text
stringlengths 198
630k
| id
stringlengths 47
47
| metadata
dict |
---|---|---|
Four supermarket chains sell seafood in a particular state. Three of the companies secretly agree to sync up their prices. The companies then engage in predatory pricing by undercutting the seafood prices offered by the fourth supermarket chain.
A year later, the fourth supermarket chain closes its seafood department because it can no longer compete. The three companies then modify their horizontal scheme: they push seafood prices far above the national average and take turns offering discounts in an effort to avoid accusations of violating antitrust laws. | <urn:uuid:950e63ac-b0cd-4600-a181-aecb2576bdae> | {
"date": "2013-05-23T18:45:45",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9388240575790405,
"score": 2.515625,
"token_count": 96,
"url": "http://www.law.cornell.edu/wex/price-fixing"
} |
Definition from Nolo’s Plain-English Law Dictionary
A sudden statement (also known as an "excited utterance") made by someone who has seen a surprising, startling, or shocking event (such as an accident or a death), or has suffered an injury. For example, "Oh my God, that blue car hit the little girl!" Spontaneous exclamations are often introduced at trial as evidence of the speaker's state of mind or the truth of the matter being spoken about, and will be admitted if the judge decides that the circumstances surrounding the statement make it likely that the speaker was telling the truth. Without this determination, the statement is simply hearsay; that is, a statement made out of court and offered for the truth of the matter it deals with. (See also: hearsay
Definition provided by Nolo’s Plain-English Law Dictionary.
August 19, 2010, 5:24 pm | <urn:uuid:f46e42da-05f9-4938-b23a-fc8dffdaa09e> | {
"date": "2013-05-23T18:58:33",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9590510725975037,
"score": 3.09375,
"token_count": 191,
"url": "http://www.law.cornell.edu/wex/spontaneous_exclamation?quicktabs_3=1"
} |
Expand each section to read more.
1600s Western Igbo kingdoms dominate trade in the lower Niger region.
1815 Following the end of the Napoleonic wars between France and Great Britain, Britain begins to trade with the interior, calling the region "Nigeria" based on the path the Niger River takes through the area.
1914 Igbo, Yoruba, and Hausa areas are officially united under Britain as the Colony and Protectorate of Nigeria.
1930 Chinua Achebe is born in the Igbo village of Ogidi.
1958 Things Fall Apart is published in England.
1960 Nigeria gains independence, as a parliamentary democracy.
This story of the Igbos around 1900 was written by one of their grandchildren; Chinua Achebe was born in 1930 in southeastern Nigeria, in the Igbo village of Ogidi. He grew up speaking English and reading English literature, but Achebe kept a deep attachment to his Igbo roots; eventually he came to question the English literary portrayal of Africa and Africans as violent, ignorant, and primitive. Achebe wanted to give Africans their own voice, to take control of how they were seen, and to repair their own self-image.
The result was Things Fall Apart. The hero of the story is Okonkwo, a self-made man who has been unstoppable in his determination to rise in his society, the village of Umuofia. His greatest fear is being weak, like his father, whom he detested. Okonkwo will go to any lengths to prove to the world and to himself that he is strong and fearless—even to the point of destroying himself.
Umuofia is not a paradise or a hell. Its people are not evil and ignorant, nor are they innocent, noble savages. These European points of view are discarded. Umuofia is filled with real people who have complex personalities. When the British missionaries arrive in Umuofia, it is shocking to realize that most of them would destroy Igbo culture without a second thought.
But Achebe's refusal to paint the conflict in black and white is what makes Things Fall Apart so powerful. Just as Umuofia was not perfect, the British are not all evil. The missionaries offer acceptance, love, and respect to those Igbos who have been outcast by their village for religious reasons. If only the two groups could have met in a spirit of compromise, they might have been able to live peacefully together. But the British insistence on domination, and the Igbo fear and rejection of their people who convert to Christianity, spell doom for Umuofia. Each side fears the other, and, like Okonkwo, each side is so fearful of appearing weak that it will resort to violence to keep the upper hand. Achebe shows that the coming of Europeans to Africa was not light coming to darkness, or pure evil destroying a people; it was two imperfect societies set on a collision course from which neither could emerge whole again.
Achebe wrote Things Fall Apart in English. The decision was controversial amongst African writers at the time, some of whom wanted to promote native African languages, while others accepted English. If Achebe wrote in English, he was using the language of the colonizer, a non-African voice, to tell an African story, once again. But if he wrote in Igbo, he was limiting the potential audience for the novel to a single group of people in Nigeria.
In an essay called "The African Writer and the English Language," Achebe describes the problem:
For an African writing in English is not without its serious setbacks. He often finds himself describing situations or modes of thought which have no direct equivalent in the English way of life. Caught in that situation he can do one of two things. He can try and contain what he wants to say within the limits of conventional English or he can try to push back those limits to accommodate his ideas... I submit that those who can do the work of extending the frontiers of English so as to accommodate African thought-patterns must do it through their mastery of English and not out of innocence.
In other words, African writers can use English to change it, and turn it into a language of African experience and not just English experience.
Achebe changed English by infusing it with Igbo syntax, usage, and vocabulary so that while Things Fall Apart is clearly written in English, it is a new kind of English that serves an Igbo purpose.
- Mr. Brown
- The first white missionary to arrive in Umuofia, Mr. Brown is respectful and patient, never attacking clan customs or religion directly. His early success is endangered by his ill health.
- The District Commissioner
- The highest English official in the region arrives with the missionaries and oversees the fall of the villages from a distance.
- Okonkwo's second wife, who left her first husband for Okonkwo. She has borne ten children and lost all but one, her daughter Ezinma. Her love for Ezinma leads her to stand up to Okonkwo on occasion.
- She is Okonkwo's favorite child, beautiful and connected to her father in a deep way. Only she can understand him and his moods. Her only flaw, in his eyes, is being a girl.
- A boy from a neighboring clan who is seized by Umuofia warriors. He lives with Okonkwo's family as a peace offering, and is a more satisfying son to Okonkwo than Nwoye.
- This self-made man has worked his way up from poverty and, as he sees it, freed himself from the disgrace of having a lazy, "feminine" father. While Okonkwo possesses real virtues of hard work, far-sightedness, devotion to his clan, and love, these co-exist uneasily with impulses of fear, pride, and impatience.
- Okonkwo's eldest son shows every sign―so far as Okonkwo is concerned―of being a lazy, weak man like Unoka. Beaten and belittled by his father, Nwoye will become a prime target for conversion by the English missionaries.
- Nwoye's mother
- Okonkwo's first wife, whose name is not told to the reader. She, unlike her husband, understands the value of pity, gentleness, and forgiveness. Her stories instruct and delight the children.
- A thoughtful member of the clan who is Okonkwo's best friend. He tries to help Okonkwo navigate the troubles that come to him, and is left cleaning up after Okonkwo's catastrophic end.
- Ogbuefi Ezeudu
- The highest-ranking man in the village, and holder of three titles―a great rarity.
- Mr. Smith
- The far more zealous Smith replaces Brown and leads his new converts on a full-scale war of ideas against the village.
- Okonkwo's father, a gentle musician who left his family poor and in debt at his death. He held no titles of rank in the village―driving Okonkwo to vow that he would hold many. | <urn:uuid:c2aad512-af01-45f9-884d-747083b43f3e> | {
"date": "2013-05-23T18:37:57",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.971096396446228,
"score": 3.625,
"token_count": 1511,
"url": "http://www.learner.org/courses/worldlit/things-fall-apart/read/getting-started/"
} |
From the 'Lectric Law Library's Stacks
Search The Library
Since the early part of this century, the federal courts have attempted to limit the uncertainty surrounding novel scientific evidence by establishing an evidentiary standard of reliability for scientific proof. Frye v. U.S., 293 F. 1013 (D.C.Cir.'23), provided the standard that governed the introduction of expert evidence for more than half a century. The courts have also embraced procedures, including various forms of discovery providing for mandatory disclosure of witnesses "who may be used at trial to present evidence under Rules 702, 703, or 705," and requiring submission of written reports by expert witnesses, which give the parties and the courts greater opportunities to test the reliability of novel expert testimony.
The standard of reliability for expert testimony and the applicable procedures in federal courts in the years proceeding the landmark 1993 Daubert case had undergone significant change.
As Judge Learned Hand in "Historical and Practical Considerations Regarding Expert Testimony", 15 Harv.L.Rev. 40 (1901-02) observed at the beginning of this century, expert evidence must be reliable in order to have some "possible weight" on an issue and be admitted for consideration by a trier of fact. Absent reliability, the evidence would not be relevant to the inquiry. In Frye, the Court of Appeals considered an appeal from a trial court's refusal to admit the resultsof a test based on systolic blood pressure, offered to prove the truthfulness of a defendant in a murder prosecution. In an oft-quoted passage, the court crafted a standard to determine whether scientific evidence was sufficiently reliable to warrant consideration by a trier of fact:
Just when a scientific principle or discovery crosses the line between the experimental and demonstrable stages is difficult to define. Somewhere in this twilight zone the evidential forces of the principle must be recognized, and while courts will go a long way in admitting expert testimony deduced from a well-recognized scientific principle of discovery, the thing from which the deduction is made must be sufficiently established to have gained general acceptance in the particular field in which it belongs.
Frye contemplated two stages for acceptance of new science. First, the scientific community develops a theory and determines its reliability using scientific method. This stage required experimentation with the new science's methodology and publication of the results for scrutiny and approval by the scientific community. Second, once the new science became "demonstrable," based on acceptance in the scientific community, the court could permit its use as evidence in the courtroom. Without explanation, the court of appeals chose "general acceptance" in the relevant scientific community as the standard for governing the admission of novel scientific evidence.
Under Frye, the party proffering novel scientific evidence must show general acceptance by offering scientific publications, judicial decisions, evidence of practical use, or testimony by scientists on their peers' position regarding the evidence in question. Many courts, faced with determining the admissibility of a wide array of scientific evidence, favored the Frye standard. Often, new scientific evidence failed to survive this demanding standard. For example, McCormick on Evidence reports:
Polygraphy, graphology, hypnotic and drug induced testimony, voice stress analysis, voice spectrograms, ion microprobe mass spectroscopy, infrared sensing of aircraft, retesting of breath samples for alcohol content, psychological profiles of battered women, and child abusers, post traumatic stress disorder as indicating rape, astronomical calculations, and blood group typing, all have fallen prey to [Frye's] influence.
Many rationales have been offered to support the use of the Frye standard as a means of excluding evidence. The justifications included: that the standard guaranteed a minimum number of knowledgeable experts; that it promoted uniformity of decisions; that it eliminated the need for time consuming hearings on admissibility; and, most importantly, that it assured a method by which those best qualified to assess the validity of scientific evidence would effectively determine its admissibility.
The general acceptance test of Frye became the "dominant standard for determining the admissibility of novel scientific evidence at trial." Indeed, Professor Clark's testimony in Briggs that the doll tests were "generally accepted as indications of the child's sensitivity to race as a problem" was calculated to satisfy Frye. Nonetheless, as Justice Blackmun noted in Daubert, the merits and application of Frye were extensively debated by commentators. Professor McCormick was one of the primary critics of Frye prior to the adoption of the Federal Rules of Evidence. In 1972, he wrote:
"General scientific acceptance" is a proper condition for taking judicial notice of scientific facts, but not a criterion for the admissibility of scientific evidence. Any relevant conclusions which are supported by a qualified expert witness should be received unless there are other reasons for exclusion. Particularly, probative value may be overborne by the familiar dangers of prejudicing or misleading the jury . . . . If the courts used this approach, instead of repeating a supposed requirement of "general acceptance" not elsewhere imposed, they would arrive at a practical way of utilizing the results of scientific advances. Charles T. McCormick, Evidence Sec. 203, at 491 (2d ed.'72)
The Fed.R.Evid., effective July 1, 1975, provided the first modern and uniform set of evidence rules for the trial of civil and criminal cases in the federal courts. Rule 702, which governs the admission of expert testimony, does so in terms that do not expressly address reliability:
If scientific, technical, or other specialized knowledge will assist the trier of fact to understand the evidence or to determine a fact in issue, a witness qualified as an expert by knowledge, skill, experience, training, or education, may testify thereto in the form of an opinion or otherwise.
The Advisory Committee on Evidence, appointed by the Supreme Court, formulated the language which Congress adopted as Rule 702. Rule 702 and the accompanying Advisory Committee Note echo McCormick's criticism of Frye. Reliability should depend on relevance rather than the general acceptance of scientific evidence. Fed.R.Evid. 401 defines "relevant evidence" as "evidence having any tendency to make the existence of any fact that is of consequence to the determination of the action more probable or less probable than it would be without the evidence.". Rule 403 provides that relevant evidence "may be excluded if its probative value is substantially outweighed by the danger of unfair prejudice, confusion of the issues, or misleading the jury, or by considerations of undue delay, waste of time, or needless presentation of cumulative evidence." Rule 702 incorporates a relevancy requirement by permitting the introduction of scientific evidence which "will assist the trier of fact to understand the evidence or to determine a fact in issue." Surprisingly, the Advisory Committee Note made no mention of Frye. Instead, the Committee quoted Professor Mason Ladd:
There is no more certain test for determining when experts may be used than the common sense inquiry whether the untrained layman would be qualified to determine intelligently and to the best possible degree the particular issue without enlightenment fromthose having a specialized understanding of the subject involved in the dispute. Mason Ladd, Expert Testimony, 5 Vand.L.Rev.414 ('52)
Thus, Rule 702 contemplated the admission of expert testimony that was relevant in the sense that such testimony would facilitate an understanding of scientific, technical, or other specialized facts to determine an issue.
Nonetheless, when called on to apply Rule 702, the majority of federal courts continued to utilize Frye. The courts were understandably reluctant to accept the sub silentio overruling of a precedent of Frye's stature, and often incorporated the general acceptance standard into the relevance determination under Rule 702.
A number of courts have gradually begun to abandon the general acceptance standard. In 1975, the Fourth Circuit affirmed the admission of a voice spectrogram analysis of telephoned bomb threats. The court found Professor McCormick's critique of Frye persuasive:
Unless an exaggerated popular opinion of the accuracy of a particular technique makes its use prejudicial or likely to mislead the jury, it is better to admit relevant scientific evidence in the same manner as other expert testimony and allow its weight to be attacked by cross-examination and refutation. U.S. v. Baller, 519 F.2d 463 (4th Cir.)
This decision required only that scientific evidence be supported by a "demonstrable, objective procedure" rather than general acceptance. Three years later, the 2nd Circuit approved the admission of similar evidence in a prosecution on narcotics charges in U.S. v. Williams, 583 F.2d 1194 (2d Cir.'78). The considerations governing admissibility, the court wrote, were the "probativeness, materiality, and reliability of the evidence." In addition, the court of appeals directed the district court to consider whether the evidence had "any tendency to mislead, prejudice, or confuse the jury."
In 1985, the 3rd Circuit decided U.S. v. Downing, 753 F.2d 1224 (3d Cir.'85), the most significant precursor to Daubert. In Downing, the court considered the admissibility of expert testimony concerning the reliability of eyewitness identification. The court concluded that the language and spirit of the Fed.R. Evid., in addition to the experience of the courts in attempting to apply Frye, suggested that an approach more flexible than the general acceptance test for the admissibility of novel scientific evidence was appropriate. Downing instructed the district courts to undertake a preliminary inquiry as to the soundness of the theory or technique on which proffered scientific evidence was based. This inquiry was to include consideration of the risk that the jury would be overwhelmed, confused or misled and assessment of the materiality of the evidence to the issue in dispute.
The Third Circuit envisioned a multi-factored analysis of the reliability of the evidence. The court permitted, but did not require, the identification of a relevant scientific community and a determination of the degree of acceptance within that community. In language reminiscent of Frye, the court suggested that in many cases, the general acceptance factor was likely to be decisive. Additional factors that district courts could consider included the novelty of the technique and its relationship to established modes of scientific analysis, the existence of specialized literature dealing with the technique, the likelihood that the scientific basis of the new technique has been exposed to critical scientific scrutiny, the qualifications and professional stature of the expert witness, and the potential and actual non-judicial uses of the scientific technique.
According to Downing, district courts should also focus on the risk of error, both the frequency with which the method leads to erroneous results and the type of error generated by the technique. Finally, the district courts should consider whether the expert testimony had been offered in earlier cases to support or dispute the merits of a particular procedure. The Downing opinion noted that "other factors could be added to the list." The Third Circuit's articulation of a clear alternative to Frye set the stage for the Supreme Court's resolution in Daubert of the conflict among the circuits over the appropriate standard of reliability for scientific evidence under Rule 702.
The cases decided after the adoption of Rule 702, but prior to Daubert, reflected the different approaches of the courts described in the preceding section. Occasionally, courts would restate and apply the Frye general acceptance test. Some courts adopted a hybrid approach that incorporated the general acceptance standard into the determination of relevance under Fed.R.Evid. 702. Still other courts jettisoned Frye and attempted to assess for themselves the reliability of scientific evidence.
Dang Vang v. Vang Xiong X. Toyed, 944 F.2d 476 (9th Cir.'91), illustrates the first approach. Female Hmong refugees from Laos brought an action pursuant to 42 U.S.C. 1983 against an employee of a Washington State Employment Security office who allegedly raped them when they contacted him about obtaining employment. The district court allowed extensive anthropological testimony, including a general explanation of Hmong culture, the longterm reliance of the Hmong on governmental agencies for support, and the role of women in that culture. The court found such testimony to be both relevant and necessary because it assisted the jury in understanding certain behavior of parties that might otherwise be confusing, such as the plaintiffs' continued contact with the defendant after a rape. The court excluded opinion testimony regarding the specifics of the case, such as whether there was a rape and why these particular plaintiffs did not report the rape. On appeal, the defendant maintained that all of the expert testimony should have been excluded because it failed to satisfy the requirements of Frye. The 9th Circuit did not question appellant's citation to Frye. Instead, the court rejected the argument as inapposite because the testimony below derived from anthropological study of the Hmong, rather than a novel scientific theory, and therefore should not be scrutinized under Frye.
U.S. v. Kozminski, 821 F.2d 1186 (6th Cir. 1987) (en banc), aff'd, 487 U.S. 931 (1988), exemplifies the hybrid approach, where the court incorporates the Frye standard into the relevance determination under Rule 702. Kozminski was an appeal from a criminal conviction for violation of civil rights. Appellants, a dairy farmer and his wife, were convicted of willfully holding two retarded farm workers in involuntary servitude and of conspiring to deprive the workers of their constitutional right to be free from involuntary servitude154 as guaranteed by the Thirteenth Amendment. The couple's son was also convicted on the conspiracy charge. The Kozminskis argued on appeal that the district court erred in admitting expert psychological testimony to show that the two victims were detained against their will. A psychologist testified that the victims' limited mental ability, combined with the psychological pressures exerted on them by the conditions at the dairy farm, created an "involuntary conversion" to complete dependency. The 6th Circuit, sitting en banc, held that the district court improperly admitted this evidence. The court explained: "For expert testimony to be admissible under Rule 702, a fourpart test must be met: (1) a qualified expert; (2) testifying on a proper subject; (3) in conformity to a generally accepted explanatory theory; (4) the probative value of which outweighs any prejudicial effect."
According to the 6th Circuit, the only arguably relevant theory shown to have general acceptance by the trial testimony was the "captivity syndrome" associated with the brainwashing of prisoners of war. The appellate court was not satisfied that any established theory existed to support a conclusion that the Kozminskis' actions resulted in complete dependency on the part of the victims: "As bad as conditions on the Kozminski's dairy farm are alleged to be, they fall short of those found in a Chinese prison camp. Accordingly, captivity syndrome is inapplicable as a matter of law given the facts of this case." Because Frye's requirement of a generally accepted explanatory theory was not met, the court held the testimony inadmissible under Rule 702.
A concurring opinion in Kozminski cited Frye and emphasized the need to protect a defendant in a criminal case against scientific evidence which may bear an "aura of special reliability and trustworthiness," even when it is based on an unproved hypothesis which has yet to obtain any degree of acceptance in its field. Id. at 1199 (Krupansky, J., concurring). A dissenting opinion urged that the Frye test should not be applicable to the testimony because it was properly categorized as "other specialized" rather than "scientific" knowledge under Rule 702, and as such, could be based on a subjective assessment of the victims and their conditions of confinement. Id. at 1215 (Guy, J., dissenting). The dissent, noting the abandonment of Frye by the Second and Third Circuits, also argued that the majority's concern with the reliability of the expert testimony could be better addressed under Rule 403, which permits the exclusion of relevant evidence if its probative value is substantially outweighed, inter alia, by the danger of unfair prejudice, confusion of the issues, or misleading the jury. Id. at 1214.
Spencer v. General Elec., 688 F. Supp.1072 (E.D.Va.'88), typifies the third approach mentioned above, where the court attempts its own assessment of the scientific reliability of proffered expert testimony. Spencer involved a Title VII sexual harassment claim and state tort claims against a former supervisor and employer brought by an employee claiming to be a victim of rape and other sexual misconduct. At trial, the plaintiff attempted to introduce the testimony of a forensic psychiatrist that plaintiff suffered from Post Traumatic Stress Disorder (PTSD) as proof that the rape actually occurred.
Ultimately, the district court held the testimony inadmissible for this purpose. Noting that PTSD is a condition recognized in psychiatry as the emotional reaction to traumatic events, such as rape, the court cited the American Psychiatric Assn., Diagnostic and Statistical Manual of Mental Disorders for the proposition that PTSD may be caused by a variety of traumatic events outside the range of common experiences, such as military combat, bombing, torture, airplane crashes, or rape. In the case of rape, the condition is sometimes labeled Rape Trauma Syndrome (RTS).
The court concluded, however, that evidence of PTSD or RTS was not a scientifically reliable means of proving that a rape occurred: "Evidence of PTSD occasioned by rape" . . . "is not a scientifically reliable means of proving that a rape occurred. PTSD is simply a diagnostic category created by psychiatrists; it is a human construct, an artificial classification of certain behavioral patterns. RTS was developed by rape counselors as a therapeutic tool to help identify, predict, and treat emotional problems experienced by the counselor's clients or patients. It was not developed or devised as a tool for ferreting out the truth in cases where it is hotly disputed whether the rape occurred. Unlike fingerprints, blood tests, and lie detector tests, RTS was not devised to determine the 'truth' or accuracy of a particular past event--i.e., whether, in fact, a rape in the legal sense occurred." . . . "The scientific evaluation of rape trauma syndrome has not reached a level of reliability that surpasses the quality of common sense evaluation present in jury deliberations."
While the district court made its own determination of the reliability of the proffered evidence, its opinion did not completely ignore Frye. The court questioned several authorities which had admitted PTSD or RTS evidence under the Frye test based on findings that the disorders were "generally accepted to be a common reaction to sexual assault." The court opined that the relevant issue was not whether rape victims may display certain symptoms, but whether diagnosis of PTSD or RTS provided scientifically reliable proof that an alleged victim was raped. Thus, the court believed that, under Frye, the evidence should not be admitted for this purpose. After trial, the district court held that the employee failed to prove by a preponderance of evidence that the alleged sexual assaults and rape took place. The evidence issue was not raised on appeal, and the 4th Circuit affirmed. Spencer v. General Elec, supra.
The court's exclusion of the psychiatric evidence of PTSD to corroborate the plaintiff's testimony that she was raped, on grounds that such evidence was irrelevant, seems questionable. The diagnosis of the plaintiff with a disorder that experts recognize as affecting persons who have suffered significant trauma subsequent to the date of the alleged incident was relevant because it tended to support her testimony that she had indeed been raped. Such evidence is relevant even if the diagnosis standing alone did not show the cause of the condition. The court's evidentiary ruling in Spencer has not been cited by any other federal court. Nonetheless, the decision illustrates the types of issues which a court following the third line of authority must address in an effort to determine for itself the reliability of scientific proof in a federal civil action.
