible interpretation. But this only raises a further question: exactly whose intent are we seeking to ascertain? The intent of the human author or the intent of the divine author? Or is it possible that there is actually no tangible difference between the two? Herein lies one of the key issues in the field of hermeneutics today—the question of whether the human intention and divine intention of Scripture are one and the same. A Closer Look at a Difficult Passage Some interpreters point to 1 Peter 1:10-12 as evidence of a sharp distinction between of the human and divine intention of OT prophecy. In this passage, the apostle Peter writes: (10) As to this salvation, the prophets who prophesied of the grace that would come to you made careful searches and inquiries, (11) seeking to know what person or time the Spirit of Christ within them was indicating as He predicted the sufferings of Christ and the glories to follow. (12) It was revealed to them that they were not serving themselves, but you, in these things which now have been announced to you through those who preached the gospel to you by the Holy Spirit sent from heaven—things into which angels long to look. According to this view, 1 Peter 1:10-12 teaches that the OT prophets did not understand the meaning of their own prophecies. For this reason, it is said, the human and divine intent of Scripture cannot be regarded as one and the same. At issue here is perspicuity of the Old Testament. The term “perspicuity” refers to the overall clarity of God’s Word in which the meaning of Scripture was basically clear and comprehensible to its original audience. Some interpreters effectively deny the perspicuity of the Old Testament by insisting that its true meaning could only be understood hundreds of years later in light of the New Testament. This was the conviction of George Eldon Ladd, who insisted that “the New Testament frequently interprets Old Testament prophecies in a way not suggested by the Old Testament context.” Many who embrace this view refer to this as the sensus plenior of the Old Testament. Sensus plenior means “fuller sense,” and it refers to an additional, deeper meaning of an OT passage which was (a) intended by God, (b) not intended or understood by the human author, (c) not understood by the original audience, and (d) not known to exist until it was discerned and revealed by the NT writer. According to the sensus plenior view, the Holy Spirit embedded a hidden meaning in the OT passage even though the original human author and audience were completely unaware of it, and the NT citations of the OT often bring out this fuller meaning. If 1 Peter 1:10-12 teaches that the OT prophets were unaware of the meaning of their prophecies, it would seem to provide biblical justification for this view. On the contrary, the ignorance of the OT prophets as described in 1 Peter 1:10-12 has been greatly overstated. As Walt Kaiser observes, 1 Peter 1:10-12 “decisively affirms that the prophets spoke knowingly on five rather precise topics: 1) the Messiah, 2) his sufferings, 3) his glory, 4) the sequence of events (for example, suffering was followed by the Messiah’s glorification), and 5) that the salvation announced in those pre-Christian days was not limited to the prophets’ audiences, but it also included the readers of Peter’s day (v. 12).” In other words, what the prophets unsuccessfully strived to understand was not the meaning of their prophecies but rather the identity of the Messiah and the time of His coming. Recently on Pastors / Leadership Have something to say about this article? Leave your comment via Facebook below! Listen to Your Favorite Pastors Add Crosswalk.com content to your siteBrowse available content
<urn:uuid:27d21ae9-2884-497a-9d39-e7026f51240c>
CC-MAIN-2013-20
http://www.crosswalk.com/church/pastors-or-leadership/did-the-ot-prophets-know-what-they-were-saying.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.968272
929
2.140625
2
Frugality Opens Doors to Giving, Enjoying God's Blessings - Friday, June 09, 2006 I want to be careful to balance our discussion by warning that we should not allow our desire to be frugal to keep us from fully enjoying the things that are within the bounds of what God allows. I thoroughly enjoy the breathtaking view of the city from my home. My husband and I have made great sacrifices in putting the needs of God’s house before our own desires. Therefore, we refuse to allow Satan to make us feel guilty about what God has provided. Frugality is not a call to poverty, and it certainly should not take the fun out of our lives. It is important that we enjoy the abundant life that Christ came to give us. It is equally important to understand that abundance is not to be equated with extravagance. God blesses His children with abundance so that they can bless others with their overflow. If we are all poverty-stricken, how will we have an overflow? Frugality is simply avoiding waste. Wastefulness will keep your finances in a tailspin. Frugality is evidence that God can trust you with increased resources because you have learned how to manage what He already supplied. Taken from 30 Days to Taming Your Finances by Deborah Smith Pegues; Copyright 2006 by Deborah Smith Pegues; Published by Harvest House Publishers, Eugene, OR; Used by Permission. Deborah Smith Pegues is an experienced certified public accountant, a Bible teacher, a speaker, a certified behavioral consultant specializing in understanding personality temperaments, and the author of 30 Days to Taming Your Tongue. She and her husband, Darnell, have been married for more than 27 years and make their home in California. Recently on Finances Have something to say about this article? Leave your comment via Facebook below! Listen to Your Favorite Pastors Add Crosswalk.com content to your siteBrowse available content
<urn:uuid:7d3109b5-39ae-46af-8f0d-2c55fc5b0547>
CC-MAIN-2013-20
http://www.crosswalk.com/family/finances/frugality-opens-doors-to-giving-enjoying-gods-blessings-1401010.html?p=2
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.950811
407
1.671875
2
Indonesia is known for being prone to natural disasters of all kinds, ranging from climatic (floods, drought) to geologic (earthquakes, landslides, tsunamis, volcanoes, etc.), biological (avian influenza) to man-made (deforestation, mining, conflicts). With an already high level of food insecurity, households' vulnerability to shocks is high as the assets and structures of communities are jeopardized by these complex emergencies and a general lack of disaster risk reduction and management. Over the past five years, more than 1,500,000 people have been directly affected by natural disasters, primarily in West Sumatera, West Java, Central Java, West Nusa Tenggara, East Nusa Tenggara and Papua. Following the tsunami of 2004, the government of Indonesia has become more aware of the risks, both real and potential, affecting the provinces, and has taken steps to build the capacity of its staff in disaster risk reduction. Emergency preparedness and response has also become a priority for the Indonesian Church, specifically the national Caritas office—KARINA—and a growing number of dioceses. Various disasters over the past five years offered opportunities for the dioceses in those areas to contribute to the disaster responses and increase their response and management capacities. This has provided Catholic Relief Services Indonesia with greater opportunity to work with and support the local Church and other organizations to improve their capacity in emergency response programming. Latest Stories From Indonesia View all stories »» See all the different ways your support helps people around the world after disasters strike. »» The latest eruption from Indonesia's Mount Merapi volcano killed 70 people and forced thousands to flee from their homes. »» When Sumatran villagers were left homeless after an earthquake, a CRS program helped them build 11,000 houses in just a few months. »» |Population:||248,645,008 (July 2012 est.)| |Size:||735,358 sq. mi.; slightly less than three times the size of Texas| |People Served:||863 (2012 est.)| Since 1957, Catholic Relief Services has been helping rural communities in Indonesia alleviate human suffering, eradicate poverty and become self-reliant. Over the past five years, CRS in Indonesia has responded to various disasters and helped more than 60,000 people rebuild their lives. Our response to the West Sumatera earthquake in 2009 through cash grant for transitional shelter has been widely appreciated by the local government and donor community as the most effective strategy to provide timely, appropriate, accountable and high quality interventions. PartnersKARINA (Caritas Indonesia) CORDAID and Caritas Australia United Nations Office for the Coordination of Humanitarian Affairs
<urn:uuid:148006ce-2cf9-4b2a-a5c6-7bc1a406a114>
CC-MAIN-2013-20
http://www.crs.org/countries/indonesia
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.937576
568
3.03125
3
Our Product Research Team At Crutchfield, you'll get detailed, accurate information that's hard to find elsewhere. That's because we have our own in-house Product Research team — they open the box, verify contents, check the owner's manual, and record dimensions, features and specs. We stay on top of new products and technologies to help people make informed choices. Overview: The Sonos Bridge is used to connect a Sonos Digital Music System to your home network or to extend the wireless range of your existing Sonos Digital Music System. The Sonos Bridge makes setting up your wireless Sonos system fast and easy by simply connecting the Bridge to your router to instantly activate SonosNet (a secure wireless mesh network). All your Sonos players (Connect, Play:5) and the Sonos Controller will work wirelessly and can be placed anywhere in your home. Although the Bridge doesn't play music like a Sonos player, it's an effective way to extend the range of your Sonos system and expand the Controller's wireless coverage. It's also a way to connect other products to the Internet. Note: This unit is not a stand-alone device and requires at least one Sonos player (Connect, Connect:Amp, Play:3, or Play:5) Instant Wired/Wireless Setup: The Bridge connects to your router using a standard Ethernet cable connection (2-port switch, 10/100Mbps, auto MDI/MDIX). Then, a simple press of the button located on top of the Bridge will start SonosNet, a secure AES encrypted, peer-to-peer wireless mesh network that enables other Sonos products to control and play music wirelessly. System Flexibility: Once you've set up your Bridge, you can easily add components anytime. If your home has structured (built-in) wiring, you can make a wired connection to additional Sonos players or Bridges. If you don't have structured wiring, you can take advantage of Sonos' built-in wireless technology. The Bridge provides flexibility to place your Sonos players in any room of the house and connect them all wirelessly. Ethernet Ports: The Bridge has two Ethernet jacks on the back to bring standard Internet connectivity to your set-top box, PC, Game Console or NAS drive. Range Expansion: You can stream music wirelessly to a remote location by placing a Bridge between your Sonos player in a remote location and the rest of your Sonos system. You can also improve Controller access to SonosNet by placing the Bridge in areas where wireless coverage needs a boost. The Bridge is ideal for retrofits, where your Sonos players might be in one location instead of being placed throughout your home. Desktop Controller Software: Designed with a user interface to accommodate large screen displays, the supplied Sonos Desktop Controller software for PC and Mac will guide you through both set up and music sharing. It offers all the same functionality as the Sonos Controller, but instead of being in the palm of your hand, it's all on your desktop. The software offers the - Easy-to-use wizard for set up and music sharing. Set up music folders on your hard drive so they can be shared across all Sonos players. - Control of your Sonos Digital Music System from your desktop. - Add and edit your choice of Internet radio stations. System Requirements: You computer will need to meet the following system requirements to connect the Bridge and use the supplied Sonos Controller - PC: Windows XP SP3 or higher, Windows Vista, Windows 7, Windows 8 - Mac: OS X v10.6 or higher - Internet Connection: DSL, Cable Modem or LAN-based high-speed Internet connection recommended
<urn:uuid:f93bb81c-0ef0-437f-a163-d144777ee4fd>
CC-MAIN-2013-20
http://www.crutchfield.com/S-RffUqxqbqL6/p_616BR100/Sonos-BRIDGE.html?offerId=19158
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.897751
812
1.859375
2
Medicine and ImagingOur faculty are engaged in research collaborations with colleagues in biomedical engineering, neurology and neuro-surgery. Areas of central interest to these disciplines draw on techniques developed in mathematics, algorithms, computer vision and computer graphics. Thus, our students are well prepared to undertake research in these exciting fields. Specific areas in which our faculty, graduate and undergraduate students are contributing include: brain image analysis, image-guided neurosurgery, medical imaging and diffusion imaging. Some courses that are relevant for this area are:
<urn:uuid:92bd7fab-1d57-4272-bf57-475bc7603cb7>
CC-MAIN-2013-20
http://www.cs.mcgill.ca/prospective-students/undergraduate/medicine/imaging
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.941457
105
1.617188
2
(Washington) - “We know all too well that few efforts to build democratic and tolerant societies in Kosovo or anywhere in the region can succeed without addressing the role of Slobodan Milosevic and the need for democratic change in Serbia itself. Until that occurs, the international community will continue to be challenged in the region,” said Commission Chairman Rep. Christopher H. Smith (R-NJ) at today’s hearing “Kosovo’s Displaced and Imprisoned” held by the Commission on Security and Cooperation in Europe. Commissioner Rep. Frank R. Wolf (R-VA) and Ranking Commissioner Rep. Steny H. Hoyer (D-MD) also attended. Testifying before the Commission were: Ambassador John Menzies, Deputy Special Advisor to the President and Secretary of State for Kosovo Implementation, U.S. Department of State; Bill Frelick, Director of Policy, U.S. Committee for Refugees; His Grace Artemije, Serbian Orthodox Bishop of Prizren and Raska; Andrzej Mirga, Chairman, Project on Ethnic Relations Romani Advisory Council, and Co-Chair, Specialists Group on the Roma of the Council of Europe; Susan Blaustein, Senior Consultant, International Crisis Group; and Ylber Bajraktari, a political analyst from Kosovo. Smith emphasized that during this time of attempted reconciliation, “it is particularly important that we are alert around the time of important anniversaries, such as the anniversary of the NATO bombing that is forthcoming.” He also said that “we must keep our focus on potential Hot Spots that might devolve into another Kosovo, areas such as southern Serbia or Montenegro. And we must make every effort to remember the forgotten and vulnerable in Kosovo—the Roma, Conscientious Objectors, Muslim Slavs and those Albanians accused by extremists to have been collaborators with the Serbian regime.” Smith called upon the Clinton Administration to raise the public level of attention to the status of Albanian prisoners of conscience in Serbia and to call upon the Serbian regime to comply with international law and release them. Menzies, speaking for the Clinton Administration, said that “gradually, peace is taking hold, and the resolution of the questions posed by the displaced and imprisoned are important factors in building that peace. The key to the return of all citizens of Kosovo is security.” However, Menzies said, “The continued detention of Albanians in Serbia remains a tragic and acutely vexing issue for the international community. Given our lack of diplomatic relations with Belgrade, it is difficult for the U.S. Government to directly pressure the Milosevic regime on this issue.” Bishop Artemije recommended, “KFOR should be more robust in suppressing violence, organized crime and should more effectively protect the non-Albanian population from extremists. This is required by the U.N. resolution . More international police should be brought to Kosovo. Finally, the international community, especially the U.S., should make clear to Kosovo Albanian leaders, that they cannot create an ethnically cleansed state under the protectorate of western democratic governments.” Andrzej Mirga commented, “The most devastating effect on minds and feelings of those belonging to minorities is the fact that the same atrocities which were associated with Serbs during the conflict are taking place now in the presence of international forces.…Until civil society, rule of law, and moderation are achieved it is hard to believe that these minorities will feel secure.” Susan Blaustein noted, “It was U.S. officials in Washington who allowed the issue of the Albanian prisoners to be dropped from the negotiating table.…Nevertheless,…the pragmatic omission of the prisoner issue from the military-technical agreement that brought the conflict to a much-desired close does not in any way relieve the parties to that conflict of the obligation to release, immediately upon the cessation of hostilities, all prisoners of war (POWs) and civilians detained in the course of armed conflict. This obligation is incumbent upon all signatories to the Third and Fourth Geneva Conventions of 1949 and the accompanying Protocol II of 1978…” Ylber Bajraktari humanized the numbers by citing cases, such as: 24-year-old Albin Kurti, a former leader of the non-violent student movement; Flora Brovina, a prominent pediatrician and human rights activist; Ukshin Hoti, a Harvard graduate considered by some to be a possible future leader of Kosovo; and, Bardhyl Caushi, Dean of the School of Law, University of Pristina. Frelick recommended, “The U.S. Government and other donors should direct bilateral funding to international nongovernmental organizations to develop alternative networks to deliver humanitarian assistance in Serbia. This will not only establish alternative networks for the delivery of humanitarian assistance, thus breaking the Yugoslav Red Cross’ monopoly and introducing healthy competition that will hopefully make the YRC more accountable as well, but will also encourage the development of an active and vibrant local NGO sector in the Federal Republic of Yugoslavia (FRY).” egarding resettlement, Frelick said, “The United States should institute refugee processing out of Podgorica, Montenegro; President Clinton should issue a presidential determination permitting the United States to consider admitting certain categories of internally displaced persons in the FRY as refugees for purposes of the U.S. resettlement program; and, the following vulnerable groups such as: a) Roma and Hashkalija (gypsies) who fled from Kosovo to Serbia proper, Montenegro, or Macedonia would have a well-founded fear of persecution if returned to Kosovo. b) Ethnic Albanians from Kosovo who fled from Kosovo to Serbia proper or Montenegro because of threats or persecution at the hands of ethnic Albanian nationalists who accuse them of collaborating with the Serbian regime ruling Kosovo until June 1999 and who have a well-founded fear of persecution if returned to Kosovo. A relatively small number of ethnic Albanians fled Kosovo. c) Serbian conscientious objectors. d) Gorani, Slavic Muslims who fled Kosovo into Serbia proper or Montenegro. e) The refugees who continue to live in collective centers in Kosovo. f) Members of Albanian-Serbian mixed marriages. g) Ethnic Albanians from Serbia proper (mostly Presevo) who have fled into Macedonia. h) Other ethnic and religious minorities from Kosovo.” Approximately two years ago, a decade of severe repression and lingering ethnic tensions in Kosovo erupted into full-scale violence, leading eventually to NATO intervention in early 1999 and UN administration immediately thereafter. The conflict in Kosovo was ostensibly between the Serbian and Yugoslav forces controlled by Yugoslav President Slobodan Milosevic—since indicted for war crimes—on the one hand, and the Kosovo Liberation Army which arose from more militant segments of Kosovo’s Albanian majority on the other. As with previous phases of the Yugoslav conflict, however, the primary victims have largely been innocent civilians. Over one million ethnic Albanians were displaced during the conflict, as well as over 100,000 Serbs and tens of thousands of Roma in the aftermath of the international community’s intervention. Senseless atrocities were frequently committed throughout this process of forced migration. Many remain unable to return, and the recent violence in the northern city of Mitrovica demonstrates the continued volatility of the current situation. Meanwhile, a large number of Kosovar Albanians, removed from the region while it was still under Serbian control, languish in Serbian prisons to this day. Media Contact: Chadwick R. Gore
<urn:uuid:5f35441b-bdc7-4a33-93f9-2b6c4ec73d0b>
CC-MAIN-2013-20
http://www.csce.gov/index.cfm?FuseAction=ContentRecords.ViewDetail&ContentRecord_id=106&ContentType=P&ContentRecordType=P&UserGroup_id=59&region_id=59&year=0&month=0&Subaction=ByDate&CFID=12188023&CFTOKEN=65836901
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.941578
1,592
1.820313
2
By Alex T. Johnson and Mischa Thompson, PhD, Policy Advisors As part of an ongoing initiative to foster ethnic minority political participation in the OSCE region1, Congressman Alcee L. Hastings (D-FL), Co-Chairman of the United States Helsinki Commission attended the United Nations (UN) Second Session of the Forum on Minority Issues. The Session focused on Minorities and Effective Political Participation, took place on November 12 and 13, 2009 at the Palais des Nations in Geneva, Switzerland. The purpose of the Forum was to “identify and analyze best practices, challenges, opportunities and initiatives for the further implementation of the UN Declaration on the Rights of Persons Belonging to National or Ethnic, Religious and Linguistic Minorities.” The Forum consisted of a Preparatory Meeting for NGOs, Workshop for Minority Political Actors, the Forum, and two Side events organized by the Minority Rights Group and United Nations Office of the High Commissioner for Human Rights. Recommendations based on the proceedings were produced at the close of the forum.2 The U.S. delegation to the Forum was led by Congresswoman Barbara Lee (D-CA), Chairman of the Congressional Black Caucus. In addition to Co-Chairman Hastings, other members of the U.S. delegation included, Congressman Mike Honda (D-CA) - Chair of the Congressional Asian Pacific American Caucus, and Delegate Donna Christensen (D-VI). The Forum was Chaired by Congresswoman Lee and convened by United Nations Independent Expert on Minority Issues, Gay McDougall. More than five hundred persons participated in the Forum, including more than eighty elected officials and other political actors, forty-five delegates and ninety-five non-government organizations from all over the world. The U.S. Delegation attended the Workshop for Minority Political Actors, which took place prior to the Forum and allowed elected officials and other political figures to discuss their own priorities and strategies for increasing minority political participation. Participants discussed barriers and possible remedies and efforts governments, parliaments, political parties, national human rights institutions, civil society, treaty bodies, United Nations institutions, the media, and other stakeholders could engage in to foster minority political participation. The U.S. delegation focused on the need to educate minority populations on their civil and political rights, including voting, running for office, and advocacy. Additionally, to address the lack of representation of minorities in government, the delegation called for initiatives that would increase employment opportunities for minorities in the political sphere. Specifically, these recommendations included introducing civic education programs led by minorities and developing minority youth professional development programs at government agencies, in parliaments, and in international bodies. Congressman Honda highlighted the importance of including minorities in the development, management, and implementation of government initiatives targeting minorities. “One should see minorities in professional positions upon immediately entering national human rights agencies, especially when the agency has a stated goal of combating racism and discrimination,” he argued. (This and other suggestions from the U.S. Delegation were included in the final Recommendations of the Forum.) As Chairperson, Congresswoman Lee opened the official Forum. In her remarks, she noted that empowering minorities politically is critical to achieving a truly democratic, free and global community. While she cited the election of President Barack Obama as an example of gains made toward fair election processes, she stated that minorities are still underrepresented in the U.S. Congress. For instance, there is currently only one African-American serving in the U.S. Senate.) Additionally, she stated that a continued focus of the Congressional Black Caucus and other minority caucuses was to address disparities between minority and majority populations in all aspects of society including the political arena. Following her remarks, government delegates and members of civil society ranging from Iranian dissidents to South Asian Dalit activists gave remarks. While many of the governments offered descriptions of their various initiatives to foster minority political participation, some governments provided assessments and prescriptions for improvement, including the U.S. government. Of particular relevance to minority political participation in the European context were the comments of OSCE High Commissioner on National Minorities Knut Vollebaek.3 The Office of the High Commissioner on National Minorities is a unique institution of the OSCE in that it is situated in a politico-security dimension of the organization and facilitates confidential direct assessments on the status of minorities in the 56 participating States of the OSCE. High Commissioner Vollebaek highlighted how the underrepresentation of minorities in public services exacerbates the challenge of involving minorities in civic life. More specifically, he noted that exclusion and its causes threaten the stability of societies if left unaddressed. Other presentations throughout the forum corroborated the importance of this message. Speaking on the panel “Concrete Steps to Advance Minority Political Participation and to Build Capacity of Minorities to Participate Effectively,” Co-Chairman Hastings highlighted his work with minority European Parliamentarians in convening the 2009 Black European Summit.4 He noted findings from the Summit, including that “the majority of our political and legal systems do not accurately reflect the racial and ethnic diversity of our societies.” He called for this problem to be addressed via “simple solutions governments, political parties, and non-governmental organizations can employ such as advertising employment opportunities in minority communities, requiring that at least a percentage of persons interviewed for a position are minorities, and providing fellowships and internships for minority youth in Parliament, government agencies, and other organizations.” On the margins of the UN Minority Issues Forum, Co-Chairman Hastings convened a roundtable of participants of the April 2009 Black European Summit and other interested parties. The roundtable provided an opportunity to follow up on the Brussels Declaration adopted at the close of the Black European Summit (see Appendix 1), and discuss future initiatives for continuing the transatlantic dialogue. The discussion also informed individuals unable to participate in the Black European Summit about the scope of activities and potential for future collaboration. Participants identified destinations for study tours to view the situation of minorities and existing initiatives to increase minority political participation in the OSCE region. The United Kingdom, Netherlands, France, and Germany were specifically named given that the populations of visible minorities in these countries remains high and that they each offer unique narratives for analyzing methods to overcome barriers to minority political participation. Participants reaffirmed the need for annual meetings to sustain linkages between minority political actors and agreed to identify additional minority leaders to expand the transatlantic dialogue and plan future initiatives. The “Recommendations of the second session of the Forum on Minority Issues on minorities and effective political participation” were compiled at the close of the Forum and should serve as a useful guide for governments to foster minority political inclusion.5 Moreover, in the OSCE region, sustaining a transatlantic dialogue with minority political actors focused on minority political inclusion is not only key to implementation of the recommendations, but also realizing the commitments to democratic societies enshrined in both the UN Declaration on the Rights of Persons Belonging to National or Ethnic, Religious and Linguistic Minorities and the Helsinki Final Act. We, as members of the public, private, and voluntary sectors from Europe and the United States of America convening in Brussels, Belgium from the 15 to 16 of April 2009 for the Black European Summit: Transatlantic Dialogue on Political Inclusion, draw attention to the need for coordinated strategies to address racism and discrimination; We recognize the democratic, multi-ethnic and multi-racial nature of our countries’ diverse societies; We reaffirm the principles of equal rights and self-determination of peoples and recalling that all individuals are born equal in dignity and rights; We remain concerned that the political and legal systems in some of our societies do not reflect the racial and ethnic diversity within our societies, which then contributes to the continuation of racism and discrimination; We recognize that the full access of racial and ethnic minorities to participate in the political sphere and relevant areas of decision making at the levels of national, regional, and locally elected government appropriate to each nation is critical to combating racism and inequality and ensuring our democratic societies; We therefore note the need for concrete strategies to: increase the representation and influence of racial and ethnic minority policymakers; jointly seek solutions to racial and ethnic minorities increased participation in decision-making in the development and implementation of policy initiatives to address discrimination and inequality; and support opportunities to exchange and share perspectives in these areas through the continuance of a transatlantic dialogue to realize these goals. We today resolve that we will endeavor to enact initiatives to eradicate racial and ethnic discrimination through: Continuing a transatlantic dialogue that: includes cultural exchanges between American and European racial and ethnic minority groups, including youth; focuses on the development of opportunities for racial and ethnic minority political leadership and participation in the policymaking process; and fosters the exchange of information on best practices to implement and enforce antidiscrimination measures and achieve racial equality; Joining forces over the coming months to develop common goals and objectives in each of our decision-making bodies to recognize Europe’s Black and racial and ethnic minority populations for their historical and present-day contributions and acknowledge past injustices; Promoting racial and ethnic minority participation at all levels of national, regional, and local government through the education of civil and political rights, including the legislative process and advocacy of legislative issues relevant to racial and ethnic minority communities, development of targeted professional development and hiring strategies, and increased youth and community outreach; Reaffirming our continued cooperation and commitment to work with our governments, international institutions, civil society, private sector, and other partners to improve institutions so that they are fully participatory and reflect the democratic principles of equality, justice, and celebration of the strengths of our countries’ diversity. In 2008, Congressman Hastings Chaired two U.S. Helsinki Commission hearings entitled: “The State of (In)visible Black Europe: Race, Rights, and Politics” and “Racism in the 21st Century: Understanding Global Challenges and Implementing Solutions.” At the hearings, the lack of minority representation in European policymaking, especially at national levels, was identified as a major obstacle to combating racism and discrimination by European witnesses. This prompted a call for a transatlantic dialogue on minority political participation that included best practices from the United States’ Civil Rights Movement. The resulting events have been the 2009 Black European Summit and 2010 Transatlantic Dialogue on Minority Political Leadership. 1In 2008, Congressman Hastings Chaired two U.S. Helsinki Commission hearings entitled: “The State of (In)visible Black Europe: Race, Rights, and Politics” and “Racism in the 21st Century: Understanding Global Challenges and Implementing Solutions.” At the hearings, the lack of minority representation in European policymaking, especially at national levels, was identified as a major obstacle to combating racism and discrimination by European witnesses. This prompted a call for a transatlantic dialogue on minority political participation that included best practices from the United States’ Civil Rights Movement. The resulting events have been the 2009 Black European Summit and 2010 Transatlantic Dialogue on Minority Political Leadership. 2A summary of the discussions, recommendations, statements, and other information on the Forum can be found at: http://www2.ohchr.org/english/bodies/hrcouncil/minority/documentation_2ndsession.htm 3Statement by Mr. Knut Vollebaek, OSCE High Commissioner on National Minorities http://www2.ohchr.org/english/bodies/hrcouncil/minority/docs/Item%20IV%20Conditions%20required%20for%20effective%20political%20participation/2009UNForumWrittenStatement_OSCE_HCNM.doc 4Statement by Co-Chairman Alcee L. Hastings: http://www.csce.gov/index.cfm?Fuseaction=Files.Download&FileStore_id=1813 5Recommendations from the forum can be found at: http://www2.ohchr.org/english/bodies/hrcouncil/minority/documentation_2ndsession.htm
<urn:uuid:f807ef58-75f2-41cb-a312-d206dbe9f14e>
CC-MAIN-2013-20
http://www.csce.gov/index.cfm?FuseAction=ContentRecords.ViewDetail&ContentRecord_id=478&Region_id=0&Issue_id=0&ContentType=G&ContentRecordType=G&CFID=17299551&CFTOKEN=47528228
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.927401
2,491
1.898438
2
Please Join the U.S. Helsinki Commission OSCE 101: Briefing for Civil Society For those in need of a refresher course and those interested in becoming involved. Learn about the Organization for Security and Cooperation in Europe and the Role of Civil Society Thursday, September 4, 2008, 10:00 a.m. - 12:00 p.m. B318 Rayburn House Office Building Don’t forget! For those planning to travel to Warsaw, Poland, remember to register to participate in the OSCE’s Annual Human Rights Meeting What: Human Dimension Implementation Meeting (HDIM) When: September 29 – October 10, 2008 Where: Warsaw, Poland Why: Annual 2-week human rights conference Free Registration, Agenda, and Information on past meetings: http://www.osce.org/odihr/16533.html (Note: registration may not yet be open, please keep checking website) What is the HDIM? (see also fact sheet: http://www.osce.org/publications/odihr/2006/09/20658_674_en.pdf) The term "human dimension" describes the set of norms and activities related to human rights, the rule of law, and democracy that are regarded within the OSCE as one of the three pillars of its comprehensive security concept, along with the politico-military and the economic and environmental dimensions. Every year in Warsaw, the OSCE's Office for Democratic Institutions and Human Rights (ODIHR) organizes a two-week conference, the Human Dimension Implementation Meeting (HDIM). The HDIM is a forum where OSCE participating States discuss the implementation of human dimension commitments that were adopted by consensus at prior OSCE Summits or Ministerial Meetings. These commitments are not legally binding norms; instead, they are politically binding - a political promise to comply with the standards elaborated in OSCE documents. Follow-up meetings to review the implementation of the commitments are based on the principle that the commitments undertaken in the field of the human dimension are matters of direct and legitimate concern to all participating States and do not belong exclusively to the internal affairs of the state concerned. OSCE human dimension commitments A comprehensive, 2-volume compilation of the OSCE human dimension commitments (available in English and in Russian) can be ordered free of charge through the ODIHR website: Volume 1: Thematic Compilation and Volume 2: Chronological Compilation