* The above material was excerpted, modified and otherwise prepared by the 'Lectric Law Library from "Novel Expert Evidence In Federal Civil Rights Litigation" a work by Gordon J. Beggs, Fair Employment Practices Clinic, Cleveland-Marshall College of Law. Gordon Beggs. The original was found at www.wcl.american.edu
Brought to you by - The 'Lectric Law Library
The Net's Finest Legal Resource For Legal Pros & Laypeople Alike. | <urn:uuid:ef3bbf0a-8506-4c5d-b61c-4f010c25ac1b> | {
"date": "2013-05-23T18:50:53",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.947708010673523,
"score": 2.53125,
"token_count": 4229,
"url": "http://www.lectlaw.com/files/exp08.htm"
} |
Guide to writing history papers
Reading, Writing, and Researching for History: A Guide for College Students
A comprehensive but easy-to-skim web guide to writing history papers. Recommended by History Dept faculty.
Using call numbers to find books
Books and journals are arranged on our shelves according to the Library of Congress (LC) classification system. Each is assigned a unique call number based on its subject matter and other characteristics. Items on the same subject will often be grouped together.
In using a call number to locate a book on the shelf, consider each element in turn before moving on to the next segment.
These call numbers are arranged as they should appear on the shelves. In each case, the element shown in boldface distinguishes the number from the preceding one:
Each call number consists of several elements. For example::
The FIRST line, TK, is based on the broad subject of the book. Within Class T for technology, TK represents electrical engineering.
The SECOND line, 7881.6, defines the subject matter more finely. When looking for the book, read this as a whole number with a decimal component. In this example, TK7881.6 represents magnetic recording (a subdivision of TK— electrical engineering).
The THIRD line, M29, usually indicates author, but may also represent a further subject subdivision, geographic area, etc. There may also be a fourth line, formatted the same way. When looking for the book, read the numeric component as if it were preceded by a decimal point. In the example above, the numeric part of M29 should be read as ".29" (and the call number TK7881.6 M29 comes before TK7881.6 M4).
The YEAR of publication, such as 1993, may also be present. These file in chronological order and often indicate successive editions of a book. The call number may also have additional elements, such as volume numbers.
To use library databases from off campus you have to set up the proxy server: this changes your browser settings.
Where's the PDF?
Many article databases contain information about articles (citations or abstracts), not the entire text of the article. Once you've used an article database to find articles on your topic, you may need to use this button: in order to locate and read the full text of the article. The UC-eLinks button appears in nearly all the databases available from the UCB Library website.
UC-eLinks will link you to the online full text of an article if UCB has paid for online access; otherwise, UC-eLinks will help you locate a print copy on the shelf in the library. If UCB doesn't own the article in print or online format, UC-eLinks can also help you order a copy from another library.
For more information, watch this video tutorial (about 4 min.)
You can also set up UC-eLinks to work with Google Scholar. For more information, watch this video tutorial (about 2 min.) | <urn:uuid:61f86099-fc1b-4956-94f2-7779fb6f43aa> | {
"date": "2013-05-23T19:01:12",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8929922580718994,
"score": 3.1875,
"token_count": 631,
"url": "http://www.lib.berkeley.edu/alacarte/course-guide/416-HIST101"
} |
What is pathology?
Pathology, or general pathology, is the medical specialty focused on the diagnosis of disease through analysis of blood, tissues or urine in a pathology lab. A division of pathology is anatomical pathology (study of organs and tissues to diagnose disease), which is broken into the following subspecialties: forensic pathology (determining cause of death), autopsy pathology (performing autopsies), surgical pathology, and cytopathology (study of diseases on the cellular level). Other subspecialties include clinical chemical pathology (study of antibodies, hormones, immune system and pharmacology), clinical pathology (working directly with patients), hematology (study of blood) and microbiology (study of bacteria, parasites and viruses).
Who are pathologists?
Pathologists are doctors who are concerned with the diagnosis of disease, as well as prevention and treatment. These specialists use a microscope or other diagnostic tools to look at blood, urine or other body fluid specimens and detect chemical makeup in the body. Based on the test results, he or she may recommend additional study of the specimen.
Pathologists typically work in a hospital or pathology lab, and may work in administrative roles supervising divisions of a clinical pathology lab. They may oversee special divisions of the lab, such as the blood bank, clinical chemistry, hematology, immunology and serology, and microbiology. Pathologists are certified by The American Board of Pathology.What types of specimens does a pathologist collect?
General pathology relates to the collection of a specimen or specimens for the diagnosis of disease. The types of specimens a pathologist may collect include:
Related Articles:Do It Yourself Lab Tests New Sensor Could Replace Finger-Prick Testing
- Blood – Usually drawn from a vein through a needle in the forearm, or sometimes pricked from a finger.
- Urine – The “random method” is when a patient urinates into a cup; “clean catch specimen” takes a sample of urine after the outer genital area has been sanitized; and a “sterile urine test” requires catheterization (a tube inserted through the urethra into the bladder to take a sample of urine). Sometimes the patient will need to undergo several urine tests to measure changes in urine over time.
- Sputum (phlegm) – Samples are taken from sputum that has been coughed into a clean container.
- Feces – Collected by the patient into a clean plastic or cardboard container.
- Other bodily fluids– Spinal fluid, pleural fluids (lung or pleural cavity fluids), abdominal fluids, joint fluids.
- Tissue – Obtained from any organ in the body such as liver, bone, brain, skin, intestines, etc. | <urn:uuid:99738d1c-fd7d-41eb-804d-b058229aef73> | {
"date": "2013-05-23T19:06:20",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9197807312011719,
"score": 3.859375,
"token_count": 570,
"url": "http://www.lifescript.com/doctor-directory/pathology/arvada-colorado-co-john-j-temple-md.aspx"
} |
The term Unix-like is widely used to describe operating systems that share many of the characteristics of the original UNIX, which was written in 1969 by Ken Thompson at Bell Labs, and its early successors.
The popularity of this term is mainly due to the fact that it is a very convenient and logical way of describing the numerous and diverse operating systems that fit into this category. It is also due in part to the controversy about what really is UNIX and how this term should be used. This controversy, in turn, has arisen largely as a result of the complex history of UNIX and the operating systems that have been based on it.
The category of Unix-like operating systems clearly includes those systems that have all three of the following characteristics: a direct source code lineage from the original UNIX, obvious UNIX characteristics and officially describe themselves as being UNIX. Source code is the version of software as it is originally written (i.e., typed into a computer) by a human in plain text (i.e., human readable alphanumeric characters). Such systems include AIX (developed by IBM), HP-UX (developed by HP), IRIX (developed by Silicon Graphics), Solaris (developed by Sun Microsystems) and True64 (developed by Compaq for alpha processors and now owned by HP).
The category of Unix-like operating systems also includes UNIX clones. A clone is a program (i.e., an operating system or an application program) that has functions and behavior similar to another program but which does not contain source code from that program.
The functions and behavior of the UNIX clones are so similar to those of the early (and later) versions of UNIX, in fact, that many knowledgeable users consider them to be UNIX. However, they do not have a direct lineage to the original UNIX source code, and most of them do not officially describe themselves as being UNIX. This category includes the BSDs (i.e., FreeBSD, NetBSD, OpenBSD and Darwin), Linux, MINIX, QNX and Cygwin.
Unix-like operating systems also generally contain most or all of the enhancements and new features that were subsequently added at the University of California at Berkeley (UCB) and which are known as the Berkeley extensions. The Berkeley extensions include such now nearly universal innovations as the C shell, also referred to as csh, TCP/IP (transmission control protocol/Internet protocol), which forms the basis for both the Internet and most local networks, virtual memory, which allows a hard disk drive (HDD) to simulate additional main memory, and the vi text editor. Thus, it has been suggested that operating systems that refer to themselves as UNIX might more appropriately call themselves something such as UNIX/Berkeley.
BSD (Berkeley Software Distribution), the version of UNIX developed at UCB in the 1970s and early 1980s, was widely considered to be a type of UNIX, as are its modern day descendants. In fact, BSD even included UNIX in its name, such as BSD UNIX 4.0, which was released in October 1980.
The original name for the operating system developed at Bell Labs was UNIX (all upper case). This term became a trademark that was eventually acquired by The Open Group, an industry consortium that was formed in 1996. The Open Group attempts to permit operating systems to call themselves UNIX only if they both conform to its Single UNIX Specification and pay a substantial fee (which is one of its main sources of revenue). Thus, at least theoretically, an operating system would not have to contain any of the original UNIX source code or bear much superficial resemblance to the original UNIX to be permitted to call itself UNIX.
Adding to the complexity of the situation is the fact that there is some controversy as to whether the term UNIX is actually a valid trademark. This is because trademark law states that when a term becomes very widely used as a generic term (i.e., a term that describes a class of products rather than just a single brand) it can lose its legally protected trademark status.
Apple Computer, which uses Darwin (a Unix-like operating system based on BSD) as the core of its increasingly popular Mac OS X operating system, claims that the term UNIX has become generic and thus that it is not a legally valid trademark. Apple has vastly greater legal and financial resources than the BSDs or most of the Linux distributions (i.e., versions), and thus it is not afraid to call its operating system UNIX. In fact, it makes a number of statements on its website explicitly referring to itself as UNIX (and not as Unix-like), including the following: "Don't let its elegant and easy-to-use interface fool you. Beneath the surface of Mac OS X lies an industrial-strength UNIX foundation hard at work to ensure that your computing experience remains free of system crashes and compromised performance."
As a result, the Open Group is suing Apple Computer for alleged trademark violation. This is a necessary move for the Open Group, as attempting to protect a trademark from abuse can be an important factor in legal decisions about the validity of the trademark. However, some industry observers expect that this case will be settled quietly out of court because neither side wants to risk a negative judgment1.
The BSD operating systems are widely regarded as free (both in a monetary sense and with regard to use) implementations of UNIX, and thus as UNIX. However, in contrast to Apple, they make a point of not referring to themselves as being UNIX on their websites or other materials in order to avoid potentially costly legal problems. For example, FreeBSD, the most popular of the BSD systems (at least until the recent rise of Darwin), describes itself as being " . . . a very economical alternative to commercial UNIX® workstations." NetBSD describes itself on its homepage as " . . . a free, secure, and highly portable Unix-like Open Source operating system available for many platforms, . . . " OpenBSD describes itself as " . . . a FREE, multi-platform 4.4BSD-based UNIX-like operating system."
Some operating systems do not seek UNIX branding because the royalties would be prohibitively expensive for them due to the facts that they are updated frequently (which would require costly recertification) and that they are made available freely over the Internet. Moreover, developers of such systems generally feel that such branding would not provide any significant advantage, as their users are generally well informed and are interested in the intrinsic values of the systems rather than in their names.
The term Unix-like does not have any negative implication about the validity of the UNIX trademark. In fact, it could even be argued that it supports the trademark by providing a convenient term for describing operating systems that resemble the original UNIX and its early successors so that they, and their users, will not be tempted to inappropriately use the term UNIX.
Other terminology is also sometimes used to refer to Unix-like operating systems, particularly UN*X, Un*x, *NIX and *nix.
Created April 19, 2005. Updated June 18, 2006. | <urn:uuid:7b1c054f-8032-42b9-949c-4ed73394b7ec> | {
"date": "2013-05-23T18:52:11",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9685171842575073,
"score": 3.671875,
"token_count": 1484,
"url": "http://www.linfo.org/unix-like.html"
} |
Papal Primer: History's 10 Most Intriguing Popes
Pope Benedict XVI announced his resignation in February, citing his deteriorating mental and physical health
CREDIT: Jeffrey Bruno | Shutterstock.com
Pope Benedict XVI made headlines today (Feb. 11) when he announced he was stepping down — something no pope has done since the Middle Ages. While that's big news, the Catholic Church has seen much more dramatic upheavals.
From a cadaver on trial to a three-timing pope, here are 10 of the most interesting church fathers in history.
The first head of the Catholic Church was St. Peter. Peter, whose original name was Simon, was one of Jesus' 12 apostles, according to John Julius Norwich in his book "Absolute Monarchs: A History of the Papacy" (Random House, 2012). He preached throughout Asia Minor before coming to Rome, where he lived for 25 years, when Emperor Nero Augustus Caesar crucified him. Legend has it that he sought to be crucified upside down, deeming himself too low to share in the same death as Jesus. Though now considered the first pope, he never officially took that title during his lifetime. [Photos: Gladiators of the Roman Empire]
The first pope to step down was Pontian, who headed the church from A.D. 230 to 235. Unlike many of his predecessors, Pontian wasn't martyred, but rather was sentenced to hard labor in the Sardinian mineral mines by Emperor Maximus the Thracian who was persecuting Christians, particularly heads of church. The pope voluntarily abdicated to prevent the church from having a power vacuum, according to the Catholic Encyclopedia.
The next hundred years was rough for the Catholic Church, with persecution of Christians and martyrdom for several of the church heads. But in A.D. 313, Emperor Constantine officially put an end to Christian persecution. Pope Sylvester I was the first pope to live in this less dangerous world, but when Constantine arranged the Council of Nicea to sort out official Christian doctrine, Sylvester chose to sit it out, sending underlings instead, according to "Absolute Monarchs: A History of the Papacy." The Nicene Creed is now considered the first official statement of belief for Christians.
Pope Leo I, who reigned from A.D. 461 to 468, may have been most famous for work he did before ascending to the papacy: The former aristocrat and then bishop convinced the feared Attila the Hun not to sack Rome. It's possible Leo offered Attila a pile of loot, or the warlord used the meeting as an excuse to turn back, given his own strategic concerns.
Another possibility is that the pope may have played on Attila's superstitious fear of dying soon after the sacking, just as Alaric I (king of a tribe of Goths) did after the despoiling of Rome decades earlier, according to "Absolute Monarchs: A History of the Papacy." [Saint or Spiritual Slacker? Test Your Religious Knowledge]
Cadaver on trial
Pope Formosus headed the Catholic Church from A.D. 891 to 896, and his reign was marked by political battles and infighting. He was excommunicated about 20 years prior to his reign, but then later absolved. After his death, his cadaver was exhumed, put on trial, and judged to be unworthy of the papacy. All of his papal edicts were deemed invalid, the fingers he used to make sacraments were ripped off, and he was tossed into the Tiber River.
The current pope isn't the only Benedict to have stepped down. During a tumultuous time in the Catholic Church's history known as the saeculum obscurum (sometimes called the Rule of the Harlots), the popes engaged in corrupt venal behavior and were too closely allied to one aristocratic family. Fed up, the people in Rome raised Benedict V to the highest position in A.D. 964. But the founder of the Holy Roman Empire, King Otto, wasn't having it: He elected an antipope, Leo VIII, instead. Benedict V chose to step down a few months after being elected. (At this chaotic time, it wasn't unheard of to have two popes elected.)
The next Benedict, Benedict VI, also faced an ignominious end to his reign: When King Otto died in 974, Benedict VI was imprisoned and put to death by his antipope successor.
Another Benedict, Pope Benedict IX, had three runs at the papacy. The ne'er-do-well ascended to the highest office in 1032 as a result of family connections at the tender age of 20, according to the Catholic Encyclopedia. The ruler reportedly lacked all moral balance and led a dissolute life. In 1044, the city of Rome elected an antipope (a second pope). Benedict IX drove out the antipope, but then stepped down — only after selling the papacy to yet another priest. Before he died, he seized the highest office one more time, but Benedict IX's final stint was short lived.
One legend has it that from A.D. 855 to 877, a Pope John who reigned may have actually been a woman. The story, recounted by a Dominican monk named Martin in 1265 and several others, claims that Pope John was a girl who was brought to Athens in men's clothing, according to "Absolute Monarchs: A History of the Papacy." She took up study and became a master of learning, the story goes, but became pregnant and gave birth in a church procession. However, the chaos at the time and the discrepancies between different stories suggests this "Pope Joan" may never have existed.
Many of the men who have been chosen for the highest office didn't get a chance to do much with it. Pope-elect Stephen was elected in A.D. 752, but died just a few days later, without being consecrated into office. Pope Damasus II ascended to the papacy in 1048, after several political squabbles, but passed away just 23 days later. Celestine IV, who was elected in 1241, died just 16 days later — too early for his coronation. And Pope Urban VII, at 12 days in A.D. 1590, was the shortest-reigning pope in the Catholic Church's history.
The Catholic Church has also had several periods where no pope reigned. These gaps, known as interregnums, usually occurred when the cardinals who vote for the pope were deadlocked.
The last pope to abdicate, Pope Gregory XII, was elected in 1406, more than 600 years ago. A man noted for his piety, he was originally elected to end the schism that occurred after Pope Innocent VII died, according to the Catholic Encyclopedia. Gregory XII was one of three popes to rule at the time, and the ensuing chaos must have convinced him it was time to quit. He eventually convened a council to sort out the mess, and abdicated in 1415.
MORE FROM LiveScience.com | <urn:uuid:1b3d6a1c-1a58-454c-aeb1-98f3de99fba1> | {
"date": "2013-05-23T18:31:24",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9829252362251282,
"score": 3.0625,
"token_count": 1478,
"url": "http://www.livescience.com/27006-10-most-interesting-popes-benedict.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Livesciencecom+%28LiveScience.com+Science+Headline+Feed%29"
} |
Earth from Space: Easter Island
Easter Island as seen by astronauts aboard the International Space Station on Sept. 25, 2002.
On Easter Sunday in 1722, Dutch explorer Jacob Roggeveen became the first known European to encounter this Polynesian island and gave it the name it has become most widely known by.
Easter Island (also known as Rapa Nui in the native language) is one of the most isolated spots on Earth, lying some 2,000 miles from the nearest areas of human habitation (Tahiti and Chile) — even more remote than the astronauts orbiting at 210 nautical miles above the Earth.. The island, which is only 15 miles long, was annexed by Chile in 1888. (In Spanish, it is called "Isla de Pascua," which means "Easter Island.")
Archaeological evidence suggests that Polynesians from other Pacific Islands discovered and colonized Easter Island around the year 400.
The island and its early inhabitants are best known for the giant stone monoliths, known as Moai, placed along the coastline.
It is thought that the population grew bigger than was sustainable on the small island, resulting in civil war, deforestation and near collapse of the island ecosystem . Today, a new forest (primarily eucalyptus) has been established in the center of the island (the dark green in the image), according to a NASA statement.
Volcanic landforms dominate the geography of the island, including the large crater Rana Kao at the southwest end of the island and a line of cinder cones that stretch north from the central mountain. Near Rana Kao is the longest runway in Chile, which served as an emergency landing spot for the space shuttle before its retirement in 2011.
MORE FROM LiveScience.com | <urn:uuid:02e8e579-65c8-4c0a-b405-7a29e289fea9> | {
"date": "2013-05-23T19:06:26",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9662283658981323,
"score": 4.09375,
"token_count": 370,
"url": "http://www.livescience.com/31329-easter-island-image.html"
} |
High blood pressure, or hypertension, affects almost one in three adults in the United States. However, this serious health condition isn't limited to just those ages 18 and older.
The number of children and adolescents with high blood pressure is increasing. This rise can be partly blamed on the increasing number of overweight and obese children.
High blood pressure is a major risk factor for heart disease and is the primary risk factor for stroke. Prehypertension is a condition that increases a child's risk of developing high blood pressure in the future. Children with hypertension have a higher risk for high blood pressure as adults. High blood pressure in childhood is also correlated with early development of atherosclerosis in adulthood.
Systolic pressure is the top number in a blood pressure reading and corresponds to the pressure in arteries when the heart contracts. Diastolic pressure is the bottom number in a blood pressure reading, and corresponds to the pressure in the arteries between heart beats, when the heart relaxes.
The American Academy of Pediatrics recommends that children ages 3 years and older have their blood pressure measured each time they see their health care provider for routine checkups. Normal blood pressure in children depends on their gender, age, and height.
Parents and health care providers encourage children with high blood pressure to make lifestyle changes, such as losing weight. Other changes may include increased exercise and improved diet. A doctor may also give a child prescription medication to help control blood pressure.
Regular exercise helps control weight and may keep blood pressure in check. Regular exercise means 30 to 60 minutes of moderate physical activity on most days. Sedentary activities should be limited to less than two hours a day.
A healthy diet for a child with prehypertension or high blood pressure includes fresh vegetables and fruits, additional fiber, and nonfat dairy products, as well as limited salt and sodium. The American Heart Association recommends a maximum daily sodium intake of 1,500 mg/day; however, this number may be lower, depending on your child's age and other health considerations. Please consult your child's pediatrician regarding the recommended sodium intake for your child. | <urn:uuid:83301d2b-55fc-46d7-9610-72e8d22fefa8> | {
"date": "2013-05-23T18:33:07",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9411967992782593,
"score": 3.890625,
"token_count": 427,
"url": "http://www.lnrmc.com/health-education/1,2650"
} |
South Korea (officially, Republic of Korea) encompasses an area of 98,477 sq. km. (38,022 sq. mi.), about the size of state of Indiana. Its capital is Seoul (population 10.3 million); other major cities are: Busan, Daegu, Inchon, Gwangju, Daejeon, and Ulsan. The terrain of South Korea consists of forested mountain ranges separated by deep, narrow valleys and cultivated plains along the coasts. South Korea is bordered by North Korea to the North and is surrounded by the Sea of Japan, Korean Strait, and Yellow Sea.
An independent Korean state or a collection of states has existed almost continuously for several millennia. Between its initial unification in the 7th century, until the 20th century, Korea existed as a single independent country. In 1905, following the Russo-Japanese War, Korea became a protectorate of imperial Japan, and in 1910 it was annexed as a colony. Korea regained its independence following Japan's surrender to the United States in 1945. After World War II, the Republic of Korea (ROK) was set up in the southern half of the Korean Peninsula. During the Korean War (1950-53), US troops and UN forces fought alongside soldiers from the ROK to defend South Korea from Democratic People's Republic of Korea attacks supported by China and the Soviet Union. An armistice was signed in 1953, splitting the peninsula along a demilitarized zone at about the 38th parallel.
After 1953, South Korea achieved rapid economic growth. In 1993, Kim Young-sam became South Korea's first civilian president, following 32 years of military rule. In June 2000, a historic North-South summit took place between South's President Kim Dae-jung and the North's leader Kim Jong Il.
The natural hazards facing South Korea consist of occasional typhoons bringing high winds and floods and low-level seismic activity. In 2004, South Korea's oil consumption was 2.149 barrels per day (bbl/day); its exports were 644,100 bbl/day and imports were 2.83 million bbl/day.
U.S. State Department Background Notes; CIA World Factbook, 2007/9; 2007/12 | <urn:uuid:3701a0ff-43ac-4036-b785-8394f1550363> | {
"date": "2013-05-23T19:05:32",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9560921788215637,
"score": 3.09375,
"token_count": 460,
"url": "http://www.loc.gov/today/placesinthenews/archive/2007arch/20071210_southkorea.html"
} |
Historical diversification of migration patterns in a passerine bird
Förlag: Society for the Study of Evolution
Migratory strategies of birds require complex orientation mechanisms, morphological adaptations, and life-history adjustments. From an evolutionary perspective, it is important to know how fast this complex combination of traits can evolve. We analyzed mitochondrial control-region DNA sequences in 241 blackcaps (Sylvia atricapilla) from 12 populations with different migratory behaviors. The sample included sedentary populations in Europe and Atlantic archipelagos and migratory populations with different distances of migration, from regional to intercontinental migrations, and different heading directions (due to a migratory divide in central Europe). There was no genetic structure between migratory and sedentary populations, or among populations from different biogeographic areas (Atlantic islands, the Iberian Peninsula, or the continent), however we found evidence of a genetic structure when comparing populations located on either side of the migratory divide. These findings support an independent evolution of highly divergent migratory strategies in blackcaps, occurring after a postglacial colonization of the continent along western and eastern routes. Accordingly, mismatch-distribution analyses suggested an expansion of blackcaps from a very small population size, and time estimates dated such an expansion during the last postglacial period. However, the populations in Gibraltar, located in a putative Mediterranean refuge, appeared to be independent of these processes, showing evidence of restricted gene flow with other populations and demonstrating insignificant historical changes in effective population size. Our results show that the interruption of gene flow between migratory and sedentary populations is not necessary for the maintenance of such a polymorphism, and that even the most divergent migratory strategies of a bird species are susceptible to evolution in response to historical environmental changes.
- Biology and Life Sciences
- Molecular Ecology and Evolution Lab
- ISSN: 0014-3820 | <urn:uuid:45ee2487-eb43-419e-9772-0b745f90bff8> | {
"date": "2013-05-23T19:00:13",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8422442078590393,
"score": 3.3125,
"token_count": 384,
"url": "http://www.lu.se/lup/publication/136904"
} |
Arts and Artisans of Early 19th-Century Portland
Text by William David Barry and John Mayer
Images from Maine Historical Society, the Maine State Museum
Portland's growth began in 1786 when citizens changed the name of the town from Falmouth Neck.
Between then and the middle of the nineteenth century, the footprint of the city as it exists today was established, a maritime economy flourished, and the population increased dramatically.
Newly enriched merchants and community leaders from Portland's middle and upper classes provided support for itinerant and local artisans.
By the early nineteenth century, products made by native born and locally trained artists replaced those of itinerants and the work of these Portland artisans found their way into private home and influenced the efforts of students, teachers, and performers in city schools, theaters, and academies.
The demand for the arts helped native born and locally trained decorative painters, gilders, silversmiths, potters, furniture and cabinetmakers, tinsmiths, and other artisans thrive in Portland in the early nineteenth century.
Fashionable costumes and stately poses rendered with care and emphasis provide a visual sense of the personal style and stature of the period.
Finely crafted furniture made with exotic or colorful materials illustrate changes over time in taste, design, and craftsmanship.
These works represent the distinctive nature of the arts and artisans of Portland.
This two-part online exhibit is based on an exhibit featured from June to December 2005 at the Maine Historical Society Museum. The exhibit was sponsored by Noyes & Chapman Insurance, Maine Employers Mutual Insurance Co. and the Phineas W. Sprague Memorial Foundation.
Click on the links below the images to view Part I: Early Years; and Part II: Arts Flourish in Portland. | <urn:uuid:458d9a2b-59cc-49a1-9b3e-908fc2da2ef3> | {
"date": "2013-05-23T18:59:28",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9332185387611389,
"score": 2.875,
"token_count": 371,
"url": "http://www.mainememory.net/sitebuilder/site/166/page/425/display?use_mmn="
} |
Talking About Economic Troubles
Download MP3 (Right-click or option-click the link.)
I'm Susan Clark with the Special English program WORDS AND THEIR STORIES.
In the nineteen thirties, a song, "Brother, Can You Spare a Dime?," was very popular in the United States. It was the time of the big Depression. The song had meaning for many people who had lost their jobs.
A dime is a piece of money whose value is one-tenth of a dollar. Today, a dime does not buy much. But it was different in the nineteen thirties. A dime sometimes meant the difference between eating and starving.
The American economy today is much better. Yet, many workers are concerned about losing their jobs as companies re-organize.
Americans have special ways of talking about economic troubles. People in businesses may say they feel the pinch. Or they may say they are up against it. Or, if things are really bad, they may say they have to throw in the towel.
A pinch is painful pressure. To feel the pinch is to suffer painful pressure involving money.
The expression, feel the pinch, has been used since the sixteenth century. The famous English writer William Shakespeare wrote something very close to this in his great play "King Lear."
King Lear says he would accept necessity's sharp pinch. He means he would have to do without many of the things he always had.
Much later, the Times of London newspaper used the expression about bad economic times during the eighteen sixties. It said, "so much money having been spent ... All classes felt the pinch."
Worse than feeling the pinch is being up against it. The saying means to be in a lot of trouble.
Word expert James Rogers says the word "it" in the saying can mean any and all difficulties. He says the saying became popular in the United States and Canada in the late nineteenth century. Writer George Ade used it in a book called "Artie." He wrote, "I saw I was up against it."
Sometimes a business that is up against it will have to throw in the towel. This means to accept defeat or surrender.
Throwing in the towel may mean that a company will have to declare bankruptcy. The company will have to take legal steps to let people know it has no money to pay its debts.
Word expert Charles Funk says an eighteen seventy-four publication called the Slang Dictionary explains throwing in the towel. It says the words probably come from the sport of boxing, or prizefighting. The book says the saying began because a competitor's face was cleaned with a cloth towel or other material. When a boxer's towel was thrown, it meant he was admitting defeat.
Most businesses do not throw in the towel. They just re-organize so they can compete better.
This WORDS AND THEIR STORIES was written by Jeri Watson. I'm Susan Clark. | <urn:uuid:35e3dfde-f26f-46fa-8fb9-6e39068eaed8> | {
"date": "2013-05-23T18:38:01",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9855287075042725,
"score": 3.09375,
"token_count": 610,
"url": "http://www.manythings.org/voa/words/36.html"
} |
Frilled Sharks, Chlamydoselachus anguineus
Taxonomy Animalia Chordata Elasmobranchii Hexanchiformes Chlamydoselachidae Chlamydoselachus anguineus
Description & Behavior
Frilled sharks, Chlamydoselachus anguineus (Garman, 1884), aka frill sharks, frill-gilled sharks, Greenland sharks, scaffold sharks, and silk sharks are members of the most ancient frill and cow sharks order, Hexanchiformes. Hexanchiform sharks have a single dorsal fin, either six or seven gill slits (versus the 5 found in all other existing sharks), and no nictitating membranes (protective third eyelids). The frilled shark, Chlamydoselachus anguineus, is currently one of only two known species of frilled sharks. The southern African frill shark, C. africana, was recently discovered (2009) off southern Angola, Namibia and South Africa. They are both very different in other ways from the cow sharks and are likely to be moved to their own order Chlamydoselachiformes in the near future.
Frilled sharks, Chlamydoselachus anguineus, are deepwater eel-like sharks that reach lengths up to 2 m and are thought to reach sexual maturity when they are 1.35 to 1.5 m long. They are dark brown or gray in color above, sometimes lighter below, and have six pairs of "frilly" gill slits where the first gill slit is joined under their jaws forming a sort of collar. Frilled sharks' heads are broad and flattened with short, rounded snouts. Their nostrils are vertical slits, separated into incurrent and excurrent openings by a leading flap of skin. The moderately large eyes are horizontally oval (like a cat's).
Their mouth is located at the leading edge of their snout (terminal) rather than underneath like most sharks and they have small tricuspid teeth in both jaws. Their rows of teeth are rather widely spaced, numbering 19–28 teeth in their upper jaws and 21–29 teeth in their lower jaws. Each tooth is small, with three slender, needle-like cusps alternating with two cusplets. Their very long jaws are positioned terminally (at the end of the snout), as opposed to the underslung jaws of most sharks.
They have a small lobe-like dorsal fin set far back over their pelvic fins with an anal fin that is larger than their dorsal fin. Their pectoral fins are small and paddle-shaped and their very long caudal fin (tail fin) has a small ventral lobe and without a subterminal notch.
Frilled sharks also have a pair of thick skin folds of unknown function (possibly to help allow for expansion when digesting larger prey) running along their bellies, separated by a groove, and their midsections are relatively longer in females than in males.
Frilled shark differs from their southern African relative, C. africana, by having more vertebrae (160–171 vs 147) and more turns in the spiral valve intestine (35–49 versus 26–28), as well as differences in various proportional measurements such as a longer head and shorter gill slits. The maximum known length is 1.7 m for males and 2.0 m for females.
Frilled sharks are highly specialized for life in the deep sea with reduced, poorly-calcified skeletons and enormous livers filled with low-density lipids, which allows them to maintain their position in water with little effort. They are also one of the few sharks with an "open" lateral line, in which the mechanoreceptive hair cells are positioned in grooves that are directly exposed to the surrounding seawater. This configuration is thought to be the most primitive in sharks and may enhance their sensitivity to minute movements of prey in their proximity.
Many frilled sharks are found with the tips of their tails missing, probably from predatory attacks by other shark species.
These sharks, or a proposed giant relative, have been suggested as a source for reports of sea serpents.
World Range & Habitat
Frilled sharks, Chlamydoselachus anguineus, are an uncommon "primitive" shark species typically found near the sea floor in waters over outer continental and island (insular) shelves and upper slopes, usually at depths between 120 and 1,280 m but up to 1,570 m and occasionally even at the surface.
Frilled sharks are thought to have a wide though patchy distribution (74°N - 58°S, 169°W - 180°E) in the Atlantic and Pacific Oceans. In Suruga Bay, Japan they are most common at depths between 50 m and 200 m.
In the western Indian Ocean they are found off South Africa as C. africana. In the western Pacific, frilled sharks are known to live off Japan and south to New Zealand, New South Wales and Tasmania in Australia. In the eastern/central Pacific they have been observed off Hawaii, southern California to northern Chile. Frilled sharks have also been observed in the eastern Atlantic from waters off northern Norway to northern Namibia, and possibly off the eastern Cape of Good Hope in South Africa.
In the central Atlantic, they have been caught at several locations along the Mid-Atlantic Ridge, from north of the Azores to the Rio Grande Rise off southern Brazil, as well as over the Vavilov Ridge off West Africa. In the western Atlantic, it has been reported from off New England, Georgia, and Suriname.
Feeding Behavior (Ecology)
Frilled sharks, Chlamydoselachus anguineus, feed on cephalopods (mainly squid), other sharks, and bony fishes. Feeding behavior has not yet been observed by this weak-swimming species, though they are thought to capture active, fast-moving squid by taking advantage of injured squid or those that are exhausted and dying after spawning. Alternatively, they may surprise their prey by curving their body like a spring, bracing themselves with rear positioned fins, and launching quick strikes forward like a snake. They may also be able to close their gill slits creating negative internal pressure to suck prey quickly into their mouth. They have many small, sharp, rear-pointing (recurved) teeth that function much like squid jigs which could easily snag the body or tentacles of a squid, particularly as they are rotated outwards when their jaws are protruded. Observations of captive frilled sharks swimming with their mouths open might also suggest that the small teeth, light against their dark mouths, may even fool squid into attacking and entangling themselves.
Using their long, extremely flexible jaws they should be able to swallow large prey (up to half its size!) whole, while their many rows of needle-like teeth would make escape essentially futile. Examining the length and articulation of their jaws appears to show that frilled sharks cannot deliver as strong a bite as more conventionally built sharks. Most captured individuals have been found with no or barely identifiable stomach contents, suggesting that they have a fast digestion rate and/or long intervals between feedings. One 1.6 m long individual, caught off Japan, was found to have swallowed an entire 590 g Japanese catshark, Apristurus japonicus. Squid comprise some 60% of the diet of these sharks in Suruga Bay and this includes not only slow-moving, deep-dwelling squid such as Chiroteuthis and Histioteuthis, but also relatively large, powerful swimmers of the open ocean such as Onychoteuthis, Sthenoteuthis, and Todarodes.
Frilled sharks, Chlamydoselachus anguineus, are aplacental viviparous (aka ovoviviparity) where the embryos emerge from their egg capsules inside their mother's uterus and are nourished by their yolk until birth. Frilled sharks' gestation period may be as long as three and a half years, the longest of any vertebrate. Between 2 and 15 young are born at a time (average is 6) measuring 40–60 cm long, and there appears to be no distinct breeding season (which is expected as these sharks inhabits depths at which there is little to no seasonal influence). Male frill sharks attain sexual maturity at 1.0–1.2 m long and females at 1.3–1.5 m. A possible mating aggregation of 15 male and 19 female frilled sharks was recorded over a seamount on the Mid-Atlantic Ridge.
Conservation Status & Comments
Frilled sharks, Chlamydoselachus anguineus, are listed as Near Threatened (NT) by the IUCN Red List: "A generally rare to uncommon deepwater species, with a few localities where it is taken more commonly as bycatch in several fisheries. Not an important target species, but a regular though small bycatch in many bottom trawl, midwater trawl, deep-set longline, and deep-set gillnet fisheries. As bycatch, this species is variously either used for meat, fishmeal, or discarded. Occasionally kept in aquaria (Japan). There is some concern that expansion of deepwater fisheries effort (geographically and in depth range) will increase the levels of bycatch. Although little is known of its life history, this deepwater species is likely to have very little resilience to depletion as a result of even non-targeted exploitation. It is classified as Near Threatened due to concern that it may meet the Vulnerable A2d+A3d+4d criteria."
On August 27, 2004, the first observation of this species in its natural habitat was made by the ROV Johnson-Sea-Link II, on the Blake Plateau off the southeastern United States (see the first photo above). On January 21, 2007, a Japanese fisherman discovered a 1.6 m long female alive at the surface, perhaps there because of illness or weakness from the warm water. It was brought to Awashima Marine Park in Shizuoka, where it died after a few hours (see the video above). Garman, and numerous authors since, have advanced the frilled shark as an explanation for sea serpent sightings. Because of the shark's modest size, some cryptozoologists have posited the existence of a giant relative, particularly as larger Chlamydoselachus species are known from the fossil record.
References & Further Research
Research Chlamydoselachus anguineus » Barcode of Life ~ BioOne ~ Biodiversity Heritage Library ~ CITES ~ Cornell Macaulay Library [audio / video] ~ Encyclopedia of Life (EOL) ~ ESA Online Journals ~ FishBase ~ Florida Museum of Natural History Ichthyology Department ~ GBIF ~ Google Scholar ~ ITIS ~ IUCN RedList (Threatened Status) ~ Marine Species Identification Portal ~ NCBI (PubMed, GenBank, etc.) ~ Ocean Biogeographic Information System ~ PLOS ~ SCIRIS ~ SIRIS ~ Tree of Life Web Project ~ UNEP-WCMC Species Database ~ WoRMS
Feedback & Citation
Find an error or having trouble with something? Let us know and we'll have a look!
Help us continue to share the wonders of the ocean with the world, raise awareness of marine conservation issues and their solutions, and support marine conservation scientists and students involved in the marine life sciences. Join the MarineBio Conservation Society or make a donation today. We would like to sincerely thank all of our members, donors, and sponsors, we simply could not have achieved what we have without you and we look forward to doing even more. | <urn:uuid:e5679202-a3e8-4aa9-8403-181d8b06bc4f> | {
"date": "2013-05-23T18:38:24",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9530429840087891,
"score": 3.484375,
"token_count": 2451,
"url": "http://www.marinebio.org/species.asp?id=1485"
} |
Ancient secrets of Merlin’s Barrow unearthed
The Wiltshire landscape around Avebury and Silbury Hill is at the heart of prehistoric Britain, and has World Heritage designation. Now another monument can be added to its archaeological treasures: the Marlborough Mound.
The Mound lies in the heart of the grounds of Marlborough College, and has been interwoven with local folklore for hundreds of years. The town’s motto, Ubi nunc sapientis ossa Merlini (‘Where now are the bones of wise Merlin?’), echoes the myth which convinced generations that Merlin’s bones were buried under the Mound. These were the seductive Arthurian legends that may have drawn the interest of Tennyson and William Morris back to their connections with Marlborough and its Mound – or ‘Merlin’s Barrow’, as the burghers of the town claimed.
Not only has the Mound stimulated some of the region’s most enduring threads of mythology, it has also been recognised as a feature of considerable historical significance. It was the motte on which the keep of Marlborough Castle was built fifty years after the Norman Conquest. Subsequently, it became the centrepiece of a major seventeenth century garden. The latest research, however, has extended its history back by three millennia.
Recent coring of the Mound at Marlborough College has produced four samples of charcoal, allowing radiocarbon dating for the first time. The samples, which came from different levels in the Mound, were taken from two bore holes through the height of the 19m monument, showing that it was built in the years around 2400 BC. This is the first positive evidence proving the theory that the castle motte is in fact a re-used prehistoric structure of the highest national standing.
Jim Leary, who led the recent archaeological investigations for English Heritage at the nearby Silbury Hill, and is co-author of the recently published ‘The Story of Silbury Hill’ coordinated EH’s contribution, which also included radiocarbon dating. He says, “This is an astonishing discovery. The Marlborough Mound has been one of the biggest mysteries in the Wessex landscape. For centuries people have wondered whether it is Silbury’s little sister; and now we have an answer. This is a very exciting time for British prehistory.”
The Master of Marlborough College is equally enthusiastic: ‘We are thrilled at the discovery of another aspect of our rich history, and one which can be added to the educational opportunities at the school.’
The work is part of a major conservation programme being undertaken by the Marlborough Mound Trust, specially formed at the invitation of the College. The chairman of the Trust says that ‘the inspiration for this was our founder Eric Elstob, a former pupil at the College, whose generous legacy has provided the means for this work. He would have been totally delighted by this news.’
Note: As part of the College grounds, the Mound is strictly on private property. For further details please contact: Donald Insall Associates, 7A Northumberland Buildings, Queen Square, BATH, BA1 2JB Telephone: 01225 469898 Email: email@example.com | <urn:uuid:62d5356e-39e3-4c93-b0e0-9ff2efbd820f> | {
"date": "2013-05-23T19:06:09",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9641839861869812,
"score": 3.25,
"token_count": 689,
"url": "http://www.marlboroughcollege.org/about-us/college-history/the-mound/"
} |
SHORT TALK BULLETIN - Vol.XI May, 1933 No.5
"Thou shalt not remove thy neighbor's landmark, which they of old have set in thine inheritance, which thou shalt inherit in the land the Lord thy God hath given thee (Deuteronomy XIX:14). The Masons "of old time set thine inheritance" (Masonry) certain fundamental principles which are named as "Landmarks" as early as the Constitutions of 1723.
Men have quarreled about the stone markers set up as boundaries for land ever since sections of the earth were claimed as property; in like manner have Masons differed about what are and what are not Landmarks of the Order. In this country particularly, with forty-nine Jurisdictions, each sovereign within its own territory, arguments about Landmarks are never ending. This Bulletin attempts not to settle any of these numerous controversies, but only to bring before the average Lodge Member some of the reasons why his neighbor's Masonic Landmarks may differ from those his own Grand Lodge may have set up for him to follow. In 1858 Albert Gallatin Mackey, the great Masonic jurist and authority, listed twenty-five fundamental principles as the true Landmarks of Freemasonry. Although critical scholarship has since riddled the list as to accuracy, Mackey's ideas of what constitute the essential qualities of a Landmark - antiquity, universality and irrevocability - are still respected. This definition excludes from the classification of Landmarks any principle which is any two of these but no the third, It is by his own standards that many critics have measured Mackey's Landmarks and found them wanting. As an example of what is meant; it is "ancient," in the sense that it was recognized in the "Constitutions" of the Grand Lodge in 1723, that a Grand Master appoints own Deputy Grand Master. But the practice is by no means universal. Lodges are now universally governed by Grand Lodges, but the practice has antiquity of only two hundred and sixteen years. According to Mackey's dicta, neither the manner of creating a Deputy Grand Master not the fundamental governing body of the Craft can be considered as Landmarks. A few principles are so universally recognized that they are freely admitted to be essentials, even in Jurisdictions which have no pronouncements as to the Landmarks. Belief in a Supreme Being, the Volume of sacred Law as a necessary part of the furniture of the Lodge, that a Masons must be a man are essentials all over the world, though not necessarily listed in all Jurisdictions. On the validity of certain principles all authorities agree, but differ as to their antiquity, universality and irrevocability. A substantial minority of American Grand Jurisdictions have Officially adopted Mackey's twenty-five Ancient Landmarks, but a majority either follow other compilations, use other Old Charges, or decline to specify what are and what are not the Landmarks of the Craft. The right and power of any Grand Lodge to determine for itself just what is and what is not "law" in its Jurisdiction is unquestioned. Therefore, when a Jurisdiction sets forth any list of Landmarks in its Code, they have all the force of Ancient Landmarks in that Jurisdiction, whether they are actually so or not. "Actually so" refers to inherent nature; that which cannot be altered by law, no matter what the lawmaking authority. The National Legislature has the undoubted "right" to enact a law that unsupported objects must fall. "Per contra," it then has the right to repeal the law of gravity, and forbid things to fall when no longer supported. But it has not the "power" to enforce, change or suspend the law of gravity! A Grand Lodge which says "Thus and such is an Ancient Landmark "in that Jurisdiction," give that pronouncement the full force and effect of an Ancient Landmark "in that Jurisdiction, but its edict does not "actually" make it such. One Jurisdiction follows Lockwood's list of nineteen landmarks, of which number 8 reads: "That every Lodge has an inherent right to be represented in Grand Lodge by its first three officers, or their proxies."
This is good Masonic law in most Jurisdictions, but not all; the Mason from this Jurisdiction (Washington, D.C.) who moves to New York or Texas and there affiliates finds that this is not a Landmark in either of these Jurisdictions, since neither New York not Texas admit Wardens to Grand Lodge.
In the General Assemblies of Ancient times each Mason, Craftsman or Entered Apprentice, represented himself. In Grand Lodges Masons are represented by their officers. Evidently a change has been made in the manner of governing the Craft. As a Landmark is not subject to change, this particular principle of law does not conform to Mackey's definition of a Landmark.
No wonder his neighbor's landmark is a matter of confusion to brethren from neighboring but differing Jurisdictions! Mackey's fourteenth Landmark asserts that every Mary Mason has the right of visitation. Just what is a "right?" Until that word is defined this so-called Landmark cannot be discussed intelligently. If it here means "power superior to all other powers," then it is merely nonsense. If it here means "privileged until a higher privilege overcomes it," how may it be considered to conform to the requirements of a Landmark?
Even so, how can the word "right" be translated "privilege?" A privilege may be withdrawn; an inherent right cannot! as many Jurisdictions rule on the "right of visit" in different ways - even those which have adopted Mackey's list - it can hardly be considered a true Landmark, "if" we judge by Mackey's own pronouncement on what constitutes a Landmark and "if" the word "right" means what it says. In some jurisdictions a Mason cannot visit without a good standing card; in others any member may object to any visitor and the Master must exclude; in still others, some Masters close the doors of their lodges to all visitors on election nights, and so on. Occasionally there is a conflict between ritual and Landmarks as adopted. A certain Jurisdiction lists fifty-four Landmarks, of which Number 18 reads: "Every Lodge, Grand or Subordinate, when lawfully congregated, must be regularly clothed, tyled and opened before it can proceed to work." Many other Jurisdictions agree that it is a Landmark that a Lodge must be "duly tiled." Our ancient brethren met on high hills and low vales to observe the approach of cowans and eavesdroppers. Did they "truly tile?" California Lodge No. 1 of the District of Columbia was chartered to go to California during the gold rush of 1849. Had that Lodge (now California No.1 on the register of the Grand Lodge of California) been wrecked going around the horn; had only the members of the Lodge, with their charter, been saved upon an otherwise uninhabited island; if they then held meetings with no tiler - since there were no cowans or eavesdroppers against whom to tile - would they have violated the so-called Landmark?
Many rituals give "three" as the irreducible minimum for a Master Mason's Lodge; a Lodge must have a Master and two Wardens. If under some strange circumstances, three and only three met as a Lodge, what becomes of the so-called Landmark which requires a Tiler? Secrecy undoubtedly conforms to the classification of the three essentials of a Landmark; but about "the means" of securing secrecy is at least room for argument.
Other Masonic laws, good where in force but not necessarily Landmarks, are Mackey's 8th: "The prerogative of the Grand Master to make Masons at sight" and the 11th Landmark of a Western Grand Lodge which reads: "Every person, to be made a Mason must be a man of lawful age, free born and; hale and sound, as a man ought to be." Several Grand Jurisdictions have enacted legislation preventing a Grand Master from convening an Emergent Lodge for the purpose of Making a Mason "at sight." Others consider that it is an inherent right of Grand Masters to convene Emergent Lodges (that is, give a certain number of brethren a dispensation to hold a Lodge) and that no law can take this right from him.
If a Landmark cannot be changed, and this "has been" changed, is it truly a Landmark, or merely a matter of common law? All will agree that no woman can be made a Mason. But what becomes of the "lawful age" provision in the face of the fact that Washington - and many another man - was made a Mason before he was twenty-one? He would be a daring debater who argued that the Father of His Country was not regularly and legitimately initiated. The "hale and sound" provision is by no means universal; many Jurisdictions stick to the strict letter of the "doctrine of the perfect youth" while others admit the lame and the halt under a Grand Master's dispensation, Worshipful Master's judgment or even Grand Lodge law relaxing restrictions in favor of men of the Army or Navy who had arms or legs shot off in the war!