<urn:uuid:bf6cb246-aec7-4397-9ad3-56f187b46492>
CC-MAIN-2013-20
http://www.csce.gov/index.cfm?FuseAction=ContentRecords.ViewDetail&ContentRecord_id=706&ContentType=P&ContentRecordType=P&UserGroup_id=66&region_id=66&year=0&month=0&Subaction=ByDate&CFID=918967&CFTOKEN=89439130
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.87774
518
1.96875
2
Hon. Benjamin L. Cardin, Chairman Hon. Alcee L. Hastings, Co-Chairman For Immediate Release April 10, 2010 CARDIN, HASTINGS STATEMENT ON DEATH OF POLISH PRESIDENT KACZYNSKI WASHINGTON--U.S. Senator Benjamin L. Cardin (D-MD), Chairman of the Commission on Security and Cooperation in Europe (U.S. Helsinki Commission) and Co-Chairman Congressman Alcee L. Hastings (D-FL) released the following joint statement upon news of the death of Polish President Lech Kaczynski. “We were shocked and deeply saddened to learn of the plane crash that killed Polish President Lech Kaczynski, his wife Maria, and 94 other military, political, and civil society leaders as well as family members of those murdered in the Katyn massacre of 1940. Words alone do not adequately convey the depth of our sympathy before this catastrophic loss of life. We stand with the people of Poland, who have long stood by us, in this most painful moment. Our prayers and thoughts go out to the families and friends of all who lost their lives in this tragedy. "President Kaczynski was a friend of the United States and a tireless advocate for freedom and human rights, including remembering the history of Polish Jews. "This morning's tragedy is all the more devastating considering the delegation traveling with the president included so many people who have played inspiring roles in Poland's democratic reforms. The memory of President Kaczynski's life and his commitment to peaceful regional and international relations should serve as an inspiration to us all." Media Contact: Neil Simon # # #
<urn:uuid:e5f6b4c9-5a0f-4d60-bb7c-fd49a2f7620c>
CC-MAIN-2013-20
http://www.csce.gov/index.cfm?FuseAction=ContentRecords.ViewDetail&ContentRecord_id=888&ContentType=P&ContentRecordType=P&UserGroup_id=100&region_id=100&year=0&month=0&Subaction=ByDate&CFID=9122157&CFTOKEN=83775007
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.958585
346
1.5625
2
"Every important new technology and market segment has a defining chronicle of its beginning. In the minicomputer market it was Tracy Kidder's The Soul of the New Machine. In the agemitigating pharmaceutical market, we believe it will be the new book Ageless Quest from Elixir's Lenny Guarente. Although layman readers may find the science descriptions a little more comprehensive than they're used to, dedicated readers will be rewarded with a good understanding of what looks to be one of the important regulatory mechanisms in human aging, and a significant advance in the quest that man has undertaken for literally thousands of years. Ageless Quest is a must read for anyone interested in the future of an important new biotech market, or who is interested in the real science and progress in the field of age-mitigation." Juvenews - Biology of Aging News "Part autobiography, part social commentary, part science, [Ageless Quest] does an excellent job of explaining and extolling the use of model organisms for research into ageing.... Ageless Quest conveys some quite difficult ideas and complex experimental results with a clarity and freshness that deserve to make it widely read." "The book tells a good story about the search for a gene and an even better story about the human side of scientific discovery. To these ends, Ageless Quest succeeds admirably." "Ageless Quest is a personal account of a rich and active academic life, in which descriptions of the scientific work that led to the discovery of Sir2, a potentially important biochemical factor that influences life's clock, are mixed with autobiographical sketches. The book is reminiscent in more than one way of Jim Watson's classic, The Double Helix, in that it paints an accurate picture of how scientific research was, and is, done: the excitement, the frustrations, the fear of competitors and the race for 'highimpact' publications. Ageless Quest is, therefore, not just a book about ageing, nor just about genes and proteins; it is also about people, and the nittygritty of doing science at the end of the twentieth century. One of the most endearing features of this little book, which can be read over the course of a weekend (or during a lengthy run of a native gel, to put it in scientists' timeunits as well), is that its author pays tribute to the many people he has worked with over the years; or, to be more precise, to the dedicated and eager young scientists who have worked for hima noteworthy difference." Basically a personal account of research into aging, including descriptions of his students and postdocs and their work at the laboratory bench, the book is a pleasure to read. The author writes with the clarity of a firstclass journalist, an infectious enthusiasm and an eye for the revealing anecdote. Although the relevance of Sir2 and survival mechanisms discovered in shortlived laboratory organisms to aging in mammals is still questionable, I am convinced that by opening this avenue of research, Guarente and kindred spirits have done much to draw outstanding scientists into aging research, thereby shaking this file dout of its stuffy reputation. That alone makes Ageless Quest and the story of its simple pursuit a timely contribution to the growing literature on why and how we age. For the scientifically curious, this book is much more enjoyable than paperback thrillers that pretend to present medical science. Guarente tells real stories with engaging wit, not fictions with pompous affectations. The Quarterly Review of Biology
<urn:uuid:d7627868-328a-4223-a2c6-4138e2ce3b55>
CC-MAIN-2013-20
http://www.cshlpress.com/default.tpl?action=full&cart=133572499549399588&--eqskudatarq=427&newtitle=Ageless%20Quest%3A%20One%20Scientist's%20Search%20for%20the%20Genes%20That%20Prolong%20Youth
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.946416
711
1.851563
2
In Peru, Voters Must Pit Stability Against Freedoms UNDER the hot midday sun in the high Andean town of Ayacucho, weather-beaten peasants sport T-shirts with the slogan ``Say yes to the Peru you love'' written in green on a white background.Skip to next paragraph Subscribe Today to the Monitor In the polling booths, for those who cannot read, green will signify ``Yes,'' sky blue ``No.'' For the third time in less than a year, Peruvians must turn out across the nation Sunday to cast their votes, but this time in a referendum, the first in the country's history. Over 11 million people are being asked to give their verdict on the proposed new constitution, drawn up by the Congress they elected last November. ``Naturally I'm voting yes,'' says Gaudencio Chipana, a farmer with a couple of acres just outside Ayacucho. ``Look what President [Alberto] Fujimori has done for us. Inflation has almost disappeared and so has terrorism. He deserves our vote.'' Statements like this have Peru's constitutional lawyers pulling their hair out. No more than one Peruvian in 10 has read the new constitution, according to pollsters, and there has been virtually no government-sponsored education campaign to ensure that the population understands what their vote on Sunday entails. ``Most voters associate the `yes' vote with a more attractive panorama for foreign investment, and therefore more jobs and development in general,'' says Giovanna Penaflor, director of Imasen, a polling organization based in Lima, the capital. ``People may not know much about the complexities of the constitution, but that doesn't prevent them having an opinion.'' Pollsters agree that Mr. Fujimori will get his majority on Sunday, though the 60 percent to 40 percent margin they are predicting will not be as wide as the government had hoped. ``The more resounding the victory, the more the outside world will perceive Peru as stable, and therefore as a good place to invest,'' says Jaime Yoshiyama, president of Congress and Fujimori's No. 2. THE 1993 constitution, if approved, will not be very different from the 1979 version that Fujimori suspended in April 1992, at the same time he dissolved Congress. Constitutional lawyer Domingo Garcia Belaunde calculates that 60 percent of it has remained the same, 30 percent has been ``fine-tuned,'' and only 10 percent is new. For the international community, the most controversial novelties are the articles introducing the death penalty for top guerrilla leaders convicted of ``treason'' and enabling a serving president to stand for an immediate second term. Latin American constitutions barr such measures, the latter because the president wields too much influence at election time. But in Peru, both carry broad popular support. Other major constitutional changes affect Peru's system of governance. The new Congress, for example, will have only one chamber and 120 representatives, instead of the traditional two-chamber house with a total of 240 senators and deputies. The 12 large, semi-autonomous regions created in the final months of the Alan Garcia Perez regime are to be eliminated. Under the new charter, the president will have the ability in the future to dissolve Congress ``in the event of grave conflict'' and will be free to appoint the ambassadors and senior military officers he chooses. It all adds up to a more centrist and authoritarian constitution. ``Everyone's a democrat when he's facing an opinion survey,'' says Alfredo Torres of the Apoyo polling organization. ``But it's obvious from their response to last year's coup that Peruvians want a strong hand in government.'' Apoyo's surveys show that since terrorist activity has declined, popular concerns increasingly center on the economy and employment opportunities. Unlike the thorough, if not lavish, government advertising campaign, the movement for the ``No'' vote has suffered from an almost complete lack of funding (T-shirts for ``No'' do not exist). And there is no dominant figure to pull the ``no'' groups together. Nevertheless, the campaign has touched a chord among a few Peruvians. In Ayacucho, as in most provincial towns and the shantytowns that surround Peru's large cities, the most committed campaigners for the ``no'' vote are teachers, health-care workers, and representatives of struggling grass-roots civic and neighborhood organizations. ``This constitution represents yet another cut-back in our fundamental rights,'' says Alberto Ochoa, leader of Ayacucho's Civic Committee for the ``No'' Vote. ``The state is abdicating its most basic function, which is to promote development.'' Mr. Ochoa is skeptical that foreign investors will bring their money to Ayacucho. The prospect of more state employees losing their jobs and the ``privatization of education'' will lead many to vote ``no'' on Sunday, he says. According to Lima's pollsters - who concede they can only take proper samples from around 45 percent of Peru's vast, rugged territory - the ``No'' vote was gathering strength in the last few days before polling. ``If this makeshift `No' campaign gets 40 percent or more of the valid votes, it will be seen as a triumph even though the constitution will be approved,'' Mr. Torres says. ``It could mean a strengthening of the new opposition to Mr. Fujimori - and in the end, that's good for democracy in Peru.''
<urn:uuid:8c43819d-5a3d-4b7e-8cff-0d532b097718>
CC-MAIN-2013-20
http://www.csmonitor.com/1993/1029/29013.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.948001
1,127
1.867188
2
1940 Census data: A treasure trove for con artists? Data from the 1940 census, released Monday, has excited Americans looking for more information about their heritage. But the information could also help identity thieves. The release of the 1940 Census data is a treasure trove of information for historians and Americans who want to know more about their genealogy.Skip to next paragraph Subscribe Today to the Monitor But is it also going to be a toy store for con artists and identity theft thieves? Some computer-security experts are concerned that release of the information may give those with less than pure motives an opportunity to defraud. Senior citizens – there are some 21 million Americans still alive from the 1940 Census – are often the victims of scams. The worry is that they may be conned by people who learn personal information. But the information release may also be pertinent to even younger Americans, since many banks use security questions such as mother’s maiden name and the street you grew up on. “This is real data,” says IT security consultant Jeff Farr, president of Farr Systems in Dallas. “It gives identify thieves the chance to legitimize, to put together a picture, a timeline which can be used to manipulate victims into giving data.” “The next thing you know they are going shopping on your credit card or filing a tax return with your information,” he says. The US government official who is most concerned about identify theft, Maneesha Mithal, associate director of the FTC’s Division of Privacy and Identity Protection, was not consulted about releasing the data. “Anytime there is more information about us, whether it’s on social-networking sites or public information, there is an increased risk of identity theft,” says Ms. Mithal. “Certainly there are benefits and risks to releasing the data.” In 2011, the Federal Trade Commission reported that identify theft was the top consumer complaint. Of the 1.8 million complaints to the agency, 279,156 or 15 percent concerned identity theft. One of the latest scams involves individuals who are filing tax returns of other individuals and collecting their tax refunds with the help of dishonest postal workers. The actual numbers might be higher. In 2008, the Bureau of Justice Statistics found that 11.7 million Americans, or 5 percent of everyone over the age of 16, had their identity stolen in a two-year period. The National Archives and Records Administration releases information from the census, which is taken every 10 years, only after 72 years. The prior release in 2002 involved the 1930 census. Although identify theft was an issue then, it was not as prevalent. [Editor's note: The original version of this paragraph contained incorrect information about the process of releasing data.] The National Archives had no comment. Mr. Farr, who says he is not trying to be alarmist, says the Census data present con artists with another source of information to paint a picture of a potential victim. Then con artists may go to Facebook or other social media and find yet more information. “That’s when they start to manipulate you into giving them yet more data,” he warns. He points out that older Americans are less technologically savvy and more likely to get hit with a deceptive e-mail or phone call. To counter someone trying to get personal information, Farr says individuals can take a few simple steps. For example, if someone calls up and says they are from a bank, he recommends getting their phone number and calling them back. “Then, you call the bank and ask for that person,” he says. “That solves 98 percent of all the problems,” he says. The FTC’s Mithal advises consumers to secure their data as carefully as possible. “Treat your information as if it were cash,” she says. “Shred all your bills, check your financial statements, make sure your Social Security number is not in your billfold, and get a free copy of your credit report once a year.” Get daily or weekly updates from CSMonitor.com delivered to your inbox. Sign up today. Making a Difference
<urn:uuid:5ca3f126-dca7-4264-928f-83e5c79dc590>
CC-MAIN-2013-20
http://www.csmonitor.com/USA/2012/0403/1940-Census-data-A-treasure-trove-for-con-artists
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.949987
871
2.390625
2
This information applies to pages in the CSUN template system.Windows-press ALT + an access key. Macintosh-press CTRL + an access key. ExCEL programs are individualized counseling and group workshops designed to help you Experience more Confidence and Enjoyment in your Learning opportunities at CSUN. Remember when you were a kid filled with curiosity and a love of learning? Remember when nothing would get in you way of leaning how to ride a bicycle, master a video game or put together a difficult puzzle. We would like to help you rediscover that enthusiasm, curiosity and confidence in learning through our ExCEL programs. Learning does not have to be experienced as a tedious and boring activity. Learn how to enjoy and have more confidence in your learning journey at CSUN. Find out more information about ExCEL Our counselors have found that a significant percentage of college students have a difficult time enjoying their learning opportunities while in college. Many students have experienced "mini" academic traumas before they enter college that reduces their confidence to learn new and difficult material. Enjoyment and confidence in learning are two important variables in achieving academic success.
<urn:uuid:e5a958f3-665e-48c9-881b-4bdddbae8c7d>
CC-MAIN-2013-20
http://www.csun.edu/counseling/excel/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.952818
230
2.0625
2
In 1968, Switzerland dominated the world of watchmaking, with over 65% of the unit sales in the world and more than 85% of the profits. They were constant innovators and on the cutting edge of research in all aspects of their watches. By 1980 their world market share had collapsed to less than 10% and 50,000 of the 62,000 watchmakers had lost their jobs. What happened? Something profound. They had run into a paradigm shift - a change in the fundamental rules of watchmaking. Everything the Swiss were good at - the making of gears and bearings and mainsprings, etc. - was irrelevant to the new way. The irony was that this disaster was totally avoidable. The Swiss themselves invented the electronic quartz movement at their research institute in Neuchâtel, Switzerland. Yet, when the Swiss researchers presented this revolutionary new idea to the Swiss manufacturers in 1967, it was rejected. It couldn't possibly be the watch of the future! So sure were the manufacturers of that conclusion that they let their researchers showcase their useless invention at the World Watch Congress that year. Seiko took one look, and the rest is history. 1. Any organization must have all of the following to be successful in the future: excellence, innovation, and anticipation (p.11) 2. Organizations also must manage to stay in an advantageous stance relative to paradigm shifts. 3. Paradigms, even as they are successfully solving many problems, always uncover problems that they cannot solve. These problems trigger the search for a new paradigm. (84) 4. Paradigm shifters are almost always outsiders - in that they don't understand the subtleties of the prevailing paradigms and/or have little investment in them (84) 5. You don't have to be a paradigm shifter to get all the advantages. Just being a paradigm pioneer is sufficient (note example of USA and Japan). (78) 6. It is in the future where our greatest leverage is. Why is that intelligent people with good motives do such a poor job at anticipating the future? As more than one sage has already observed, the future is where you are going to spend the rest of your life. And since that is true, wouldn't it be useful to be able to get to know more about the neighborhood before you move in? You can and should shape your own future. Because, if you don't, someone else surely will. (18-20) |Last modified January 14, 2007||Notes Copyright 1992-2007 Rex Mitchell|
<urn:uuid:435895aa-5d35-4035-b899-b7daf60c0e3c>
CC-MAIN-2013-20
http://www.csun.edu/~hfmgt001/paradigm.htm
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.975571
521
2.25
2
CTComms sends on average 2 million emails monthly on behalf of over 125 different charities and not for profits. Take the complexity of technology and stir in the complexity of the legal system and what do you get? Software licenses! If you've ever attempted to read one you know how true this is, but you have to know a little about software licensing even if you can't parse all of the fine print. By: Chris Peters March 10, 2009 A software license is an agreement between you and the owner of a program which lets you perform certain activities which would otherwise constitute an infringement under copyright law. The software license usually answers questions such as: The price of the software and the licensing fees, if any, are sometimes discussed in the licensing agreement, but usually it's described elsewhere. If you read the definitions below and you're still scratching your head, check out Categories of Free and Non-Free Software which includes a helpful diagram. Free vs Proprietary: When you hear the phrase "free software" or "free software license," "free" is referring to your rights and permissions ("free as in freedom" or "free as in free speech"). In other words, a free software license gives you more rights than a proprietary license. You can usually copy, modify, and redistribute free software without paying a fee or obtaining permission from the developers and distributors. In most cases "free software" won't cost you anything, but that's not always the case – in this instance the word free is making no assertion whatsoever about the price of the software. Proprietary software puts more restrictions and limits on your legal permission to copy, modify, and distribute the program. Free, Open-Source or FOSS? In everyday conversation, there's not much difference between "free software," "open source software," and "FOSS (Free and Open-Source Software)." In other words, you'll hear these terms used interchangeably, and the proponents of free software and the supporters of open-source software agree with one another on most issues. However, the official definition of free software differs somewhat from the official definition of open-source software, and the philosophies underlying those definitions differ as well. For a short description of the difference, read Live and Let License. For a longer discussion from the "free software" side, read Why Open Source Misses the Point of Free Software. For the "open-source" perspective, read Why Free Software is Too Ambiguous. Public domain and copyleft. These terms refer to different categories of free, unrestricted licensing. A copyleft license allows you all the freedoms of a free software license, but adds one restriction. Under a copyleft license, you have to release any modifications under the same terms as the original software. In effect, this blocks companies and developers who want to alter free software and then make their altered version proprietary. In practice, almost all free and open-source software is also copylefted. However, technically you can release "free software" that isn't copylefted. For example, if you developed software and released it under a "public domain" license, it would qualify as free software, but it isn't copyleft. In effect, when you release something into the public domain, you give up all copyrights and rights of ownership. Shareware and freeware. These terms don't really refer to licensing, and they're confusing in light of the discussion of free software above. Freeware refers to software (usually small utilities at sites such as Tucows.com) that you can download and install without paying. However, you don't have the right to view the source code, and you may not have the right to copy and redistribute the software. In other words, freeware is proprietary software. Shareware is even more restrictive. In effect, shareware is trial software. You can use it for a limited amount of time (usually 30 or 60 days) and then you're expected to pay to continue using it. End User Licensing Agreement (EULA). When you acquire software yourself, directly from a vendor or retailer, or directly from the vendor's Web site, you usually have to indicate by clicking a box that you accept the licensing terms. This "click-through" agreement that no one ever reads is commonly known as a EULA. If you negotiate a large purchase of software with a company, and you sign a contract to seal the agreement, that contract usually replaces or supersedes the EULA. Most major vendors of proprietary software offer some type of bulk purchasing and volume licensing mechanism. The terms vary widely, but if you order enough software to qualify, the benefits in terms of cost and convenience are significant. Also, not-for-profits sometimes qualify for it with very small initial purchases. Some of the benefits of volume licensing include: Lower cost. As with most products, software costs less when you buy more of it. Ease of installation. Without volume licenses, you usually have to enter a separate activation code (also known as a product key or license key) for each installed copy of the program. On the other hand, volume licenses provide you with a single, organisation-wide activation code, which makes it much easier to find when you need to reinstall the software. Easier tracking of licenses. Keeping track of how many licenses you own, and how many copies you've actually installed, is a tedious, difficult task. Many volume licensing programs provide an online account which is automatically updated when you obtain or activate a copy of that company's software. These accounts can also coordinate licensing across multiple offices within your organisation. To learn more about volume licensing from a particular vendor, check out some of the resources below: Qualified not-for-profits and libraries can receive donated volume licenses for Microsoft products through TechSoup. For more information, check out our introduction to the Microsoft Software Donation Program, and the Microsoft Software Donation Program FAQ. For general information about the volume licensing of Microsoft software, see Volume Licensing Overview. If you get Microsoft software from TechSoup or other software distributors who work with not-for-profits, you may need to go to the eOpen Web site to locate your Volume license keys. For more information, check out the TechSoup Donation Recipient's Guide to the Microsoft eOpen Web Site. Always check TechSoup Stock first to see if there's a volume licensing donation program for the software you're interested in. If TechSoup doesn't offer that product or if you need more copies than you can find at TechSoup, search for "volume licensing not-for-profits software" or just "not-for-profits software." For example, when we have an inventory of Adobe products, qualifying and eligible not-for-profits can obtain four individual products or one copy of Creative Suite 4 through TechSoup. If we're out of stock, or you've used up your annual Adobe donation, you can also check TechSoup's special Adobe donation program and also Adobe Solutions for Nonprofits for other discounts available to not-for-profits. For more software-hunting tips, see A Quick Guide to Discounted Software Programs. Pay close attention to the options and licensing requirements when you acquire server-based software. You might need two different types of license – one for the server software itself, and a set of licenses for all the "clients" accessing the software. Depending on the vendor and the licensing scenario, "client" can refer either to the end users themselves (for example, employees, contractors, clients, and anyone else who uses the software in question) or their computing devices (for example, laptops, desktop computers, smartphones, PDAs, etc.). We'll focus on Microsoft server products, but similar issues can arise with other server applications. Over the years, Microsoft has released hundreds of server-based applications, and the licensing terms are slightly different for each one. Fortunately, there are common license types and licensing structures across different products. In other words, while a User CAL (Client Access License) for Windows Server is distinct from a User CAL for SharePoint Server, the underlying terms and rights are very similar. The TechSoup product pages for Microsoft software do a good job of describing the differences between products, so we'll focus on the common threads in this article. Moreover, Microsoft often lets you license a single server application in more than one way, depending on the needs of your organisation. This allows you the flexibility to choose the licenses that best reflect your organisation's usage patterns and thereby cost you the least amount of money. For example, for Windows Server and other products you can acquire licenses on a per-user basis (for example, User CALs) or per-device basis (for example, Device CALs). The license required to install and run most server applications usually comes bundled with the software itself. So you can install and run most applications "out of the box," as long as you have the right number of client licenses (see the section below for more on that). However, when you're running certain server products on a computer with multiple processors, you may need to get additional licenses. For example, if you run Windows Server 2008 DataCenter edition on a server with two processors, you need a separate license for each processor. SQL Server 2008 works the same way. This type of license is referred to as a processor license. Generally you don't need client licenses for any application that's licensed this way. Client Licenses for Internal Users Many Microsoft products, including Windows Server 2003 and Windows Server 2008, require client access licenses for all authenticated internal users (for example, employees, contractors, volunteers, etc.). On the other hand, SQL Server 2008 and other products don't require any client licenses. Read the product description at CTXchange if you're looking for the details about licensing a particular application. User CALs: User CALs allow each user access to all the instances of a particular server product in an organisation, no matter which device they use to gain access. In other words, if you run five copies of Windows Server 2008 on five separate servers, you only need one User CAL for each person in your organisation who access those servers (or any software installed on those servers), whether they access a single server, all five servers, or some number in between. Each user with a single CAL assigned to them can access the server software from as many devices as they want (for example, desktop computers, laptops, smartphones, etc.). User CALs are a popular licensing option. Device CALs: Device CALs allow access to all instances of a particular server application from a single device (for example, a desktop computer, a laptop, etc.) in your organisation. Device CALs only make sense when multiple employees use the same computer. For example, in 24-hour call centres different employees on different shifts often use the same machine, so Device CALs make sense in this situation. Choosing a licensing mode for your Windows Server CALs: With Windows Server 2003 and Windows Server 2008, you use a CAL (either a User CAL or a Device CAL) in one of two licensing modes: per seat or per server. You make this decision when you're installing your Windows Server products, not when you acquire the CALs. The CALs themselves don't have any mode designation, so you can use either a User CAL or a Device CAL in either mode. Per seat mode is the default mode, and the one used most frequently. The description of User CALs and Device CALs above describes the typical per seat mode. In "per server" mode, Windows treats each license as a "simultaneous connection." In other words, if you have 40 CALs, Windows will let 40 authenticated users have access. The 41st user will be denied access. However, in per server mode, each CAL is tied to a particular instance of Windows Server, and you have to acquire a new set of licenses for each new server you build that runs Windows. Therefore, per server mode works for some small organisations with one or two servers and limited access requirements. You don't "install" client licenses the way you install software. There are ways to automate the tracking of software licenses indirectly, but the server software can't refuse access to a user or device on licensing grounds. The licenses don't leave any "digital footprint" that the server software can read. An exception to this occurs when you license Windows Server in per server mode. In this case, if you have 50 licenses, the 51st authenticated user will be denied access (though anonymous users can still access services). Some key points to remember about client licensing: The licensing scenarios described in this section arise less frequently, and are too complex to cover completely in this article, so they're described briefly below along with more comprehensive resources. You don't need client licenses for anonymous, unauthenticated external users. In other words, if someone accesses your Web site, and that site runs on Internet Information Server (IIS), Microsoft's Web serving software, you don't need a client license for any of those anonymous users. If you have any authenticated external users who access services on your Windows-based servers, you can obtain CALs to cover their licensing requirements. However, the External Connector License (ECL) is a second option in this scenario. The ECL covers all use by authenticated external users, but it's a lot more expensive than a CAL, so only get one if you'll have a lot of external users. For example, even if you get your licenses through the CTXchange donation program, an ECL for Windows Server 2008 has an £76 administrative fee, while a User CAL for Windows Server 2008 carries a £1 admin fee. If only a handful of external users access your Windows servers, you're better off acquiring User CALs. Also, an ECL only applies to external users and devices. In other words, if you have an ECL, you still have to get a CAL for all employees and contractors. Even though Terminal Services (TS) is built into Windows Server 2003 and 2008, you need to get a separate TS CAL for each client (i.e. each user or each device) that will access Terminal Services in your organisation. This TS license is in addition to your Windows Server CALs. Microsoft's System Centre products (a line of enterprise-level administrative software packages) use a special type of license known as a management license (ML). Applications that use this type of licensing include System Center Configuration Manager 2007 and System Center Operations Manager 2007. Any desktop or workstation managed by one of these applications needs a client management license. Any server managed by one of these applications requires a server management license, and there are two types of server management licenses – standard and enterprise. You need one or the other but not both. There are also special licensing requirements if you're managing virtual instances of Windows operating systems. For more information, see TechSoup's Guide to System Center Products and Licensing and Microsoft's white paper on Systems Center licensing. Some Microsoft server products have two client licensing modes, standard and enterprise. As you might imagine, an Enterprise CAL grants access to more advanced features of a product. Furthermore, with some products, such as Microsoft Exchange, the licenses are additive. In other words, a user needs both a Standard CAL AND an Enterprise CAL in order to access the advanced features. See Exchange Server 2007 Editions and Client Access Licenses for more information. With virtualisation technologies, multiple operating systems can run simultaneously on a single physical server. Every time you install a Microsoft application, whether on a physical hardware system or a virtual hardware system, you create an "instance" of that application. The number of "instances" of particular application that you can run using a single license varies from product to product. For more information see the Volume Licensing Briefs, Microsoft Licensing for Virtualization and the Windows Server Virtualization Calculator. For TechSoup Stock products, see the product description for more information. There are a lot of nuances to Microsoft licensing, and also a lot of excellent resources to help you understand different scenarios. About the Author: Chris is a former technology writer and technology analyst for TechSoup for Libraries, which aims to provide IT management guidance to libraries. His previous experience includes working at Washington State Library as a technology consultant and technology trainer, and at the Bill and Melinda Gates Foundation as a technology trainer and tech support analyst. He received his M.L.S. from the University of Michigan in 1997. Originally posted here. Copyright © 2009 CompuMentor. This work is published under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 License. The latest version of Microsoft Office Professional Plus is an integrated collection of programs, servers, and services designed to work together to enable optimised information work.