A number of Grand Jurisdictions have never adopted any list or classification of Landmarks. The thought back of such absence of legislation may be understood from the following, from R.W. Charles C. Hunt, Grand Secretary and Grand Librarian of the Grand Lodge of Iowa.
"We hold that the power of the Grand Lodge of Iowa in the Jurisdiction of Iowa is limited only by the Ancient Landmarks. We do not attempt to make a list of the Landmarks. "We believe it as unnecessary to adopt an official list of scientific laws, such as the law of gravitation. The Landmarks. like scientific laws, are valid only in so far as they are true and their adoption by any so-called body has no effect whatever on their validity. Individual scientists may list what they conceive to be the laws of nature, but no scientific society would undertake officially to adopt these laws as the official laws of the science in which they are interested.
"The very definition of a Landmark is a fundamental law or principle of Masonry which no body of men or Masons can change or modify. Anything that can be adopted can be repealed. If a Grand Lodge has the power to adopt, it has the power to modify or repeal. It is the very fact that they unalterable that makes them similar to scientific laws which cannot be changed or altered by any man or body of men." Some authorities have attempted to formulate lists of Ancient Landmarks which no Mason would question. For instance, one very old Jurisdiction states that the Landmarks are:
a. Monotheism, the sole dogma of Freemasonry.
b. Belief in immortality.
c. The Volume of Sacred Law, an indispensable part of the furniture of a Lodge.
d. The legend of the Third Degree.
f. The symbolism of the operative art.
g. A Mason must be a freeborn male adult."
But then adds "The above list of Landmarks is not declared to be exclusive."
Dr. Joseph Fort Newton suggests five fundamentals on which all Masons can agree: "The Fatherhood of God, the brotherhood of man, the moral law, the Golden Rule and the hope of a life everlasting." Those who question these as Landmarks usually qualify by agreeing that they are teachings of the Order, but are in doubt as to just how old all of them may be, as such.
Dean Roscoe Pound, whose "Masonic Jurisprudence" is generally considered to be among the most profound analyses of Landmarks, thinks seven are unquestionable: (1) Belief in God; (2) Belief in the persistence of personality; (3) a Book of the Law as an indispensable part of the furniture of every Lodge; (4) The legend of the Third Degree; (5) Secrecy; (6) The symbolism of the operative art; and, (7) That a Mason must be a man free born and of age." Of thirty-nine Jurisdictions of our forty-nine, eighteen either have adopted, recognized or follow Mackey's list of twenty-five Landmarks; two use the Old charges, or Old Charges and General Regulations as Landmarks; eight have adopted, recognized or follow lists of Landmarks of their own, and eleven either have not adopted, do not recognize, or do not follow any special compilation of Landmarks, preferring to leave the question untouched. Reduced to a percentage basis, Mackey is followed in 46.1% plus of these thirty-nine Jurisdictions; Old charges and Regulations in 5.1%; own Landmarks in 20.5% plus and no special list in 28.2% plus. Obviously there is no universality of opinion as to what is and what is not a Landmark, and yet all Jurisdictions agree there "are" Landmarks.
Many "Laws of Nature" recognized in former times are believed in no longer; knowledge of science and of nature is in a state of flux. What appears to be the truth today may be the error of tomorrow. Possibly this is true also of our conception of the ancient Landmarks, and that no list of all those fundamentals of the Craft which are "actually" Landmarks is possible. Both that statement and this bulletin are without prejudice to the undoubted fact that in those Jurisdictions which have adopted any list of Landmarks, whether all inclusive or not, the principles there denominated as Landmarks have the force of Landmarks within the borders of those Jurisdictions. | <urn:uuid:7b76d64d-e9d9-4fc6-b749-956fbc1d26e7> | {
"date": "2013-05-23T18:39:11",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9577089548110962,
"score": 2.546875,
"token_count": 2870,
"url": "http://www.masonicworld.com/education/articles/thy_neighbor.htm"
} |
Here is a fun one,
There was a man who greatly enjoyed golf. He also could make a perfectly consistent swing. So out of curiosity he decided to challenge a mathematician. So first he brought the mathematician to a golf field, with his golf club, a tee, and a ball. He sets the ball on the tee, all ready to swing, and then he asks the mathematician, “Write me a formula where z is the total distance the ball will travel, assuming there is no wind, the ground is level, The ball starts one inch off the ground, and I hit it with x force at y angle, all before I hit the ball.” He then swings his club, hits the ball and much to his surprise the mathematician succeeds. Not only did the mathematician have a flawless formula, but he also had the shortest formula he could have possibly written. What was his formula?
Last edited by TheTick (2013-02-28 15:50:15) | <urn:uuid:070e6cdd-a083-43f2-9577-27e03e835620> | {
"date": "2013-05-23T19:05:31",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9858924150466919,
"score": 2.765625,
"token_count": 201,
"url": "http://www.mathisfunforum.com/viewtopic.php?pid=255533"
} |
DefinitionBy Mayo Clinic staff
CLICK TO ENLARGE
|Visual acuity test|
|Manual visual field testing|
A complete eye exam involves a series of tests designed to evaluate your vision and check for eye diseases. Your eye doctor may use a variety of instruments, shine bright lights directly at your eyes and request that you look through an array of lenses. Each test during an eye exam evaluates a different aspect of your vision or eye health.
- Pediatric eye evaluations. San Francisco, Calif.: American Academy of Ophthalmology. http://one.aao.org/printerfriendly.aspx?cid=2e30f625-1b04-45b9-9b7c-c06770d02fe5. Accessed Jan. 24, 2013.
- Comprehensive eye and vision examination. American Optometric Association. http://www.aoa.org/eye-exams.xml. Accessed Jan. 24, 2013.
- Clinical practice guidelines: Comprehensive adult eye and vision examination. St. Louis, Mo.: American Optometric Association. http://www.aoa.org/eye-exams.xml Accessed Jan. 24, 2013.
- Riordan-Eva P, et al. Vaughan & Asbury's General Ophthalmology. 18th ed. New York, N.Y.: The McGraw-Hill Companies; 2011. http://www.accessmedicine.com/resourceTOC.aspx?resourceID=720. Accessed Jan. 24, 2013.
- What is a doctor of optometry? American Optometric Association. http://www.aoa.org/x4891.xml. Accessed Jan. 24, 2013. | <urn:uuid:f4385a87-3762-4552-9e50-5589e339b22a> | {
"date": "2013-05-23T18:45:26",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.679851233959198,
"score": 2.921875,
"token_count": 355,
"url": "http://www.mayoclinic.com/health/eye-exam/MY00245"
} |
When exposed to cold temperatures, especially with a high wind chill factor and high humidity, or to a cool, damp environment for prolonged periods, your body's control mechanisms may fail to keep your body temperature normal. When more heat is lost than your body can generate, hypothermia, defined as an internal body temperature less than 95 F (35 C), can result.
Wet or inadequate clothing, falling into cold water and even not covering your head during cold weather can increase your chances of hypothermia.
Signs and symptoms of hypothermia include:
- Slurred speech
- Abnormally slow breathing
- Cold, pale skin
- Loss of coordination
- Fatigue, lethargy or apathy
- Confusion or memory loss
- Bright red, cold skin (infants)
Signs and symptoms usually develop slowly. People with hypothermia typically experience gradual loss of mental acuity and physical ability, so they may be unaware that they need emergency medical treatment.
Older adults, infants, young children and people who are very lean are at particular risk. Other people at higher risk of hypothermia include those whose judgment may be impaired by mental illness or Alzheimer's disease and people who are intoxicated, homeless or caught in cold weather because their vehicles have broken down. Other conditions that may predispose people to hypothermia are malnutrition, cardiovascular disease and an underactive thyroid (hypothyroidism).
To care for someone with hypothermia:
- Call 911 or emergency medical assistance. While waiting for help to arrive, monitor the person's breathing. If breathing stops or seems dangerously slow or shallow, begin cardiopulmonary resuscitation (CPR) immediately.
- Move the person out of the cold. If going indoors isn't possible, protect the person from the wind, cover the head, and insulate the individual from the cold ground.
- Remove wet clothing. Replace wet things with a warm, dry covering.
- Don't apply direct heat. Don't use hot water, a heating pad or a heating lamp to warm the person. Instead, apply warm compresses to the center of the body — head, neck, chest and groin. Don't attempt to warm the arms and legs. Heat applied to the arms and legs forces cold blood back toward the heart, lungs and brain, causing the core body temperature to drop. This can be fatal.
- Don't give the person alcohol. Offer warm nonalcoholic drinks, unless the person is vomiting.
- Don't massage or rub the person. Handle people with hypothermia gently because their skin may be frostbitten, and rubbing frostbitten tissue can cause severe damage.
- Mechem CC, et al. Accidental hypothermia in adults. http://www.uptodate.com/home/index.html. Accessed March 3, 2012.
- Corneli HM, et al. Clinical manifestations of hypothermia in children. http://www.uptodate.com/home/index.html. Accessed March 3, 2012.
- Ferri FF. Ferri's Clinical Advisor 2011: Instant Diagnosis and Treatment. Philadelphia, Pa.: Mosby Elsevier; 2011. http://www.mdconsult.com/books/page.do?eid=4-u1.0-B978-0-323-05611-3..00017-3--sc0285&isbn=978-0-323-05611-3&uniqId=321844243-3#4-u1.0-B978-0-323-05611-3..00017-3--sc0285. Accessed March 3, 2012.
- Hypothermia. The Merck Manuals: The Merck Manual for Healthcare Professionals. http://www.merckmanuals.com/professional/injuries_poisoning/cold_injury/hypothermia.html. Accessed March 3, 2012. | <urn:uuid:df6a67d6-62c2-4c01-9bbd-a0927b3efcc4> | {
"date": "2013-05-23T19:00:26",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.867378294467926,
"score": 3.953125,
"token_count": 828,
"url": "http://www.mayoclinic.com/health/first-aid-hypothermia/FA00017/rss=1"
} |
Blacks in metropolitan Hartford are slightly more segregated by neighborhood than Latinos, the census study found. But because blacks tend to be more segregated in U.S. cities and suburbs, metro Hartford's segregation ranking for blacks was significantly better - 24th of 43 - in 2000.
» The latest on traffic, delays and road construction delivered to your mobile phone. Click to sign up to receive text alerts!
The Hartford metropolitan area - a 58-town, 1.2 million person region - was the fourth most segregated among 36 metros for Latinos in 2000, trailing only Providence, New York and Newark, according to the census study. The study tracked the distribution of people across the nation's largest cities and suburbs between 1980 and 2000.
During that period , Hispanics grew more segregated in most U.S. metro areas the Census Bureau studied, probably because of rapid foreign immigration in those regions.
But Greater Hartford bucked that trend. Between 1980 and 2000, only three of the metro areas studied by the Census Bureau - San Antonio, Tampa-St. Petersburg, Fla., and Miami - experienced higher rates of Latino integration than Greater Hartford. In contrast, most Northeast metropolitan areas, including Providence, New York and Boston, saw significant increases in Latino segregation.
Fernando Betancourt, director of the legislature's Latino and Puerto Rican Affairs Commission, said economic advancement has given some Latinos access to new neighborhoods.
"Still, I am very aware of the incredible concentration of Latinos in urban areas, and how poverty correlates with that fact," he said.
And some experts argued that metro Hartford's relatively high Latino segregation standing is the more significant measure to consider than a modest trend toward integration.
"I just don't think this is one of the places that Latinos did very well," said John Logan, a sociologist at the State University of New York at Albany who studies segregation. "My reading of Hartford is that as the Hispanic population grew substantially in the last 20 years, it remained very highly segregated, unusually segregated."
In a state where public schools are organized along neighborhood lines and town boundaries, neighborhood residential segregation isn't just a moral issue. It's a legal and financial one - especially with Connecticut facing a budget crisis and the prospect that it may need to spend even more on school desegregation because of the Sheff vs. O'Neill case.
The state Department of Education says Connecticut has authorized more than $1 billion to facilitate school desegregation since the 1997 verdict favoring the plaintiffs in the 13-year-old Sheff case, which charged that segregation was preventing minority students from receiving an equal education. The Sheff plaintiffs say those remedies are not sufficient.
Neither side would comment on their discussions, nor on how much money could be at stake. But one lawyer for the plaintiffs said that while the progress in neighborhood segregation was good news, the pace of change was too slow to mean much for school integration.
"That's like waiting for the glaciers to melt to put out a fire," said Dennis Parker, of the NAACP Legal Defense Fund. "You need to do something more quickly."
While a few suburbs near Hartford have many more black and Latino residents than a decade ago, Parker said many of Hartford's outlying suburbs are not becoming significantly more diverse.
"In fact, having schools that are not racially and ethnically isolated may speed the process of housing change, because the composition of the schools has an effect on where people choose to live," Parker said.
The 2000 Census counted about 114,000 Hispanics and 106,000 blacks in the Hartford metro area.
Many Latinos are highly concentrated in relatively few neighborhoods, almost all of them in either Hartford or New Britain; while blacks are most highly concentrated in Hartford, Bloomfield and Windsor.
Blacks and Latinos are about equally likely to live in neighborhoods where their own ethnic group constitutes more than half the population. About 30 percent of Latinos live in mostly Latino areas; about 33 percent of blacks live in mostly black neighborhoods. | <urn:uuid:b977c7f1-4d64-4da0-833d-a9b1f217279d> | {
"date": "2013-05-23T18:54:56",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9665209054946899,
"score": 2.609375,
"token_count": 811,
"url": "http://www.mcall.com/topic/hc-stillseg1229.artdec29,0,4234501.story"
} |
Chromosomes are present in every cell of the body. These chromosomes carry the DNA information that defines many aspects of an individual's life. DNA evidence is used to determine if the individual will develop normally or not. There are a few genetic abnormalities that may be caught at an early stage of pregnancy. The tendency is to suggest that such pregnancies be terminated as they would only lead to the development of children who are born with abnormalities.
The karyotype test is used to collect the information needed relating to the health and functioning of the chromosomes. There are several steps that need to be followed in order to perform the karyotype test. The sample is collected from a newborn baby or from the amniotic fluid of a pregnant woman. The entire karyotype test procedure requires one week to be performed. This is because the cells need to be collected and then divided and allowed to grow. When these cells grow in the laboratory, the doctors can identify the necessary genetic information in order to make a diagnosis.
The actual process of collecting information from the chromosomes is complicated and requires extremely precise work. There is a specialized type of laboratory used for such testing. This is known as a cytogenetics laboratory. Cytogenetics is a relatively modern field of medicine. For this reason, one may not find a cytogenetics laboratory in every hospital. There are specialty hospitals that deal with issues relating to genetics. One needs to have the karyotype test done in such a location.
The chromosome karyotype test is conducted to identify a number of different genetic conditions. One such syndrome is Down's syndrome. One may also discover conditions such as Klinefelter syndrome, Philadelphia syndrome and Turner syndrome. All these conditions involve complications relating to the genetic makeup of cells. In order to understand these conditions further, one may speak with the doctor for clarifications.
There is no preparation required for the karyotype test. In fact, as far as the patient is concerned, the karyotype test takes less than a minute to perform. If the test is performed on a pregnant woman, then it will be done when she visits the clinic for a checkup. If the karyotype test is done on a new born baby, then it will be done in the hospital itself. Samples may then be transported to the appropriate laboratory capable of conducting the chromosome karyotype test. You could check with your doctor for the karyotype test cost as these rates would vary accordingly. Also it is of utmost importance that the karyotype test results be shown to your doctor for a proper interpretation. | <urn:uuid:c79fe98f-9e7f-4f22-b036-f8bf02a3c513> | {
"date": "2013-05-23T18:44:06",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9505125880241394,
"score": 3.34375,
"token_count": 525,
"url": "http://www.medicalhealthtests.com/medical-tests/karyotype-test.html"
} |
Women with heart disease are at greater risk than other women when going through a pregnancy, but most still have positive outcomes, a registry showed.
Compared with healthy pregnant women, those with structural or ischemic heart disease had higher rates of preterm birth (15% versus 8%), fetal death (1.7% versus 0.35%), and maternal mortality (1% versus 0.007%), but absolute rates remained relatively low, according to Jolien Roos-Hesselink, MD, of Erasmus Medical Center in Rotterdam, and colleagues.
The risks conferred by heart disease were magnified in women with cardiomyopathies and in those living in developing countries, the researchers reported online in the European Heart Journal.
However, they wrote, "most patients with adequate counseling and optimal care should not be discouraged and can go safely through pregnancy."
Because of a limited amount of data detailing the effects of heart disease on pregnancy outcomes, the European Society of Cardiology started the European Registry on Pregnancy and Heart Disease in 2007. The ongoing registry enrolls pregnant women who have valvular heart disease, congenital heart disease, ischemic heart disease, or cardiomyopathies.
For the current analysis, the researchers looked at data on 1,321 pregnant women who were enrolled from 60 hospitals in 28 countries from 2007 to 2011. The median age was 30.
Most of the patients (72%) were in New York Heart Association class I, and only 0.3% were in NYHA class IV.
The most frequent diagnosis was congenital heart disease (66%), followed by valvular heart disease (25%), cardiomyopathy (7%), and ischemic heart disease (2%).
The median duration of pregnancy was 38 weeks, and the median birth weight was 3,010 grams (6 pounds 10 ounces).
Thirteen of the mothers died -- seven from cardiac causes, three from thromboembolic events, and three from sepsis. The highest mortality rate occurred in patients with cardiomyopathy, who also carried higher rates of heart failure and ventricular arrhythmias.
"Cardiomyopathy is uncommon during pregnancy, but it is difficult to manage a pregnancy in the context of left ventricular dysfunction or peripartum cardiomyopathy with a high risk of an adverse outcome for both the mother and the baby," the authors noted. "Our study shows that more attention needs to be paid to this group."
During pregnancy, 26% of the women were hospitalized, a much higher rate than seen in healthy pregnant women (2%). More than one-third of the admissions (39%) were for heart failure; 31% were for obstetric reasons, including pregnancy-induced hypertension, vaginal bleeding, pregnancy-induced diabetes, and abortion/missed abortion; 21% were for cardiac reasons other than heart failure; and 9% were for other reasons.
The rate of cesarean delivery was significantly higher among the women with heart disease than has previously been seen in healthy pregnant women (41% versus 23%, P<0.001).
Fetal mortality beyond 22 weeks of gestation or when the fetus was greater than 500 grams (1 pound 2 ounces) occurred at a higher rate in the women with heart disease. Most of those cases (62%) were listed as intrauterine fetal death without any further information, 21% were attributed definitely to the mother's condition, and 17% were related to structural fetal abnormalities.
Neonatal mortality (within the first 30 days of life) occurred in 0.6%, a rate that was not significantly higher compared with historical controls (0.4%, P=0.27).
Women living in developing countries (185 of the registry patients) carried greater risks of both maternal mortality (3.9% versus 0.6%, P<0.001) and fetal mortality (6.5% versus 0.9%, P<0.001).
The authors noted that developed countries have much greater access than developing countries to optimal prenatal care and preconception counseling, even if it isn't used in all cases.
"This is a very complex issue, but if achievable, pre-conception counseling focusing on the severity of the heart disease with a clear statement of the consequences of pregnancy may save lives," they wrote.
The researchers acknowledged some limitations of the study, including the inability to perform extensive subgroup analyses because of small patient numbers, the fact that the input and quality of data was checked in only 5% to 10% of cases, and uncertainty about how representative the patient population is, considering the voluntary participation in the registry.
From the American Heart Association:
Primary source: European Heart Journal
Roos-Hesselink J, et al "Outcome of pregnancy in patients with structural or ischemic heart disease: results of a registry of the European Society of Cardiology" Eur Heart J 2012; DOI: 10.1093/eurheartj/ehs270. | <urn:uuid:67590eca-3da1-4574-b25c-3566d00461e4> | {
"date": "2013-05-23T19:06:31",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9523318409919739,
"score": 2.796875,
"token_count": 1022,
"url": "http://www.medpagetoday.com/OBGYN/Pregnancy/34726"
} |
An abdominal aortic aneurysm can develop in anyone, but is most often seen in males over age 60 who have one or more risk factors. The larger the aneurysm, the more likely it is to rupture and break open.
Aneurysms develop slowly over many years and often have no symptoms. If an aneurysm expands quickly, tears open (ruptures), or blood leaks along the wall of the vessel (aortic dissection), symptoms may develop suddenly.
The symptoms of rupture include:
Pain in the abdomen or back -- severe, sudden, persistent, or constant. The pain may spread to the groin, buttocks, or legs
Any one of these tests may be done when you're having symptoms.
If you have bleeding inside your body from an aortic aneurysm, you will have open abdominal aortic aneurysm repair.
If the aneurysm is small and there are no symptoms:
Surgery is rarely done if the aneurysm is small.
You and your doctor must decide whether the risk of having surgery is smaller than the risk of bleeding if you do not have surgery.
Your doctor may recommend checking the size of the aneurysm with ultrasound tests every 6 months to see if it is getting bigger.
Surgery is usually recommended for patients who have aneurysms bigger than 2 inches (5.5 cm) across and aneurysms that are growing quickly. The goal is to perform surgery before complications or symptoms develop.
There are two approaches to surgery:
In a traditional (open) repair, a large cut is made in your abdomen. The abnormal vessel is replaced with a graft made of man-made material, such as Dacron.
The other approach is called endovascular stent grafting. This procedure can be done without making a large cut in your abdomen, so you may get well faster. If you have certain other medical problems, this may be a safer approach. Endovascular repair is rarely done for a leaking or bleeding aneurysm.
The outcome is usually good if an experienced surgeon repairs the aneurysm before it ruptures.
When an abdominal aortic aneurysm begins to tear or ruptures, it is a true medical emergency. Less than 80% of patients survive a ruptured abdominal aneurysm.
Calling your health care provider
Go to the emergency room or call 911 if you have pain in your belly or back that does not go away or is very bad.
To reduce the risk of developing aneurysms:
Eat a heart-healthy diet, exercise, stop smoking (if you smoke), and reduce stress to help lower your chances of having a blocked artery again.
Your health care provider may give you medicine to help lower your cholesterol.
If you were given medicines for blood pressure or diabetes, take them as your doctor has asked you to.
People over age 65 who have smoked at any time in their life should have a screening ultrasound performed once.
Gloviczki P, Ricotta JJ II. Aneurysmal vascular disease. In: Townsend CM, Beauchamp RD, Evers BM, Mattox KL, eds. Sabiston Textbook of Surgery. 18th ed. Philadelphia, Pa: Saunders Elsevier; 2007:chap 65.
Greenhalgh RM, Powell JT. Endovascular repair of abdominal aortic aneurysm. N Engl J Med. 2008;358:494-501.
Lederle FA, Kane RL, MacDonald R, Wilt TJ. Systematic review: repair of unruptured abdominal aortic aneurysm. Ann Intern Med. 2007;146:735-741.
Braverman AC, Thompson RW, Sanchez LA. Diseases of the aorta. In: Bonow RO, Mann DL, Zipes DP, Libby P, eds. Braunwald's Heart Disease: A Textbook of Cardiovascular Medicine. 9th ed. Philadelphia, Pa: Saunders Elsevier; 2011:chap 60.
Shabir Bhimji, MD, PhD, Specializing in General Surgery, Cardiothoracic and Vascular Surgery, Midland, TX. Review provided by VeriMed Healthcare Network. Also reviewed by David Zieve, MD, MHA, Medical Director, A.D.A.M. Health Solutions, Ebix, Inc. | <urn:uuid:c4993df2-00d9-46ea-83cc-5abb08c8f432> | {
"date": "2013-05-23T18:31:04",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9047322273254395,
"score": 2.84375,
"token_count": 929,
"url": "http://www.mercyclinton.com/body.cfm?id=69&action=detail&AEProductID=Adam2004_5117&AEArticleID=000162&AEArticleType=Disease"
} |
See mail address, network address.
A unique number identifying a node on a network. There are only two types of Addresses; Hardware = OSI Layer 2 & Internet = OSI layer 3.
string Simple Street/Mailing address of referenced item - multiple address lines (if needed) are sequenced by "rank". THIS ELEMENT UNDER REVIEW FOR EXTENSION.