<urn:uuid:c337bcd8-6aa1-4f2d-8c48-b916442ebbee>
CC-MAIN-2013-20
http://www.ctt.org/resource_centre/getting_started/learning/understanding_licenses
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.910602
3,479
3.234375
3
Wood Chipper/Shredder Safety Tips - Be familiar with all controls and their proper operation. Know how to stop and disengage them quickly. - Keep bystanders, pets, and children at least 75 feet from the machine while it is in operation. Stop the machine if anyone enters the area. - Do not put hands and feet near rotating parts or in the feeding chambers and discharge openings. - Never attempt to unclog either the feed intake or discharge opening, remove or empty the bag, or inspect and repair the machine while the engine is running. Shut off the engine and wait until all moving parts have come to a complete stop. Disconnect the spark plug wire and ground it against the engine. - Wear sturdy, rough-soled work shoes and close-fitting slacks and shirts. Loose fitting clothing or jewelry can be caught in moveable parts. Never operate this machine in bare feet or sandals. Wear leather work gloves when feeding material into the chipper chute. Did you find this helpful?
<urn:uuid:cd360e0a-ccb6-4328-b108-259c61e21203>
CC-MAIN-2013-20
http://www.cubcadet.com/equipment/cubcadet/walk-behind-mowers/electric-lawn-mowers/KnowledgeCenterArticleView?storeId=10051&catalogId=14101&langId=-1&pageName=en_US/knowledgeCenter/knowledgeCenterArticles/WoodChipperShredderSafetyTips.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.907513
212
2.046875
2
Howard Hughes Medical Institute at Columbia University Welcome to the Howard Hughes Medical Institute (HHMI) at Columbia University. HHMI, one of the worlds’ largest philanthropic organizations, is a nonprofit medical research organization that employs hundreds of leading scientists working at the forefront of their fields at over 70 'host' institutions around the U.S. In addition, through its Science Education programs and other activities, HHMI is helping to enhance science education at all levels and maintain the vigor of biomedical science worldwide. The Institute has laboratories across the United States and grants programs throughout the world. Its headquarters is located in Chevy Chase, Maryland. The Institute also maintains its own research complex in Ashburn, Virginia, known as the Janelia Farm Research Campus, which brings together scientists from a variety of disciplines to tackle the most difficult problems confronting science today. The HHMI investigators (and early career scientists) based at Columbia University and Columbia University Medical Center are Drs. Richard Axel, Joachim Frank, Stephen Goff, Eric Greene, Iva Greenwald, Wayne Hendrickson, Oliver Hobert, Barry Honig, Thomas Jessell, Eric Kandel, Steven Siegelbaum, Brent Stockwell, Gary Struhl, Rafael Yuste and Charles Zuker. For more information on the Howard Hughes Medical Institute, please check our website: http://www.hhmi.org. For information about, or to contact someone at our Columbia site, please call the HHMI Office of Administrative Services, located at: 100 Haven Avenue New York, New York 10032 Phone: (212) 781-0611 Marilin Riedler, Manager of Administrative Services Isaias Arce, Procurement Coordinator Maria Lulo, Procurement Coordinator Stephanie Seabrook, Administrative Assistant Howard Hughes Medical Institute Structural Biology Program
<urn:uuid:6a04c085-f00e-4b27-bfaf-29c0c4af280f>
CC-MAIN-2013-20
http://www.cumc.columbia.edu/dept/hhmi/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.882388
382
1.578125
2
- Our Story - In Memory Vaccination and Immunotherapy for Alzheimer’s Disease Vaccination against amyloid is a promising approach for the development of Alzheimer’s disease (AD) therapeutics. Approximately half of the investigational new therapeutics in human clinical trials for AD are active or passive immunotherapeutics. Active vaccination involves the injection of an antigen and relies on the production of antibodies in the vaccinated patient. Four human clinical trials of active vaccination currently are under way. Passive immunization is also a promising strategy that involves the production of antibodies outside of the patient and injection of these antibodies. There are currently 12 clinical trials of passive immunization. You can check for Alzheimer therapeutics in human clinical trials by visiting www.clinicaltrials.gov and searching for key words “Alzheimer’s and immunotherapy.” Thinking out of the box The development of vaccinations as a strategy for treating or preventing Alzheimer’s is an example of thinking out of the box. Vaccinations commonly are associated with infectious diseases, like influenza, small pox and polio, which appear to have little in common with neurodegenerative diseases, like Alzheimer’s. Moreover, the brain is an immunoprivileged site with little access to antibodies, so it seems unlikely antibodies would be protective in the brain. Researchers were pleasantly surprised when Dale Schenk and co-workers at Elan Inc. reported that vaccination of transgenic mouse models of AD against the amyloid Aß peptide prevented amyloid deposition in young animals and removed pre-existing amyloid deposits in older animals. Subsequent work showed that immunization against Aß prevented or reversed many other pathological features and prevented cognitive dysfunction in transgenic mice and non-human primates. This vaccine (Elan AN1792) was tested in human clinical trials, where it showed similar beneficial effects of removing amyloid deposits and slowing cognitive decline in patients with significant levels of anti-Aß antibodies, but the clinical trial was halted because 6 percent of the patients developed meningoencephalitis, an inflammatory side effect. Second-generation vaccines and passive immunization To circumvent the unwanted inflammatory side effects, second-generation active vaccines have been developed and passive immunization strategies have been explored. The second-generation vaccines use small pieces of the amyloid Aß sequence to avoid activating the T-cells responsible for meningoencephalitis, while passive immunization bypasses the human immune response by directly supplying antibodies. These newer strategies have shown the same beneficial effects in transgenic mice and passive immunization has shown some promise in a subset of patients in human trials, but they have raised new questions about their effectiveness and potential new side effects. Elan/Wyeth reported preliminary results from clinical trials of their monoclonal antibody, Bapineuzimab, that demonstrated only a small benefit in a subgroup of patients who lack the apoE4 genotype. They also failed to observe an improved benefit with an increased dose of antibody and reported side effects, like a buildup of fluid in the brain. Results of active vaccination human clinical trials with second-generation vaccines remain to be reported. Third-generation vaccines and antibodies: Thinking perpendicular to the box Both second-generation vaccines and antibodies suffer from a common problem. They both target linear amino acid sequences found in normal human proteins (the amyloid precursor protein) and in the amyloid deposits themselves. Making antibodies against normal human proteins can cause autoimmune side effects, in which the immune system is attacking normal human cells in addition to the Alzheimer’s pathology. Fortunately, it is difficult to make antibodies against self-proteins because of immune suppression of auto antibodies. Third-generation vaccines seek to overcome these problems of autoimmune side effects and autoimmune suppression by using antibodies that target structures specific to the amyloid aggregates and that do not react with normal human proteins. Cure Alzheimer’s Fund has been supporting two projects that seek to develop third-generation immunotherapeutics. Dr. Charles Glabe’s laboratory is developing active vaccines and monoclonal antibodies that recognize conformations of the amyloid peptide that only occur in the pathological amyloid oligomer aggregates, while Dr. Rob Moir’s lab is working on cross-linked amyloid peptides (CAPs) that are only found in disease-related aggregates. Dr. Glabe’s strategy relies on the fact that when the Aß peptide aggregates into ß-sheet oligomers, it creates new antibody recognition sites, known as epitopes, that are not found on native proteins. The surprising finding is that these oligomer-specific antibodies recognize amyloid oligomers from other diseases that involve amyloids formed from sequences unrelated to Aß. This means the same antibodies also may be effective for other amyloid-related neurodegenerative diseases, like Parkinson’s disease. The explanation for why the antibodies are specific for amyloid oligomers that involve several individual peptide strands arranged in a sheet and yet recognize these sheets when they are formed from other amino acid sequences is simple and elegant (Figure 1). It is now known that most pathological amyloids aggregate into simple and very regular structures where the peptide strands are arranged in parallel and where the amino acid sequence is in exact register. This is like a sheet of paper upon which the same sentence is written on each line. The individual amino acids line up and down the sheet in homogeneous tracts, known as “steric zippers.” The steric zippers do not occur in normal protein structures and the oligomer-specific antibodies are thought to recognize these steric zipper patterns on the surface of the sheets. Since all proteins are made up using the same 20 amino acids, any sequence in this parallel, in-register structure gives rise to the same steric zippers regardless of the linear sequence, which can explain why the antibodies recognize the oligomers formed by different proteins. Dr. Moir’s group is working on CAPs, where Aß is cross-linked by oxidation of a tyrosine residue at position 10 of the peptides’ sequence. Aß is oxidized after it is produced from the amyloid precursor protein as a consequence of the abnormally high level of oxidative activity in a brain with AD and the peptides’ propensity to bind redox active metals. Excessive CAPs generation is associated with the disease state and is not a normal feature of Aß biology. The cross-linking at tyrosine 10 that gives rise to CAPs may serve to align the peptides in a parallel, in-register fashion and promote the generation of still-larger oligomeric aggregates that display steric zippers on their surface. Dr. Moir and Dr. Rudy Tanzi’s labs found that natural antibodies to CAPs are reduced in the blood of patients with AD. More recently, evidence published by Tony Weiss-Coray’s group at Stanford University supports the idea that antibodies that recognize steric zippers and CAPs may be important for protecting against Alzheimer’s disease. The levels of these antibodies that target the zippers and CAPs were among the highest in young, normal humans; levels dropped with aging and with AD. Furthermore, the results of a recent study supported by Baxter Biosciences of patients that received human antibodies purified from normal individuals (IVIg) reported that antibody treatment reduced the risk of being diagnosed with AD by 42 percent over the five-year study period. This is one of the most remarkable reports of prevention of AD by any therapy. Although the normal human antibodies that target amyloid primarily recognize the steric zippers and CAPs, these antibodies are present at relatively low levels. It is reasonable to imagine that an even greater protective effect might be achieved by boosting the levels of these protective antibodies by either active vaccination or passive immunization. Figure 1 shows how the same steric zipper patterns are formed on parallel, in-register oligomers from completely different sequences. A segment of the Aß sequences is shown in the upper left corner and a random sequence is shown in the upper right. Each amino acid is designated by a capital letter. Typical antibodies recognize the linear sequence (from left to right) indicated in the horizontal boxes, which is unique to each sequence. When the peptides aggregate to form pathological oligomers, they line up in a parallel, in-register fashion, shown below. This gives rise to steric zippers that run up and down the sheet perpendicular to the sequence, shown in vertical boxes. Aggregation-dependent, disease-specific antibodies recognize the steric zippers from many different amyloid sequences. Zippers from F and V amino acids are shown in boxes, but there are potentially 20 different zippers; one for each of the 20 amino acids. The fact that a completely random sequence can form the same type of steric zipper as is found in Aß amyloid in Alzheimer’s disease means we can use a non-human, random peptide sequence as a vaccine to produce a protective immune response that has a very low potential for autoimmune side effects. Vaccines based on non-human peptides, like diphtheria and pertussis toxin, are so safe they routinely are given to infants. There is no reason to expect that a vaccine for AD that targets the disease-specific steric zippers wouldn’t be as safe and free of side effects. A goal of the research funded by Cure Alzheimer’s Fund is to do the preclinical investigations that are a necessary prelude to getting these third-generation vaccines and monoclonal antibodies that target disease-specific epitopes into human clinical trials.
<urn:uuid:063831fb-bde6-43d4-95fe-4286849bf7d1>
CC-MAIN-2013-20
http://www.curealzfund.org/2009/10/vaccination-and-immunotherapy-alzheimer%E2%80%99s-disease?page=70
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.940551
2,013
2.890625
3
DDoS gets the press – “but it’s fraud that gets the attention of our banking executives,” said Lynn Price, an IBM security executive. That may surprise given the blizzard of headlines Distributed Denial of Service attacks have won, but DDoS, so far, has not typically inflicted money losses. It may have shut down the websites of targeted institutions but it did no more. Fraud, by contrast, is all about emptying the till. Sneakily. Quietly. No headlines sought. And exactly that is what bank and credit union executives really lose sleep over. That reality is driven home in a recent, and detailed, report on the evolving threat landscape compiled by ENISA, the European Network and Information Security Agency. (The free report is here.) What ENISA reports matters. It is an official agency of the European Union and this particular document is the product of an exhaustive analysis of data collected across the EU. Security vendors frequently color their pronouncements with breathy hype. Not ENISA. It’s more a Jack Webb, “just the facts” style that aimed to uncover what really worries companies and governments in the EU. Distributed Denial of Service made the ENISA threat list but it was far down. What ranked as bigger worries in this in-depth survey of IT executives? You already know: attacks with fraud at their heart. Top of the chart are drive-by exploits, which are nasty attacks on known vulnerabilities of Web browsers and plug ins such as Adobe Flash. The report ominously noted that drive-by attacks has also shown up on Android phones, which could augur a new frontier of cyber crime. Drive-bys are technically simple. Often many of the details of the how-to are included in announcements by legitimate researchers of the discovery of a vulnerability – and then for the criminal it amounts to waiting for an unpatched browser to show up at a site. Particularly favorite websites to exploit are low-budget sites, often ones maintained by non-profits. Last year, security firm Barracuda Researchers analyzed the top 25,000 websites and found enough compromised with drive-by exploits that it estimated they had infected 10 million visitors in just one month. The worse news about drive-by attacks is that they download malware to the victim’s computer that will later interact with other sites – such as online banking. And that means credit unions have to be alert to members who arrive with infected computers. The number two threat, per ENISA, are worms and Trojans, already well familiar to credit unions from the Zeus keylogger Trojan. Especially worrisome to credit unions is that experts report uncovering Zeus kits – which are usually adapted to attack only customers of one financial institution – that have been written for very small institutions. One told me about discovering a kit adapted for a private bank that served under 500 (admittedly wealthy) customers. It’s not only the big banks that are Zeus targets now, and credit unions need to brace themselves for Zeus invasions, experts have told me. Another threat high up on the ENISA list are exploit kits, which are sometimes referred to as malware as a service. The bad news: would-be cybercriminals who lack significant technical skill increasingly can buy pre-packaged attacks that, for a few thousand dollars, turn a computer illiterate into a world-class hacker. Some 28% of all Web threats are traced back to one exploit kit, Blackhole, by Internet security researchers Sophos. Particularly insidious about Blackhole is that it starts an attack with a scan of a victim computer and, having identified susceptibilities, it then downloads a precisely honed payload. Technically, exploit kits bring little new to the party but what they do is multiply the number of threats out there and that just makes the IT security job more complicated. Also on the increase, according to ENISA, is old-fashioned phishing, which exploits the willingness of many consumers, as well as credit union employees, to click on links in emails and to provide information that should never be given out (such as username and password for online banking). The ENISA bottom line: threats are multiplying – and a grim reality is that the depth of defenses at credit unions is not necessarily keeping pace. Which is why the question to ask is this: has your credit union kept pace with the development of more malicious computer-based attacks? The era of robbing a bank or credit union with a gun and a note is entering its twilight. It’s all about bits and bytes now.
<urn:uuid:6f02a986-8955-4ab4-a6b1-23c9ecacda53>
CC-MAIN-2013-20
http://www.cutimes.com/2013/02/05/threat-of-the-week-whats-really-keeping-you-up-at?t=lendingtcredit-union-managementtonline-mobile-bank
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.961228
948
2.046875
2
The Dow Jones industrial average in recent days has ended a surge that the markets hadn’t seen in 17 years. For some, it was one more sign that the nation’s economy may be continuing to move along the road to recovery. Industry watchers said the Dow’s ascension, which started at close to 14,254 on March 5 and peaked at 14,514 on March 15, was fueled by several factors, including a spike in gas prices. Investors may have either been spooked by the record rise or made some adjustments to their portfolio mix. For credit union members, who tend to err on the side of conservative, the Dow’s increase might have aligned with their savings, which were up in January, according to CUNA Mutual Group’s March Credit Union Trends Report. The timing of the Dow’s record movement coincides with the latest update from an initiative between CU Solutions Group and SaveUp. According to the Michigan Credit Union League & Affiliates, which owns CU Solutions Group, SaveUp is a free rewards program that encourages consumers to make positive changes to their financial behaviors. More than 40 credit unions have signed on with SaveUp since the alliance launched six months ago. Every time members contribute to their savings or retirement accounts, pay down their credit cards, mortgages or other loans or engage with SaveUp’s financial education content, they earn credits they can use to win prizes from sponsors such as Virgin America, Banana Republic and GameStop, as well as a $2 million jackpot, CUSG said. For the $737 million Northeast Credit Union in Portsmouth, N.H., SaveUp has served several roles particularly with certain member niches and their spending and long-term planning goals, said Andrea Pruna, vice president of marketing at Northeast. “SaveUp is a great innovative tool to engage with the Gen Y market, reward positive member behavior and help plan our marketing tactics using its incredibly useful data reports,” Pruna said. Unlike their baby boomer counterparts, Gen X and Gen Y have a bit more time to plan for retirement. To target these younger members, SaveUp recently released its first U.S. Consumer Savings and Debt Report with its major findings focused on the financial habits of Gen X and Gen Y. With Gen X, average mortgage debt was $181,706, which was 21% above the U.S. average. Average student loan debt and credit card debt were $44,270 and $8,801, respectively. Gen Y had less debt averages, according to SaveUp. The average mortgage debt was more than $161,000, which was 7.5% above the U.S. average. Average student loan debt and credit card debt were $40,273 and $4,113, respectively. “Our recent data report shows that young people are bearing a disproportionate share of the country’s non-asset debt, and if credit unions can engage younger Americans to offer them better terms, and longer term financial services, there is a real benefit to all sides,” said Priya Haji, CEO and co-founder of SaveUp. Meanwhile, despite the Dow’s winning streak and more consumers paying down debt, retiring comfortably remains elusive for some. According to the Employee Benefit Research Institute’s Retirement Confidence Survey, released on March 19, the percentage of workers confident about having enough money for a comfortable retirement is essentially unchanged from the record lows observed in 2011. While more than half expressed some level of confidence, with 13% being very confident and 38% somewhat confident of being able to afford a comfortable retirement, 21% were not too confident, and 28% were not at all confident. The latter figure is the highest level of those not at all confident recorded during the 23 years of the survey, EBRI said. One reason that retirement confidence has remained low despite a brightening economic outlook is that some workers may be waking up to just how much they may need to save, according to EBRI. Asked how much they believe they will need to save to achieve a financially secure retirement, a striking number of workers cited large savings targets: 20% said they need to save between 20% to 29% of their income and 23% indicated they need to save 30% or more. “Aggressive as those savings targets appear to be, they may not be based on a careful analysis of their individual circumstances,” said Jack VanDerhei, EBRI research director and co-author of the report. “Only 46% report they and/or their spouse have tried to calculate how much money they will need to have saved by the time they retire so that they can live comfortably in retirement.”
<urn:uuid:2cb429aa-7a36-4cdb-93a4-f87cdc3175fd>
CC-MAIN-2013-20
http://www.cutimes.com/2013/03/22/stocks-hit-highs-while-uncertain-credit-union-memb?t=debit-atm-shared-branchingtlendingttechnology
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.977088
983
1.578125
2
Aliphatic alcohols occur naturally in free form (component of the cuticular lipids) but more usually in esterified (wax esters) or etherified form (glyceryl ethers). Several alcohols belong to aroma compounds which are found in environmental or food systems (see the website: Flavornet). They are found with normal, branched (mono- or isoprenoid), saturated or unsaturated of various chain length and sometimes with secondary or even tertiary alcoholic function. An unusual phenolic alcohol is found as a component of glycolipids in Mycobacteria. Some cyclic alcohols have been described in plants. A classification according to the carbon-chain structure is given below. 1 - Normal-chain alcohols The carbon chain may be fully saturated or unsaturated (with double and/or triple bonds), it may also be substituted with chlorine, bromine or sulfate groups. Some acetylenic alcohols have been also described. Among the most common, some are listed below 9-methyl-1-hendecanol (anteisolauryl alcohol) 11-methyl-1-tridecanol (anteisomyristyl alcohol) 14-methyl-1-pentadecanol (isopalmityl alcohol) 13-methyl-1-pentadecanol (anteisopalmityl alcohol) 16-methyl-1-heptadecanol (isostearyl alcohol) 15-methyl-1-pentadecanol (anteisostearyl alcohol) Free fatty alcohols are not commonly found in epicuticular lipids of insects, although high molecular weight alcohols have been reported in honeybees (Blomquist GJ et al., Insect Biochem 1980, 10, 313). Long-chain alcohols also have been reported in the defensive secretions of scale insects (Byrne DN et al., Physiol Entomol 1988, 13,267). Typically, insects more commonly produce lower molecular weight alcohols. Honeybees produce alcohols of 17–22 carbons, which induce arrestment in parasitic varroa mites (Donze G et al., Arch Insect Biochem Physiol 1998, 37, 129). Two female-specific fatty alcohols, docosanol (C22) and eicosanol (C20), which have been found in epicuticle of Triatoma infestans (a vector of Chagas disease in South America), are able to trigger copulation in males (Cocchiararo-Bastias L et al., J Chem Ecol 2011, 37, 246). Hexadecyl acetate is found in the web of some spiders (Pholcidae) to attract females (Schulz S, J Chem Ecol 2013, 39, 1). Long-chain alcohols (C18, C24, C28) from the femoral glands in the male lizard Acanthodactylus boskianus play a role in chemical communication as a scent marking pheromone (Khannoon ER et al., Chemoecology 2011, 21, 143). Various fatty alcohols are found in the waxy film that plants have over their leaves and fruits. Among them, octacosanol (C28:0) is the most frequently cited. Policosanol is a natural mixture of higher primary aliphatic alcohols isolated and purified from sugar cane (Saccharum officinarum, L.) wax, whose main component is octacosanol but contains also hexacosanol (C26:0) and triacontanol or melissyl alcohol (C30:0). Policosanol is also extracted from a diversity of other natural sources such as beeswax, rice bran, and wheat germ (Irmak S et al., Food Chem 2006, 95, 312) but is also present in the fruits, leaves, and surfaces of plants and whole seeds. A complex policosanol mixture has been identified in peanut (Cherif AO et al., J Agric Food Chem 2010, 58, 12143). More than 20 aliphatic alcohols were identified (C14-C30) and four unsaturated alcohols (C20-24). The total policosanol content of the whole peanut samples varied from 11 to 54 mg/100 g of oil. This mixture was shown to have cholesterol-lowering effects in rabbits (Arruzazabala ML et al., Biol Res 1994, 27, 205). Octacosanol was also able to suppress lipid accumulation in rats fed on a high-fat diet (Kato S et al., Br J Nutr 1995, 73, 433) and to inhibit platelet aggregation (Arruzazabala ML et al., Thromb Res 1993, 69, 321). The effectiveness of policosanol is still questionable but it has been approved as a cholesterol-lowering drug in over 25 countries (Carbajal D et al., Prostaglandins Leukotrienes Essent Fatty Acids 1998, 58, 61), and it is sold as a lipid-lowering supplement in more than 40 countries. More recent studies in mice question about any action on improvement of lipoprotein profiles (Dullens SPJ et al., J Lipid Res 2008, 49, 790). The authors conclude that individual policosanols, as well as natural policosanol mixtures, have no potential for reducing coronary heart disease risk through effects on serum lipoprotein concentrations. Furthermore, sugar cane policosanol at doses of 20 mg daily has shown no lipid lowering effects in subjects with primary hypercholesterolemia (Francini-Pesenti F et al., Phytother Res 2008, 22, 318). It must be noticed that, for the most part, positive results have been obtained by only one research group in Cuba. Outside Cuba, all groups have failed to validate the cholesterol-lowering efficacy of policosanols (Marinangeli C et al., Crit Rev Food Sci Nutr 2010, 50, 259). Independent studies are required before evaluating the exact value of the therapeutic benefits of that mixture. An unsaturated analogue of octacosanol, octacosa-10, 19-dien-1-ol was synthesized and was as effective as policosanol in inhibiting the upregulation of HMGCoA reductase (Oliaro-Bosso S et al., Lipids 2009, 44, 907). This work opens promising perspectives for the design of new antiangiogenic compounds (Thippeswamy G et al., Eur J Pharmacol 2008, 588, 141). An unsaturated analogue of octacosanol, octacosa-10, 19-dien-1-ol was synthesized and was as effective as policosanol in inhibiting the upregulation of HMGCoA reductase (Oliaro-Bosso S et al., Lipids 2009, 44, 907). This work opens promising perspectives for the design of new antiangiogenic compounds. 1-Octanol and 3-octanol are components of the mushroom flavor (Maga JA, J Agric Food Chem 1981, 29, 1). Many alcohols in the C10 to C18 range, and their short-chain acid esters are potent sex or aggregation pheromones. They are mainly found as components of specialized defensive glands, pheromone glands or glands of the reproductive system. A series of C22 up to C28 saturated n-alcohols, with even carbon numbers predominating, and a maximum at C26 and C28, has been identified in the cyanobacterium Anabaena cylindrica (Abreu-Grobois FA et al., Phytochemistry 1977, 16, 351). Several authors have reported high contents of the 22:0 alcohol in sediments where an algal origin is plausible. For example, the major alcohol in a sample of the lacustrine Green River Shale of Eocene age is also 22:0 which comprises over 50% of the alcohols present (Sever JR et al., Science 1969, 164, 1052) Long-chain alcohols are known as major surface lipid components (waxes) with chains from C20 up to C34 carbon atoms, odd carbon-chain alcohols being found in only low amounts. Very long-chain methyl-branched alcohols (C38 to C44) and their esters with short-chain acids were shown to be present in insects, mainly during metamorphosis. A series of long-chain alkanols (more than 23 carbon atoms) were identified in settling particles and surface sediments from Japanese lakes and were shown to be produced by planktonic bacteria being thus useful molecular markers (Fukushima K et al., Org Geochem 2005, 36, 311). Cutin and suberin contain as monomer saturated alcohols from C16 to C22 up to 8% of the total polymers. C18:1 alcohol (oleyl alcohol) is also present. Long-chain di-alcohols (1,3-alkanediols) have been described in the waxes which impregnate the matrix covering all organs of plants (Vermeer CP et al., Phytochemistry 2003, 62, 433). These compounds forming about 11% of the leaf cuticular waxes of Ricinus communis were identified as homologous unbranched alcohols ranging from C22 to C28 with hydroxyl group at the carbon atoms 1 and 3. In the leaf cuticular waxes of Myricaria germanica (Tamaricaceae) several alkanediols were identified (Jetter R, Phytochemistry 2000, 55, 169). Hentriacontanediol (C31) with one hydroxyl group in the 12-position and the second one in positions from 2 to 18 is the most abundant diol (9% of the wax). Others were far less abundant : C30-C34 alkanediols with one hydroxyl group on a primary and one on a secondary carbon atom, C25-C43 b-diols and C39-C43 g-diols. Very-long-chain 1,5-alkanediols ranging from C28 to C38, with strong predominance of even carbon numbers, were identified in the cuticular wax of Taxus baccata (Wen M et al., Phytochemistry 2007, 68, 2563). The predominant diol had 32 carbon atoms (29% of the total). Long-chain saturated C30-C32 diols occur in most marine sediments and in a few instances, such as in Black Sea sediments, they can be the major lipids (de Leeuw JW et al., Geochim Cosmochim Acta 1981, 45, 2281). A microalgal source for these compounds was discovered when Volkman JK et al. (Org Geochem 1992, 18, 131) identified C30-C32 diols in marine eustigmatophytes from the genus Nannochloropsis. Two nonacosanetriols (7,8,11-nonacosanetriol and 10,12,15-nonacosanetriol) have been isolated from the outer fleshy layer (sarcotesta) of the Ginkgo biloba "fruit" (Zhou G et al., Chem Phys Lipids 2012, 165, 731). They exhibited slight activity of antithrombin and moderate activities of platelet aggregation in vitro. The chief lipid fraction in the uropygial gland excretion of the domestic hen is a diester wax. The unsaponifiable fraction consists of a series of three homologous compounds, which have been named the uropygiols and identified as 2,3-alkanediols containing 22-24 carbon atoms. These fatty alcohols are esterified by saturated normal C22-C24 fatty acids (Haahti E et al., J Lipid Res 1967, 8, 131). - Unsaturated alcohols Some fatty alcohols have one double bond (monounsaturated). Their general formula is: The unique double bond may be found in different positions: at the C6: i.e. cis-6-octadecen-1-ol (petroselenyl alcohol), C9 i.e cis-9-octadecen-1-ol (oleyl alcohol) and C11 i.e cis-11-octadecen-1-ol (vaccenyl alcohol). Some of these alcohols have insect pheromone activity. As an example, 11-eicosen-1-ol is a major component of the alarm pheromone secreted by the sting apparatus of the worker honeybee. In zooplankton, the cis-11-docosen-1-ol (22:1 (n-11) alcohol) is not only present in high proportion in wax esters (54 to 83%) but may be also predominant in free form (75-94% of free alcohols) in ctenophores (Graeve M et al., Mar Biol 2008, 153, 643). This presence is unexplained because pathways for conversion and catabolism of fatty alcohols in ctenophores are still unknown. Some short-chain unsaturated alcohols are components of mushroom flavor, such as 1-octen-3-ol, t2-octen-1-ol, and c2-octen-1-ol (Maga JA, J Agric Food Chem 1981, 29, 1). An acetoxy derivative of a 16-carbon alcohol with one double bond, gyptol (10-acetoxy cis-7-hexadecen-1-ol), was described to be a strong attractive substance secreted by a female moth (Porthetria dispar, "gypsy moth"). A fatty alcohol with two double bonds, bombykol (tr-10,cis-12-hexadecadien-1-ol), was also shown to be excreted as a very strong attractive substance by the female of silk-worm (Bombyx mori). This first discovery of a pheromone was made by Butenandt A et al. (Z Naturforsch 1959, 14, 283) who was formerly Nobel laureate (in 1939) for his work in sex hormones. Another pheromone, 8,10-dodecadienol (codlemone), is secreted by the codling moth Cydia pomonella, has been used for monitoring and mating in apple and pear orchards in the USA and Europe. This molecule was also used to monitor the population of the pea moth Cydia nigricana. Likewise, 7,9-dodecadienol, the female pheromone of the European grapewine moth Lobesia botrana, was used to control this important pest in vineyards. A fatty triol with one double bond, avocadene (16-heptadecene-1,2,4-triol) is found in avocado fruit (Persea americana) and has been tested for anti-bacterial and anti-inflammatory properties. These properties are likely related with the curative effects of avocado described for a number of ailments (diarrhea, dysentery, abdominal pains and high blood pressure). Several others heptadecanols with one primary and two secondary alcohol functions and with one double or triple bond have been identified in the leaves of Persea americana (Lee TH et al., Food Chem 2012, 132, 921). One or two of these alcohol groups may be acetylated. These compounds may be related to the known antifungal activity of Persea leaves. Long-chain alkenols (C37 to C39) with 2 to 4 double bonds, the reduced form of the alkenones, have been described in the benthic haptophyte Chrysotila lamellosa (Rontani JF et al., Phytochemistry 2004, 65, 117). al., 1986). C30 to C32 alcohols having one or two double bonds are significant constituents of the lipids of marine eustigmatophytes of the genus Nannochloropsis (Volkman JK et al., Org Geochem 1992, 18, 131). These microalgae could be partially the source of the alkenols found in some marine sediments. Two chlorinated derivatives of unusual alcohols were described in a red alga Gracilaria verrucosa (Shoeb M et al., J Nat Prod 2003, 66, 1509). Both compounds have a C12 aliphatic chain chlorinated in position 2 and with one double bond at carbon 2 (compound 1 : 2-chlorododec-2-en-1-ol) or two double bonds at carbon 2 and 11 (compound 2 : 2-chlorododec-2,11-dien-1-ol). - Acetylenic alcohols Natural acetylenic alcohols and their derivatives have been isolated from a wide variety of plant species, fungi and invertebrates. Pharmacological studies have revealed that many of them display chemical and medicinal properties. Monoacetylenic alcohols : were isolated from culture of Clitocybe catinus (Basidiomycetes) and the study of their structure revealed the presence of two or three hydroxyl groups (Armone A et al., Phytochemistry 2000, 53, 1087). One of these compounds is shown below. Acetylenic alcohols have been also described in a tropical sponge Reniochaline sp (Lee HS et al., Lipids 2009, 44, 71). One of the two described in that species is shown below, it exhibited a significant growth effect against human tumor cell lines. Polyacetylenic alcohols : Several examples with different chain lengths, unsaturation degrees, and substitution have been reported from terrestrial plants and marine organisms. Food plants of the Apiaceae (Umbellifereae) plant family such as carrots, celery and parsley, are known to contain several bioactive bisacetylenic alcohols. The main plant sources of these compounds are Angelica dahurica, Heracleum sp and Crithmum maritimum (falcarindiol, falcarinol), red ginseng (Panax ginseng) (panaxacol, panaxydol, panaxytriol), Cicuta virosa (virol A), and Clibadium sylvestre (cunaniol). All these compounds display antibiotic or cytotoxic activities. Polyacetylenes have been isolated from the stems of Oplopanax elatus (Araliaceae), plant used in Korean and Chinese traditional medicine for anti-inflammatory and analgesic purposes (Yang MC et al., J Nat Prod 2010, 73, 801). Among the most efficient in inhibiting the formation of nitric oxide in LPS-induced cells is a seventeen-carbon diyne diol with an epoxy cycle, oploxyne A. Other parent compounds without the epoxy group were also described. J. Sci. Food Agric. 2003, 83, 1010). Falcarinl has potent anticancer properties on primary mammary epithelial cells and was compared with that of b-carotene. These results might be important in developing new cancer treatments with simple and common vegetables. At high concentrations, falcarinol is capable to induce contact dermatitis. Falcarinol, a seventeen-carbon diyne fatty alcohol (1,9-heptadecadiene-4,6-diyn-3-ol), was first isolated from Falcaria vulgaris (Bohlmann F et al., Chem Ber 1966, 99, 3552) as well as from Korean ginseng (Takahashi et al., Yakugaku Zasshi 1966, 86, 1053). It was also isolated from carrot (Hansen SL et al. Falcarinol protects the vegetable from fungal diseases, it showed biphasic activity, having stimulatory effects between 0.01 and 0.05 µg per ml and inhibitory effects between 1 and 10 µg per ml, whereas b-carotene showed no effect in the concentration range 0.001–100 µg per ml (Hansen SL et al., J Sci Food Agric 2003, 83, 1010). Experiments with macrophage cells have shown that falcarinol (and its C-8 hydroxylated derivative, falcarindiol) reduced nitric oxide production, suggesting that these polyacetylenes are responsible for anti-inflammatory bioactivity (Metzger BT et al., J Agric Food Chem 2008, 56, 3554). Falcarindiol was first reported as phytochemicals in carrots (Daucus carota) (Bentley RK et al., J Chem Soc 1969, 685). Besides falcarinol, falcarindiol, and falcarindiol 3-acetate, nine additional bisacetylene alcohols were identified in Daucus carota (Schmiech L et al., J Agric Food Chem 2009, 57, 11030). Experiments with human intestinal cells demonstrate that aliphatic C17-polyacetylenes (panaxydol, falcarinol, falcarindiol) are potential anticancer principles of carrots and related vegetables (parsley, celery, parsnip, fennel) and that synergistic interaction between bioactive polyacetylenes may be important for their bioactivity (Purup S et al., J Agric Food Chem 2009, 57, 8290). Compounds very similar to falcarinol and extracted from Panax japonicus are potent a-glucosidase inhibitors (Chan HH et al., Phytochemistry 2010, 71, 1360). These inhibitors may potentially reduce the progression of diabetes by decreasing digestion and absorption of carbohydrates. The water dropwort (Oenanthe crocata), which lives near streams in the Northern Hemisphere, contains a violent toxin, cicutoxin, resulting in convultions and respiratory paralysis (Uwai K et al., J Med Chem 2000, 43, 4508). The biochemistry and bioactivity of polyacetylenes are presented in a review (Christensen LP et al., J Pharm Biomed Anal 2006, 41, 683) as well methods for the isolation and quantification of these compounds. Many other polyacetylenic alcohols were found in primitive marine organisms, such as sponges and ascidians. These invertebrates have no physical defenses and thus they have developed efficient chemical mechanisms such as polyacetylenic metabolites to resist predators and bacteria. A C36 linear diacetylene alcohol named lembehyne was found in an Indonesian marine sponge (Haliclona sp) (Aoki S et al., Tetrahedron 2000, 56, 9945) and was later able to induce neuronal differentiation in neuroblastoma cell (Aoki S et al., Biochem Biophys Res Comm 2001, 289, 558). Several polyacetylenic alcohols with 22 carbon atoms were isolated and identified in lipid extract from a Red Sea sponge, Callyspongia sp (Youssef DT et al., J Nat Prod 2003, 66, 679). Their physical study revealed the presence of 4 triple bonds and one, two or three double bonds. The structure of one of these Callyspongenols is given below. Several di- and tri-acetylenic di-alcohols with a chain of 26 up to 31 carbon atoms, named strongylodiols, have been isolated from a Petrosia Okinawan marine sponge (Watanabe K et al., J Nat Prod 2005, 68, 1001). Some of them have cytotoxic Several polyacetylenic alcohols with 21 carbon atoms were isolated from a marine ascidian (Polyclinidae) and were determined to have two triple bonds combined with a conjugated dienyne group (Gavagnin M et al., Lipids 2004, 39, 681). Some of them have an additional hydroxyl group or only three double bonds. The structure of one of these molecules is given below. Several brominated polyacetylenic diols with cytotoxic properties were isolated from a Philippines sponge Diplastrella sp (Lerch ML et al., J Nat Prod 2003, 66, 667). One of these molecules is shown below. A comprehensive survey of acetylenic alcohols in plant and invertebrates with information on their anticancer activity has been released by Dembitsky VM (Lipids 2006, 41, 883). - Sulfated alcohols Long-chain di-hydroxy alcohols in which both the primary and secondary hydroxyl groups are converted to sulfate esters and one to five chlorine atoms are introduced at various places have been discovered in the alga Ochromonas danica (Chrysophyceae, Chrysophyta) where they constitute 15% of the total lipids (Haines TH, Biochem J 1969, 113, 565). An example of these chlorosulfolipids is given below. There may be several types of chlorine addition : one at R4, two at R3 and R5 or R1 and R2, five at R1 to R5 and six at R1 to R6. Similar molecules with a 24 carbon chain was also described in Ochromonas malhamensis (review in Dembitsky VM et al., Prog Lipid Res 2002, 41, 315 and in Bedke DK et al., Nat Prod Rep 2011, 28, 15). It was suggested that the chlorosulfolipids replace sulfoquinovosyl diglyceride, since when the later is high the former is low and vice versa. They have been associated with the human toxicity of the mussel-derived lipids (Diarrhetic Shellfish Poisoning). Several of these chlorosulfolipids have also been identified from more than 30 species of both freshwater and marine algae belonging to green (Chlorophyceae), brown (Phaeophyceae), red (Rhodophyceae) macrophytic algae (Mercer EI et al., Phytochemistry 1979, 18, 457), and other microalgal species (Mercer EI et al., Phytochemistry 1975, 14, 1545). Some fatty alcohols, such as dodecanol (lauryl or dodecyl alcohol), are used for the manufacture of detergents after sulphonation (by action of SO3 gas). The salt sodium laurylsulfate (or sodium dodecylsulfate) is a detergent and strong anionic surfactant, used in biochemistry and in the composition of cosmetic products (shampoos, toothpastes). 2 - Branched-chain alcohols In 1936, Stodola et al. characterized an optically active substance recovered on saponification of ‘‘purified waxes’’ of Mycobacterium tuberculosis, determined its global formula and proposed to name it phthiocerol (Stodola FH et al., J Biol Chem 1936, 114, 467). In 1959, after several chemical studies, its structure was determined as a mixture of C36 and C34b-glycols. It has been proposed that the term phthiocerol be reserved for the original 3-methoxy congener (phthiocerol A) and that the term phthioglycol be used to refer to the family of compounds (Onwueme KC et al., Prog Lipid Res 2005, 44, 259). Among the most important saturated isopranols found in plants or in geological sediments are those having two (tetrahydrogeraniol), three (farnesanol), or four (phytanol) isoprenoid units. Pristanol (2,6,10,14-tetramethyl-1-pentadecanol) is tetramethylated but with only three complete isoprenoid units. B - Unsaturated polyisoprenoids (prenols or polyprenols) They have the following general structure : These molecules consist of several up to more than 100 isoprene residues linked head-to-tail, with a hydroxy group at one end (a-residue) and a hydrogen atom at the other (w-end). - 1. all trans forms : They have the following structure: Some important members of the series are as follows: Number of isoprene unit Number of carbons Long-chain trans-polyprenol (n>8) have been characterized from Eucommia ulmoides. Geraniol (from rose oil) is a monoterpene (2 isoprene units). It has a rose-like odor and is commonly used in perfumes and as several fruit flavors. Geraniol is also an effective mosquito repellent. Inversely, it can attract bees as it is produced by the scent glands of honey bees to help them mark nectar-bearing flowers and locate the entrances to their hives. Farnesol is a sesquiterpene (3 isoprene units). It is the prenol that corresponds to the carbon skeleton of the simplest juvenile hormone described for the first time in insects in 1961 (Schmialek PZ, Z Naturforsch 1961, 16b, 461; Wigglesworth VB, J Insect Physiol 1961, 7, 73). It is present in many essential oils such as citronella, neroli, cyclamen, lemon grass, rose, and others. It is used in perfumery to emphasize the odors of sweet floral perfumes. It is especially used in lilac perfumes. As a pheromone, farnesol is a natural pesticide for mites. The dimorphic fungus Candida albicans has been shown to use farnesol as quorum-sensing molecule (Hornby JM et al., Appl Environ Microbiol 2001, 67, 2982). Geranylgeraniol is a diterpene (4 isoprene units). Geraniol and geranylgeraniol are important molecules in the synthesis of various terpenes, the acylation of proteins and the synthesis of vitamins (Vitamins E and K). The covalent addition of phosphorylated derivatives of typical isoprenoids, farnesyl pyrophosphate and geranylgeranyl pyrophosphate, to proteins is a process (prenylation) common to G protein subunits. These isoprenylated proteins have key roles in membrane attachment leading to central functionality in cell biology and pathology. Solanesol, discovered in tobacco leaves in 1956 (Rowland RL et al., J Am Chem Soc 1956, 78, 4680), may be an important precursor of the tumorigenic polynuclear aromatic hydrocarbons of smoke but is also a possible side chain for plastoquinone. Solanesol is also present in the leaves of other Solanaceae plants including tomato, potato, eggplant and pepper. It has useful medicinal properties and is known to possess anti-bacterial, anti-inflammation, and anti-ulcer activities (Khidyrova NK et al., Chem Nat Compd 2002, 38, 107). Industrially, solanesol is extracted from Solanaceae leaves (about 450 tons in 2008) and used as an intermediate in the synthesis of coenzyme Q10 and vitamin K analogues. Spadicol was discovered in the spadix (inflorescence) of the Araceae Arum maculatum (Hemming FW et al., Proc R Soc London 1963, 158, 291). Its presence is likely related to its presence in the ubiquinone as the side-chain. Phytol is a partially saturated diterpene, a monounsaturated derivative of geranylgeraniol which is part of the chlorophyll molecule : - 2. ditrans-polycis-prenols, such as the bacteria prenol and betulaprenol types. In general, bacteria, as all prokaryotic cells, possess ditrans-polycis-prenols containing between 10 and 12 units, the most abundant being undecaprenol (trivial name bactoprenol). Betulaprenols with n = 3-6 were isolated from the woody tissue of Betula verrucosa (Wellburn AR et al., Nature 1966, 212, 1364), and bacterial polyprenol with n = 8 were isolated from Lactobacillus plantarum (Gough DP et al., Biochem J 1970, 118, 167). Betulaprenol-like species with 14 to 22 isoprene units have been discovered in leaves of Ginkgo biloba (Ibata K et al., Biochem J 1983, 213, 305). Polyisoprenoid alcohols are accumulated in the cells most often as free alcohols and/or esters with carboxylic acids. A fraction of polyisoprenoid phosphates has also been detected, and this form is sometimes predominant in dividing cells and Saccharomyces cerevisiae (Adair WL et al., Arch Biochem Biophys 1987, 259, 589). - 3. tritrans-polycis-prenols, of the ficaprenol type.Some of the earliest samples were obtained from Ficus elastica, giving rise to the trivial names ficaprenol-11 and ficaprenol-12 (Stone KJ et al. Biochem J 1967, 102, 325). In plants, the diversity of polyprenols is much broader, their chain length covers the broad spectrum of compounds ranging from 6 up to 130 carbon atoms (Rezanka T et al., J Chromatogr A 2001, 936, 95). - 4. dolichol types, the a terminal is saturated. Most eukaryotic cells contain one type of polyisoprenoid alcohols with one a-saturated isoprenoid unit (2,3-dihydro polycis-prenols) which have been called dolichol by Pennock JF et al. (Nature 1960, 186, 470), a derivative of prenols. Most of these carry two trans units at the w-end of the chain. Dolichols (fro the Greek dolikos: long) have the general structure : Dolichols isolated from yeast or animal cells consist mainly of seven to eight compounds, those with 16, 18, or 19 isoprenoid units being the most abundant (Ragg SS, Biochem Biophys Res Comm 1998, 243, 1). Dolichol amount was shown to be increased in the brain gray matter of elderly (Pullarkat RK et al., J Biol Chem 1982, 257, 5991). Dolichols with 19, 22 and 23 isoprenoid units were described as early as 1972 in marine invertebrates (Walton MJ et al., Biochem J 1972, 127, 471). Furthermore, the pattern of their distribution may be considered as a chemotaxonomic criterion. It has been reported that a high proportion of dolichols is esterified to fatty acids. As an example, 85-90% of dolichols are esterified in mouse testis (Potter J et al., Biochem Biophys Res Comm 1983, 110, 512). In addition, dolichyl dolichoate has been found in bovine thyroid (Steen L. et al., Biochim Biophys Acta, 1984, 796, 294). They are well known for their important role as glycosyl carrier in a phosphorylated form in the synthesis of polysaccharides and glycoproteins in yeast cells, and animals. Dolichyl phosphate is an obligatory intermediate in the biosynthesis of N-glycosidically linked oligosaccharide chains. Conversely, they have been identified as the predominant isoprenoid form in roots (Skorupinska-Tudek K et al., Lipids 2003, 38, 981) and in mushroom tissue (Wojtas M et al., Chem Phys Lipids 2004, 130, 109). Similar compounds (ficaprenols) have the same metabolic function in plants. The repartition of the various types of polyisoprenoid alcohols between plants and animals and their metabolism have been extensively discussed (Swiezewska E et al., Prog Lipid Res 2005, 44, 235). Biosynthesis of polyisoprenoid alcohols and their biological role have been reviewed in 2005 (Swiezewska E et al., Prog Lipid Res 2005, 44, 235). 