A location in a computer system, identified by a name, number, or code label.
(1) A number, character, or group of characters which identifies a given device or a storage location which may contain a piece of data or a program step. (2) To refer to a device or storage location by an identifying number, character, or group of characters.
Physical: A specific location in memory where a unit record, or sector, of data is stored. To return to the same area on the disc, each area is given a unique address consisting of three components: cylinder, sector and head. Memory: A unique memory location. Network interface cards and CPUs often use shared addresses in RAM to move data from each card to the PC's processor. The term can also refer to the unique identifier for a particular node in a network.
Otherwise known as a URL, the unique location of a Web page on the Internet. Can also mean your email address.
For Bluetooth, each Bluetooth device has built into its hardware a 48-bit device unique address.
Computer location where a particular item is stored.
A set of characters that identifies an individual network node.
IP address is a 32-bit numeric identifier assigned to a node. The address has two parts, one for the network identifier and the other for the node identifier. All nodes on the same network must share the network address and have a unique node address. For networks connected to the Internet, network addresses are assigned by the Internet Activities Board (IAB). Addresses also include IPX addresses, the internal network number and external network number, and the Media Access Control (MAC) address assigned to each network card or device.
A computer address is very different to a street address, but has the same function - a name for the place where other computers can find it "living".
A unique identity of each network station on a LAN or WAN.
A location of a web site or file on the Internet.
A unique memory location permitting reading or writing of data to/from that location. Network interface cards and CPUs often use shared addresses in RAM to move data between programs.
Words, numbers, symbols that designate a physical or virtual location. For example: street numbers and names, countries, e-mail addresses, URLs.
The location of a Web page on the internet, otherwise called a URL.
In the online world, the combination of letters, numbers, and/or symbols that will let you send e-mail to a particular person or organization.
The identification of a physical or virtual distinct entity in a network. On the Internet, this network address is called a URL (Uniform Resource Locator). For instance: http://www.gsh.org. [It is important to type these accurately.
The information in the header of a PDU that identifies the owner of the information in the payload. In connection-oriented protocols the address identified the virtual circuit number, and in connectionless protocols the address identifies the ultimate destination of the information.
location in primary memory where data or instructions are held temporarily; identification of a storage location
Similar to street addresses, computer addresses identify information's storage location on a computer or identify a node on a network.
(1) A number that identifies a particular location in the memory, a register, or other data source or depository. (2) The location of a terminal, peripheral device, node, or any other component in a network.
The series of letters or numbers that will take the user to a specific e-mail address or web site.
Characters that are used by a device to locate another device in a network. See also group address.
A number that specifies the location of a byte in memory.
The location of an Internet resource. An e-mail address may take the form of firstname.lastname@example.org. A web address looks similar to http://www.showtheworld.com.
In reference to the Internet, the name of a site that users can connect to, such as www.microsoft.com, or the address of an e-mail recipient, such as email@example.com. A typical address starts with a protocol name (such as ftp:// or http://) followed by the name of the organization that maintains the site. The suffix identifies the kind of organization. For example, commercial site addresses often end with .com.
the means by which a particular portion of a storage medium is identified absolute address the actual address of a location in the main store relative address the number to be added to the starting address ion order to produce the absolute address Return
A unique number or name assigned to all computers that are connected to the Internet. See also domain name and IP address.
An address is a unique identifier that determines the originating location of data or the destination of data being transmitted across a communication link. There is a distinction between a station's link address, a station's network address, and an individual process running on a station.
Normally refers to one's e-mail address which can be a series of letters and/or numbers, or when referring to a World Wide Web site, it is a URL.
Refers to a location in a storage medium. Addresses most frequently refer to a locations in RAM.
An Internet machine name or location, for example, www.prolifics.com.
A character string that uniquely identifies a memory location in a PLC, computer, or other programmable system.
The logical location of a terminal, node, peripheral device, or byte in memory in a network. The abbreviation for address is addr.
A name, label, or number identifying a register, location or unit where information is stored.
The address is the label given to the places in computer memory.
A specific location where data is stored in a memory; a numerical or alphabetical designation of the storage location of data.
the url of a Web page, such as http://www.anvil-graphics.com/.
The location of an Internet resource. An email address may take the form of firstname.lastname@example.org. A web address looks something like http://www.intellisoft.co.uk.
Address is the term used to refer to the physical location of any piece of information and the computer on which that information resides, on the Internet. Addresses are also used to define where electronic mail is sent to and from.
911 address-physical location; mailing address-owners location.
A unique network location used to identify a network object such as a database service, client, Interchange, or Names Server. TNS addresses have a specific format. Addresses must be unique. See TNS address and well known address.
An identifier defined and used by a particular protocol and associated software to distinguish one node from another.
A specific location in memory, designated either numerically or by a symbolic name.
A system just like a house or street address used for identifying a destination or location of information located on the internet. An example of a web address would be www.webct.com.
When used within the context of the Internet, an address refers to one of these pieces of information: Internet email addresses or a Web site address, called a Uniform Resource Locator.
Like a postal address, a "network address" is used to locate another user for the purpose of directing mail. On the Internet this is in the form: email@example.com.
Francis Street, Perth, Western Australia 6000
A label such as an integer or other set of characters which identifies a register, location of device in which information is stored.
either the address of a user of a system, as in an email address (required so that the message sent can be directed to the desired person), or the address of a site on the internet
a code or series of letters, numbers and or symbols by which the Internet identifies you or a location where information is stored
a data structure understood by a network which uniquely identifies the recipient
an identifier which is unique within the particular computing network to identify each device associated with the network
a numerical identifier for the topological location of the named entity
a numeric label for a specific location in memory
a place where a person or organization can be located and communicated with
a primary means to identify and locate a unique object
a unique number or group of characters that identifies a unique user or location on the Internet
a virtual liaison office, not the physical location of AMBAI/Ambai U's faculty and officials
see uniform resource locator (URL)
The location of a word of memory in RAM.
In data communication, the unique code assigned to each device, workstation, user, or multicast group connect to a network. See IP address.
A number uniquely identifying each node in a network.
A collection of letters and numbers that tell the world whosesite it is - cf URL.
The unique code by which the Internet identifies you (also referred to as URL). Most URLs contain three parts: the protocol, the host name, and the folder or filename.
(Network Address) Internet site address come in two forms: as a set of numbers such as 22.214.171.124 and alphanumeric such as nasa.gov (both of these represent the same address, and either could be used). An individual e-mail's address at this site, for example, John Glenn's, might look like this: firstname.lastname@example.org.
(referring to e-mail or network address) A unique combination of letters and/or numbers which identifies a person or location sought. Also referred to as a URL.
The location of an Internet resource. A web address looks something like http://www.stunik.com. An e-mail address may take the form of email@example.com.
Unique designation for a device on a network that lets other devices direct messages to it.
Identifies the author and supplies the author's mailing address.
A hexadecimal number that represents a location in storage or memory. Used to identify communication ports. To communicate with a storage device.
A string of characters used in cyberspace that allows users to identify themselves.
The unique code assigned to the location of a file in storage, a device in a unique system or network, or any other data source on a network.
An address is the name you need to either a) access an Internet site or b) send an email. An Internet site's address is also referred to as a URL and typically appears in the format www.address.com. Email, on the other hand, appears in the form of firstname.lastname@example.org and provides a unique identifier for your inbox so your mail can find you.
There are three basic types: Computer address: e.g. www.bournemouth.ac.uk E-Mail address: e.g. email@example.com URL:e.g. http://www.bids.ac.uk
Internet addresses help you find people or information on the Internet. People with e-mail addresses can have mail delivered right to their computer. It's a lot like your street address which tells the post office where to deliver letters. E-mail addresses usually look like this: firstname.lastname@example.org or email@example.com.
Either a personal/business address for email (i.e. firstname.lastname@example.org) or a Web site address, also called a URL (i.e. www.cincinnati.com)
The actual street listing associated with the Remediation Site. With city and zip, constitutes the complete physical address for the site.
In the context of the Internet, an address is the information a web browser needs to locate a particular website.
The location to which mail items are delivered. It consists of certain elements such as recipient name, street name and house number, city, state, and postal code as required by the type of mail.
location of an internet site.
a unique set of numbers that identifies a particular location in computer memory.
The location of an Internet resource. An email address may take the form of email@example.com. A web address looks something like http://www.geeksnet.com.
A unique name or number identifying a specific computer. Addresses are used in network communications in transmitting messages to a particular machine. You can address a particular person by associating their account with the address of the machine where they have the account. For example, the "john" in firstname.lastname@example.org is the account of an individual on the machine "reliant.c-cwis.siu.edu". This machine address is an IP (Internet Protocol) address. You must always have an IP address to use the Internet. IP addresses can also be expressed numerically, e.g., 126.96.36.199, which represents the same machine. The verbal names are simply easier for people to remember.
the number, street, city, and ZIP code on a letter that tell postal workers where to deliver it
The string of characters that you must give an electronic mail program to direct a message to a particular person. The term "Internet address" often refers to an assigned number, which identifies a host on this network.
A unique network location used to identify a client on a network. TNS addresses have a specific format. Addresses must be unique. See TNS address.
The address is the number which identifies a computer on the internet.
The location of an Internet resource. An email address may take the form email@example.com. A web address looks something like http://www.metrac.org.
The numerical designation of a location in memory.
See either IP Address or Email Address.
Internet address is just like your home or apartment address, only it is in cyberspace. Once you have an Internet address, you have a place all your own on the Internet.
The location of a highway-rail grade crossing. There are three addressing systems that locate a highway-rail grade crossing: The local governmental street address The railroad milepost number The Federal DOT Crossing Number (See DOT Crossing Number and Milepost Number.)
a binary pattern used to select a location in memory. In this text, addresses are 16 bits wide.
The location of an Internet resource. An email address may be firstname.lastname@example.org, a web address shall look like http://www.funnyjobs.co.au
The location of a computer, file or peripheral device on a network.
A unique identifier for a communication endpoint.
This is a way of identifying a location on a network, and is used for email and Internet locations. Another term for a website address is URL which stands for Uniform Resource Locator.
The address identifies the location of a web page on the World Wide Web. This is also referred to as URL or Uniform Resource Locator.
a unique identifier used in sending data to a particular person or object. For example, an "IP address", "Mail address" or "Ethernet address".
In online terms this commonly refers to a particular machine or computer system connected to the Internet. Machine 'addresses' exist on the Internet for servers for e-mail sending and receiving, web page or web site access, and almost everything functioning on the Internet. Internet users encounter two important types of addresses: Web page addresses (more properly called URLS) and E-mail addresses (for sending e-mail to someone. E-mail addresses almost always contain an @).
Used for finding people, URLs, email, newsgroups.
The common descriptor that identifies a property. It usually includes a building number and street name.
The unique string of text that identifies the location of a web page on the World Wide Web.
An address on the Internet is described as a uniform resource locator, which can be used for any type of addressing, such as e-mails (mailto:email@example.com), web pages (http://www.news.com/) and ftp sites (ftp://ftp.netscape.com/pub/communicator). Instead of using domain names, it is also possible to use IP addresses. See also ftp, e-mail, IP, uniform resource locator, web page.
Refers to the email address of an individual or group, or the address of a site on the Internet. Site addresses are known as URLs.
A number identifying each individual locomotive and accessory decoder on a layout. When a controller is set to a particular address, only the decoder set to the corresponding address can read the instructions from the controller.
An address is a word or number that refers to a storage location or port.
On the Internet a unique name or number combination which identifies a user or system. Ex: "firstname.lastname@example.org" is the address of a user known as fozz. "xmission.com" is the address of the system called Xmission.
The memory location of a data item or procedure. The expression can represent just the offset (in which case the default segment is assumed), or it can be in segment: offset format.
The number of a particular memory or peripheral storage location. Like post office boxes, each byte of memory and each disk sector has its own unique address. Programs are compiled into machine language, which references actual addresses in the computer.
Code used to locate any person, website and/or file on the Internet. The format for email addresses is username@hostname, where username is your username, login name, or account number, and hostname is the name of the computer or Internet provider you use (e.g. AOL). Websites and files are also identified by a unique address, or URL (Uniform Resource Locator). EGS's URL, for example, is www.ellisgs.com.
An email address is composed of the following: email@example.com recipiant(username), @, location, domain
Unique identifier of a web page. URL (Uniformed Resource Locator) is more frequently used for this purpose.
a unique identifier for a computer or site online, usually a URL for a Web site or marked with an @ for an e-mail address. Literally, it is how one computer finds the location of another computer using the Internet.
The physical location of a variable in memory, addresses are stored as hexadecimal numbers and are usually not directly modified by the programmer.
in Organization, the mailing address of the organization (or person). Includes street number, name, city, state, zipcode, and count ry.
each web page on the Internet is assigned a unique recognizable address. Address is also known as URL (Uniformed Resource Locator).
See IP Address or E-Mail Address.
An address is the unique identifier you need to either a) access the services of an Internet site or b) send E-Mail. Another word for Internet site addresses is URL. Chances are you're already familiar with E-Mail addresses. They're in the form of firstname.lastname@example.org and provide a unique identifier for your in-box so your mail can find you. [See Also: URL
a unique combination of letters, numbers and other characters determining the recipient of an email message or the location of a computer on the Internet (e.g. a Web site).
A unique alphanumeric sequence used to identify a computer transmitting or receiving data. Also a location in memory.
The location of an Internet resource. An email address may take the form of email@example.com A web address looks something like http://www.slashtime.com
A unique name or number identifying a computer user or a computer. They are used in network communication in transmitting messages to a particular machine or person.
In Internet Explorer, an address is the location of a Web page. Addresses can be used to identify Web site, FTP site and gopher site on the Internet, as well as files on an intranet. Type the following address in the Address box: http://www.dpsinfo.com/help/words.html http means the URL to open is residing on a Web server www.dpsinfo.com is the domain of the server help is a subdirectory under the dpsinfo.com domain on the server words.html identifies the Web page being opened Internet Explorer gives the user the option of displaying Addresses as simplified addresses ("friendly URLs") or full addresses (URLs as described above). This value is set from the Options menu, on the Appearance tabsheet. When the term address is typically used on the Internet, it means an E-mail address. The term URL is more often used to represent Web page addresses.
An Internet address can consist of letters, number and/or symbols. The address allows the Internet to identify a computer. Addresses allow people to transfer files, send email and visit web sites.
a web address is the domain name or URL. An e-mail address is in the form firstname.lastname@example.org
In communications, the coded representation of the source or destination of a message. ( 188) In data processing character or group of characters that identifies a register, a particular part of storage, or some other data source or destination. ( 188) To assign to a device or item of data a label to identify its location. ( 188) The part of a selection signal that indicates the destination of a call. To refer to a device or data item by its address. Back to the Top
Code by which the Internet identifies you. The format is username@hostname, where username is your username, login name, or account number, and hostname is the name of the computer or Internet provider you use. The hostname may be a few words strung together with periods.
A numerical identifier for a controller when used in computer communications.
Unique identifier or location of a web page. Also called a Web Address or URL (Uniformed Resource Locator)
6940 Villagreen View Rockford, IL 61107 Click here to Email Kiki Glossary - - - - - - - - - - - - - - - - - - - - X- Y - Z
A address is a unique name (or number) identifying a computer user or computer. Addresses are used in network communications in transmitting messages to a particular person or machine.
numbers and letters which locate a computer
The unique identifier you need to either access a Web site: http://www.webguest.com (see URL) or 188.8.131.52 (see IP address) or to send email: email@example.com (see email address).
The location where a person or computer expects to find or deliver a particular piece of information, such as: e-mail—"Its_me@workplace," that specifies how electronic mail can be sent to a person or organization. or a Website address (see URL)—"http://www.ownpage.ownsite/beginhere"
The location of a web site on the Internet-- also called a "URL." The address of a site can tell you something of the nature of the information that you will find there. An address that has ".gov" at the end of the address will belong to a "government" site. Typing "http://www.nsa.gov" in the location field will bring you to the National Security Agency web site. Another common suffix is ".com." Sites with this suffix are generally commercial sites. See also "Domain Name."
a location in memory; each data item is stored at a particular memory address
a name, label or number that is used to identify a location in memory; allows each device on a single communications line to respond to its own message
A name, group of numbers or bits used to identify a specific device. (e.g. server, router, switch, printer, or computer) on a network.
There are two types of addresses in common use within the Internet. They are email and IP or Internet addresses.
Typically refers to either a website or email address. A website address appears in the form of a Uniform Resource Locator (URL) and is prefixed with http:// or https://.
Either the address of a user (usually a name, followed by '@' and some other bits, separated by dots) ... or the address ('URL') of an Internet site (usually preceded by 'http://...' or 'ftp://...'
An identification (number, name, or label) that uniquely identifies a computer register, memory location, or storage device.
The code used to designate the location of a specific piece of data within computer storage
The location of a site on the Internet, which in its pure form is expressed by a number.
An identifier assigned to networks, stations, and other devices so that each device can be separately designated to receive and reply to message.
The location of an Internet resource. An email address may take the form of firstname.lastname@example.org. A web address looks something like " http://www.q2websolutions.com"
Reference to a memory location. In C pointers are used to hold addresses.
Data structure or logical convention used to identify a unique entity, such as a particular process or network device.
(1.) The telephone number that remote systems use to call the system. (2.) To refer to a device or an item of data by its address. (3.) In word processing, the location, identified by an address code, of a specific section of the recording medium or storage. (4.) In data communication, the unique code assigned to each device or workstation connected to a network. See also network user address. (5.) A numbering system used in network communications to identify a specific network or host with which to communicate. Addresses are often denoted in dotted decimal form.
The information in an email message that determines where and how the message must be sent. Addresses are found both on message headers and on message envelopes.
The identifying location of a device or an area of storage; for example, a memory register, disk sector, or network node. 2.To identify with an address. See also URL
There are three types of addresses in common use within theInternet. They are email address; IP, internet or Internetaddress; and hardware or MAC address. See also: email address, IPaddress, internet address, MAC address. address mask
System developed to identify and reach someone or something. About concerning the Internet, there are: a) e-mail addresses, b) IP addresses, c) hardware addresses, e) URLs.
a slippery term, depending on context; in e-mail world, the combination of usercode/mailname and domain designation allowing proper routing of messages to an individual (e.g., email@example.com or firstname.lastname@example.org). In a network context, an address is the end of a glorified phone jack (a Network Access Module or NAM), able to be designated to receive packets of data in IP (Internet Protocol) form. All Internet traffic is tracked and routed by IP addressing, whether or not the addressing is manifest to the naked eye: the text address email@example.com silently incorporates the four-digit IP address of the server known as peseta.ucdavis.edu. The number of IP addresses on a given subnet is limited by the number of ports served by the equipment in a given IDF closet.
Think of the World Wide Web as a network of electronic files stored on millions of computers all around the world. Hypertext links these resources together. Uniform Resource Locators or URLs are the addresses used to locate the files. The information contained in a URL gives you the ability to jump from one web page to another with just a click of your mouse. When you type a URL into your browser or click on a hypertext link, your browser sends a request to a remote computer, called a web server, to download one or more files. Every URL is unique and identifies one specific file.
Identifies the location of an Internet resource. Examples: an e-mail address (firstname.lastname@example.org); a web address (http://www.osu.edu); or an internet address (128.146.999.9).
A way to identify an Internet resource. See also URL. The following are examples of different Internet addresses: an electronic mail address - email@example.com, a web server address - www.farmingdale.edu
A name, label, or number identifying a location in storage, a device in a system or network, or any other data source.
A number that represents a location in the memory. Usually shown in a hexadecimal value for memory or storage.
(also called e-mail address) A special code name that is a user's unique name on the Internet. Usually describing both the person and the place where the person works, the address is used to direct e-mail to its intended destination. See Chapter 6.
In networking, a unique code that identifies a node to the network.
Internet address, usually in dotted decimal notation.
Sometimes referred to as a URL. This is the address of the website, web page or resource on the Internet.
The identification of a physical or virtual distinct entity in a network. On the Internet, this network address is known as a URL, Uniform Resource Locator, e.g., http://www.gsh.org.
An electronic mail location of a user.
A number given to a location in memory. The location is accessed by using that number, like accessing a variable by using its name.
Your Internet address is like your phone number, it is how you are uniquely identified. Once you are assigned your Internet address, you are connected to all other Internet computers. For example, New Technology Associates Internet address is 184.108.40.206.
Number representing the location of a byte in memory. Within CP/M there are two kinds of addresses: logical and physical. A physical address refers to an absolute and unique location within the computer's memory space. A logical address refers to the offset or displacement of a byte in relation to a base location. A standard CP/M program is loaded at address 0100H, the base value; the first instruction of a program has a physical address of 0100H and a relative address or offset of 0H.
There are three types of addresses in common use within the Internet. They are email address; IP, internet or Internet address; and hardware or MAC address. See also: email address, IP address, internet address, MAC address.
The label or number identifying the memory location where a unit of information is stored.
With reference to the Web, an address is a string of letters and punctuation marks that identifies an email mailbox or a web site. firstname.lastname@example.org is a sample email address, and http://www.techsoup.org is a sample web address. A web address is also called a URL. Source: TechSoup.org
This could be an email or web address. Web addresses are also sometimes called URLs. Web addressed are always always in this format www.thedomain.com or http://thedomain.com. What about the .au or .uk endings, you ask? That's the country ( Au stralia or nited ingdom, for instance). American sites don't have the two country letters at the end of the address for the same reason that English stamps don't have "England" on them - they invented it. Email addresses are always in this format: email@example.com (or maybe .net, .gov, .org. .edu etc).
(1) A coded representation of the destination of data, as well as of its source. Multiple terminals on one communications line, for example, must each have a unique address. (2) A group of digits that makes up a telephone number. Also known as the called number. (3) In software, a location that can be specifically referred to in a program. (4) A name, label, or number that identifies a location in storage, a device in a network, or any other data source.
A component of a location that can be assigned a US Postal Service street address.
(1) Disks and other storage devices have numbers that identify locations by sector and by byte. Retrieval software searches for the address assigned to the desired information in order to locate it. (2) Used as a verb, it means what a computer can access: "This Mac can address 5 megs of RAM."
a unique network identification name which can alternatively be expressed numerically, such as 220.127.116.11 or science3.soe.umich.edu
A unique network location used to identify a network object, such as a listener, Oracle Connection Manager, or Oracle Names server. Addresses have a specific format and must be unique.
An e-mail address. A way to locate you through your Internet service provider.
1.The precise location in memory or on disk where a piece of information is stored. Every byte in memory and every sector on a disk have their own unique addresses. 2. To reference or manage a storage location.
address - A recipient address is a collection of information that identifies a specific message recipient. It must be unique and complete to properly identify an e-mail recipient.
There are four types of addresses in common use on the Internet: Email, IP, hardware, and URL.
Network addresses are usually of two types:(1) the physical or hardware address of a network interface card; for ETHERNET this 48-bit address might be 0260.8C00.7666. The hardware address is used to forward PACKETS within a physical network. Fortunately, network users do not have to be concerned about hardware addresses since they are automatically handled by the networking software.(2) The logical or INTERNET address is used to facilitate moving data between physical networks. The 32-bit INTERNET address is made up of a network number, a subnetwork number, and a host number. Each host computer on the INTERNET, has a unique address. All INTERNET hosts have a numeric address and an English-style name. For example, the INTERNET address for UCC's CYBER 840 is 18.104.22.168; its INTERNET name is csugreen.UCC.ColoState.EDU.
A name, decimal number or bit string used to identify a networked device.
A number used by the operating system to identify a storage location.
The unique code assigned to each device or workstation connected to a network. A standard Internet address (or IP address) is a 32-bit address field. This field contains two parts. The first part is the network address; the second part is the host number. See also IP address.
A unique name (or number) identifying a computer user or computer is called an address. Addresses are used in network communications to transmit messages to a particular person or machine. In IP (Internet Protocol) form, it consists of a series of numbers, separated by dots, which enables a machine in one part of the world to contact another (much like a personal zip code). Also, technical reference to a specific location in a computer's memory.