3 - Phenolic alcohols Among the simple phenolic alcohols, monolignols are the source materials for biosynthesis of both lignans and lignin. The starting material for production of monolignols (phenylpropanoid) is the amino acid phenylalanine. There are two main monolignols: coniferyl alcohol and sinapyl alcohol. Para-coumaryl alcohol is similar to conipheryl alcohol but without the methoxy group. Conipheryl alcohol is found in both gymnosperm and angiosperm plants. Sinapyl alcohol and para-coumaryl alcohol, the other two lignin monomers, are found in angiosperm plants and grasses. Conipheryl esters (conypheryl 8-methylnonanoate) have been described in the fruits of the pepper, Capsicum baccatum (Kobata K et al., Phytochemistry 2008, 69, 1179). These compounds displayed an agonist activity for transient receptor potential vanilloid 1 (capsaicin receptor) as the well known capsaicinoids present in these plant species. Complex phenolic alcohols (phenolphthiocerol) were shown to be components of Mycobacterium glycolipids which are termed glycosides of phenolphthiocerol dimycocerosate (Smith DW et al., Nature 1960, 186, 887) belonging to the large family of "mycosides". The chain length differs according to the homologues, 18 and 20 carbon atoms in mycosides A, and B, respectively. One of these phenolphthiocerols is shown below. An analogue component but with a ketone group instead of the methoxy group, a phenolphthiodiolone, has been detected in mycoside A (Fournie JJ et al., J Biol Chem 1987, 262, 3174). An alcohol with a furan group, identified as 3-(4-methylfuran-3-yl)propan-1-ol, has been isolated from a fungal endophyte living in a plant, Setaria viridis (Nakajima H et al., J Agric Food Chem 2010, 58, 2882). That compound was found to have a repellent effect on an insect, Eysarcoris viridis, which is a major pest of rice. Some cyclic alkyl polyols have been reported in plants. Among the various form present in an Anacardiaceae, Tapirira guianensis, from South America, two displayed anti-protozoal (Plasmodium falciparum) and anti-bacterial (Staphylococcus spp) activities (Roumy V et al., Phytochemistry 2009, 70, 305). The structure shown below is that of a trihydroxy-alcohol containing a cyclohexene ring. As emphasized by the authors, external application of the active plant extract or of the purified compounds could represent an accessible therapeutic alternative to classical medicine against leishmaniasis. aldehydes are found in free form, but also in the form of vinyl ether (known as alk-1-enyl ether) integated in glycerides and phospholipids (plasmalogens). The free aldehydes can be as fatty acids saturated or unsaturated. They have a general formula CH3(CH2)nCHO with n=6 to 20 or greater. The most common is palmitaldehyde (hexadecanal) with a 16 carbon chain. Normal monoenoic aldehydes are analogous to the monoenoic fatty acids. It must be noticed that an aldehyde function may be found at a terminal (w) position while an acid function is present at the other end of the carbon chain (oxo fatty acids). These compounds have important signaling properties in plants. Long-chain aldehydes have been described in the waxes which impregnate the matrix covering all organs of plants (Vermeer CP et al., Phytochemistry 2003, 62, 433). These compounds forming about 7% of the leaf cuticular waxes of Ricinus communis were identified as homologous unbranched aldehydes ranging from C22 to C28 with a hydroxyl group at the carbon 3. Long-chain 5-hydroxyaldehydes with chain lengths from C24 to C36, the C28 chain being the most abundant, were identified in the cuticular wax of Taxus baccata needles (Wen M et al., Phytochemistry 2007, 68, 2563). Long-chain aliphatic aldehydes with chain-length from C22 to C30 are also present in virgin olive oils, hexacosanal (C26) being the most abundant aldehyde (Perez-Camino MC et al., Food Chem 2012, 132, 1451). Aldehydes may be produced during decomposition of fatty acid hydroperoxides following a peroxidation attack. Several aldehydes (hexanal, heptanal..) belong to aroma compounds which are found in environmental or food systems (see the website: Flavornet). Aldehydes (mono- or di-unsaturated) with 5 to 9 carbon atoms are produced by mosses (Bryophyta) after mechanical wounding (Croisier E et al., Phytochemistry 2010, 71, 574). It was shown that they were produced by oxidative fragmentation of polyunsaturated fatty acids (C18, C20). Trans-2-nonenal is an unsaturated aldehyde with an unpleasant odor generated during the peroxidation of polyunsaturated fatty acids. It participates to body odor and is found mainly covalently bound to protein in vivo (Ishino K et al., J Biol Chem 2010, 285, 15302). Fatty aldehydes may be determined easily by TLC or gas liquid chromatography (follow that link). The most common method for the determination of aldehydes involves derivatization with an acidic solution of 2,4-dinitrophenylhydrazine to form corresponding hydrazones followed by HPLC separation and UV–VIS detection. An optimized derivatization procedure for the determination of aliphatic C1-C10 aldehydes has been described (Stafiej A et al., J Biochem Biophys Meth 2006, 69, 15). Other short-chain aldehydes (octadienal, octatrienal, heptadienal) are produced via a lipoxygenase-mediated pathway from polyunsaturated fatty acids esterifying glycolipids in marine diatoms (D'Ippolito G et al., Biochim Biophys Acta 2004, 1686, 100). Heighteen species of diatoms have been shown to release unsaturated aldehydes (C7:2, C8:2, C8:3, C10:2, and C10:3) upon cell disruption (Wichard T et al., J Chem Ecol 2005, 31, 949). Several short-chain aldehydes were shown to induce deleterious effects on zooplankton crustaceans and thus limiting the water secondary production (birth-control aldehydes) (D'Ippolito G et al., Tetrahedron Lett 2002, 43, 6133). In laboratory experiments, three decatrienal isomers produced by various diatoms were shown to arrest embryonic development in copepod and sea urchins and have antiproliferative and apoptotic effects on carcinoma cells (Miralto A et al., Nature 1999, 402, 173). Later, the copepod recruitment in blooms of planktonic diatom was shown to be suppressed by ingestion of dinoflagellate aldehydes (Nature 2004, 429, 403). It was demonstrated that diatoms can accurately sense a potent 2E,4E/Z-decadienal and employ it as a signaling molecule to control diatom population sizes (Vardi A et al., PLoS Biol 2006, 4, e60). This aldehyde triggered a dose-dependent calcium transient that has derived from intracellular store. Subsequently, calcium increase led to nitric oxide (NO) generation by a calcium-dependent NO synthase-like activity, resulting in cell death in diatoms. Myeloperoxidase-derived chlorinated aldehydes with plasmalogens has been reported. Thus, the vinyl-ether bond of plasmalogens is susceptible to attack by HOCl to yield a lysophospholipid and an Both these chloro-fatty aldehydes have been detected in neutrophils activated with PMA (Thukkani AK et al., J Biol Chem 2002, 277, 3842) and in human atherosclerotic AK et al., Circulation 2003, 108, 3128). Furthermore, 2-chlorohexadecanal was shown to induce COX-2 expression in human coronary artery endothelial cells (Messner MC et al., Lipids 2008, 43, 581). These data suggest that 2-chlorohexadecanal and possibly its metabolite 2-chlorohexadecanoic acid, both produced during leukocyte activation, may alter vascular endothelial cell function by upregulation of COX-2 expression. Long after the demonstration of the presence of iodinated lipids in thyroid (besides iodinated aminoacids), it was shown that the major iodinated lipid formed in thyroid when incubated in vitro with iodide was 2-iodohexadecanal (Pereira A et al, J Biol Chem 1990, 265, 17018). In rat and dog thyroid, 2-iodooctadecanal was determined to be more abundant that the 16-carbon aldehyde. These compounds, which are thought to play a role in the regulation of thyroid function, were recently shown to be formed by the attack of reactive iodine on the vinyl ether group of PE plasmalogen. This attack generates an unstable iodinated derivative which breaks into lysophosphatidylethanolamine and 2-iodo aldehydes (Panneels V et al, J Biol Chem 1996, 271, 23006). In some bacteria, aldehyde analogs of cyclopropane fatty acids were described. Several fatty aldehydes are known to have pheromone functions. Studies in African and Asian countries have shown that the use of 10,12-hexadecadienal could be effective for control of the spiny bollworm Earias insulana, a cotton pest. The sex pheromone of the navel orange worm, Amyelois transitella, 11,13-hexadecadienal, is usually used in the control of this citric pest. A branched saturated aldehyde (3,5,9-trimethyldodecenal, stylopsal) has been identified as a female-produced sex pheromone in Stylops (Strepsiptera), an entomophagous endoparasitic insect (Cvacka J et al., J Chem Ecol 2012, 38, 1483). Several isoprenoid aldehydes are important in insect biology as pheromones and in botany as volatile odorous substances. Some examples are given below: These three terpenic aldehydes are produced in large amounts by the mandibular glands of ants and may function as defensive repellents (Regnier FE et al., J Insect Physiol 1968, 14, 955). In contrast, the same molecules have a role of recruiting pheromones in honeybees Citral, a mixture of the tautomers geranial (trans-citral) and neral (cis-citral) is a major component (more than 60%) of the lemongrass (Cymbopogon flexuosus) oil. Lemongrass is widely used, particularly in Southeast Asia and Brazil, as a food flavoring, as a perfume, and for its medicinal properties (analgesic and anti-inflammatory). It was found that citral is a major suppressor of COX-2 expression and an activator of PPARa and g (Katsukawa M et al., Biochim Biophys Acta 2010, 1801, 1214). It was demonstrated that damaged leaves released 2-hexenal, among other C6-volatile aldehydes, produced from the catalytic activity of hydroperoxide lyase (Turlings TC et al., Proc Ntl Acad Sci USA 1995, 92, 4169). These compounds, considered as signal molecules, can trigger several responses in neighboring plants and may also act as antimicrobial agents (Farmer EE, Nature 2001, 411, 854). One important constituent of this group of aldehydes is retinal, one active form of vitamin A involved in the light reception of animal eyes but also in bacteria as a component of the proton pump. Retinal exist in two forms, a cis and a trans isomer. On illumination with white light, the visual pigment, rhodopsin is converted to a mixture of a protein (opsin) and trans-retinal. This isomer must be transformed into the cis form by retinal isomerase before it combines again with opsin (dark phase). Both isomers can be reduced to retinol (vitamin A) by a NADH dependent alcohol dehydrogenase. Retinol is stocked in retina mainly in an acylated form. Cinnamic aldehyde (cinnamaldehyde) is the key flavor compound in cinnamon essential oil extracted from Cinnamomum zeylanicum and Cinnamomum cassia bark. Investigations have revealed than that benzyl aldehyde activates the Nrf2-dependent antioxidant response in human epithelial colon cells (Wondrak GT et al., Molecules 2010, 15, 3338). Cinnamic aldehyde may therefore represent a precious chemopreventive dietary factor targeting colorectal carcinogenesis.
<urn:uuid:545660ca-1ae5-41b7-b614-1a9c88f961c3>
CC-MAIN-2013-20
http://www.cyberlipid.org/simple/simp0003.htm
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.881417
10,975
3.0625
3
The immune system immune; immunity; disease; bacteria; viruses; white; cells; lymph; germs; mucous; mucus; glands; What is immunity? Immunity (say im-yoon-it-i) means that you are protected against something. There are different kinds of immunity. This topic is about how different parts of our bodies work together to keep us from getting sick. Immunity to some diseases is passed on from our mothers before we are born. Immunisation (having your 'shots') helps our body's immune defence system protect us from diseases . body's immune system Every body has an inbuilt immune system which protects it from diseases and germs. This system has a lot of different parts which work together to keep out any harmful germs, and attack and destroy any which manage to get inside your body - Every day your body is exposed to millions of germs, and you do not get sick from them because of your immune system. - Every time you do get sick because of a germ, your immune system works to get rid of it and then it remembers how to fight the infection if the same germ comes again. - Usually the older you get, the more germs you become immune to. So, let's have a look at the immune system, starting from the outside of the body. The skin is the first line of defence in your immune system. You know how you put plastic wrap over leftovers to keep them fresh enough for later? Well, your skin is like a plastic wrap to keep germs from getting into your body. - The epidermis (outside layer of skin) has special cells which warn the body about incoming germs. - Glands in the skin also make substances that can kill some bacteria (anti-bacterial chemicals). This means you don't get infections on your skin unless your skin is damaged, such as by a cut or a graze. Your nose, mouth and eyes are the next point of attack. - The mucous membranes which line the mouth, throat, lungs and bowel, act like a barrier to germs, just as the skin does. - Saliva in the mouth and the tears which wash your eyes have special enzymes (chemicals) in them which break down the cell walls of many bacteria and viruses. - The mucous that is made in your nose, throat and lungs traps bacteria, viruses and dust. - Acid in your stomach kills most germs, and starts to digest your food. - Lymph (limf) is a clear fluid that is very similar to blood plasma, the clear liquid in blood, but it carries only white blood cells, not red blood cells. - The lymph flows through all the parts of the body picking up fluid around cells and carrying it back to large veins near the heart. It also carries white blood cells to the places that they are needed. - Some bacteria or viruses that have entered the body are collected by the lymph and passed on to the lymph nodes where they are filtered out and destroyed. Lymph nodes are sometimes called glands. Your doctor can often tell if you have an infection by checking out the lymph nodes (glands) in your neck and under your arms to see if they're swollen. If they are, it shows that they are working to get rid of bacteria or viruses. In your blood you have red blood cells and white blood cells, and in lymph there are white blood cells. There are several different types of white cells which work together to seek out and destroy bacteria and viruses. All of them start off in the bone marrow, growing from 'stem cells'. The disease-fighting white blood cells are specialists. Some of the white blood cells are: - Neutrophils (say new-tro-fills), which move around the body in the blood and seek out foreign material (things that don't belong in your body). - Macrophages (say mak-row-far-jes) are the biggest blood cells. Some live in different parts of the body and help to keep it clean, eg. in the lungs. Others swim around cleaning up other white blood cells that have been damaged while doing their jobs, eg. cleaning up pus that has been caused by neutrophils when they work to clear out bacteria from a wound. - Lymphocytes (say lim-fo-sites) work on bacterial and viral infections There are two different types: - B cells produce antibodies. Each cell watches out for a particular germ, and when that germ arrives, the cell starts to produce more antibodies which begin the process of killing that germ. Antibodies attach themselves to the germs so that other cells can recognise that these germs need to be destroyed. - T cells look for cells in your body that are hiding invaders (germs) or body cells that are different to normal healthy cells (such as cells that could develop into a cancer) and kill them. does your immune system know which cells to attack? Your body has lots of friendly bacteria around it which help your body work properly - eg. some bacteria inside your bowel help you to digest your food and break it up into the different things that are needed in various parts of the body. - These friendly bacteria live on the surfaces of the body, such as on our skin or inside the bowel. - They do not try to invade the body, so the immune system does not try to get rid of them. - Other germs which cause illness, try to enter the body. - Antibodies, which are made by the lymphocytes, attach to the invaders so that the other white blood cells can destroy them. They 'tag' them so they can be easily noticed. As well as attacking germs, your immune system recognises and destroys other cells which do not belong in your body. - The cells in your own body are marked with a special system called Human Leukocyte Antigen or HLA (say Hew-man lew-ko-site anti-jen). - Your immune system can recognise these markings as 'you'. Any cells which do not have the right markings are 'not you' and are therefore attacked.This happens if, for example, you have a blood transfusion with the wrong types of blood cells. Your body's immune system recognises that these cells do not belong in your body, so it destroys them. How you know your immune system is working You know your immune system is working: - if you get better after you are sick - if cuts heal without getting infected - if you don't catch the same diseases over and over again - when you get swollen glands - when you get swelling and soreness around a cut. Your immune system is in there working to get rid of any infection. When things go wrong with the immune system Sometimes the immune system will make a mistake. - It may attack your own body as if it were the enemy, eg. insulin dependent diabetes (the type that most often starts in children and young people) is caused by the immune system attacking the cells in the pancreas that make insulin. - Allergies are caused by the immune system over-reacting to something that is not really a threat, like when pollen triggers hay fever or asthma. - If tissue is transplanted from one person to another - eg. a skin or organ transplant - then the immune system will attack the new part. The immune system has to be suppressed by drugs to allow the transplant to work. - When the immune system is damaged, such as when people have a serious illness called AIDS, they get lots of infections and are much more likely to get cancers. Their body cannot recognise the infection or abnormal cells very well and the immune system does not destroy them as well as usual. The immune system is absolutely amazing. It deals with millions of bacteria and viruses every day to keep us healthy. Keeping up to date with immunisations can help your body to build immunity to some serious diseases too. We've provided this information to help you to understand important things about staying healthy and happy. However, if you feel sick or unhappy, it is important to tell your mum or dad, a teacher or another grown-up.
<urn:uuid:ce2ffe26-b35c-4206-9d9e-c664fdbda89f>
CC-MAIN-2013-20
http://www.cyh.sa.gov.au/HealthTopics/HealthTopicDetailsKids.aspx?p=335&np=152&id=2402
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.949602
1,713
3.59375
4
Radon, a silent killer in homes DeKALB – Many homeowners take precautions to protect themselves. They lock their doors at night, turn off and unplug appliances and regularly test their smoke detectors. Radon isn’t something many homeowners consider a danger in their homes, but it could be harming them the most. Radon is a colorless, odorless naturally occurring gas found in uranium in soil. The gas often seeps through cracks in a house’s foundation or other areas exposed to soil. The health risks associated with radon are not immediate but rather a result of continuous exposure over a long period of time. If you have any technical difficulties, either with your username and password or with the payment options, please contact us by e-mail at firstname.lastname@example.org
<urn:uuid:19f471cc-541f-46da-bb37-61497f73e921>
CC-MAIN-2013-20
http://www.daily-chronicle.com/2013/02/27/radon-a-silent-killer-in-homes/aqv83ut/?list-comments=1
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.946226
168
2.546875
3
“People learn to develop and articulate their story [through the program] so they can go into the community and tell their story,” Director James Guffey said of the program. Joel Slack, the founder of Respect International and instructor of this week’s program, said it was important for those who have faced mental health and/or substance abuse challenges to learn to tell their story and to reach out to the community in an effort to change the stigmatization associated with mental illnesses or addiction. Those who spoke during Friday’s ceremony, held at the Bartow County Agriculture Building, shared personal experiences of trauma, physical abuse, prior hospitalization and how they have worked through the problems associated with self-medicating through drugs and alcohol. “I don’t know how anybody could feel like they are part of a community if they have to hide a story about themselves,” Slack said. “... This is an opportunity for people to explain how they have seen their life experiences and make peace with their past.” Christine Farnum said working with the local center, along with the aid of the RESPECT program, has helped her grow as a person “My world became very dark in the shell of a body that was once filled with so much light,” Farnum said. “My guilt, shame and codependency had me trapped in my own personal prisons, demons and all.” She spoke on how she repeated behavior of becoming involved in abusive relationships and using drugs in between being prescribed antipsychotic medication and seeking therapy. Farnum said she was introduced to the Cartersville center during a treatment program she attended in 2011. “I was able to stay out of the hospital for over a year by using the center when I felt I needed it,” Farnum said. “I finally had people that believed in me and treated me with dignity and respect. “They showed me ways to overcome my weaknesses and confront my fears.” Guffey further explained the purpose of the center as well as how it operates. “We’re a non-traditional provider for services, we have wellness activities throughout the day, we have a 24/7 warm line that people can call to get support over the phone, and we have a thing called ‘respite’ where people can stay up to seven nights [if approved] and it’s completely free,” Guffey said. “We’re completely funded through a government contract.” He said the center serves about nine to 11 clients a day. “Everybody that works at the center is a certified peer specialist, and what that means is we’re all people who are living with a mental health challenge or substance abuse problem and basically we’re there to provide peer support,” Guffey said. For more information about the Peer Support, Wellness and Respite Center, call 770-276-2019. The number also is the organization’s 24-hour warm line.
<urn:uuid:9c1036e6-1f92-4475-896e-fea6ef286753>
CC-MAIN-2013-20
http://www.daily-tribune.com/view/full_story/21526506/article-Graduates-celebrate-RESPECT--growth?instance=most_recommended
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.975738
642
2.03125
2
Earlier this year, PUC President Michael Peevey told Edison they had to provide the information by Feb. 28, 2013. Now Edison has to "prepare testimony" based on preliminary engineering studies of options for running transmission lines underground by Dec. 3. Moreover, Edison has to provide the PUC a rate recovery proposal and a detailed report describing the cost and scope of the materials and service contracts, and the associated timing required for such contracts, that are required to install an underground transmission option for the section of the Tehachapi Renewable Transmission Project, according to PUC documents. The new PUC order came on Nov. 15. The $2.1 billion Tehachapi project aims to carry wind-generated electricity from Kern County to the Los Angeles Basin. Edison already has started extending the towers about five miles into the right-of-way. But city officials and the grassroots group Hope for the Hills have advocated building the project underground. Chino Hills officials have spent more than $2 million battling Edison in a lawsuit for two years insisting the right-of-way is too narrow for the proposed 198-foot towers and that it causes safety hazards.
<urn:uuid:ab5781cd-6110-437e-b046-2088af2b1154>
CC-MAIN-2013-20
http://www.dailybulletin.com/breakingnews/ci_22082067/cpuc-moves-southern-california-edison-study-undergrounding-high
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.939516
244
1.78125
2
When it comes to solar power, the real dilemmas are efficiency and cost. On the one hand, efficiency has steadily improved over the last couple decades to the point where it’s approaching the utility prices of other power generation methods. Exotic technologies promise even greater gains. However, the price of solar-generated power still remains at least five times as expensive as coal-power, the chief source of power in the U.S. (compared to the leading candidate, nuclear, which is approximately 1.5 to 2 times as expensive). While solar adoption from a cost standpoint is unattractive, there's much debate over whether commercial adoption is needed to spur further research to propel solar into the realm of cost competitiveness. While many nations like the U.S. and China have modestly taken this position, adopting solar at a moderate rate, one nation has fallen head over heels for solar -- Spain. Spain is allowing solar and wind power plants to charge as much as 10 times the rates of coal power plants, making it possible for solar power installations to earn utilities big money. On average, recent rate increases have raised solar charges to over 7 times the rates of coal or natural gas rates. The costs are added onto consumers' power bills. The results are mixed; while Spanish power bills are at record highs, the number of deployments is soaring. Spain has 14 GW of solar power, or the equivalent capacity of nine average nuclear reactors, under construction -- the most of any nation. Florida’s FPL Group Inc. and French Electricite de France SA are among the many jumping to build in Spain. Gabriel Calzada, an economist and professor at Rey Juan Carlos University in Madrid, states, "Who wouldn’t want to enter a business that’s paid many times more than the market rate, and where the customer is guaranteed for life?" By 2009, 42 percent of Spaniards energy bills -- approximately 95 euros ($127) on average -- will be provided by alternative energy. Spanish law requires power distributors to buy all clean energy produced in the first 25 years of the plants' lives. The government also recently raised the rate of Spain believes this sacrifice will pay off as fossil fuel resources become depleted and emissions standards tighten. Karsten von Blumenthal, an industrial analyst at Hamburg-based SES Research GmbH states, "The guarantee is more attractive than what other countries offer. Actually the U.S. has better space for solar, in the deserts of California and Nevada." The U.S. meanwhile is also advancing thanks in part to President Obama's solar initiatives passed earlier this year as part of the federal stimulus legislation. Over 6 GW of capacity is planned for the U.S. Fred Morse, an official at the Washington- based Solar Energy Industries Association trade group and author of the first report to the White House on solar power (1969), says that the U.S. needs to adopt more incentives if it hopes to catch Spain. He states, "The incentives, if implemented promptly and effectively, should greatly facilitate the financing of these plants." One promising benefit of the Spanish solar boom is that it is increasing the number of plants utilizing new, potentially more efficient technologies like solar thermal or sterling engines. Spain is limiting the number of photovoltaic plants (solar panel-based designs), but is giving out unlimited licenses for solar thermal and other alternative plants. quote: 1 - Solar Tech is improving very quickly. In another 3~5 years, it SHOULD be just as cheap as coal. quote: 4 - If many people buy their own, it reduces the drain on the electrical system quote: 2 - If its cheap, unlike a power plant (coar / nuke) Anyone can buy it and install it on their roof or their yard. Remember on DT - they're's tech that'll allow your windows to be solar collectors. quote: 5 - if everyone has one, it can help re-charge their electric cars. Because AS OF NOW, eletric cars STILL require power from Coal / Nuke plants which generate pollution / waste. quote: Assuming 0,45 cents per KW Here, quote: But the pleasure to not give the moneyto them... doesn´t have a price...
<urn:uuid:23a90b54-7af3-418f-b87f-445b0ed0e428>
CC-MAIN-2013-20
http://www.dailytech.com/article.aspx?newsid=15102&commentid=443095&threshhold=1&red=4522
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.943513
874
2.734375
3
Android operating system has been tremendously successful. It's become the top selling phone platform in the world and its app store is stocked with close to 200,000 apps. But for all that success, a perpetual criticism is a perception that Android's environment is too heterogeneous across various handsets -- part of this is due to carriers/hardware partners failing to roll out the latest versions, but part of it is due to customizations such as Motorola's Motoblur and HTC's Sense UI. I. Bye Bye Open Source -- For Now Perhaps that's part of why Google has decided why not to release the source code for Android 3.0 "Honeycomb", yet. The company states that the code isn't ready yet for external modification, despite the fact that products are being sold with it installed, today. Aside from preventing unwanted third-party user interfaces, the chief goal of the delay is ostensibly from preventing Honeycomb (Android 3.0) from being put on smartphones. Google is pressuring smartphone makers to instead use Android 2.3 "Gingerbread". Google is also less-than-enthusiastic about Honeycomb entering other devices, like set-top boxes and automobiles, without further modification. Andy Rubin, vice-president for engineering at Google and head of its Android group essentially admits that the move is being made to prevent the platform from heading, in its current state, to places Google didn't intend. In a BusinessWeek interview, he states, "To make our schedule to ship the tablet, we made some design tradeoffs. We didn't want to think about what it would take for the same software to run on phones. It would have required a lot of additional resources and extended our schedule beyond what we thought was reasonable. So we took a He adds, "Android is an open-source project. We have not changed our Then he makes an even more surprising statement -- he says that if his company released Android's source, it couldn't prevent phone makers from putting it in a phone form-factor "and creating a really bad user experience. We have no idea if it will even work on phones." That statement is intriguing because it sounds a lot like arguments against open source operating systems that one of Android's top competitors, Apple, made in recent years. And while the delay doesn't mean Google has closed its project off from the public, it does indicate that the company is increasingly seeing eye to eye with Apple on this issue. Dave Rosenberg, a longtime executive in the open-source software world, complains about the decision, but admits, "Everyone expects this level of complete trust from a company that's worth $185 billion. To me, that is ridiculous. You have to be realistic and see that Google will do what is in [its] best interests at all times. II. What Will the Impact of Google's Newfound Selectiveness Be? Ultimately this issue will supposedly be washed away with Android 3.5 "Ice Cream Sandwich", which will unify the smartphone (Gingerbread) and tablet (Honeycomb) trees into a single operating system. In the meantime, it's possible Google could make stop-gap modifications to improve the Honeycomb experience on smart phones, and release a minor update. Mr. Rubin states, "The team is hard at work looking at what it takes to get this running on other devices." It's hard to say how the move will affect sales. Sales of the Samsung Galaxy Tab were quite good, despite the interface (Android 2.2 Froyo)feeling clunky on a tablet. By contrast the Motorola Xoom offers a vastly superior UI in Honeycomb, yet has struggled in sales. Part of this may be due to price -- the Tab debuted at $399 USD on at least one network, while the Xoom debuted at $799 USD. The true test of whether the decision to close off the platform should be soon at hand, though. The Xoom has dropped in price, with a Wi-Fi version launch on Sunday at $599 USD. And Samsung will soon air a second generation Galaxy Tab 8.9-inch tablet for $469 USD and a a 10.1-inch variant for $499 USD, rumored to launch on June 8. Dell also looks to soon air updated versions of its "Streak" Android tablets, at competitive prices. Despite that the decision to temporarily close the source may benefit Google and its customers experience, not everyone is happy with it. Eben Moglen, a professor of Law at Columbia Law School and the founding director of the Software Freedom Law Center, argues that Google is repeating the mistakes of industry giants like Apple. He states, "[Closing your source is] usually a mistake. Long experience teaches people that exposing the code to the community helps more than it hurts you."
<urn:uuid:83e60154-731d-4135-883b-b3b54166a223>
CC-MAIN-2013-20
http://www.dailytech.com/article.aspx?newsid=21222&commentid=666620&threshhold=1&red=5313
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.942091
1,043
1.882813
2
Would you bank the umbilical cord blood of your newborn? The controversial practice has been getting more air time this fall, thanks to the endorsement of reality show stars Giuliana and Bill Rancic, who banked their newborn’s cord blood. Many celebrity endorsements should come with a wink and a nod, and this is no exception. The Rancics—stars of the show Giuliana & Bill—are paid spokespersons for the Cord Blood Registry, the nation's largest for-profit stem cell bank. But cord blood banking may be worth considering—despite the nearly $5,000 price tag (for harvesting and years of storage). Umbilical cord blood contains stem cells unique to each individual, which can help generate treatments later in life. Blood disorders like leukemia are already being treated with these stem cells. What’s the downside? While some companiespromise that stem cells can treat over 80 conditions, there are no guarantees. If your child develops a genetic illness as an adult, her stem cells might contain the same abnormality. Also, researchers aren’t sure how long these banked cells are viable. The Upside: Banking cord blood may look iffy now, but it could pay off down the line. Clinical trials using stem cells as a treatment for autism, cerebral palsy, and more are underway.
<urn:uuid:3fd0bd30-8251-4236-91a1-0da034426251>
CC-MAIN-2013-20
http://www.dailyworth.com/posts/1573-a-vital-deposit-for-your-child
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.90543
281
1.835938
2
You are sending a link to... How Androscoggin Valley Hospital Used New Technology to Reduce Patient Falls Androscoggin Valley Hospital (AVH) is a 25 bed critical access hospital located in the white mountains of New Hampshire. AVH may be small, but the hospital is home to a wide variety of services and technologies that place it on the level of much larger facilities. Click Here to See the Dalcon/Polycom AVH Success Story PDF The staff at Androscoggin is serious about fall prevention. Patients are assessed for fall risk factors upon admission and at each shift. Patients determined to be at risk of falling are placed in a special program called the “ruby slippers” program. The ruby slippers program is designed to make staff aware of a patient’s fall status and put additional preventative measures in place, such as ambulation assistance. Ruby slipper patients and their families are educated on the seriousness and importance of the program. Investing in New Fall Prevention Technology Kirk 4040 with Bed Fall Alert AVH uses Stryker bed alarm systems for ruby slipper patients who are disoriented or unable to follow directions or call for assistance. When a patient on bed alarm begins to sit up to get out of bed, the Stryker bed sets off an audible alarm. Additionally, this bed alarm is captured by AVH’s Dalcon Alert Remote Patient Monitoring system. Dalcon Alert forwards the bed alarm directly to Kirk phones carried by hospital staff. The wireless phones receive a text message that communicates the location and type of alarm. As a result, clinicians know exactly which room to respond to decreasing the time of response. When responding to a fall alarm, time is of the utmost importance. A few seconds can be the difference between finding a patient still trying to get out of bed, and finding a patient on the floor. As an added measure to buy clinicians more time to respond, Dalcon Alert relays audible announcements in the patient room telling the patient to “please get back into bed, your nurse is on the way” when a bed alarm is tripped. The emphasis Androscoggin has placed on fall prevention has been successful. Since implementing Dalcon Alert and incorporating the system’s fall prevention technology into their fall policy, AVH’s fall rate has dropped significantly. The average fall rate, measured in percentage of patients who fall for the three quarters Dalcon Alert has been installed at AVH is 0.43%. The average fall rate for the three quarters before the Dalcon Alert installation was 0.67%. Thus the average for the three quarters after installing Dalcon Alert resulted in 36% fewer falls than the average for the three quarters prior to Dalcon Alert being installed.
<urn:uuid:1150c27b-3637-4677-a505-00c7fb160589>
CC-MAIN-2013-20
http://www.dalcon.com/blog_email.cfm/blog_id/43027
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.934407
567
2.25
2
LAST CHANCE TO SEE ‘YOUNG MASTERS’ The “Young Masters” exhibition, featuring 56 works chosen from 620 entries by local advanced-placement art studio, music and art history students, closes this weekend at the Dallas Museum of Art. One of my personal faves is Fox With Jewels, by Samantha Miller, 17, of Plano West Senior High School. Samantha’s mischief-making fox, Reala, looks like the star of an animated movie. The artist told me that her goal was to place the fox “in a setting where one could easily grasp her personality through gesture and expression. The scene was developed so as to capture the sly and sneaky fox’s split-second decision to steal the jewels.” Continues through Feb. 17 at the DMA’s concourse, 1717 N. Harwood, Dallas. Free. 214-922-1803. apstrategiesarts.org. dma.org. Expect architects and engineers to get the kids involved in interactive activities about building and putting things together during Engineers Week, sponsored by IBM, Lockheed Martin and Time Warner Cable at the Perot Museum of Nature and Science. It’s all happening at the Texas Instruments Engineering and Innovation Hall and the museum’s temporary exhibit “Building the Building.” For a lighter look at the art of construction, check out the Girl Scouts’ “Cookie Box Creations” display, which shows that even when the cookies are gone, these girls’ imaginations are still going strong. Feb. 18-22, with engineering activities from10 a.m. to 2 p.m. (guests can stay until the museum closes at 5). “Cookie Box Creations” will be on display Feb. 18-March 17 near “Building the Building” in the traveling exhibit hall on the lower level. 2201 N. Field St., Dallas. Included with general admission of $15, $12 for students 12-17 and seniors 65 and older, $10 for kids 2-11, free for ages 1 and younger. Tickets are for timed entry at 30-minute intervals, and advance online purchase is highly recommended. 214-428-5555. perotmuseum.org. If you can’t get enough of the little girl who turns pink from eating too many pink cupcakes, you’re in luck. The kids of Artie’s Playhouse are tackling Pinkalicious at Artisan Center Theater. There’s always a special role for Artie the Monkey in Artie’s Playhouse shows; he’ll play Pinkalicious’ doll that follows her around. Feb. 16-March 16 at Artisan Center Theater, 418 E. Pipeline Road, Hurst. $7, $5 for kids 12 and younger. 817-284-1200. artisanct.com. ‘BROTHERS GRIMM SPECTACULATHON’ What happens when Snow White, Cinderella, Hansel, Gretel and characters from the many Brothers Grimm fairy tales meet? Find out in Brothers Grimm Spectaculathon, an interactive comedy performed by the kids of Creative Arts Theatre & School (CATS) at Mosaic in Arlington. Feb. 15-23 at 817 W. Park Row, Arlington. $10, $8 for students, military and seniors 55 and older. 817-861-2287. creativearts.org. ‘LOVE SONGS & BRAHMS’ The sweet voices of the Children’s Chorus of Greater Dallas will perform songs about love and friendship as part of the group’s annual fundraising gala at the Meyerson Symphony Center. All six of the company’s children’s and youth choruses and three West Dallas neighborhood choruses will sing. The music will highlight poems by Emily Dickinson and William Shakespeare, and high school students will sing selections from the Liebeslieder Waltzes. You can just attend the concert or arrive early for a gala dinner and auction for an additional fee that supports the company. Feb. 17 at 8 p.m. for concert, 5:45 for gala dinner and auction, at the Meyerson, 2301 Flora St, Dallas. $8-$30 for concert only; $125 for gala tickets that also include concert admission. 214-965-0491. thechildrenschorus.org. TODDLER TUESDAY CLUBS AND VALENTINE DEALS If you’re looking for a deal on toddler outings and complimentary coffee, we hope you’re free on Tuesdays. Legoland Discovery Center is kicking off its Toddler Tuesday Club on Feb. 19 and continuing the third Tuesday of each month. Sea Life Grapevine Aquarium also offers a Toddler Tuesday Club every second Tuesday of the month (the next one is March 12). In addition, Sea Life offers special activities during Valentine’s Day weekend with admission deals, fish-kiss candy packs and a chance to take your own keepsake pictures with Sea Life divers. Legoland Discovery Center and Sea Life Aquarium are both in Grapevine Mills mall, 3000 Grapevine Mills Parkway, Grapevine. Toddler Tuesdays Club events cost $14 for parent and up to two toddlers ages 3-4, $5 for each additional child ages 3-12, free for kids 2 and younger (plus tax for each ticket) at both sites; includes free coffee in the cafe for parents. Legoland Discovery Center: Feb. 19 and the third Tuesday of each month from 11 a.m. to 2 p.m. 469-444-3050. legolanddiscoverycenter.com. Sea Life Aquarium Grapevine: March 12 and every second Tuesday of the month from 11 a.m. to 2 p.m. 469-444-3050. www.sealifeus.com. Valentine’s Day weekend at Sea Life Grapevine Aquarium continues Feb. 15-17; buy one, get one free admission after 2 p.m. on Feb. 15. Free fish-kiss candy packs to first 100 kids through Feb. 17. Pictures with divers available during scheduled dives at 2 p.m. daily through Feb. 17. (Divers go to the glass and pose with the child.) Compiled by Nancy Churnin
<urn:uuid:bc8b7010-9fd0-4d56-9fe1-346bf62a8fa3>
CC-MAIN-2013-20
http://www.dallasnews.com/entertainment/headlines/20130214-childrens-activities-in-dallas-fort-worth-feb.-15-and-beyond.ece
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.891542
1,353
1.726563
2
Gregory Oliver Hines (1946–2003) spent his boyhood days at Harlem’s Apollo Theater with his brother Maurice, watching tap dancers like Chuck Green, Charles “Honi” Coles, Teddy Hale, The Nicholas Brothers and Howard “Sandman” Sims. Between performances, the hoofers would gather in the dimly lit, costume-cluttered basement to jam on the worn-in rehearsal floor. It was here, trading steps with tap legends, that Hines fell in love with the artform and learned how to develop his own rhythms. “They really loved him, because he could think on his feet and didn’t have any fear,” says Hines’ brother Maurice. A true triple threat, Gregory Hines ultimately became one of tap’s most recognized performers and preservers of the art. He appeared in major motion pictures, on television and on Broadway, and for more than half a century, he carried on the tap lineage, eventually sharing it with a new generation of tappers. And in October 2009, Dance Affiliates launched a 10-week national tour of Thank You Gregory, A Tribute to the Legends of Tap to honor the man who bridged the generations and transformed rhythm tap into a respected dance style. Born on February 14, 1946, in New York’s Washington Heights neighborhood, Hines began his formal tap training at age 3 with Henry LeTang. Two years later, he and 8-year-old Maurice were performing professionally as “The Hines Kids.” They toured the world, dancing in nightclubs, theaters and on TV shows, including three dozen appearances on “The Tonight Show.” In 1954, the brothers made their Broadway debut in The Girl in Pink Tights and in 1964, their father, Maurice Hines Sr., joined the touring act (renamed “Hines, Hines & Dad”) as a drummer. But unfortunately, the Hines brothers caught the tail end of an era. While their fame was slowly rising, tap’s popularity declined. Big bands fell out of fashion and jazz nightclubs shuttered. And Broadway, encouraged by the success of West Side Story, turned to ballet and jazz as storytelling forms. The hoofers who had mentored young Gregory had a difficult time finding work. Even Hines found himself pulling away from tap. In the early 1970s, after months of soul-searching, Hines left his family act, his first wife and their 2-year-old daughter, Daria, and fled to Venice Beach, California, where he formed the jazz-rock ensemble Severance and adopted the hippie lifestyle. Five years later, Hines returned to his passion. He moved back to New York and soon landed a role alongside Maurice in the musical revue Eubie! (1978), which was being choreographed by LeTang. This performance earned the natural rhythm-maker his first Tony nomination, which was followed by two more for his work in Comin’ Uptown (1979) and Sophisticated Ladies (1981). Ten years later, Hines finally took home a Tony Award for his lead role in Jelly’s Last Jam (1992). As Hines’ career blossomed, he continued to make tap more visible while pushing the genre’s boundaries. He broke away from the polished, foursquare tempos of the 1930s to captivate audiences with hard, roughed-up, low-to-the-ground, free-flowing, funky rhythms—movements expanded by his protégé Savion Glover and generations to come. “He felt tap should be as modern and new as Twyla Tharp. Top hats and tails were out, tight Armani T-shirts were in,” says close friend and tap historian Jane Goldberg. In the 1985 film White Nights, Hines tapped to contemporary music and went toe-to-toe with ballet virtuoso Mikhail Baryshnikov. “This film put both artforms on equal footing. It said, ‘This tap dancer and tap dance are at the same level as Mikhail in ballet,’” says Tony Waag, the artistic director of the American Tap Dance Foundation. Hines also starred in Francis Ford Coppola’s Harlem jazz club crime-drama The Cotton Club and 1989’s Tap, a movie that experimented with rock music and brought together a teenage Glover and legends like Sandman Sims, Jimmy Slyde and Bunny Briggs. “He made tap cool to young people in terms of using contemporary music and innovating how we use our feet,” says hoofer Jason Samuels Smith. “He was the motivating force behind our whole generation’s movement.” Having witnessed the older generations struggle through tap’s dormancy, Hines made tireless efforts to ensure tap’s vitality in the 21st century. When Congress was considering legislation to create National Tap Dance Day, Hines showed up in Washington, DC, to speak to the Congressional Black Caucus. This day has been celebrated on May 25 since 1989. In 2001, Hines helped Waag launch Tap City, a New York tap festival, and just a week before he died, Hines was supposed to participate in the inaugural Los Angeles Tap Festival. “It was so humbling for me to hear how eager he was to be a part of it,” says Samuels Smith, the festival’s co-creator. On August 9, 2003, Hines passed away at age 57, after a 13-month battle with liver cancer. While his passing was a great loss, he left a timeless legacy through his generous support of the tap community. Hines used to say he was “just a tap dancer,” says Maurice. “I told him, ‘You’re not just a tap dancer, you’re the tap dancer.’” DT Katie Rolnick is an editor for Dance Spirit magazine. She holds an MA in journalism from New York University. Photo of Gregory Hines by Anthony Crickmay, courtesy of Dance Magazine archives.
<urn:uuid:f6b7cf35-e3b9-4a7b-baf8-1c1e23cb49fb>
CC-MAIN-2013-20
http://www.dance-teacher.com/2010/05/gregory-hines/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.969871
1,292
1.6875
2
- Data recovery from - » Laptop Hard Drive - Desktop Hard Drive - External Drive - RAID - Array of drives - FLASH Memory & SSD - Recovery Report - Checking the Results Laptop Drives for Data Recovery There is a small 2.5" (or even tiny 1.0 or 1.8 inch) hard disk drive inside almost every laptop or notebook computer. Some of the light-weight and thin laptops have solid state drives, mostly with the same connectors and body shape, except few SSD models that look more like RAM memory sticks, with the exposed NAND flash memory elements like the one used in new Mac Book Air. The miniature laptop drive design makes any repairs, accompanying follow-up actual data retrieval steps, more delicate and skill refined process and requires using of special tooling, equipment and expertise in advanced digital recovery technologies. The data recovery process requires only the bare drive that needs be extracted from your laptop case. To remove the hard drive from your computer refer to the manufacturer manual. Alternatively, there are plenty of online quality sources about drive removal with pictures, graphics, or even videos. We have also placed a few illustrated articles with the hard drive instructions on our website. Don't forget to remove and retain for future using all brackets, side screws, interface adapters and other elements from the drive before sending one out to the lab. You may need all these items to install a new replacement drive into the same computer. Some laptops are very sophisticated in the design and do not give an easy access to the drive even for an experienced technician. If you have a problem removing the failed drive with data, you may ship the whole laptop computer to the lab in one piece and we'll take care of it. Our lab supports all of the laptop hard disk drive models for data recovery. The micro mechanics of laptop hard drives still can be a challenge for the most of experienced recovery technicians. Databe Lab has been investing the decades of years in experience to resolve the hardest data recovery tasks, and that time was generously repaid by inventions of new methods and developments of unique instruments for safe and fast reading information from damaged disks. Hybrid Hard Drives for Laptops The classic hard drive is much safer, reliable, and cost-effective storage device for user data files, however HDD loses the fight for speed with SSD-flash type drives. Today the major drive makers start to utilize flash-memory technology to deliver SSD-like performance in the new hybrid hard drives. If you decide to upgrade your old drive to the hybrid kind - to increase the performance of your PC, or MAC system - it should not be a problem at all, as the hybrid drive installs and works just like a regular hard drive. Databe Lab works with hybrid drives at the same rates as the classic ones, with the exception to the pure SSD. SSD stands for Solid State drive, and is supported in our lab too, but at the different price niche. Databe Support for laptop hard drives We recover ALL brands/makes of laptop hard drives, including Fujitsu, Hitachi, Samsung, Seagate, Toshiba, Western Digital. All form-factors are supported: 2.5", 1.8", 1" (MicroDrive) with any installed operating system like: - For PC computers: all Microsoft OS (including Windows XP and Vista), Linux/Unix - For Apple Macintosh computers: all MAC OS, Windows for Apple - VMWare virtual machines Here are some common tips of how to remove failed hard drive from laptop (notebook) computer: 1. Turn off your computer. Unplug and remove any cables connected to the computer, including the AC adaptor. Remove the battery. 2. Turn the computer upside down to locate the hard drive slot cover. You may need a small Phillips screwdriver to loosen the captive screws that secure the hard drive slot cover, if required. 3. Gently remove the drive from the slot. On some laptop models you will need to loosen ribbon cable or disconnect drive adapter from drive. 4. Remove from the hard drive any frames, adapters, side screws if they are not parts of the drive itself. You will need them to install a new drive into your laptop later. 5. Pack the drive by following shipping instructions To learn more about detailed hard drive removal techniques (with sample illustrations) use the help links below: Hard drive removal instructions for the following laptop computers: - Acer TravelMate, Extensa, Ferrari and Aspire - Apple MacBook, MacBook Air and MacBook Pro, PowerBook G4 - Compaq Evo, Armada, LTE, Presario - Dell Inspiron, Latitude, Precision, Vostro, XPS - IBM Lenovo ThinkPad, IdeaPad - Hewlett-Packard HP Pavilion, HP Omnibook, HP Compaq Notebooks - Sony VAIO - Toshiba Dynabook, Equium, Portege, Tecra, Satellite, Qosmio, Libretto WD laptop HDD support Seagate laptop HDD support Toshiba laptop HDD support Fujitsu laptop HDD support Hitachi laptop HDD support Samsung laptop HDD support Recent Problem Solved Branko D., Denver, Colorado, United States : Toshiba MK6008GAH The drive is experiencing a problem with booting the system. I suspect the corruption of the booting sectors. Tested hard drive on the different laptop and the same error: no drive found. The drive is a small laptop type, only 1.8', coming from Toshiba laptop computer. The files I need mostly are in QuickBooks, and emails. Your work on the drive is much appreciated. I'm pleased with the whole process; the technical support is very helpful, reliable and will definitely recommend your recovery service...
<urn:uuid:7fd6bd00-def9-40c1-b01a-7b0a78e83518>
CC-MAIN-2013-20
http://www.databe.com/laptop.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.891711
1,203
1.632813
2
In digital imaging, there are 256 levels, or tonal values, ranging from black to white. Black is level 0. White is level 255. Of course, not all images (e.g. extreme foggy, misty, atmospheric shots) contain the full tonal range from black to white, but most do. The histogram (Levels) is a graphical representation of the tonal values in an image. Ideally, it should range from 0 to 255, with a good spread of tonal values throughout. If the histogram is bunched up towards the left, it indicates the image is under-exposed. Note the crushed shadow detail. If bunched up towards the right, it's over exposed. Note the blown-out highlights. If the black and white points are set incorrectly, the image will have a dull, flat, washed-out appearance. Here they're wrongly set to 20/230. Unless under instructions from a repro bureau or printer, you should not set the black/white points to anything other than 0/255. The printer may well adjust them later for technical reasons to do with repro, but don't try to guess what's required. It's true that some leeway is acceptable (e.g. up to 5% is usually OK), but your images will lack visual impact if the black/white points are incorrect, so don't do this as a matter of course. In the vast majority of cases, it's best to set them to 0/255.
<urn:uuid:52488de0-c8c9-4c17-af7d-5a2c271456dc>
CC-MAIN-2013-20
http://www.davepattison.com/digital-imaging/exposure.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.931286
313
2.859375
3
Renaissance merges sculptural form with the brilliant jewel tones found in classical painting to produce a collection that is quintessential David Yurman. Artists of the Renaissance looked to the classics for inspiration and infused their work with innovative techniques and a new aesthetic sensibility. In 1983, David Yurman did the same with the development of cable. Cable exemplifies the designer’s motto of "Continuing in the Classic Tradition” with references to ancient Greek and Roman, Egyptian and Celtic forms. Twisting multiple strands of hollow metal into a cohesive helix, cable is David Yurman’s iconic design and signature motif.
<urn:uuid:2b8791ef-cc21-4410-9c6f-3488dcc40c58>
CC-MAIN-2013-20
http://www.davidyurman.com/shoponline/product.aspx?itemid=Y19D7&folderid=/collections/renaissance
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.894948
130
1.8125
2
DC Action for Children 1432 K Street, NW, Suite 1050 Washington, DC 20005 DC Action for Children (DC Action), in partnership with National Black Child Development Institute (NBCDI), seeks to enhance the work of supporting families, centers and schools by providing parallel tracks of support to parents and teachers to improve overall child well-being, with a specific focus on the helping our youngest children living in low-income families in Ward 7 and 8 to learn, grow and thrive. See the press release here Parents play a critical role in their children’s experiences from their earliest years. Our overarching goal is to prepare children for success in school and life by empowering parents with advocacy skills needed to be their strongest advocate. Building on comprehensive models such as Head Start, where parent engagement and empowerment is equally important to student engagement and teacher quality, DC Action and NBCDI developed a theory of change on the principle that when parents are supported in practicing positive parenting behaviors and have the knowledge, skills and opportunities to participate in the advocacy process, they become empowered to actively engage in changing not only their family, but also their community.
<urn:uuid:c217ce73-aa57-4200-8761-7e9d573e3586>
CC-MAIN-2013-20
http://www.dcactionforchildren.org/parent-engagement
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.959319
230
1.601563
2
The Department of Defense POW/Missing Personnel Office (DPMO) announced today that the remains of two servicemen, missing in action from the Vietnam War, have been identified and returned to their families for burial with full military honors. Air Force Col. James E. Dennany, 34, of Kalamazoo, Mich., and Maj. Robert L. Tucci, 27, of Detroit, will be buried as a group Jan. 14, in the Dallas-Ft. Worth National Cemetery. On Nov. 12, 1969, Dennany and Tucci were flying the number three aircraft of three F-4Ds escorting an AC-130 gunship on a night strike mission over Laos. After the gunship attacked six trucks and set two of them on fire, the AC-130 crew’s night vision equipment was impacted by the glow from the fires. They requested that Tucci attack the remaining trucks. During the attack, gunship crew members observed anti-aircraft artillery gunfire directed at Tucci’s plane followed by a large explosion. No radio transmissions were heard from the F-4D following the attack and no parachutes were seen in the area. An immediate electronic search revealed nothing and no formal search was initiated due to heavy anti-aircraft fire in the area. Beginning in the mid-1990s analysts at DPMO and the Joint POW/MIA Accounting Command (JPAC) developed case leads they collected from wartime reporting and archival research. In 1994, a joint U.S.-Lao People’s Democratic Republic (L.P.D.R.) team led by JPAC analyzed leads, interviewed villagers, and surveyed five reported crash sites near the record loss location with negative results. In 1999, during another joint survey, officials in Ban Soppeng, Laos, turned over remains later determined to be human, two .38 caliber pistols and other crew-related equipment that villagers had recovered from a nearby crash site. Between 1999 and 2009, other joint U.S.-L.P.D.R. teams pursued leads, interviewed villagers, and conducted three excavations. They recovered aircraft wreckage, human remains, crew-related equipment and personal effects. JPAC scientists used forensic tools and circumstantial evidence in the identification of the remains. With the accounting of these airmen, 1,702 service members still remain missing from the conflict. For additional information on the Defense Department’s mission to account for missing Americans, visit the DPMO website at http://www.dtic.mil/dpmo/ or call 703-699-1169.