Central Park West at 79th Street, New York, NY 10024
A memory location in a particular machine's RAM; a numeric identifier or symbolic name that specifies the location of a particular machine or device on a network; and a means of identifying a complete network, subnetwork, or a node within a network.
There are two separate uses of this term in Internet networking: "electronic mail address" and "Internet address." An electronic mail address is the string of characters that you must give an electronic mail program to direct a message to a particular person. See "Internet address" for its definition.
There are three types of addresses in common use on the Internet: email addresses, IP addresses, and Uniform Resource Locators. Examples: email address: firstname.lastname@example.org IP address: 22.214.171.1244 Uniform Resource Locator (URL): http://www.nrtc.net
Secret code by which the Internet identifies you so that people can send you mail. It usually looks like username@hostname - where username is your username, or login name, or account number; and hostname is the Internet's name for the computer or Internet provider you use. The host name can be a few words strung together with periods.
A specific site (www, ftp, gopher) or "mailbox" (e-mail) on the Internet, often the mailbox of a particular user. If referring to e-mail, an address will usually contain the "at" sign: @. An address is often rendered in lower case. Example: email@example.com.
Another name for a unique URL of a Web page. ...
A name, set of numbers, or sequence of bits used to identify devices (computer, printer, or server) on a network.
The unique identifier for a specific location on a network. There are three types of addresses in common use within the Internet: e-mail addresses; IP or Internet address; and hardware or MAC addresses. WWWebfx Home Page
Computers store numbers and instructions in their store. The store is usually divided into locations each of which holds one number or instruction. Each of these locations is given a designation so that it can be referred to, no matter what number or instruction it happens to contain. This designation is often called the 'address' of the location.
Number or bit pattern that uniquely identifies a location in library memory. Every location has a distinct address.
An Internet address is the name of a site you want to connect to, such as www.aga.org. Also, an Internet address can be the address of someone you want to send e-mail to, such as firstname.lastname@example.org
The street address that describes the physical (geographic) location of the front door or main entrance of a facility site. Example: 123 Main Street.
A number of reference, which identifies a unique location in a computer's memory.
A number which identifies a location in memory where information is stored.
The location of an Internet resource. email address may take form email@example.com. A web looks something like http://www.squareonetech.com.
A number which is used to identify a location. Each computer on the internet has a unique IP address, which the network uses to direct information to it. memory address is a string of digits which identifies where to read or write data.
(URL-uniform resource locator): generally of the form www.something.com; entering this into the address bar of your browser is the most direct way of accessing a site
An exact location in memory. A program can store or retrieve data from this address.
An address in a unique identifier assigned to a web page. The address is more commonly referred to as the URL (Uniformed Resource Locator).
Unique location of a person or computer on the Internet. Communication on the Internet requires an address.
An address is the location of a computer or computer resource on the Internet. You can find the address in the Address Box (Explorer) or the Location Box (Netscape)
The location of an Internet resource. An email address may take the form of firstname.lastname@example.org. A web address looks something like http://www.crn.org.
The Uniform Resource Locator of a file contained on a network. This can be the home page of a website or any of its files. It usually appears as http://www.(name).com. There can also be addresses that include a /(filename) after the ".com" reference.
An address in memory is a location to which an application or a piece of hardware refers. For example, a word processor will store your document in a particular memory address while you have it open. Problems occur when two things (hardware or software) try to use the same address.
A location in the memory where a particular piece of data is stored.
Most commonly, an address is a person's email location or a web page's URL.
The location of an Internet resource. An email address may take the form of name@.yourdomain.com. A web address looks something like http://www.domain.com.
A unique number assigned to a device on a network. For example, a twinax terminal must be assigned a unique address before it is able to access the host system.
Internet users encounter two important types of addresses: Web page addresses (more properly called URLs) and e-mail addresses (for sending e-mail to someone). One example of an e-mail address is email@example.com.
In telephony, the number dialed by a calling party which identifies the party called. Also known as the telephone number.
The number assigned to an individual memory location. Each byte in the Atari has its own unique address, much like a house has a street address. The main use of this book is to provide you a roadmap to each address so you don't get lost.
See e-mail address and host address.
The unique location of an information site on the Internet, a specific file (for example, a Web page), or an email user.
1151, Punchbowl Street, Honolulu, Hawaii
The location of an internet resource. An email address may take the form of firstname.lastname@example.org -- a web address appears as http://www.insurancestop.com
A unique sequence of letters or numbers for the location of data or the identity of an intelligent device.
A unique identifier assigned to networks and stations that allows each device individually to receive and reply to messages. Three types of addresses are commonly used on networks: e-mail address; IP, internet, or Internet address; and hardware or MAC address. See also Class A/B/C address, IP address, MAC address.
A specific site (www, ftp, gopher etc.) on the Internet, often the mailbox of a particular user. If referring to email, an address will usually contain the "at" sign: @. An address is often rendered in lower case. Example: joebloggs@BTopenworld.com
(1) A name, numeral, or label that designates a particular location in primary or secondary storage. (2) A location identifier for nodes in a computer network.
The location of an Internet resource. An email address may take the form of email@example.com. A web address looks something like http: //www.supanet.com. Also know as the URL (Uniformed Resource Locator).
An address by which the Internet identifies you so that people can send you mail. It usually looks something like firstname.lastname@example.org, where username is your username, login name, or account number, and ispname is the Internet's name for the computer or Internet provider you use. Also See: E-mail
The location of an Internet resource. An email address may take the form of email@example.com. A web address looks something like http://www.aic.net.au.
The numerical location of a web site. Example: 126.96.36.199. The first six digits are a country location, the next three are a server computer location, and the last three are a location on the server computer. The numbers can range from 0 to 255.
1. Physical location of a home. 2. Code or path used to locate stored information in a computer.
A unique identifier for a computer or site online, usually a URL for a web site or marked with an @ for an e-mail address. Literally, it is how your computer finds a location on the information highway.
Another name for a Web URL.
A character or group of characters that identify a register, a location or some other data source or destination.
A way to identify an Internet resource. The following are examples of different Internet addresses: an electronic mail address firstname.lastname@example.org, a gopher server address - gopher.unm.edu, a web server address - www.unm.edu
Number that uniquely identifies the location of a word in memory.
An address is a code and abstract concept expressing the fixed location of a home, business or other building on the earth's surface. | <urn:uuid:d0da5b61-d08a-43ec-b151-d0596cbc350f> | {
"date": "2013-05-23T18:38:38",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.8887968063354492,
"score": 3.8125,
"token_count": 9412,
"url": "http://www.metaglossary.com/meanings/582336/"
} |
We all like to think of ourselves as rational creatures who smartly prepare for the worst. We watch our back, weigh the odds and pack an umbrella when the skies look threatening. But although we take such precautions, we generally expect things to turn out pretty well — often better than they actually do.
The belief that the future will probably be much better than the past and present is known as the optimism bias, and most of us have this tendency to overestimate the likelihood of good events happening to us and underestimate the likelihood that bad events will come crashing down.
Take marriage, for example. In the Western world, divorce rates are higher than 40 percent: Two out of five marriages end in divorce. But newlyweds estimate their own likelihood of divorce at zero.
Why is optimism about our personal future so resilient? It starts with what may be the most extraordinary of human talents: the ability to move back and forth through time and space in one’s mind. To think positively about our prospects, it helps to be able to imagine ourselves in the future. Our capacity to envision a different time and place is critical for our survival. It allows us to plan ahead, to save resources for times of scarcity, and to endure hard work in anticipation of a future reward.
While mental time travel has clear survival advantages, conscious foresight came to humans at an enormous price — the understanding that death awaits. The knowledge that old age, sickness, decline of mental power and oblivion are somewhere around the corner can be devastating.
Ajit Varki, a biologist at the University of California at San Diego, argues that the awareness of mortality on its own would have led evolution to a dead end. The despair would have brought the daily activities needed for survival to a stop. The only way that conscious mental time travel could have arisen is if it emerged along with irrational optimism. The knowledge of death had to emerge in parallel with the persistent ability to picture a bright future.
The capacity to envision that future relies partially on the hippocampus, a brain structure that is crucial to memory. (People with damage to the hippocampus are unable to recollect the past; they are also unable to construct detailed images of future scenarios.)
But the human brain doesn’t travel in time randomly. It tends to engage in specific types of thoughts: We consider how well our kids will do in life, how we will obtain that desired job, whether our team will win. We also worry about losing loved ones, failing at our job or dying in a plane crash. But research shows that most of us spend less time mulling negative outcomes than we do positive ones.
Why do we maintain this rosy bias even when information challenging our upbeat forecasts is so readily available? Only recently have we been able to decipher this mystery. My colleagues and I at University College London recently scanned the brains of people as they processed both positive and negative information about the future.
Among other things, we asked them to estimate how likely they were to encounter 80 negative events, including developing cancer, having Alzheimer’s disease and being robbed.
We then told them the likelihood that a person like them would suffer these misfortunes; for example, the lifetime risk of cancer is about 30 percent. Then we asked again: How likely are you to suffer from cancer? | <urn:uuid:50646eb9-7da9-4434-a23d-0f59ff7f4063> | {
"date": "2013-05-23T18:45:02",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9566811323165894,
"score": 3.59375,
"token_count": 675,
"url": "http://www.miamiherald.com/2013/01/12/3176557/the-optimism-bias-why-we-look.html"
} |
On the second day of his first visit to Algeria, French President Francois Hollande stood up before both chambers of the Algerian parliament to “recognize the suffering inflicted by colonization upon the Algerian people.” He also accepted responsibility for “the profoundly unjust and brutal system to which Algeria was subjected for 132 years; and that system has a name: colonization.”
Spoken fifty years after the former colony’s independence, these words did not constitute the “apology” demanded by several Algerian political parties (nor was it the “repentance” dreaded by the right-wing in France). But for his Algerian hosts, these were pleasing words. They were also the crucial starting point in Mr. Holland’s pitch for a “new era” between the two countries. Since he set foot in Algiers, the socialist president had spared no effort to achieve what other French leaders have failed to achieve so far: overcoming the hindrance of the past in order to focus on the benefits of the future.
For decades, relations between both countries never settled on a steady course. French hesitation to deal adequately with the country’s colonial legacy and the Algerians’ particular sensitivity to French attitudes put bilateral relations on a path of continued turbulence, especially during the last decade. The thawing of the ice started during last French elections. French voters of Algerian extraction, an important segment of the Muslim electorate in France, extended their hands to Francois Hollande. Their favorable perception of his conciliatory attitude, as well as their rejection of the right-wing politics of his rival, Francois Sarkozy, earned the socialist candidate the overwhelming support of French voters of Algerian origin (More than 90% of the votes of French Muslims went to Hollande, according to the polling agency OpinionWay). Since his election, the new French president seemed determined to do better than his predecessors. He had the personal commitment of somebody with “powerful memories” of a one-year stay in Algiers during the late seventies, as a student-intern at the French embassy there. Signals of good-will quickly followed. A few months into the office, Hollande made the gesture of remembering Algerian pro-independence demonstrators who fell victims in 1961 to “bloody repression” by French police in Paris. His “remembrance” of Algerian civilian casualties in France was well received in Algeria. It set the right mood for this week’s visit to France.
Mr Hollande knew in advance that dealing adequately with the painful legacies of the past was a necessary step to engage Algerian leaders, especially President Abdelaziz Bouteflika, in a dialogue about better bilateral relations. The 200-person strong delegation accompanying him to Algeria, including nine ministers, more than 40 businessmen and 100 reporters, reflected the importance he accorded to his first trip to a Maghrebi country since his election.
The stakes for Hollande were high, in more than one regard. There were obviously the economic interests. Already, 450 French companies are based in Algeria and France is already Algeria’s first source of imports. France’s European competitors, such as Italy and Spain, as well as non-Europeans powers, especially China, have increasingly challenged France in what it long considered its “chasse gardée”. Algeria’s population of 37 million and its substantial hydrocarbon revenues, make the country an attractive market for the currently-struggling European economies and a magnet for French companies desiring to expand business and trade opportunities.
The French export-insurance corporation, COFACE, pointed out recently that Algeria has “a solid financial situation” with a debt ratio that is less than 10% of its GNP. During the visit, several bilateral agreements were signed in the fields of defense, security, industry, agriculture, finance, and education, including an agreement allowing French car manufacturer Renault to assemble up to 75,000 cars in Oran and therefore expand its share of the Algerian and African automotive markets.
Mr. Hollande’s visit was also an opportunity to try to smooth down policy differences over regional and international issues. In an apparent move to avoid an unnecessary public controversy about the two countries divergent policies, he removed a paragraph on the Syrian crisis from the prepared text of his speech to parliament. Statements on the situation in Mali showed that despite their eagerness to help organize a military campaign against Jihadist groups in Northern Mali, the French want to take into consideration the concerns of the country with the longest border with Mali and with the greatest ability in the region to-make-or-break any military initiative there. Algeria’s long experience in dealing the threat of Al Qaida in the Maghreb was also the basis for talks on fighting terrorism.
Beyond agreements and compromises on regional issues, Hollande did not conceal his hope to set the stage for a long-term “strategic partnership between equals”. He tried to make all the right moves to nudges the two countries towards what French socialist leader Razzy Hammadi called a “complex-free relationship”. But the history of French-Algerian relations teaches us that the secret for the success of any well-meaning bilateral initiatives is their long-term sustainability. The road to “normalization” on all fronts is strewn with all sorts of challenges, new and old, and most of all that of the lethargy that often settles in after an enthusiastic start. “Right deeds have to follow”, cautioned Francois Hollande, at the end of his Algerian journey. The degree of proximity between Algeria and France is at best not a guarantor of sufficient understanding. An IFOP poll, conducted on the eve of the French president’s visit to Algeria, showed for instance that only 26% of the French population had a “positive image” of Algeria. Removing the distorting prisms and preset notions behind such an unfavorable perception will be a first benchmark towards developing a truly “complex-free” relationship.
Oussama Romdhani, a former Tunisian member of government, is currently an international media analyst. | <urn:uuid:9e8fafdd-da1c-43c4-b08c-3c41e62a8c66> | {
"date": "2013-05-23T18:32:24",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9715635776519775,
"score": 2.671875,
"token_count": 1275,
"url": "http://www.middle-east-online.com/english/?id=56172"
} |
Word of the Day, Website of the Day, Number to Know, This Day in History, Today's Featured Birthday and Daily Quote.
Morning Minutes: March 2
Word of the Day
Repudiate ri-PYOO-dee-eyt (verb) To reject with disapproval or condemnation. - dictionary.com
Website of the Day
Dr. Seuss: 10 Life Lessons From The Legendary Children's Author
Huffington Post compiled a list of the 10 most important things Dr. Seuss has taught us.
Number to Know
100: Points Philadelphia Warriors center Wilt Chamberlain scored in a basketball game against the New York Knicks on this date in 1962.
This Day in History
March 2, 1902: Theodore Geisel, who wrote under the pen name Dr. Seuss, is born.
Today's Featured Birthday
Rock singer Jon Bon Jovi (51)
"Knowledge is of no value unless you put it into practice." - Anton Chekov | <urn:uuid:6324351b-8582-4359-b6e7-000aff8fb0b3> | {
"date": "2013-05-23T18:55:14",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8215336203575134,
"score": 2.671875,
"token_count": 203,
"url": "http://www.montenews.com/article/20130302/NEWS/303029999/1011/http:"
} |
Consider cover crops your most important crops, because the requirements for abundant food crops — building soil fertility, improving soil texture, suppressing weeds, and inhibiting disease and crop-damaging insects — can be best met by the abundant use of cover crops, season after season.
5 Benefits of Cover Crops
Soil Fertility. A vast array of soil organisms decompose once-living plants into nutrients easily taken up by plant roots, and add to your soil’s humus content (the final residues of organic matter in your soil, which assist nutrient uptake, improve texture and hold moisture). I grow organic matter in place using cover crops because, in many ways, a living cover crop is even better than adding manure and compost for fertility.
The area of most intense biological activity — ultimately the definition of soil fertility — is the rhizosphere, the zone immediately around plant roots. Plants release nutrients through their roots to feed their buddies in the soil — beneficial microbes and mycorrhizal fungi — that increase access to water and convert soil nutrients into forms more readily utilized by plants. If the intense bioactivity in the rhizosphere is the key to fertility, imagine the contribution of closely planted cover crops with vastly more root mass than more widely spaced food crops.
Soil Texture. Mycorrhizal fungi (beneficial fungi that grow in association with plant roots) produce glomalin, a substance which glues microscopic clay and organic matter particles into aggregate clumps, stabilizing the soil and making it nice and crumbly. This crumbly texture is more porous to oxygen and water. Bacteria encouraged by cover crops produce polysaccharides, which also act as soil glues.
Grass and grain cover crops with fine, dense root masses loosen soil texture as they decompose. Others, such as sweet clovers and sorghum-sudangrass hybrids, grow deep, aggressive taproots that break up soil compaction.
Erosion Prevention. A cover crop’s tight canopy protects the soil from the drying and scouring effects of wind and the forceful impact of heavy rain. The loosened soil structure achieved by cover cropping allows rapid absorption of rain and prevents runoff.
Soil Moisture. Organic matter added by cover crops acts like a sponge in the soil, absorbing rainwater and holding it for gradual release to plant roots. Thus, gardens that have been home to regular use of cover crops become more resistant to drought.
Protection From Weeds, Diseases and Insect Damage. Garden beds frequently planted with cover crops will have fewer problems with weeds. Cover crops suppress weeds, out-competing them for water and nutrients and shading them under a tight canopy, sometimes releasing chemical compounds that inhibit germination of weed seeds (a phenomenon called allelopathy). Plus, the roots of cover crops release nutrients that feed beneficial microbes in the soil. These microbes then suppress pathogens that cause root diseases. Some cover crop plants, such as rape, rye and sorghum-sudangrass hybrids, inhibit root-knot nematodes, which can be disastrous to beets, carrots and other root crops in some regions.
You can cut cover crops and use them as mulches to boost populations of beneficial ground-dwelling species, such as rove beetles and spiders. Other cover crops can provide a wonderful habitat for the pollinators that help keep your food garden thriving. Cover crops that flower, for example, provide important food sources for honeybees and butterflies.
Cover Crop Species
Depending on your climate, gardening goals and the time of year, you’ll have a variety of cover crop options. Cover crop species vary widely in their tolerance of cold, heat, soil moisture extremes and soil types. It’s often good practice to plant a mix of different species.
The most important division among species is between legumes and non-legumes. Legumes, such as cowpeas, vetches and clovers, serve as hosts to rhizobia, bacterial alchemists that live in plant roots and convert nitrogen from the atmosphere into nitrogen compounds that help plants grow. Some of this “fixed” nitrogen remains attached to legume roots in nodules — like beads on a string — and becomes available to other plants after the legume dies.
Non-legumes include all other cover crops: grasses such as small grains, various millets, annual and perennial rye, and sorghum-sudangrass hybrids; crucifers such as mustards, rape and forage radish; and buckwheat.
For detailed information on the major cover crop species, see Managing Cover Crops Profitably by the Sustainable Agriculture Network. Even though this book is geared toward farmers, it includes great information for the home gardener. (Clicking on the link in this paragraph will take you to a page on the Sustainable Agriculture Research and Education program’s website where you can download a free copy of the most recent edition of this book.)
Cover Cropping Strategies
The most important strategy of all is: Do it now! When I complete a food crop harvest in fall, that same day I plant an overwinter cover crop. If I harvest a spring crop such as lettuce from a bed that I won’t be planting again until fall, I sow a fast-growing interim cover crop that does well in summer heat, such as buckwheat or cowpeas. The best time to plant a cover crop is anytime a bed is not covered by a food crop or mulch.
The easiest way to incorporate more cover cropping is the half and half strategy: I dedicate every other garden bed to cover crops for an entire year. I may grow several fast-growing covers such as cowpeas and buckwheat in succession, or a cover such as sweet clover, which takes a full year to yield all its benefits. In the following year, the beds previously in cover crops now grow food crops, and vice versa. This strategy allows you to grow mulches in place. Using a scythe or sickle, you can cut cover crops that produce a lot of biomass — hairy vetch, rye, and sorghum-sudangrass hybrids — and lay them out as mulches in an adjacent bed that’s planted with food crops. Most cover crops cut when in their vegetative growth stage will regrow to produce even more mulch. If you can’t give half of your garden space to cover crops, how about one bed out of three? Or four? Or even 10?
Some cold-hardy cover crops grow well through fall frosts, then die if the ground freezes solid — this is known as winterkilling, and you can use to your advantage. When I remove the top growth from asparagus beds in late September, I plant a mix of winter peas and oats. They create a knee-high tangle of green by the time the ground freezes, and they both reliably winterkill here in northern Virginia, leaving a thick, weed-suppressing mulch come spring. Plus, the leguminous peas fix nitrogen in the soil for the heavy-feeding asparagus.
It’s possible to grow both a food crop and a cover crop in the same bed at the same time. Under tall-growing crops with a small footprint, such as tomatoes or pole beans, plant an undersown cover crop, such as low-growing Dutch white clover or perennial ryegrass. If such a cover has already been established, leave it in place as a living mulch and open up holes for large transplants such as tomatoes or broccoli, or open up rows for beans.
Shade-tolerant species — annual ryegrass, cereal rye, hairy vetch, some clovers — can be sown as overseeded cover crops into existing crops such as corn or brassicas up to several weeks before harvest. The cover crops will grow slowly under the existing canopy, then come on strong when the food crop has been removed.
Try frost-seeding a cover crop into overwintered grains. In late winter, broadcast the seeds — small round ones such as clovers work best — into the grain beds. Winter freezes and thaws will work the seeds into the soil, where they will germinate in spring rains. The grain could mature into a food crop for feeding your pigs or chickens while serving as a nurse crop to establish the clover, which will grow rapidly after you harvest the grain.
Some species work as reseeding cover crops. Subclovers (cool-season legumes) will die back in winter, but the seeds they leave behind will remain dormant through much of the next growing season, then sprout in the fall to establish a new cover.
Permanent cover crops are appropriate in orchards, vineyards and border areas never planted with food crops. Keeping these areas in mixed flowering species — perennials such as clovers, or annuals that reseed themselves such as crucifers — protects the soil, supports pollinators and encourages insect diversity. Encouraging lots of different kinds of insects is the key to preventing crop damage, as the bug-munching insects will help you control the crop-munching insects. In high-traffic areas, covers that can take a good deal of wear are in order, such as annual ryegrass and white clovers.
Planting Cover Crops
Plant cover crops with as much care as your food crops. Make a furrow for larger or more vigorous seeds, such as cowpeas or sorghum-sudangrass, sow thickly, and then cover with soil. For smaller seeds, such as clovers, crucifers and small grains, scatter, rake in, and tamp the bed with the back of a garden rake to ensure good soil contact. To speed germination, apply a light mulch and water occasionally. Seeds of vigorous covers, such as annual ryegrass, oats and hairy vetch, will germinate if left on the surface, especially if broadcast just before a soaking rain.
You can plant a food crop as soon as the cover crop is killed unless there could be a temporary problem of allelopathy or nitrogen tie-up (keep reading for more information). In such cases, wait about three weeks or so before planting.
Killing a Cover Crop
It’s better to avoid deep mechanical tillage, which disrupts soil life and breaks down soil structure. Tall, heavy stands of cover crops, such as rye and hairy vetch, are a nightmare to till in with a power tiller in any case. So what’s the best way to kill a cover crop so decomposer organisms can break it down to feed your soil?
Remember that a cover crop in the vegetative stage (i.e., not flowering) usually regrows after being cut. Most cover crops in the reproductive stage (i.e., flowering), however, will die if cut. A complete no-till strategy that works for most covers is to cut the cover just above soil line after it has flowered, and transplant crops such as tomatoes, peppers or broccoli through the severed tops, leaving the cut tops and cover crop stubs as a mulch. For small areas, use a hand sickle for the cutting. (We’ve found a used butcher knife also works well. — MOTHER) Or, use a heavy field hoe to chop cover crop plants just below the soil surface to kill them without disturbing the soil deeper down. Another option is to loosen the soil with a broadfork and pull the cover plants out by the roots, again laying them on a bed as mulch. As your soil becomes more friable, the broadfork may not be necessary.
My favorite way to till in a cover crop is to place a hardworking flock of chickens on the bed. Allow them to roam inside a chicken tractor or temporary fencing. For a great example of how well this method works, check out these before-and-after photos of a garden planted with a lush mix of cover crops and the same garden two weeks later, after the chickens went to work on the area.
Thirsty rye may deplete available soil moisture enough to inhibit the following crop in a dry season. A few crops — small grains such as rye and sorghum-sudangrass hybrids — may temporarily release chemicals that will inhibit the growth and germination of other plants. Though these allelopathic effects help with weed control, they can suppress germination and growth of food crops that follow, especially small-seeded ones, such as lettuce, spinach and onions. Just wait a few weeks after killing a cover crop to plant your food crop and you won’t run into problems.
Cover crops susceptible to diseases, herbaceous insects or nematodes could serve as vectors if grown beside or followed by food crops with the same susceptibilities. If you allow cover crops to mature their seeds before being killed, they can later volunteer as weeds in following crops. However, the more diverse our gardening practices and the more complex our rotations, the less likely we will encounter such problems. And the more we learn about cover crop species, the more we discover management solutions to problems that could occur. For example, if rye has been allowed to mature, the high carbon content of its residues, both roots and top mass, can temporarily tie up nitrogen in the soil and inhibit growth of the following crop. But if you grow the rye in a mix with a compatible legume, nitrogen fixed by the legume will minimize nitrogen tie-up.
Begin experimenting with cover crop species in your garden today, and you’ll soon see that the enormous advantages far outweigh any problems that may crop up. Ultimately, cover crops will lead to healthier soil and bigger, better harvests.
For more on using cover crops in your garden, see Cover Crops: Options, Tips and Advantages for the Home Garden and Cover Cropping Your Garden.
Harvey Ussery uses cover crops galore in his Virginia garden. His website, The Modern Homestead, includes much more information about his homesteading and gardening endeavors. He is the author of The Small-Scale Poultry Flock (2011). | <urn:uuid:5b1cf787-3c0b-474f-80f1-040ba15597e1> | {
"date": "2013-05-23T19:06:56",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9436677098274231,
"score": 3.359375,
"token_count": 2955,
"url": "http://www.motherearthnews.com/organic-gardening/cover-crops-zm0z11zsto.aspx?page=4"
} |
twenty-eight years ago, Arthur Firstenberg had a dental X-ray. He's been on the run ever since.
That X-ray, he says, made him excruciatingly sensitive to electromagnetic fields—the low-level radiation that emanates from power lines, microwaves, and, most vexingly, cell phones. Now 58, Firstenberg has spent more than a decade crisscrossing the country, trying to find the last unwireless spot in America. When cell phone towers came to New York City, he moved upstate. Then he headed to Mendocino, California. These days, he lives out of his '87 Nissan station wagon in Santa Fe; a house is too risky. "Your neighbor could get wifi, and then you have to leave and hunt for a new home."
At first, I was inclined to chalk Firstenberg's symptoms up to plain old paranoia. After all, the World Health Organization's website says "no study [on cell phone radiation] has shown adverse health effects at exposure levels below international guideline limits." But doctors and scientists are starting to scrutinize how invisible electromagnetic fields affect human health, especially when it comes to cell phones, one of the most ubiquitous sources of microwave radiation. In 2006, a Swedish study reported that 85 of 905 brain tumor patients had used mobile phones heavily for 10 years or more, and most of their tumors occurred on the side of their head where they usually held their phones. In March, after reviewing more than 100 studies on the link between cell phone use and brain cancer, a prominent Australian neurosurgeon concluded that cell phones could have a broader public health impact than smoking. The list of conditions that researchers have associated with electromagnetic radiation includes trouble focusing, fatigue, headaches, sleep disturbances, and Alzheimer's. (And don't forget asthma, diabetes, cataracts, and honeybee colony collapse disorder, insists Firstenberg.)
So far, no one has been able to explain exactly how these seemingly benign waves could lead to cancer, much less this laundry list of medical woes, and for that reason, few scientists are willing to say for sure that cell phone use will make you sick—or that it won't. The heating effect of electromagnetic waves is well understood; it has been proved that they can burn human tissue if they're intense enough. (Think microwave oven.) Standards set by the Federal Communications Commission ensure that cell phone emissions stay well below that heating threshold.
But Joachim Schüz, head of the department of biostatistics and epidemiology at the Danish Cancer Society, suspects that heat isn't the only way radiation causes health problems. So far, no one has been able to prove definitively that its "nonthermal" properties have any detrimental effect on living tissue. "You find one cell reacting, one not," he says. "So you can't really say it's due to the radio waves."
Why is it easier to watch Netflix movies on a PC than a Mac?
so you're about to use Netflix's "instant watching" feature on your MacBook, when suddenly an error message pops up: "Sorry, blame Steve Jobs." Huh? Wasn't the whole point of getting a Mac to escape Microsoft's monopolistic tentacles and have the freedom to do stuff like stream movies? The problem is that Apple won't license its copyright-protection software to third parties like Netflix. Predictably, Apple wouldn't emerge from behind its titanium curtain to answer our questions about why it won't let consumers use whatever video service they choose. John Sullivan of the Free Software Foundation suspects that Apple wants you to buy movies only from iTunes. That may keep Steve Jobs in black turtlenecks, but it ticks off dedicated Mac users, many of whom have no doubt noticed that Netflix movies play perfectly fine on a stodgy PC. —Leigh Ferrara
Have a problem? Oh yes, you do. Go to motherjones.com/consumer-retorts to vent about annoying products and corporate policies. Selected entries will get MoJo swag.
Since 1999, Schüz has been a principal investigator for the Interphone project, which has produced the largest body of epidemiological work on cell phones and cancer to date. The official results aren't ready yet, but 8 of the 13 countries involved have already released their initial data. Several of these early studies show a strong correlation between long-term cell phone use and brain tumors, both malignant and benign.
Schüz cautions that the individual studies by themselves are too small to overcome some significant problems with the data. Finding subjects who have brain tumors and who have used their cell phones for more than 10 years is difficult, especially considering that the tumors typically take 10 to 20 years to develop. What's more, people are notoriously bad at remembering how much they've used their phones and which ear they hold their cell phone up to—especially if they're looking around for something to blame a brain tumor on.
Ben Greenebaum, a retired physics professor and former president of the Bioelectromagnetics Society, an international group of radiation scientists and wireless-industry professionals, says that despite Interphone's preliminary findings, "I'm not prepared to shut anything down on the basis of what I see now." But, he admits, "I do think you have to be cautious and use these things when they make sense." He recommends using a headset whenever possible and warns that "if you carry it on your belt, you'll get a higher field into your stomach," even when the device is turned off. "So set it on the counter." Don't try to make calls where your reception is poor—phones emit more radiation when they're searching for a signal. The German and French governments have recommended that parents limit children's cell phone use, since less is known about the effect of radiation on developing brains.
Of course, if you're really worried, you could ditch your cell phone for a quaint landline. Just don't expect the rest of the world to follow suit. Firstenberg has found that it's almost impossible to avoid the mobile-wielding masses. He used to ask strangers—politely—to stop talking on their phones in his presence until he got reprimanded in a grocery store for harassing a customer. "People get offended," he says. "They just don't know about microwave radiation."
For the time being, the fcc is not considering any changes to its standards for cell phone radiation. Yet some cell phone companies have started including a pamphlet about potential health risks with their packaging, perhaps to guard against future litigation. And Schüz hasn't ruled out the possibility that as more data roll in, the scientific consensus could shift dramatically. "If you ask me a year from now," he says, "I might have changed my mind." | <urn:uuid:efc651f4-44db-4f55-917c-7824f5f251a8> | {
"date": "2013-05-23T18:34:39",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9627396464347839,
"score": 2.921875,
"token_count": 1391,
"url": "http://www.motherjones.com/politics/2008/07/your-brain-cell-phones"
} |
At the heart of materials science is an understanding of the microstructure of solids. "Microstructure" is used broadly in reference to solids viewed at the subatomic (electronic) and atomic levels, and the nature of the defects at these levels. The microstructures of solids at various levels, especially the defects, profoundly influence the mechanical, electronic, chemical, and biological properties of solids. The phenomenological and mechanistic relationships between the microstructure and the macroscopic properties of solids are, in essence, what the materials science is all about. This is best represented by the "materials science triangle": synthesis-microstructure-properties.
Materials engineering, on the other hand, is concerned with the design, fabrication, and testing of engineering materials. Such materials must fulfill simultaneously the dimensional properties, quality control, and economic requirements. Several manufacturing steps may be involved: (1) primary fabrication, such as solidification or vapor deposition of homogeneous or composite materials; (2) secondary fabrication, including shaping and microstructural control by operations such as mechanical working, machining, sintering, joining and heat treatment and (3) testing, which measures the degree of reliability of a processed part, destructively or non-destructively.
Because the science of materials branches into other fields of study, the department offers joint fields of study in collaboration with other departments. A degree specializing in electronic materials is offered which provides a broad-based background in materials science, with the opportunity to specialize in semiconducting materials used in electronic and optoelectronic devices. The program incorporates several courses in electrical engineering in addition to those in the materials science curriculum.
A joint major field, chemistry/materials science, is offered to students enrolled in the Department of Chemistry and Biochemistry (College of Letters and Science). Several courses in the undergraduate curriculum also play an important role in the manufacturing engineering program.
The graduate program allows for specialization in one of the following fields: ceramics and ceramic processing, electronic and optical materials, and structural materials. | <urn:uuid:e208dae8-1b37-4cf8-9490-b8eb556972c8> | {
"date": "2013-05-23T18:59:43",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9217543601989746,
"score": 2.921875,
"token_count": 423,
"url": "http://www.ms.ucla.edu/about/about-us"
} |
New South Wales Government Gazette 1840
New South Wales Government Gazette 1840. 1840. Government Gazettes are a unique, useful and extremely fascinating resource for local, family and social historians and researchers in other fields throughout Australia.
They were published by the government as a means of communication to officials and the general public and therefore contain information that is of great use in establishing an image of the colony of New South Wales and its people in the past. Issued weekly with occasional special issues, the New South Wales Government Gazette contains information such as land transactions, court notices, notice of acts, tenders contracts, bankruptcies, dissolution of partnerships, police auctions of stolen property, statistics and much more ... There is a large amount of information (which include physical descriptions) relating to convicts - absconders, those who were granted ticket-of-leave, deserters, apprehensions and more. The Government Gazettes have information covering a broad spectrum of the community with important details and facts on many thousands of people. This product provides a great tool for researching the history of New South Wales, making information that is difficult to find, easily accessible on one CD. Example entry taken from 8 January 1840 issue:State of the Female Factory, Parramatta, on Saturday, 4th January, 1839:Under-Colonial Sentence = 291In Solitary Confinement = 61Confines by order of the Matron = 36Nursing Children = 50Number Assignable = 370Number not Assignable = 81In Hospital = 38Total number of Women = 921Total number of Children - 250S. Bell, Matron Example entry taken from 8 January 1840 issue[partial extract only - only two entries listed below, there are about fifty listed just in this one issue]:The undermentioned Prisoners having absconded from the individuals employments set against with stolen Certificates and Tickets of Leave, all Constables and others are hereby required and commanded to use their utmost exertion in apprehending and lodging them safe in custody.Taylor Thomas, alias Henley Thomas, Minerva (5), 30, Newcastle-upon-Tyne, writing master, 5 feet 7 1/2 inches, sallow comp., brown hair, grey eyes, charged with forgery, from No. 7 Road Party, since February 27, 1833.Jeffreys George (1), 34-758, 35, Devonshire, seaman and farm labourer, 5 feet 3 1/2 inches, dark sallow comp., brown to grey hair, hazel eyes, nose inclining a little to the left side, scar betwixt the eyebrows, blue ring on left little finger, left fourth and little fingers contracted, PJME cocoa-nut tree and H N inside lower left arm, anchor ball of ball of left thumb, scar back of left forefinger, from Goat Island, since July 17, 1836. | <urn:uuid:0661e18b-e931-42a3-9969-ea95fdecdad8> | {
"date": "2013-05-23T18:45:08",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9249905347824097,
"score": 3.140625,
"token_count": 589,
"url": "http://www.myheritage.de/research/collection-50457/new-south-wales-government-gazette-1840"
} |
Diabetes Awareness Month
November 01, 2012
Diabetes Awareness month is November, and World Diabetes Day is celebrated every year on November 14th. Millions of people worldwide are involved in diabetes advocacy and awareness. The focus theme for 2009-2013 is Diabetes Education and Prevention.
Diabetes is a condition in which the body cannot produce and use glucose properly. Many diabetes symptoms seem to be harmless and, therefore, go unrecognized. Some of these symptoms would be sleepiness, dry mouth, and irritability. Detection is important because poorly managed diabetes can lead to future compilations such as kidney failure, eye disease, heart attacks, and nerve damage. There are many educational websites that explain the causes, treatment and management of diabetes. Two website I found very helpful are the Joslin Diabetes Center and the American Diabetes Association.
Diabetes screening tests are a good preventative method for catching the development of diabetes at an early stage. There are diabetes community events and support groups to help educate and raise funds for diabetes research. As public health experts work to educate us on what to do to avoid this disease and its complications, be aware that healthy eating habits and activity choices can lower your risk of developing diabetes.
Blue Springs North Branch | <urn:uuid:67487005-3334-4d83-b31b-5eb0b28a3305> | {
"date": "2013-05-23T19:05:18",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.946091890335083,
"score": 2.984375,
"token_count": 248,
"url": "http://www.mymcpl.org/blog/diabetes-awareness-month"
} |
For Sophomore/Junior level courses in Theories of Personality, Personality, Individual Differences.
Using a theorist-by-theorist approach, this comprehensive introduction to personality theory gives students the history of psychology with practical information to help them understand their own lives and their relationships with others. Primary sources, abundant biographical information and supporting research are used to descibe and detail each theorist, presenting the theories of personality in an accessible and unbiased way.
Table of Contents
Chapter 1: What is Personality?
Chapter 2: Sigmund Freud
Chapter 3: Carl Jung
Chapter 4: Alfred Adler
Chapter 5: Karen Horney
Chapter 6: Erik H. Erikson
Chapter 7: Gordon Allport
Chapter 8: Raymond B. Cattell and Hans J. Eysenck
Chapter 9: B.F. Skinner
Chapter 10: John Dollard and Neal Miller
Chapter 11: Albert Bandura and Walter Mischel
Chapter 12: David M. Buss
Chapter 13: George Kelly
Chapter 14: Carl Rogers
Chapter 15: Abraham Maslow
Chapter 16: Rollo Reese May
Chapter 17: A Final Word
With CourseSmart eTextbooks and eResources, you save up to 60% off the price of new print textbooks, and can switch between studying online or offline to suit your needs.
Once you have purchased your eTextbooks and added them to your CourseSmart bookshelf, you can access them anytime, anywhere.
Introduction to Theories of Personality, An, CourseSmart eTextbook, 8th Edition
Format: Electronic Book
$75.99 | ISBN-13: 978-0-205-81001-7 | <urn:uuid:72136667-da8c-48ae-8549-53e3a2238e17> | {
"date": "2013-05-23T18:30:24",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.8130820989608765,
"score": 3.765625,
"token_count": 348,
"url": "http://www.mypearsonstore.com/bookstore/introduction-to-theories-of-personality-an-coursesmart-0205810012"
} |
Looking for a fun, kid-friendly activity to help your family appreciate the outdoors? Backyard birding is a great way to get the kids outside and learning more about the beautiful birds in your area. Here are a few helpful backyard birding tips to get started.
Educate with games
Start your birding adventures by learning which birds are native to your state. There are numerous online resources that include species listings, like the Bird Library from Perky-Pet. Once you have your list, make it a game. Print out the different types of birds and let your kids check them off as they see them. Whoever spots the most species could win a prize, like a birdfeeder. Making it a game will help motivate them to get outside and start bird watching.
Nature is full of sounds and smells. While outside, have your kids close their eyes and sit quietly for a few moments. Discuss the sounds you hear and try to recreate bird sounds as you heard them. Since our feathered friends are attracted to flowers, seeds and berries, identify which plants will invite birds. Encourage your kids to research other plants that might attract new birds to your backyard.
Backyard birding is a great tool to encourage responsibility. If your birdfeeders are not cleaned weekly it's possible for dangerous bacteria to grow. This can have a disastrous effect on a community of birds. Create a birdfeeder-cleaning calendar for your child and make note of days when the feeders should be refilled. Depending on weather and the time of the year, your feeders may need to be filled with fresh seed daily.
Help with nesting
Birds appreciate being able to keep clean as well as being provided with nesting materials. Help your kids collect lint or strips of fabric to set outside for birds to use when building their nests. As a family, set up a birdbath or bird waterer, like the new Perky-Pet Droplet Bird Waterer, and take turns keeping it cleaned and filled with fresh water.
Attract new birds
Have your kids select a new bird species they would like to see and learn how to attract them to your yard. One fun choice for young birders is the hummingbird.
Hummingbird feeder kits, like the Perky-Pet Oasis Hummingbird Feeder Complete Set, include all the essentials for feeding these tiny birds and will help your child become familiar with this species. Have your child take notes on the hummingbird behavior they witness including the birds' swift movements, territorial nature and whether they eat while perched or while flying.
Connecting kids with nature is always a good idea, and birding is a fun way to start. So now, equipped with these kid-friendly ideas, it's time to start your backyard birding adventure. It's the perfect way to get your kids outside and the birds will enjoy the extra attention as well. | <urn:uuid:3862f7d8-fd53-4a44-aedc-c3d8dec3687d> | {
"date": "2013-05-23T18:32:18",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9532220959663391,
"score": 3.140625,
"token_count": 595,
"url": "http://www.mysoutex.com/view/full_story_landing/19147332/article-Summertime-is-perfect-for-backyard-birding-with-kids?instance=all_articles"
} |
The ancient city of Cerveteri (Latin: Caere Greek: Agylia) is located about 50 km north-west of Rome and occupied an immense area protected by steep slopes and fortifications. The English word ceremony comes from the Latin caeremonium, meaning "pertaining to Caere," and reflects the Etruscan fascination with divination and prophecy.
Through its ports of Pyrgi, Alsium and Punicum, the city became an important early trading centre. Its name in Etruscan has been variously represented as Cisra, Chaisra or some other variant. In the Phoenician tablet from Pyrgi, it is referred to as Kisry.
The earliest major settlements at Cerveteri date from between the 9th and 8th centuries BCE and are characteristic of the Villanovan period. At least two villages were established during this time, as evidenced by the finds of biconical and hut shaped cinerary urns at the oldest Necropolis areas of Cava della Pozzolana and Sorbo. Trading with the Euboean Greeks commenced in the mid 8th century BCE with Etrusco -Geometric vessels becoming more common in the grave-goods. From the 7th century BCE onwards, Caere underwent rapid demographic development, becoming Etruria's chief trading centre. By the beginning of the seventh century, Euboean influence had been replaced by that of the Corinthian and other Greek colonies which had been established in Southern Italy and Sicily.
During the seventh century, local manufacture of pottery started to emulate the Greek imports, with new traditions of early Orientalising vase painting becoming established in Cerveteri. An example of these are the works of the "Painter of the Heptachord". The craft of manufacturing bucchero ware also originated in Caere during this period.
Trench type burials began to be replaced by the chamber tomb or hypogeum. The richness of grave-goods from the Orientalising period are legendary, with examples being the Regolini Galassi and Calabresi tombs, the contents of which are on display at the Vatican Etruscan museum. The Gold jewellery and vases from this period are of particularly fine workmanship.
In the 6th century BC, Caere, at the height of its power, clashed, emerging victorious, with the Phocaean Greeks of Italy who at the time were establishing their control on the Tyrrhenian Sea via the colony of Alaria on Corsica.
Following the so called "Battle of the Sardinian Sea", hundreds of Phocaean prisoners were stoned to death in Caere, which according to ancient sources resulted in a plague on the city, which was only lifted
after consultation with the oracle at Delphi. By way of expiation, the citizens of Caere were required to schedule athletic contests every year to honour the dead Phocaeans. The Greek prisoners were buried en masse probably at a site located midway between Caere and Pyrgi, which has been recently located.
After the crisis common to the whole of Etruria in the 5th century BC, there was a strong recovery in the next century, made possible in part thanks to the excellent relations enjoyed with Rome, of which Caere was a traditional ally.
In 253 BCE Caere, supporting Tarquinii (modern Tarquinia) against Rome, was defeated and lost part of its territory, including the coastal area.
Deprived of its ports, Caere was thus doomed to a crisis which came to an end with its total extinction in the 1st century CE.
As you can see from the map (below), the area of the ancient city covered approximately 150 hectares, in comparison with the modern town, which occupies only a third of this space. The remainder of the area is now used for agriculture. The plateau of tufa where the city was located runs on a north-east south-west line, roughly 5 kilometers from the sea, and surrounded to the north by the valley of the Manganello, and to the south that of the Mola.
The cliff sides in some places reach a height of 50 meters, and formed the major defensive element of the city. In the areas where the cliffs were lower, or disappeared completely walls were built to form a continuous line of defense. Today a continuous section of 400 meters of wall is still visible. Near the end of the Via degli Inferi (the road to hell, or funerary road) the cliffs on both sides of the Manganello stream were deepened to about 40 meters, to form a defensive trench and wall, integrated in some points with stone walls.
All of these walls date to the first half of the 5th century BCE. There were a series of at least 7 gates, providing outlets to the surrounding areas. The only one to have any visible structures is the so-called "PORTA COPERTO" (covered gate) (A), located on the narrow side of the plateau to the north-east. Through this gate ran a road leading to the Necropolis of Cava della Pozzolana, and beyond it towards the area of Bracciano. Of this gate there remains only descriptions, and a breach in the walls, which here have a width at the base of 5 meters. The second gate (B), opened out onto the north cliff, where a new modern cemetery is under construction. at a point where the cliffs open out into a natural amphitheatre. This gate was mostly intended to give access to the Banditaccia Necropolis. The third gate (C), was along the continuation of the Via degli Inferi, which entered the city area, and reached the Manganello temple. The fourth (D), was located below the temple, and gave access to the sea road, and some of the stone blocks are still visible on the site. The fifth (E), was on the present site of the castle (Castello Ruspoli), and also opened towards the sea. The sixth (F), and the seventh (G), were both on the south cliff, giving access to the Sorbo and Monte Abetone Necropoli, as well as the areas to the south of the city.
The Etruscans built a significant network of roads between their cities, and most of these roads were improved by the Romans, and are still in use today. Both the VIA CLODIA and the initial part of the VIA AURELIA were first laid out by the Etruscans. The Via Clodia runs from the Tiber crossings in Rome to Sovana, in the area of Lake Bolsena. The Aurelia is the coastal road which became a Consular road in the second century B.C. In the city area there have been no regular excavations carried out, but only sporadic probings, notably those done by Mengarelli in the 20's in the area of the sports field, where he found traces of a temple dedicated to HERA, and on a cliff above the Manganello, where a structure was found, probably another temple, of unknown dedication .
Other excavations were carried out in the last century near the remains of the theatre, uncovering a number of marble slabs of the Roman period, of enormous importance, with allegorical images of each of the major Etruscan cities. These slabs are now preserved in the Gregorian Etruscan Museum in the Vatican. The structures in which they were found are classified as being Roman.
The Necropolis Areas
The great development of ancient Caere is shown by the number and wealth of the tombs discovered in its necropolis.
The Necropoli of Cerveteri include the Banditaccia, Sorbo, Cava della Pozzolana, Groppie di San Antonio and Monte Abetone. The Bandittacia represents one of the most interesting archaeological areas in the whole of the Mediterranean.
In the 5th century BCE, a real city of the dead rose up with streets intersecting at right angles and areas devoted to worship. The tombs are more modest than in the previous period: the chambers are small and the style has become standardized.
Only in the last centuries was there a return to the underground tombs with a complex floor plan, the symbol of a return to power by the aristocracy.