<urn:uuid:4cc058c9-01b2-49ca-9584-29bfac319409>
CC-MAIN-2013-20
http://www.defense.gov/Releases/Release.aspx?ReleaseID=14198
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.956043
543
1.664063
2
Israel's technical superiority and a civilian population whose confidence was boosted by the Iron Dome anti-rocket system provided the country with breathing space for diplomacy that delivered a ceasefire in eight days with no need for a bloody ground invasion during the recent conflict with Gaza. (AFP) TEL AVIV — As quiet descended over the skies of Israel and Gaza in late November, it became clear that a new kind of warfare was emerging that could counter an enemy’s asymmetric advantage through a combination of strategic surprise, surgical standoff and active anti-missile defense Technical superiority and a civilian population whose confidence was boosted by the Iron Dome anti-rocket system provided Israel with breathing space for diplomacy that delivered a ceasefire in eight days with no need for a bloody ground invasion. Israel’s Operation Pillar of Defense demonstrated that the enemy’s long-time asymmetrical advantage — in which cheap weapons inflict damage against a nation boasting a more expensive and numerically superior force — could be losing ground as Iron Dome levels the battlefield. A leveling of that playing field, experts said, potentially redraws the threat picture in other regional nations such as Syria and Iran. It may also shift, without fully sidelining, the scenarios in which ground maneuvering forces could be used, experts said. Officials and experts credit technological superiority and civilian staying power for their equalizing effect on asymmetrical tools and tactics used by Hamas, Islamic Jihad and other Gaza-based groups over the eight-day fight. In the nation’s first large-scale operation in the new strategic environment sparked by the Arab Spring, Israel met its limited military objectives with minimal civilian casualties and with its international standing intact. By refusing to be dragged into a bloody ground war that could coalesce the region’s Sunni-Shiite camps against the Jewish state, experts here insisted Israel’s Gaza campaign empowered Egypt, Qatar and other Sunni states at the expense of Iran and its Shiite clients in Lebanon and war-wracked Syria. “Operation Pillar of Defense in Gaza, like the ongoing crisis in Syria, constitutes a sort of microcosm of the process of change reshaping the Middle East,” retired Lt. Col. Michael Segall, a senior analyst at the Jerusalem Center for Public Affairs, wrote in a 16-page analysis published by the think tank. “The regional and international dynamic that accompanied the [Israel-Gaza] crisis, along with Israel’s successful deflections of Iranian missiles fired at its cities, puts Iran in a problematic position of growing isolation. ... Its ongoing attempts to win the hearts and minds of the Arab street are failing due to its role in militarily supporting the repressive [Syrian President Bashar al-]Assad regime,” Segall wrote. Segall, a Farsi-speaking former Iran desk chief within Israeli military intelligence, wrote that Tehran’s efforts to discredit the performance of Israel’s Iron Dome stemmed from its opposition to the deployment of regional strategic missile defenses. “The impressive feats of Israel’s Iron Dome … places a large question mark over the Iranian asymmetrical-war doctrine to which Iran devotes so much effort. The stationing of similar systems in the Gulf states, or their addition to staging areas in case of a military operation against Iran, could undermine the response Iran is planning for a possible conflict and/or attack on its nuclear facilities,” Segall wrote. Mideast analyst Gerald Steinberg, a Bar Ilan University professor, said Israel’s operational achievements in Gaza, coupled with constructive diplomatic support from Egypt and other U.S. regional allies, has weakened Iran politically and militarily. Moreover, he said, Israel’s demonstrated ability to defend against salvo attacks “basically quashes that entire dimension of Iranian strategy.” Nevertheless, Steinberg and others here warned it is still too early to draw lasting lessons from Israel’s Gaza strategy or the political conditions anchoring the Egyptian- and U.S.-brokered ceasefire agreement. Since the truce took effect Nov. 21, Egyptian President Mohamed Morsi has become mired in domestic strife over Muslim Brotherhood-proposed power grabs. He may be too preoccupied, experts here said, with the survival of his fledling government to stem Iranian arms smuggling through Sinai into Gaza, as truce terms demand. At the same time, U.S. and European outrage over Israeli Prime Minister Benjamin Netanyahu’s decision to build thousands of new homes in a particularly sensitive corridor linking East Jerusalem and the West Bank could alter the cooperative dynamic needed for a sustainable ceasefire, experts here said. ‘No Turning Back’ Uzi Rubin, founding director of the Israeli Defense Ministry’s Missile Defense Organization, said capabilities manifested by both sides of last month’s rocket battles herald a new era of “pushbutton warfare” from which “there is no turning back.” “Pillar of Defense will likely be remembered for revealing the face of future warfare, where pushbutton warriors on both sides — from bunkers and tunnels in Gaza and from operation centers and command-and-control trailers in Israel — clashed on an empty battlefield while maneuvering forces remained sidelined,” Rubin said. In a Dec. 4 interview, Rubin said specific scenarios could still dictate the use of maneuvering ground forces, but they are not a prerequisite for future warfare. In contrast, he said, Israel can no longer contemplate military action without a robust nietwork of active defenses. “Defense has become a central pillar in Israel’s ability to prevail in future battles,” said Rubin, a Tel Aviv-based international defense technology consultant. He added, “This situation will be even more significant in cases where the other side initiates battle prior to Israel’s pre-emptive attack.” According to Rubin, a key lesson from Gaza is the need to rethink military modernization priorities, given the rapidly advancing Iranian missile threat and its race to bolster the rocket and missile arsenals of its proxies along Israel’s borders. “The threat is racing forward. We need to run just in order to stay in place,” Rubin said. In a comprehensive, 28-page preliminary assessment prepared for Bar Ilan University’s Begin-Sadat Center for Strategic Studies, Rubin details operational achievements from last month’s battles and concludes with lessons likely to be drawn by both sides. Using open-source data, Rubin analyzed the types of rockets launched from Gaza, their operational effects and Israel’s ability to defend against incoming threats. He noted several Palestinian precedents from last month’s campaign, including the targeting — albeit unsuccessful — of Jerusalem, a higher launch tempo than that of Hezbollah in the 2006 Lebanon war, and a nascent ability to generate the real-time intelligence needed to create targets of opportunity during the fighting. All told, Gaza-based militants launched 1,506 rockets, 152 of which didn’t reach Israel and 875 of which fell in open areas. Of the remaining 479 designated by Israel’s Iron Dome as threats to life or property, 421 were intercepted, a success rate of nearly 88 percent. Rubin listed three categories of rockets launched in last month’s fight, most from Iran, some produced in Gaza with Iranian technology and a few shorter-range rockets from stores of former Libyan leader Moammar Gadhafi. Segal, the retired military intelligence officer, noted that during last month’s Pillar of Defense operation, Iranian officials — including Mohammad Ali Jafari, commander of the Islamic Revolutionary Guard Corps — openly boasted about the weaponry smuggled and the technology transferred to Gaza. Unlike earlier conflicts with Israel, in which Iran couched the extent of its support for Palestinian resistance, “This time, it was amazing how confident they felt in flagging their ability to supply Hamas and Islamic Jihad,” Segall told Defense News on Dec. 6. Despite Israel’s destruction of most of the category 3 Fajr-5s, Palestinians managed to launch 12 of these 1-ton rockets, four of which overflew Jerusalem and landed in the West Bank. Iron Dome intercepted seven of the eight heavy rockets fired at Tel Aviv, but the one that leaked through Israeli defenses claimed one life when it landed in Rishon Lezion, south of the city. Six Israelis were killed during the seven days and five hours before the Nov. 21 truce, including four who disregarded Civil Defense safety procedures in their desire to witness the pushbutton war. The Hamas Health Ministry listed 163 killed from more than 1,500 Israeli standoff strikes, mostly by air with support from sea-based missiles.
<urn:uuid:79eb3146-dcb7-4b9f-a39f-b7a0bd8d08ae>
CC-MAIN-2013-20
http://www.defensenews.com/article/20121209/DEFREG04/312090002/Experts-Gaza-War-Changed-Face-Mideast-Conflicts?odyssey=tab%7Ctopnews%7Cimg%7CFRONTPAGE
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.943483
1,798
2.015625
2
Why the name DEFIANT? A. We were approched by many discerning shooters who requested us to produce a high quality light weight British pellet. Well here it is. We now DEFY any manufacturer’s pellet to surpass the precision and consistency of the aptly named DEFIANT pellet. Is a consistent muzzle velocity the only criterion to accuracy A. Too much emphasis is placed on muzzle velocity. This may be desirable but is not the only criterion to accuracy, because lighter pellets leave the muzzle faster but slow down quicker and arrive at the target at about the same velocity, all other factors being equal. It is the consistent downrange velocity that is all important and not the muzzle velocity. If one were to take the reading downrange even though the muzzle velocity was very consistent at say 5ft/sec, it will be found that this can vary by more than 50ft/sec downrange at 40 yards, because of the pellet wobble changing the ballistic coefficient from pellet to pellet. In a split die (Diablo shaped pellet), once the dies start to wear there is a displacement between the two halves. The pellets may look and weigh the same but any eccentricity which cannot be seen with a naked eye is the main cause of inaccuracy. Defiant pellets are not made in a split die, therefore true concentricity between the centerline of the nose and skirt are inherent to its accuracy. How is the consistency of weight achieved? A. The pellets are made from lead alloy wire and the slug length which governs the weight is measured by a laser controlled micrometer ensuring that the wire is cut precisely before being fed into a single die. Any slight variations in weight will be found as a small flash behind the pellets head where is does not interfere with its accuracy. Q. Why are there splits on the inside of the pellet skirt? A. These splits are patented. They are there to reduce drag through the barrel bore and/or choke which helps to increase internal barrel efficiency. Q. I have been using 4.52mm JSB or its derivatives, Air Arms and Daystate pellets, will I have the best results using the Defiant 4.52mm (large) head size? A. Not necessarily, this is because the bearing surfaces are different. The front lands on the JSB pellets are much thinner than on the Defiant so it is best to try the three head sizes, 4.48mm (small), 4.50mm (medium) and 4.52mm (large) and then determine which suits you best. This will also apply to the .22 where the head sizes are as shown on the schedule. Important .Please allow at least 30 shots for the barrel bore to settle when changing from a different make of pellet.
<urn:uuid:67f5b2c4-e519-4bf1-ad17-6784c5dd95ad>
CC-MAIN-2013-20
http://www.defiantpellets.co.uk/faq.htm
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.929902
621
1.929688
2
Definitions for 4-aminobutyrate transaminase U.S. National Library of Medicine An enzyme that converts brain gamma-aminobutyric acid (GAMMA-AMINOBUTYRIC ACID) into succinate semialdehyde, which can be converted to succinic acid and enter the citric acid cycle. It also acts on beta-alanine. EC 188.8.131.52. Use the citation below to add this definition to your bibliography: "4-aminobutyrate transaminase." Definitions.net. STANDS4 LLC, 2013. Web. 18 May 2013. <http://www.definitions.net/definition/4-aminobutyrate transaminase>.
<urn:uuid:e070e0ca-602f-4962-a574-b68800245292>
CC-MAIN-2013-20
http://www.definitions.net/definition/4-aminobutyrate%20transaminase
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.659375
159
2.421875
2
Less Than Sporting Reducing the exorbitant amounts paid to athletes and owners would help the average fan—and the government should do it. But this kind of approach need not be restricted to taxpayer-supported stadiums. All stadiums could be forced to sell tickets to the four major sports at affordable prices. If that sounds outlandish, it’s important to keep in mind how skewed the balance of government intervention in sports, in favor of ownership, has long been. Baseball’s antitrust exemption bequeathed to the owners the privilege to avoid the kind of market competition that defines so many American industries. The last serious legislative challenge to it, in 2001, was soundly defeated, even though it proposed to affect only one portion of the exemption, that dealing with restrictions on teams’ ability to move to new locations. (That bill, the Fairness in Antitrust in National Sports, had some serious progressive bona fides, counting Congressman John Conyers and Senator Paul Wellstone as its sponsors.) The second ambitious intervention would affect the television market. So much of the money related to sports today is tied up in cable television contracts. In a time of dwindling mass television events, sports have proven to be among the last consistently lucrative genres. Recent sports deals that have attracted widespread headlines because of their size were tied directly to cable television money. The Los Angeles Dodgers sold for an eye-popping $2 billion because of the enormous value of an impending cable contract. And the Los Angeles Angels signed Albert Pujols for a quarter of a billion dollars because they too were counting on future cable television revenue. If the goal is reducing sports-related money and maintaining if not improving the everyday fan’s experience, then government intervention should mandate that all sporting events should be available on local-access television. Fans should not be forced to buy expensive cable packages in order to see their local teams play—teams that, in many cases, they have already assisted through public funds. By reducing the costs of being a fan, we can also reduce the total amount of money spent on sports. The players and owners can afford it (to be clear, the amount of money that will flow to our athletes and owners would likely still surpass that in leagues overseas). And our social priorities could benefit from the adjustment. Post a Comment
<urn:uuid:84e1e60e-29bc-4a24-a179-b8964422a292>
CC-MAIN-2013-20
http://www.democracyjournal.org/26/less-than-sporting.php?page=3
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.963757
472
2.296875
2
ABOUT THE BOOK Even as Major General Suharto consolidated his power in the bloodletting of the mid-sixties, Freeport-McMoRan, the American transnational mining company, signed a contract with the new military regime, the first foreign company to do so. Today, in the isolated jungles of West Papua, a region that is increasingly restive under Indonesian rule, Freeport lays claim to the world's largest gold mine and one of its richest and most profitable copper mines. This volume is the first major analysis of the company's presence in Indonesia. It takes a close and detailed look at the changing nature of power relations between Freeport and Suharto, the Indonesian military, the traditional landowners (the Amungme and Kamoro), and environmental and human rights groups. It examines how and why an American company, despite such rigorous home-state laws, was able to operate in West Papua with impunity for nearly thirty years and adapt to, indeed thrive in, a business culture anchored in corruption, collusion, and nepotism. IN PRAISE OF THE POLITICS OF POWER "Fine investigative journalism as well as good scholarship" --The International History Review, June 2004 "Timely and welcome" --Sydney Morning Herald, 28 June 2003 "It would be difficult to write a dull book about Freeport McMoran's operations in West Papua.... Denise Leith has done the story justice and has succeeded in her stated goal to write the definitive account of Freeport's engagement with Suharto's Indonesia." --Journal of Asian Studies, August 2003 "This is an impressive book and an important contribution to the study of Suharto’s Indonesia. It is researched in great detail, and takes a measured and well-balanced approach to contentious issues. Leith is to be congratulated for bringing much-needed academic scrutiny to a company operating largely outside the spotlight." -- Inside Indonesia. (read the review) "Leith's well written account, ... is not a one-sided leftist or green diatribe. A former stockbroker, she visited the Freeport operations in Papua and presents the company's perspectives as well as those of its critics. She underlines the profound problems that arise when a western company enters a tribal environment such as Papua's: "Cultural differences can blur lines of communication, leading to misunderstandings, resentment, and inappropriate development programs."' -- Contemporary Southeast Asia. "Denise Leith has described in vivid detail the ways in which the interests of the native West Papuans and their environment have been sacrificed to the greed and ruthlessness of Western capital and genocidal Third World military...this book is required reading." -- Peter Carey, Trinity College, Oxford. "An impressive effort and one that serious students of Indonesia, of international political economy, and of the complex issues of human rights and development will appreciate." -- Daniel Lev, University of Washington "The nature of the Indonesian intelligence and military programs in West Papua makes information from the province difficult to obtain and qualify, which is why Leith's exhaustive study of the company...is so revealing. In documenting the company's history and its relations with the Soeharto regime and the military, she reveals a system that some Australian writers in the field during the former president's time tried to gloss over. Leith offers a clearly written re-assessment of the business environment in Indonesia. " -- Mines and Communities. (read the review) " (the book) is a testament to Leith’s vigorous scholarship and courageous investigative reporting." --Bali Advertiser (read the article)
<urn:uuid:c9484a30-ef34-4ec6-ab37-08c0c898b38f>
CC-MAIN-2013-20
http://www.deniseleith.com/books/politics-of-power
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.946004
742
2.03125
2
SALT LAKE CITY — The Better Business Bureau of Utah Tuesday released its list of the most prevalent fraud schemes of 2011, with the Internet and email being key tools used to defraud people. The top job scam involved emails, websites and online applications that all looked very professional with the candidate even interviewed for the job — usually over the phone. Upon receiving an offer, the candidate is required to complete a “credit report” or provide bank information for direct deposit of their paychecks. However, the online forms are just a ruse to obtain sensitive personal data that can easily be used for identity theft — and, in reality, there was really no job. Sweepstakes and lottery scams were quite popular as well. The schemes typically indicate that the victim has won a large sum of money, and in order to claim the funds the victim would have to send a smaller amount of money. The year's top sweepstakes scam was an email claiming to be from Facebook founder Mark Zuckerberg announcing that the recipient was the winner of $1 million. These kinds of scams often use celebrities or other famous names to make their offer seem more genuine. The BBB warned that on the Internet, "it is easy to pretend to be someone you are not." With so much information available online, a scammer could pretend they know the potential victim. Potential victims are prompted to “upgrade your Flash player,” for instance, but the file that is downloaded contains a worm that logs into the victim's social media account, then sends similar messages to their friends and searches for personal data. The BBB advises, "Next time you see a sensational headline for the latest viral video, resist the urge to peek." Home improvement scams are always near the top of complaint data and 2011 was no exception, the BBB stated. The schemes usually involve contractors who leave a home worse than they found it. Scammers typically knock on doors with a story or a deal — the roofer who can spot some missing shingles or the paver with some leftover asphalt who can offer a great deal on driveway resealing. The worst are those who move in after a natural disaster, taking advantage of desperate homeowners who need immediate help and may not be as suspicious as they would be under normal circumstances. Reliable contractors can be found at www.bbb.org/search. Two legitimate companies — Craigslist and Western Union — were used for an inordinate amount of scamming, mostly involving check-cashing schemes. The scams target victims through a Craigslist posting, maybe for a reason like buying an old couch or hiring the potential victim as a secret shopper. In either situation, the scammers send victims a check for more than the amount owed, then the person is asked to deposit the check into their bank account and send them the difference via Western Union. While a deposited check takes a couple of days to clear, wired money is withdrawn from the victim's account instantly. When the original check bounces, the victim is out whatever money they were wired and still stuck with the old couch. Another top fraud is “phishing” — when a potential victim receives a suspicious phone call asking for personal information or an email that puts a virus on their computer to hunt for personal data. The most pernicious phishing scam this year was disguised as official communication from the National Automated Clearing House Association, which facilitates the secure transfer of billions of electronic transactions annually. The email claims a transaction did not go through and hopes the recipient quickly clicks on the provided link before thinking it through. The scam may take you to a fake banking site to “verify” personal account information, or it may download malware to infiltrate your computer, the BBB warned. - Writers offer personal finance advice to Obama - West Davis Corridor project unveiled amid... - Dick Harmon: Utah analytics company breaks... - Tea party tax returns show small budgets,... - Is the Wii U already becoming outdated? - Abercrombie & Fitch only sells to 'cool,... - New app helps consumers purchase products... - Utah added 43,000 more jobs in April 2013... - Writers offer personal finance advice... 17 - Green energy loans have been a black... 10 - Utah's public university presidents... 9 - Obama: 'Our focus cannot drift' from... 7 - Huge drug cost disparities seen in... 6 - New app helps consumers purchase... 6 - West Davis Corridor project unveiled... 6 - Two new hotels announced for downtown... 5
<urn:uuid:c9ee1fb9-f06e-461e-9a66-8caef6e39b01>
CC-MAIN-2013-20
http://www.deseretnews.com/article/705396760/Better-Business-Bureau-lists-top-scams-of-2011.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.951799
928
1.71875
2
Jason Olson, Deseret News Transportation planners along the Wasatch Front are burdened by two simple facts of life. Their territory is a confining strip wedged between mountain ranges and the Great Salt Lake. It also happens to be a place of continuing population growth, which shows no sign of abating in coming decades. These present two contravening forces, putting planners involved in a proposed extension of the Legacy Parkway in Davis County between the proverbial rock and a hard place. Residents of Farmington City and surrounding areas recently staged a protest over plans to add 24 miles to the highway, along sensitive wetlands and through the town's western neighborhoods known for their bucolic appeal. They argue an extended parkway will be disruptive to both community life and sensitive environmental areas, and they would like the Utah Department of Transportation to rethink pans and seek alternatives. From UDOT's perch, the issue takes on a different light. The agency is charged with creating and maintaining adequate transportation arteries, and there is a documented need for an expanded infrastructure in that area to serve future commuters. This is not an either/or proposition. There is no real alternative to additional mileage along the Legacy, unless accepting a state of chronic congestion on I-15 and the existing parkway is on the table. Opponents of the extension argue in favor of additional mass transit options, carpooling and other ways to reduce traffic. But mass transit systems cannot realistically keep up with the growing number of daily commuters, or the growth in service vehicle traffic needed to support the thriving bedroom communities of Davis and Weber counties. Carpooling can be effective, but only up to a point. If traffic loads increase by 25 percent, 1-in-4 cars would need to become a pool vehicle just to maintain the status quo. If this discussion elicits a moment of deja vu, it's because we have been down this road before, so to speak. Nearly two decades ago, construction of the existing Legacy Parkway was held up in court as a result of concerns from local residents and environmentalists over the highway's impact on wetlands and adjacent communities. What resulted was a detailed settlement that significantly changed the nature of the project. In short, the traditional highway that was contemplated became the current "parkway," built with an eye toward mitigating its obtrusiveness. The state agreed to hold the speed limit to 55 mph, to prohibit truck traffic, ban billboards and to use noise-limiting asphalt. It was a hard-fought process of compromise that left neither interest completely satisfied. Residents got a less obnoxious highway; UDOT had to spend more money to build it. The birth of the original Legacy may offer a template for its proposed extension, one that requires both sides to commit to a fair process of discussion with open minds. The forces that conspire to require new transportation routes are considerable. It is therefore not wise to frame the discussion in terms of whether or not an extension is necessary, but rather exactly where and what kind. These are the most difficult kinds of public policy decisions, with implications that go beyond any individual's backyard. Everyone along the Wasatch Front has a stake in maintaining adequate transportation options, as well as in preserving the quality of neighborhoods and the environment. As the discussion moves forward, it's good to know that a process of balance and compromise is a significant part of this highway's recent legacy. - Dan Liljenquist: Chaffetz's search for truth... - Matthew Sanders: Imploding trust in America's... - In our opinion: Frances B. Monson's... - Michael Gerson: As government's ambitions... - What others say: Assault on core values - Letters: Deception and government - Letters: Paycheck Fairness Act - My view: Climate argument is shortsighted
<urn:uuid:78fd40bf-a324-4435-bcc5-8991f84ae966>
CC-MAIN-2013-20
http://www.deseretnews.com/article/765623524/Facing-highway-facts.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.951126
779
1.710938
2
7 hot, new industrial sensors Features 3/20/2000 Post a comment Integrated controllers, laser triangulation, and magnetic induction--described in the following examples--are among those technologies to further sensing capability on the factory floor Shift and replenish Features 3/6/2000 Post a comment This simple strategy has lowered the cost, yet raised the effectiveness of clinical nuclear imaging. Implementation, however, was not so simple, requiring components and cooperation from around the world. Lantronix Inc. has expanded its line of controllers for sensor networks with the release of a rugged controller that improves management of automation systems used in a number of industries, including manufacturing, oil and gas, and chemicals. Inspired by the hooks a parasitic worm uses to penetrate its host's intestines, the Karp Lab has invented a flexible adhesive patch covered with microneedles that adheres well to wet, soft tissues, but doesn't cause damage when removed. A quick look into the merger of two powerhouse 3D printing OEMs and the new leader in rapid prototyping solutions, Stratasys. The industrial revolution is now led by 3D printing and engineers are given the opportunity to fully maximize their design capabilities, reduce their time-to-market and functionally test prototypes cheaper, faster and easier. Bruce Bradshaw, Director of Marketing in North America, will explore the large product offering and variety of materials that will help CAD designers articulate their product design with actual, physical prototypes. This broadcast will dive deep into technical information including application specific stories from real world customers and their experiences with 3D printing. 3D Printing is
<urn:uuid:b69a01f6-9da7-44f2-805a-1ae2ad4ecd4d>
CC-MAIN-2013-20
http://www.designnews.com/archives.asp?section_id=1370&piddl_month=3&piddl_year=2000
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.937826
327
1.679688
2
My wife and I like to visit certain family members, and since they live rather far away, we stay in their home while we visit. The days are filled with activity, and the evenings are generally spent talking until all hours of the night. One night while we were talking, we heard a noise. It sounded like someone rapping on the wall or floor. It lasted for about 10 to 15 seconds, and was loud enough to interrupt the conversation. After the noise stopped, we looked at our family members and asked, “What was that?” Their reply -- “No one knows.” The noise had apparently occurred since the day they moved into the house. It usually only happened at night, and never lasted long enough to locate the culprit. It was evidently a water hammer. The homeowners had called a plumber to check out the house’s plumbing. The plumber changed the supply water pressure valve, installed a pressure tank, and rechecked the manifold supplying the water. No change. The water hammer was coming from somewhere, but the possibilities were endless. The next morning, I was in the bathroom, and heard the toilet valve open and shut in rapid succession. I ran downstairs, did the noise just happen? The toilet tank flapper valve was leaking, and when the level dropped, the valve opened slightly, then shut again quickly as the water level forced the bobber up again. They replaced the tank level bopper with a different style, and the problem disappeared. This entry was submitted by Doug Corbett and edited by Rob Spiegel. Doug Corbett is a graduate of BYU College of Engineering. He spent five years in electronics manufacturing, and for the past eight years has worked with temperature measurement and radiography as the non-destructive test/quality department for a domestic thermocouple cable manufacturer. Doug’s five children think an engineer is the best person to have as a dad because no math problem is too hard, and all broken toys can be fixed. Tell us your experience in solving a knotty engineering problem. Send stories to Rob Spiegel for Sherlock Ohms.
<urn:uuid:c65adf9e-f35d-421a-8ffe-96afec22441a>
CC-MAIN-2013-20
http://www.designnews.com/author.asp?section_id=1368&doc_id=254502&piddl_msgid=873285
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.978733
437
2.09375
2
The robot can be outfitted with multiple attachments such as a cell-sprayer that can spray pesticides or fertilizers and can even weed areas intertwined with the crops. It’s able to do so with the help of strategically positioned cameras that take pictures of the ground, which are then sent to an onboard computer that analyzes the images and identifies both the crops and weeds (programmed with 20 known species per geographic area). Once the unwanted plants are identified, it can then spray an herbicide through a row of nozzles placed next to the cameras positioned behind the bot. The cameras look for the corresponding image and either open or close the nozzles based on the weeds' location. With a large range of add-on tools, this robot makes a perfect plant-nursing platform that’s able to keep plants healthy, one column at a time. Robots are even being employed to harvest crops, further maximizing the efficiency associated with robotic farmers. One such robot is known as the Robotic Strawberry Harvester from Robotic Harvesting LLC. The mechanical farmhand is autonomous in the true sense of the word and is self-propelled, navigating and harvesting, and as the name suggests, is excellent in picking ripe strawberries. Robot harvesting outfitted the robot with a camera array capable of taking "stereovision" photos both above and below the plants leaves to collect data on fruit (whether it’s ripe or not), flower count, plant pathogens (diseases), and other items of interest. The camera system can be reprogrammed to identify and collect data on a number of crops in 3D space (giving the robot the capability to see like humans) not just strawberries, and uses specialized software to discern whether the fruit is ripe. Once identified, the robot uses a three-pronged outfitted robotic arm to pick the fruit, which is then placed on a convenient tiny conveyor belt that drops the fruit off in a collection basket on top of the robot. This may not seem like much, but the robot is capable of picking the fruit (tested in a controlled environment) in as little as two seconds. While you most likely won't see a fully functional efficient farm being run entirely by robots anytime in the next few years, it’s safe to say it certainly is a possibility in the near future. As more and more people populate the planet, using robotic farmers is certainly a viable option in cultivating, nurturing, and harvesting increased food crops in an efficient manner.
<urn:uuid:d0ae3c16-2656-45c7-a6e9-21c6c9e32b92>
CC-MAIN-2013-20
http://www.designnews.com/author.asp?section_id=1386&doc_id=254959&page_number=2
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.945709
514
3.078125
3
Why should we emphasize that God loves, forgives, and saves for his own glory? Two reasons (among others). 1) Because the Bible does. I, I am he who blots out your transgressions for my own sake, and I will not remember your sins. (Isaiah 43:25) For your name's sake, O Lord, pardon my guilt, for it is great. (Psalm 25:11) Help us, O God of our salvation, for the glory of your name; deliver us, and atone for our sins, for your name's sake! (Psalm 79:9) Though our iniquities testify against us, act, O Lord, for your name's sake; for our backslidings are many; we have sinned against you. (Jeremiah 14:7) We acknowledge our wickedness, O Lord, and the iniquity of our fathers, for we have sinned against you. Do not spurn us, for your name's sake; do not dishonor your glorious throne. (Jeremiah 14:20-21) God put [Christ] forward as a propitiation by his blood, to be received by faith. This was to show God's righteousness, because in his divine forbearance he had passed over former sins. It was to show his righteousness at the present time, so that he might be just and the justifier of the one who has faith in Jesus. (Romans 3:25-26) Your sins are forgiven for his name’s sake. (1 John 2:12) 2) Because it makes clear that God loves us with the greatest love. Father, I desire that they also, whom you have given me, may be with me where I am, to see my glory. (John 17:24) God loves us not in a way that makes us supreme, but makes himself supreme. Heaven will not be a hall of mirrors but an increasing vision of infinite greatness. Getting to heaven and finding that we are supreme would be the ultimate let down. The greatest love makes sure that God does everything in such a way as to uphold and magnify his own supremacy so that when we get there we have something to increase our joy forever—God’s glory. The greatest love is God’s giving himself to us for our eternal enjoyment for ever, at the cost of his Son’s life (Romans 8:32).
<urn:uuid:b9723d59-5fca-43f9-83d2-1dae08da135b>
CC-MAIN-2013-20
http://www.desiringgod.org/blog/posts/why-it-matters-that-god-does-everything-for-his-own-glory?turn_off_admin_bar=true
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.965912
515
1.734375
2
Diana Bowley of the Bangor Daily News - DEXTER - Like other schools across the state, the Tri-County Technical Center’s students observed Alcohol Awareness Week, Dec. 4-8, with a variety of educational programs, one of which will spill over into next week. On Monday and Tuesday, Dec. 11 and 12, all Dexter Regional High School students will participate in a field sobriety test conducted by the Maine State Police, the Dexter Police Department, and the Penobscot County Sheriff’s Department. "It’s an opportunity for kids to realize what their sobriety is like and what their balance is like under the effects of alcohol," Steve Spaulding, Tri-County Technical Center instructor, said Friday. Students in the Criminal Justice Program have already been through the program and will assist Spaulding during the event. Spaulding said the students will wear Fatal Vision Goggles to give them a view of what it is like to drive under the influence. These specially designed and manufactured goggles simulate the visual impairment caused by alcohol or other drugs. The wearer experiences a loss of equilibrium, which is one of the effects of intoxication, according to Spaulding. After similar programs in past years, Spaulding said students have told him that the program and the view behind the goggles was "eye-opening." The Tri-County Technical Center educates students from Nokomis Regional High School in Newport, Foxcroft Academy in Dover-Foxcroft, Piscataquis Community High School in Guilford, Penquis Valley High School in Milo, and Dexter Regional High School. |Back to News||Home||Print This Story|
<urn:uuid:aa79d737-8568-486d-91f8-098f278fc112>
CC-MAIN-2013-20
http://www.dextermaine.org/news/120906.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.956531
353
1.992188
2
The ODFW Visitors' Guide High Desert Region Photo by Robert Mutch Best time to visit: Late fall through early summer. Access to these islands is by boat (generally a jet motor is needed). The Snake River is very shallow and hazardous in this section when water flows are low. What to see and do At the wildlife area: The primary purpose of these islands is to provide public hunting of pheasants, quail and waterfowl. Deer hunting with appropriate tags, and fishing for catfish or other warmwater fish species also is allowed. The islands are open to the public year-round for bird and wildlife viewing. The islands are used by songbirds and other bird species. Waterfowl may be viewed in the river around the islands. Nearby: The Owyhee Reservoir offers boating, camping, picnicking, hunting and fishing opportunities. Take I-84 to Farewell Bend near Huntington. Boats may be launched at Farewell Bend State Park. Another public boat launch is next to the Oasis RV Park. Take I-84 south from Farewell Bend to Hwy. 201, then travel south on Hwy. 201 to the Oasis. There also are two boat launches in Weiser, Idaho. Address and Phone Oregon Department of Fish and Wildlife 3814 Clark Boulevard Ontario, OR 97914 Northwest Region | Southwest Region | High Desert Region | Northeast Region
<urn:uuid:241dd01a-264c-4a96-a81e-bcb981dca8da>
CC-MAIN-2013-20
http://www.dfw.state.or.us/resources/visitors/snake_river_islands.asp
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.926238
300
1.679688
2
.e. wrote: 19. Samsara does not have the slightest distinction from Nirvana. Nirvana does not have the slightest distinction from Samsara. Simply...Samsara is Nirvana. Simply? Is it so “simply?” The Buddha clearly defined nibbana as: That which is the destruction of greed, hatred and delusion is nibbana. -- S.N. IV 251 and IV 321, which is say that there is no nibbana outside the person who has been cooled, nibbuti , freed of from the conditioning of greed, hatred, and delusion. There is no nibbana thingie out there, and neither is there any nibbana thingie inside. And samsara is not the destruction of greed, hatred and delusion."Monks, I will teach you the all. And what is the all? The eye and forms, the ear and sounds the nose and odors, the tongue and tastes, the body and touch, the mind and mental phenomena. This is called the all. If anyone, monks, should speak thus: ' Having rejected this all, I shall make known another all' - that would be a mere empty boast." SN IV 15. All MMK 29.19 is really saying, and saying no more than this, is that nibbana is to see the “all” as no more than empty of any self-thingness, impermanent, interdependent. It is a shift in perception, no longer colored by grasping after what reinforces the sense of self, no longer colored by pushing away what threatens the sense of self, no longer colored by the delusion that there is some sort of essence that we really are. From the standpoint of knowing, one sees the “all” as empty of any sort of thingness. MMK 25.19 is talking about a shift in perception, not an equation of a this and a that. No Tat tvam asi, no Om tat sat, no Om chit ananda. Investigation of the Tathagata 22.16 16. Whatever is the own-nature of the tathagata, that is the own-nature of this world. The tathagata has no own-nature. This world has no own-nature. own-nature of the tathagata = own-nature of the world (The tathagata has no own-nature. This world has no own-nature.) (-own-nature of the) tathagata = (-own-nature of the) world tathagata = the world (Buddha said it this way. When the conditions of the world are right, a tathagatha arises. So where do the conditions of the world end and the tathagata begin?) [and here is a grossly unwarranted jump] which is identical to Brahma = the world You complain about reification, but in this quote, you are reifying everything. Twenty-two sixteen is saying “tathagata = the world” only in terms that they share the same ultimate quality of having no ultimate thingness as their ultimate nature. That is not saying that the tathagata is Now what is the world, Brahma or Buddha? They are illusion or dependently originated or empty. Choose your favorite word to represent your highest or deepest understanding. Interestingly, here is the problem neatly spelled out. Being dependently originated or empty is not the same as being an illusion. MMK 7.34 state: “Like a dream. like an illusion . . . .” “Like,” not “is.” There is a significant difference between saying something is “like an illusion” and something “is an illusion.” Missing that distinction is a fatal flaw; it is to reify supposed illusion and the supposed ultimate reality. So is there any ontology for either? Who here believes there was a Buddha who walked the earth and taught? Who believes Brahma is real in heaven? If you reify either human convention, you are ultimately in error. In missing the difference between “like an illusion” and “is an illusion,” it would seem that the reification is coming from thee, not me. if you have penetrated either system to the point of realizing what I loosely call, Reality (the highest "thing" in a tradition) = Illusion (the "problem" to be overcome), then the argument along with fixed positions dissolves. This does not seem to work here very well given that you cannot accurately portray the Buddhist position, which, as we see, is not quite what you are saying it is. So anyone that says "I am" a Buddhist or an Advaitan and the other side is "wrong" or has a lower realization or lower understanding, etc. is operating from a reifed delusion that there actually is some fixed position called the Truth that can be encapsulated within a scripture. You are certainly trying to present a fixed position with all your “this=that” stuff, as if “this does in fact equal that.” Scripture (reading) after all will only get you to the edge…on a great day… of (dualistic) knowing. He said dualistically. So what did Nargarjuna feel was the truth of this matter? [25.]18. Even when the Bhagavan is alive, one cannot perceive [him? it?] as “existing,” likewise as “not existing,” nor can one percieve [him? it?] as “both” or “neither”. There was no Buddha (or Brahma) from the get go to live forever or be annihilated. Again, reifying the contents of 25.18. You might want to try to put this into its proper context. What after all is the import of tathagata? So it is rather ironic and yes rather telling (despite everyone who chimed in claiming you cannot see the depth of a person’s understanding from what they write) that someone would actually even argue for some sort of reified Buddhist truth! But that is exactly what you have done here in your distortion of what Nagarjuna is saying. You are living in a fairy tale of your own making and don’t even know it i.e. you have not yet realized nor understood to any meaningful degree, Reality = Illusion. Not that you have shown. I am in now way personally attacking anyone’s character they are currently indentified with in the dream of separation btw! It would be like hurling insults at cartoon characters. An ad hominem par excellence.
<urn:uuid:c8e9f346-f528-424a-b0c3-85f35f599abd>
CC-MAIN-2013-20
http://www.dhammawheel.com/viewtopic.php?p=25712
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.958645
1,430
1.960938
2
Jechbi wrote:Could you expand on that? appicchato wrote:...whether this sutta is a forgery or not is unimportant to me, and where would the benefit be knowing (which doesn't seem possible, definitively, one way or another) if it is, or isn't?...it's helped me tackle my monkey mind... [/i] Jechbi wrote:I sometimes come away with a better understanding that actually strengthens practice. I hope that occurs here. my personal theory is that the satipatthana suttas of MN & DN may of been a combination of smaller suttas as a training aid for new monks who may not of been able to remember the whole collection so langer discourses were made using short discourses and verses from other longer texts to enable the students to practice properly without needing to carry around or memorise vast amounts of teachings. Dmytro wrote:There are two main valid methods for establishing the relative dating of a sutta: - comparison with Chinese counterparts; - linguistic analysis of the words and grammatical forms used. Anything else is at best a hypothesis, and at worst an empty speculation. Since the Chinese versions of this sutta are pretty much similar to Pali sutta, all this pathologic anatomy doesn't matter. This is identical to the second link in the OP, thanks. I'm only skimmed it, though.retrofuturist wrote:Have you read this? 'A History of Mindfulness: How Insight Worsted Tranquillity in the Satipatthana Sutta' by Ajahn Sujato Jechbi wrote:Having re-read the responses to this thread, I wanted to say thanks for all the insightful comments here. I think the term "forgery" probably is too harsh, simply because in common usage it implies "completely fake." But even Ajahn Sujato appears to agree that the contents of the sutta reflect important elements of Dhamma teaching as they were passed down in this particular tradition. I believe he's using the term "forgery" in a narrower sense and with regards to precise origin. Best wishes for your practice ...
<urn:uuid:4bd11b53-8963-4198-a3cf-dc0908d39b6d>
CC-MAIN-2013-20
http://www.dhammawheel.com/viewtopic.php?p=31292
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.954454
461
2.1875
2
What do these appearances that are disjoint, appear in (or are made of)? When "you" notice an appearance, what is the act of noticing? Also, I agree they are disjoint (or "just happen" like a movie), but would argue that they do happen (or exist). You should start by reading the sites of the links (especially the blog where the articles came from) I posted. I think they're good places to start. From one the artcles I posted: Just for the sake of clarification, I would like to make it clear that I never said that "these luminous self-perceiving phenomena which are craving-free and nondual are the Ultimate", if there could still be any ambiguity about that. On the contrary, I said that what I used to take for an eternal, empty, uncreated, nondual, primordial awareness, source and substance of all things, turned out to be nothing more than the luminous nature of phenomena, themselves empty and ungraspable, somehow crystallized in a very subtle witnessing position. The whole topic of this thread is the deconstruction of this Primordial Awareness, One Mind, Cognizing Emptiness, Self, Atman, Luminous Mind, Tathagatgabha, or whatever we may call it, As shocking as it may seem, the Buddha was very clear to say that this pure impersonal objectless nondual awareness (that Vedantists called Atma in Sanskrit, Atta in Pali) is still the aggregate of consciousness and that consciousness, as pure and luminous as it can be, does not stand beyond the aggregates. "Any kind of consciousness whatever, whether past, future or presently arisen, whether gross or subtle, whether in oneself or external, whether inferior or superior, whether far or near must, with right understanding how it is, be regarded thus: 'This is not mine, this is not I, this is not my self.'" (Anatta-lakkhana Sutta). What I realized also is that authoritative self-realized students of direct students of both Ramana Maharishi and Nisargadatta Maharaj called me a 'Jnani', inviting me to give satsangs and write books, while I had not yet understood the simplest core principles of Buddhism. I realized also that the vast majority of Buddhist teachers, East and West, never went beyond the same initial insights (that Adhyashanti calls "an abiding awakening"), confusing the Atma with the ego, assuming that transcending the ego or self-center (ahamkara in Sanskrit) was identical to what the Buddha had called Anatta (Non-Atma). It would seem therefore that the Buddha had realized the Self at a certain stage of his acetic years (it is not that difficult after all) and was not yet satisfied. As paradoxical as it may seem, his "divide and conquer strategy" aimed at a systematic deconstruction of the Self (Atma, Atta), reduced to -and divided into- what he then called the five aggregates of clinging and the six sense-spheres, does lead to further and deeper insights into the nature of reality. As far as I can tell, this makes me a Buddhist, not because I find Buddhism cool and trendy, but because I am unable to find other teachings and traditions that provide a complete set of tools and strategies aimed at unlocking these ultimate mysteries, even if mystics from various traditions did stumble on the same stages and insights often unknowingly. Thanks, sure. I especially like the "In lhatong—in terms of the Four Naljors—one is not naming what arises; one is not separate from what arises. One becomes completely identified with that which arises". This is how the practice these days. There is seeing, hearing, thinking, sensing, tasting and smelling, but obviously no seer, hearer, senser, etc. out there trying to dis-embed from the seen, the heard... If it seem that someone or something is investigating, seeing, practicing, it soon appears that this sense of a doer, an observer or even this abstract and impersonal sense of being is just thinking, feeling, sensing. As a matter of far, I am not familiar with noting vipassana. What I do is to hold on the 'sense of being' or 'sense of presence'. This presence that first felt like "I am presence-awareness" now turns into the direct apprehension of the beingness, presence or actuality of seeing, hearing, sensing, etc. in the absence of a subject, knower, self or non-dual awareness-super-Self. The sense of being (or feeling of existence) is not anymore the sense of my being as a sentient being or even as pure non-dual awareness, but is simply experienced as the beingness of 'what is' manifesting its presence.
<urn:uuid:eb630683-b266-4892-9077-248557d3dfd3>
CC-MAIN-2013-20
http://www.dharmawheel.net/viewtopic.php?f=66&t=9709&hilit=tathagata&start=100
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.958979
1,025
1.757813
2
deepbluehum wrote:I agree that testability would great, but their are limits to what one can gather in terms of data. For example, there is no test that can falsify rebirth. The best we can hope for are two things: 1) anecdotal evidence and 2) one must enter the path up to the fourth jhana and aver one's mind toward past lives and see what happens. The second would only be one's own subjective experience. The same applies to karma. We can look at examples like Ghaddhafi and apply the lives by the gun dies by the gun adage. Then, we can "test" in our own experience whether what the Buddha said is true, that good deeds result in pleasant condition and bad deeds result in painful condition. As to compassi-o-bots, you are missing a crucial element, the dharmakaya. This also has absolutely nothing to do with science, and cannot be tested, because it is simply awareness's own subjective experience, and by definition, is immeasurable. I feel this is really underestimating the power of Buddhist phenomenology. What might be Buddhism's most appealing factor to the Western intellectual mindset is that its primary system of inquiry is a very advanced form of phenomenology, so advanced that it overtakes anything similar ever produced in the West by millenia. It is also independently verifiable in a way that other beliefs are not - a highly intelligent person stranded on an island with no access to human knowledge may, in theory, arrive at the conventional meaning of dependent origination, even karma and rebirth and so on, by logic alone. You can't really make this claim of other systems. Truth, being absolute, must be able to be universally realised and derived, assuming necessary mental capacity, or it can never be trusted as truth. I think the Buddha realised and taught this - who, we remember, didn't have any of the anecdotal evidence we have now. Would he really try to encourage us solely by appealing to future experience? I don't think he did. If we rely on anecdotal evidence, we are only reinforcing our previous beliefs - that's why it isn't accepted generally as scientific, even though its based in scientific thinking. If we attribute truth value to claims of NDE's, or yogic recollection (even our own) it is only ever because we assign the source credibility that we don't assign to other, competing anecdotes. That credibility is based on other assumptions, which sooner or later are found to be unfounded in any rigourous way. This is why it is a flimsy argument, the same every belief system uses, and not necessary . Right view mean nothing without right understanding. We cannot yet falsify rebirth completely, so it is disingenuous to call it an empirical hypothesis. However, fortunately and possibly more importantly we can falsify nonrebirth and nonkarma. That is, it is impossible, for example, for energy to do anything other than continue. The conservation of energy is a "law" in physics. So literal non-causation and non-rebirth, at least of physical things, is impossible. We haven't quite proved the progression of a mental continuum, of course, but this is much more powerful an argument than one that appeals to anecdotal evidence, which science doesn't consider valid, and appeal to future experience, which philosophy considers a fallacy. It is bizarre to me that so many Buddhists are critical of "Western science". I have no idea why. Everything we see in modern science is exactly what we would expect if the core tenets of Buddhism are correct. Empiricism and materalism/"New Atheism"/physicalism etc. are not mutally exclusive. Sorry for the wall of text, needed a vent. As a strict skeptic you are in danger of remaining a thought-o-bot. True, and this is the biggest problem for this approach, the risk of becoming an armchair-Buddhist. The best philosophers are scientists, meaning skepticism is the proper attitude for experiment. But we should remember there is nothing to fear from skepticism or science, either way. They are on our side. The good thing about truth is that its invincible. Hooray!
<urn:uuid:c9f32dca-7512-4448-b4b8-573f24aa98b9>
CC-MAIN-2013-20
http://www.dharmawheel.net/viewtopic.php?p=63069
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.96076
869
1.703125
2
By Joanne Peazel McCavery, RDH, BSc With summer and all of its distractions in full swing, it may be difficult for us to think several months ahead, to what we will be doing for Valentine’s Day. However, February 14 is only six months away, and with that red, romantic, rose-filled day comes a very special event, Gift from the Heart. Gift from the Heart is a community care initiative that was developed by our colleague, Ms. Bev Woods R.R.D.H. The first event was held on February 14, 2009, where 75 dental hygienists provided complementary (free!) dental hygiene services to under- and underserved people in 24 communities across Ontario. The second year, there were over 50 dental hygiene clinics participating with over 150 volunteers. As well, dental hygiene schools came on board and offered the use of their clinic chairs and students to enable more spaces for people to access the free service. This year, the event broke through the borders of Ontario and our colleagues in Alberta and British Columbia became involved. In total over 1500 smiles were brightened on February 12, 2011. If you have not yet had the opportunity to experience volunteer work, or more specifically, dental hygiene related-volunteer work, then Gift from the Heart is an excellent opportunity to gain some insight and valuable experience into what it means to give back to the people that share your little corner of the world. Some may shy away from events like Gift from the Heart for the reason that they may not be self-initiated. If you are not able to self-initiate or practice independently, you can still participate many ways in this program other than chair side. For those Ontario, dental hygienists who are not authorized to self-initiate, this blog may serve as a timely reminder or motivator. Why not utilize an event such as this to be the motivation you need to obtain your authorized to self-initiate status? Self-initiation is your gateway to participation in this great event. Just as important, it also strengthens the collective voice of dental hygiene. (There are six months to obtain this authorization. Dental hygienists in general practice dental offices and dental hygienists who have no current intention of opening an independent dental hygiene clinic still benefit from becoming self-initiated. In Ontario, the College of Dental Hygienists of Ontario offers three options (streams) so even new registrants can work towards this goal shortly after entering into practice. A large support network exists to help organise and/or participate in the event. Visit the Gift from the Heart website at http://giftfromtheheart.ca/event/ ; this website has all the information you will need to run the event at your office. There are media releases prepared for you to use, marketing tips and posters to print, and a place to register for the event so that the coordinator will be able to make sure you have the donated products delivered to your office or to a central depot. You can also view pictures of offices that have participated in the past to get ideas on what you might like to do with your office when you participate in this valuable community care initiative. Supplies and equipment for community health programs can be challenging to accrue, but the Gift from the Heart event already has several large companies sponsoring by providing free supplies. Donations are readily accepted, and of course, try brainstorming some FUNdraising ideas yourself. Locations to host the initiative are abundant. Consider how many independent dental hygiene clinics, dental hygiene schools, and community centres are found within thirty to sixty minutes of your home. Or perhaps you will join a dental hygiene colleague/friend in another location. When it comes to advertising, posters and word-of-mouth are a few suitable examples, but having the national and provincial dental hygiene associations support the program is ideal. (Let us hope they are reading this!) Imagine the oral health impact that the dental hygiene community could have if even half of the dental hygienists in Canada participated in this program! How many smiles would be bigger, brighter, and healthier if 10 000 dental hygienists provided complimentary services for 6 hours on Feb 11, 2012? We all know that dental hygiene is a specialized body of knowledge. We are a profession, based on our education, our certification exam, our registration and compliance with our unique regulatory bodies. Can it follow then that dental hygienists play a vital role in greater society to provide some relief from oral disease to individuals close to home that could otherwise not afford it? The Gift from the Heart initiative allows the profession of dental hygiene to give back to the community, all the while bringing special attention to the role of dental hygienists as business owners and primary oral health care providers. Give it a try next year; make a difference, expand your professional network, and help spread the healthy smiles that began as a gift from your heart. By Bev Woods RRDH On February 14, 2009, I opened my own independent dental hygiene clinic. The rewards I gained by owning my own practice were immeasurable. My husband is with the Canadian Air Force and suddenly we were posted to Dover AFB in Delaware USA. To say I was saddened when I found out I had to sell my practice is an understatement. I did not know how I would cope without the interpersonal connections I had built with so many of my clients. It was never about the money that drove me to work every day, because to me it was never a ‘job’. Instead it was about building relationships with my clients and providing an opportunity to make a difference in their oral health and overall health. It was also about putting my efforts into the struggle to bring public awareness to independent dental hygiene. I can truly say that after 26 years of working with people, and working as a dental hygienist….. I MISS IT. While living in Delaware, I have searched for a direction that would allow me to have the same compassionate contact with people. I started volunteering with an organization at Dover AFB call Friends of the Fallen - friends helping lift the families of the fallen soldiers. We are a community-based volunteer group which provides service and assistance to families who come to Dover Air Force Base to witness the Dignified Transfer of their loved ones. After months of training, I was asked to join their board of directors as the Volunteer Coordinator. I now spend my days meeting amazing people who have given the biggest sacrifice - the lives of their sons, daughters, husbands, wives, mothers, and fathers. Even though I am from another country and our uniforms are different, we are all fighting for the same cause – FREEDOM My recent trip home to Ontario last month opened my eyes and my heart. While attending a repatriation ceremony at CFB Trenton, I had the honor of meeting two amazing men. They have come together to show the world that there are no boundaries when it comes to improving quality of life. Their mission is to recognize and pay tribute to the people who risk their lives to save others in the course of their chosen profession. They have started this simple organization so that their message will spread and give meaning to the word sacrifice. They believe in peace, unity, mutual respect, and cooperation. They do this by special events and rallies. It made me realize that our profession is no different. I began to see the similarities between their everyday obstacles and ours in dental hygiene. For example, in 2008, I turned to friends old and new to come together as one to bring public awareness to independent dental hygienist, while at the same time reaching out to those less fortunate in our communities. I named this day A Gift from the Heart. Three years and hundreds of happy healthy smiles later, registered dental hygienists from across our great country have ‘rallied’ together, unified as one to make a difference in the lives of those in our own communities. Self initiated RDH’s that work on their own as well as those that work in traditional settings all came together on that one ‘special’ day to work together to make a difference. You see it doesn’t matter what location we provide our scope of practice, we are all the same, we are all one. Our passion shines brighter and brighter as we continue to work together as oral health care providers. The two men I met in Trenton pointed out something very important to me that can be applied to many aspects of our lives and that is “We must learn to see beauty and find joy through living the simple goal of living well together side by side.” I thought I was at a crossroads in my life but instead I realize that I am standing right in the middle of the intersection where I have the freedom to choose a variety of directions to go forward in. I will continue to volunteer for the families of the fallen, I will continue to promote my profession any way I can, mentor my fellow colleagues in dental hygiene, and I will continue to volunteer to coordinate the Gift From the Heart so that we can all work to build the event to make it the best it can be so that we continue to help many more people less fortunate in our communities. Ultimately that will bring about the much deserved public awareness to our great profession. If anyone is interested in volunteering for the Gift From the Heart in 2012, please contact me, I would love to explain to you how you can make a difference. CHANGING THE WORLD--BEGINS WITH YOURSELF! Side by Side…we are one. Sincerely, Bev Woods RRDH
<urn:uuid:283c74cf-7992-437c-a754-39f8e38057a0>
CC-MAIN-2013-20
http://www.dhpro.ca/category/gift-from-the-heart/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.968321
1,988
1.804688
2
Art at the DIASearch the Collection Rollover image to zoom Photo ©2013, Detroit Institute of Arts The Theatre of Marcellus Giovanni Battista Piranesi(Italian, 1720-1778) - Etching printed in black on laid paper - plate: 15 7/8 x 21 1/2 in. 40.2 x 54.6 cm sheet: 17 3/8 x 24 3/4 in. 44.1 x 62.8 cm - Prints, Drawings & Photographs - Gift of Mrs. James E. Scripps - Accession No. Search Art at the DIA See favorite works from DIA staff members. Support the DIA Your membership and donations are critical to the museum’s success. Stay in the know Receive ongoing updates about events, announcements, and more from the DIA.
<urn:uuid:22fe6f5e-cc0f-4a4d-b4a4-e4f3c265cc4b>
CC-MAIN-2013-20
http://www.dia.org/object-info/1482c6c1-0256-483f-a3a8-5aabe15bb612.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.781798
189
1.679688
2
Living with Diabetes Diabetes is a condition that affects everyone from children right up to adults. It is referred as a chronic condition since a person who has it can go through many changes in their lives as it can affect their entire body. Over time, diabetes can cause blindness, stroke, and amputations among other things. There are two types of diabetes; Juvenile or Type 1 diabetes and adult-onset diabetes also known as Type 2 diabetes. The more common form of diabetes is Type 2 and those who have this type of diabetes are faced many difficulties and complications to their liver, muscle and even fat cells. In the case of Type 1 diabetics, they are required to use insulin to be able to combat the effects of diabetes. A simple blood sugar test can determine if you have diabetes or not. The doctor usually checks the level of your glucose to determine if you are diabetic. There are also telltale signs that one is diabetic as well. The symptoms of diabetes include an increase in thirst; feeling tired all the time, headaches, and weight loss and in some cases blurred vision and even dry mouth. There is a treatment for diabetes and one can easily keep it under control if proper measures are taken. One must first keep their blood glucose in check all the time and one way to achieve this is by eating healthy foods for diabetics. One can also combat the symptoms of diabetes by keeping up with an exercise regimen and it would also help to keep their weight under control as well.
<urn:uuid:9a5aede2-83a0-4dea-ac64-71fa514ed29c>
CC-MAIN-2013-20
http://www.diabetescondition.com/living-with-diabetes/living-with-diabetes/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz
en
0.973689
305
2.9375
3