The tomb treasures include many bronze and silver objects, refined gold jewellery, vases of local production, including the famous bucchero ware and others imported from Greece and painted terracotta objects including votive figures and heads.
Pyrgi was one of the ports of the city of Caere, lying about eight miles away and was very famous for its sacred area, which was visited by Phoenicians and Etruscans alike. Archaeological excavations have brought to light the remains of two sanctuaries dedicated to Uni and the Phoenician goddess Astarte (Western form of Ishtar). The more ancient can be dated around the 6th century BC, whilst the more recent dates back to the middle of the 5th century BC. The Pyrgi lamellae, a series of three inscriptions on rolls of gold foil (Two in Etruscan and one on Phoenician) were discovered during the excavation of the older sanctuary, and describe a tyrant named Thefarie Velianas, who ruled over Caere at this time. This was about the time of the great alliance between the Etruscans and the Phoenicians which led to the purging of the Greeks from Corsica, and the Phoenician conquest of greek settlements in Sardinia. The joint consecration of the temple by both sides of the alliance in the Pyrgi inscriptions agrees well with historical traditions in that respect.
The fragments of a mythological high relief which decorated the fronton of the more recent temple, and the three gold lamellae are on display in Rome at the Villa Giulia Museum.
Cerveteri is about 50 km North West of Rome. From Fiumicino Airport, you can drive North along the Highway (allow about 20 minutes - Toll section). If you are relying on Public transport, head for Lepanto metro station and take a blue 'Cotral' bus (destination Ladispoli/ Cerveteri). If returning to Rome, buy a 'BIRG' ticket, which will cost about 4 Euros. The trip to Cerveteri takes about 40 minutes. Get off at Cerveteri, which is the terminus. The terminus is next to the museum, located in the Castello Ruspoli, an imposing 11th Century castle.
There is accommodation available in Cerveteri, Ladispoli or Civitavecchia (further afield to the North), contact details below. Very few Italian hotels have refrigerator or air conditioning. It is important to check. Some will not accept credit cards, and will require a cash advance to confirm bookings.
From the piazza in Cerveteri, allow about 30 minutes (hilly) walk to the Banditaccia necropolis, or there is a tourist bus which leaves infrequently. Check with the tourist information centre.
Some Useful Contact Numbers | <urn:uuid:eef1ef93-39af-42c5-816e-9b079444ee5d> | {
"date": "2013-05-23T18:39:08",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9685513973236084,
"score": 3.3125,
"token_count": 2338,
"url": "http://www.mysteriousetruscans.com/caisra.html"
} |
Questions Parents of Gifted Students Should Ask Schools
by James Gallagher
Many parents dread the times they must meet their child's teacher. The thought of meeting the principal or superintendent sends chills up their spines. To many parents, the school is a "castle on the hill," distant and foreboding, a feeling that can prevent parents from interacting with the school system on a constructive basis. However, there are questions that parents of gifted students should ask of their school system regarding the program or services for their children. Their right to ask such questions matches the right of any parent.
What services are available for gifted students in this school and school system, and what are the goals of such services?
The representative of the school should be able to speak at length on the nature and purpose of the program or services the school and school system provide. The school system should have a comprehensive K-12 set of services for gifted students and some special opportunities available to advanced students in all major content fields (math, social studies, etc.). He or she should be able to tell you why and how your child has been deemed eligible for these services and what they hope the outcome will be for your child. These statements should be more specific than "we hope to improve her thinking skills." Be sure to ask, "How do you propose to do this? With what resources?"
How much time each week will my child spend in the gifted education program or receive services?
This question is key since there is great variation among schools regarding the time provided for gifted students. Time allotted to these programs can extend from one hour a week to all day or something in between. Most specialists believe that anything less than five hours a week is unlikely to have a strong positive impact. If the school explains that the child's needs are being taken care of in the regular classroom, they should be able to detail what differentiated services are being applied in that setting, and by whom.
Have the teachers in the gifted education program received specialized training?
All too often, teachers are assigned to gifted programs without any specific preparation. If they have not received training in educating gifted students they should at least have advanced training in the content field they are teaching. The school should also have a viable, articulate plan for helping teachers receive additional preparation if they are not currently certified or otherwise prepared. The regular classroom teacher should also have some special preparation, particularly if the primary responsibility for educating a gifted student depends on him or her.
Has my child received an assessment?
Since individual assessments cost schools money, some administrators would rather rely on general or group tests or on teacher judgment to decide who should be in a gifted education program. The school should tell you what test instruments or procedures are used in assessing your child and what has been learned from them. How far is the child's achievement from the average for his or her grade? Are the results of the assessment being used to develop an education plan tailored for your child?
Are there specialized materials (e.g., software) used in the gifted education program or services?
The school representative should be able to name any special curricula or advanced materials that are being used. These materials should be easily accessible to the student, and the media room should have samples of materials available for parents to review.
How will the school know if the gifted education program or services are working?
Too few school systems are following a specific evaluation plan designed to tell the teacher what is working and what is not and for which children. The school representative should be able to state specifically what they will do to demonstrate the benefits of the program for your child. Findings (test results, analyses of portfolios, or student projects, etc.) should be available to parents and shared on a regular basis.
How can I help the program?
Parents can be valuable adjuncts to the special instruction schools provide, and schools should be able to make specific suggestions as to how parents can help. There may be times, however, when a school is reluctant to accept your input, and your best efforts to be cooperative are rebuffed. It is important for you to know that you are not alone. There are probably other parents who feel the way that you do, and they may already be in an organized group. (You can check with your state gifted education association for names of other interested parents in your area). Groups of parents are invaluable in convincing school administrators that gifted and talented students have special education needs. It sometimes requires repeated efforts.
Parents often do not realize the various pressures that school administrators and teachers are under. Schools must deal with unruly students, students who are failing or are unmotivated, and the school day is often filled with a variety of immediate crises that may keep them from a full appreciation of the needs of your child. Under such circumstances you must remain vigilant. In order to ensure that your child's educational needs are met, you should interact personally with the school. A vigorous parent involvement and inquiry has been one of the best ways to develop a comprehensive, appropriate educational programs for your child.
Dr. James Gallagher is Kenan Professor of Education at the University of North Carolina and has worked over 30 years in the field of education for exceptional children. He has served as the President of the World Council for Gifted and Talented, President of the Council for Exceptional Children (CEC) and of The Association for the Gifted (TAG), and President of the National Association for Gifted Children (NAGC). A prolific author in the field, Dr. Gallagher was editor of the Journal for the Education of the Gifted for eight years. His textbook, Teaching the Gifted Child, is now in its fourth edition. | <urn:uuid:e7390a7e-1140-4f9b-b1b1-452b6b1f5513> | {
"date": "2013-05-23T19:05:46",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9722239971160889,
"score": 2.546875,
"token_count": 1155,
"url": "http://www.nagc.org/index.aspx?id=1116"
} |
Ensuring that the food provided to children in schools is consistent with current dietary recommendations is an important national focus. Various laws and regulations govern the operation of school meal programs. In 1995, Nutrition Standards and Meal Requirements were put in place to ensure that all meals offered would be high in nutritional quality.
School Meals reviews and provides recommendations to update the nutrition standard and the meal requirements for the National School Breakfast and Lunch Programs. The recommendations reflect new developments in nutrition science, increase the availability of key food groups in the school meal programs, and allow these programs to better meet the nutritional needs of children, foster healthy eating habits, and safeguard children's health.
School Meals sets standards for menu planning that focus on food groups, calories, saturated fat, and sodium and that incorporate Dietary Guidelines for Americans and the Dietary Reference Intakes. This book will be used as a guide for school food authorities, food producers, policy leaders, state/local governments, and parents. | <urn:uuid:e5ee44b0-1f02-4367-ac61-85720b88d9c1> | {
"date": "2013-05-23T18:45:57",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9408119916915894,
"score": 3.3125,
"token_count": 195,
"url": "http://www.nap.edu/catalog.php?record_id=12751"
} |
The following HTML text is provided to enhance online
readability. Many aspects of typography translate only awkwardly to HTML.
Please use the page image
as the authoritative form to ensure accuracy.
DRI Dietary Reference Intakes Calcium Vitamin D
SOURCES OF CALCIUM
Ingested calcium comes from food sources and dietary supplements. In this report dietary calcium refers to both food sources and supplements combined (although some researchers reserve the term dietary calcium to mean only food sources) and is most often referred to as total calcium intake for clarity. With more than one-half of the U.S. population (Bailey et al., 2010)—and between 24 and 60 percent of Canadians (2004 Canadian Community Health Survey, personal communication, D. Brulé, Health Canada, April 29, 2010)—reporting use of dietary supplements of some type, dietary supplements must be taken into account when considering the sources of calcium in the diet and, in turn, estimating total calcium intake. Current estimates from 2003 to 2006 indicate that the median total intake of calcium from all sources for persons > 1 year of age ranges from 918 to 1,296 mg/day, depending upon life stage (Bailey et al., 2010). Only small amounts of calcium are contributed by water, depending upon geographic location. Chapter 7 of this report contains an assessment of quantitative calcium intake in the U.S. and Canadian populations.
Calcium is classically associated with dairy products; milk, yogurt, and cheese are rich sources of calcium, providing the major share of calcium from foods in the general diet in the United States and Canada. In the United States, an estimated 72 percent of calcium comes from milk, cheese and yogurt and from foods to which dairy products have been added (e.g., pizza, lasagna, dairy desserts). The remaining calcium comes from vegetables (7 percent); grains (5 percent); legumes (4 percent); fruit (3 percent); meat, poultry, and fish (3 percent); eggs (2 percent); and miscellaneous foods (3 percent).1 Similar data from Canada are not currently available.
Fortification with calcium for a number of foods that do not naturally contribute calcium—such as orange juice, other beverages, and ready-to-eat cereals—is becoming commonplace in the United States (Calvo et al., 2004; Rafferty et al., 2007; Poliquin et al., 2009). These practices challenge the ability of national food composition databases, such as those maintained by U.S. Department of Agriculture (USDA), to keep abreast of these newer products and may result in some underestimation of actual calcium intake from food sources. However, for those persons who choose such foods, total calcium intake is increased. | <urn:uuid:a0215c41-c4d9-478a-b0f3-3efd4e5d8224> | {
"date": "2013-05-23T18:40:11",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9192695617675781,
"score": 3.421875,
"token_count": 559,
"url": "http://www.nap.edu/openbook.php?record_id=13050&page=36"
} |
The following HTML text is provided to enhance online
readability. Many aspects of typography translate only awkwardly to HTML.
Please use the page image
as the authoritative form to ensure accuracy.
DRI DIETARY REFERENCE INTAKES FOR Calcium, Phosphorus, Magnesium, Vitamin D, and Fluoride
average of 61 mg [2 mmol]/day or 5 percent of the total intake) when intakes were calculated using USDA's nutrient database (Pennington and Wilson, 1990).
Because of the uncertainty about phosphorus values for processed foods in nutrient databases, trends in phosphorus intake may be difficult to ascertain. Daily intakes of women aged 19 to 50 years from USDA 's national surveys averaged 965 mg (31.1 mmol) in 1977, 1,039 mg (33.5 mmol) in 1985, and 1,022 mg (33.0 mmol) in 1994 (Cleveland et al., 1996; USDA, 1985). Thus, it appears that intakes from foods increased about 8 percent between 1977 and 1985, but then decreased slightly between 1985 and 1994. Food supply data show a larger increase in phosphorus consumption: 12 percent from 1980 through 1994 (from 1,480 to 1,680 mg [47.7 to 54.2 mmol]/day per capita) (USDA, 1997). However, disappearance data may be unreliable for detecting trends because phosphate additives (such as those in cola beverages) are not included. Disappearance data on phosphorus-containing additives show that the use of these additives has increased by 17 percent over the last decade (Calvo, 1993). These figures also do not reflect actual consumption, because not all phosphates included in disappearance data are actually consumed, (for example, blends of sodium tripolyphosphate and sodium hexametaphosphate are used in brines for curing meat, but the brine is rinsed off and not consumed). Nevertheless, taken together, these data suggest a substantial increase in phosphorus consumption, in the range of 10 to 15 percent, over the past 20 years.
Food Sources of Phosphorus
Phosphates are found in foods as naturally occurring components of biological molecules and as food additives in the form of various phosphate salts. These salts are used in processed foods for nonnutrient functions, such as moisture retention, smoothness, and binding.
In infants, dietary intake of phosphorus spans a wide range, depending on whether the food is human milk, cow milk, adapted cow milk formula, or soy formula (see Table 5-2). Moreover, the phosphorus concentration of human milk declines with progressing lactation, especially between 4 and 25 weeks of lactation (Atkinson et al., 1995). By contrast, more of the variation in dietary intake of phosphorus in adults is due to differences in total food intake and less to differences in food composition. Phosphorus contents of adult diets average about 62 mg (2 mmol)/100 kcal in both sexes (Carroll et al., 1983), and phosphorus:energy ratios exhibit a coefficient of variation of only | <urn:uuid:c1127129-c0ac-4e85-96ae-011428fcd4ff> | {
"date": "2013-05-23T18:32:41",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8973549604415894,
"score": 3.03125,
"token_count": 622,
"url": "http://www.nap.edu/openbook.php?record_id=5776&page=155"
} |
STS-132 -- Mission to the International Space Station
The crew of space shuttle mission STS-132 has completed its mission!
Six astronauts were on space shuttle Atlantis for the STS-132 mission. The STS-132 crew took a new section to the space station. The new piece is from Russia. The new room is called Rassvet, which means dawn
in Russian. This gives the station more storage space and a new place for Russian spacecraft to dock.
Astronaut Ken Ham was the STS-132 commander. Before becoming an astronaut, Ham was a pilot in the U.S. Navy. STS-132 was his second trip to space.
Astronaut Tony Antonelli was the STS-132 pilot. Antonelli was a pilot in the U.S. Navy before he became an astronaut. He flew his first mission in space as the pilot of STS-119.
Michael Good was a mission specialist. In 2009, Good was part of the last space shuttle crew to visit the Hubble Space Telescope. During that mission, he spent almost 16 hours working outside the space shuttle. The STS-132 mission was his first trip to the International Space Station.
STS-132 was Garrett Reisman's second trip into space. In 2008, he spent over three months living aboard the International Space Station. He was a flight engineer for the Expedition 16 and 17 missions.
Astronaut Piers Sellers is from the United Kingdom. Before he was an astronaut, he studied Earth's climate. The STS-132 mission was Sellers' third trip to space. He flew on space shuttle missions in 2002 and 2006.
Steve Bowen is the first submarine officer chosen to be a NASA astronaut. STS-132 was his second mission to space. In 2008, Bowen went on three spacewalks during his first mission, STS-126.
The STS-132 Patch
Each crew designs a patch that highlights its mission. The STS-132 patch has the names of the crew on a black border. The patch features Atlantis flying off into the sunset. This shows there are only two more shuttle flights planned after STS-132.
to learn about other missions. | <urn:uuid:2d297cde-dede-4d91-aa45-c0ec25b63661> | {
"date": "2013-05-23T19:06:18",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9649966359138489,
"score": 2.734375,
"token_count": 458,
"url": "http://www.nasa.gov/audience/forkids/kidsclub/text/nowinspace/STS-132_Shuttle_Crew.html"
} |
Health officials on alert for tick fever
By Cindy Yurth
WINDOW ROCK, May 24, 2012
S ummer is almost here, which means the Navajo Nation Veterinary and Livestock Program is once again bracing for an epidemic the Navajo Nation has managed to avoid for several years through, near as anybody can tell, sheer luck.
Since 2003, Rocky Mountain Spotted Fever has been identified in Arizona. There have been 194 cases and 17 deaths - all Native Americans living on three reservations near Phoenix, and mostly children under eight years old.
Glenda Davis, head of the Veterinary and Livestock Program, says it's no mystery why Arizona's Natives are most susceptible to the sometimes fatal disease.
"It's our culture," she said. "We think we have to let our dogs run free."
The bacterium that causes spotted fever, Rickettsia rickettsii, is transmitted by ticks, and ticks are transmitted by dogs.
For years, it was thought that only three species of tick - the deer tick, the Rocky Mountain wood tick and the Lone Star tick - carried the bacterium. But lately, it has turned up in the brown dog tick. That's the extremely common tick that, unless you regularly treat your dog for ticks and fleas, is probably sucking blood from him right now.
If an infected tick bites your dog, Davis explained, the bacterium gets into the animal's bloodstream, where it can infect the next tick that sucks its blood. If that tick then bites you or your child, it transmits the bacterium to you through its blood-thinning saliva.
If you're lucky, you will soon exhibit the classic spotted rash that characterizes Rocky Mountain Spotted Fever. Your physician will recognize it and give you doxycycline, and you will start to recover in a few days.
But many victims don't exhibit the rash. Instead, they will have flu-like symptoms such as body aches, respiratory problems and nausea. It's quite possible their doctor will tell them they have a flu virus, and send them home with a prescription of aspirin and bed rest.
In eight days, their organs will start shutting down and they could die or be left with permanent neurological symptoms.
Since the Phoenix area tribes are plagued by stray dogs and many pet owners don't believe in confining their pets, the disease has spread rapidly - from 13 cases in 2004 to around 50 last year.
The only mystery, Davis said, is why it hasn't shown up in humans on Navajo, where an estimated 250,000 to 400,000 dogs are running free, and most have ticks.
According to Davis, the Centers for Disease Control sampled blood from dogs in all the Navajo Nation animal shelters in 2005, and found rickettsii in Shiprock and Crownpoint.
That has given the Navajo Nation some lead time in preparing for a possible outbreak.
Davis said her program has alerted the IHS, the community health representatives and the Navajo Housing Authority to be on the lookout for tick infestations and humans or animals exhibiting symptoms of the disease.
But, as with any health problem, the bottom line is personal responsibility.
"This is a very, very preventable disease," she said, "but we have to change our cultural outlook."
The best thing an individual family can do, Davis said, is to stay away from ticks. Check yourself and your children daily for the insects and tweeze them out straight up if you find them. Don't crush them to death with a thumbnail - if they're gorged with infected blood, you may just be spreading the bacterium. Instead, drop them into a bottle of alcohol or bleach.
Once you've been bitten, watch carefully for flu-like symptoms and rush to the doctor if you suspect tick fever. Be sure to tell your physician you've had a tick bite so he doesn't dismiss the symptoms as an ordinary flu.
Here are some other tips:
Treat all your dogs for ticks and fleas, and don't let them roam at large where they can mingle with strays Wash pet and human bedding frequently and dry in dryer (but be aware this isn't a cure - in some life stages, ticks can survive a trip through both the washer and dryer) Keep pet and human sleeping areas separate Don't stack wood against your house Use an insect repellent with DEET when you go outdoors in the summer, or before handling tick-infested pets If you suspect you have a tick infestation in your home, have it professionally fumigated Trim back thick vegetation around your home, and drain standing water (ticks can go weeks without feeding on blood, but need regular drinks of water) Don't leave old mattresses or couches outdoors for summer sleeping - ticks love hiding out in old upholstery Spay or neuter your pet to prevent overpopulation and more roaming strays Turn unwanted pets over to Animal Control rather than releasing them to fend for themselves
In the meantime, arm yourself with education. The NNVLP can provide plenty of written material, or a training seminar for your chapter, church or housing unit.
If everyone is on the alert, it could mean the difference between an epidemic on Navajo and a disease that - so far - we've only heard about. | <urn:uuid:6194261b-bc18-48fa-ba45-fa119891f4e8> | {
"date": "2013-05-23T18:37:36",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.957046627998352,
"score": 3.046875,
"token_count": 1093,
"url": "http://www.navajotimes.com/entertainment/2012/0512/052412fev.php"
} |
Stealth submarines. Powerful aircraft carriers. The most imposing vessels in America’s Navy rely on small-scale nuclear reactors to provide everything from basic propulsion to power generation. But they also depend upon an essential human element – skilled nuclear technicians, power plant operators and subsystems specialists. These highly trained, hands-on professionals perform the complex technical functions that are at the core of sub and carrier capabilities.
In the nuclear operations area, you’ll have the opportunity to undergo training that’s among the most advanced the Navy has to offer. Not to mention the chance to work with and among some of the brightest technical professionals in the nuclear, technology and engineering fields. Such are the challenges and rewards that go with being associated with one of the world’s top nuclear programs.
As a member of the Navy nuclear community, you’ll operate, control and maintain the state-of-the-art components that power Navy aircraft carriers and submarines. That could involve doing anything from operating nuclear propulsion plant machinery to controlling auxiliary equipment that supports Naval reactors to maintaining the electronic equipment used to send and receive messages, detect enemy planes and ships and determine target distance.
You may also:
- Stand watch on generators, switchboards, control equipment and electrical equipment
- Repair gas turbine engines
- Control steam generators
- Operate pumps, turning gear, air compressors, air dehydrators, and engineering and control systems
- Inspect and maintain ship alarm systems
A college degree is not required to become an Enlisted member of the highly respected Navy nuclear community, but an aptitude for math, science and problem solving is key – as is the ability to think fast, retain complex knowledge and work under pressure.
Responsibilities in the Navy Nuclear operations area depend upon the job rating or specialty you are in.
MACHINIST'S MATES (MM) operate and maintain steam turbines and reduction gears used for ship propulsion and auxiliary machinery such as turbogenerators, pumps and oil purifiers. They also maintain auxiliary machinery outside of main machinery spaces, such as electrohydraulic steering engines and elevators, refrigeration plants, air conditioning systems and desalinization plants. They may also operate and maintain compressed gas producing plants. Nuclear-trained MMs perform duties in nuclear propulsion plants operating reactor control, propulsion and power generation systems.
ELECTRICIAN'S MATES (EM) are responsible for the operation of a ship's electrical power generation systems, lighting systems, electrical equipment and electrical appliances. The duties include installation, operation, adjustment, routine maintenance, inspection, test and repair of electrical equipment. EM's also perform maintenance and repair of related electronic equipment. Nuclear-trained EMs perform duties in nuclear propulsion plants operating reactor control, propulsion and power generation systems.
ELECTRONICS TECHNICIANS (ET) are responsible for electronic equipment used to send and receive messages, computer information systems, long range radar, and calibration of test equipment. They maintain, repair, calibrate, tune, and adjust electronic equipment used for communications, detection and tracking, recognition and identification and navigation. Nuclear-trained ETs perform duties in nuclear propulsion plants operating reactor control, propulsion and power generation systems.
Beyond being capable of general duties, each of these specialized ratings requires additional “A” school training to earn required qualification in the Nuclear Field (NF).
As an Enlisted Sailor working in nuclear operations, you’ll have the opportunity to work at sea or onshore. Your assignment could place you aboard a nuclear-powered submarine or on board nuclear-powered aircraft carriers. Whatever your specific responsibilities, you'll be operating, controlling and maintaining shipboard nuclear propulsion plants. Working closely with industry-leading technology and highly specialized personnel in an intense, fast-paced environment with little room for error.
Training and Advancement
To work in Navy nuclear operations, you will receive some of the most advanced job training the military has to offer. After your initial recruit training, you will report to “A” School for technical training that's based on your specific job rating, and then move on to acquire advanced nuclear training.
NAVY NUCLEAR FIELD (NF) PROGRAM
To become a nuclear-trained MM, EM or ET qualified in the Nuclear Field (NF), you must complete:
- “A” School requirements associated with your rating
- Training requirements at Naval Nuclear Power School (NNPS)
- Training requirements at Nuclear Power Training Unit (NPTU)
“A” School for MMs – The three-month Machinist’s Mate (MM) course in Charleston, SC, provides you with a basic knowledge of technical mathematics and a basic understanding of the theory and operation of a steam power plant. You will learn to operate tools, test equipment, and system components, read blueprints, practice rigging techniques, and perform maintenance procedures such as packing a valve or aligning a pump coupling. From there, it’s on to NNPS and NPTU (see description below).
“A” School for EMs – The six-month Electrician’s Mate (EM) course in Charleston, SC, provides you with a basic knowledge of technical mathematics and a basic understanding of power distribution. You will solve basic equations using phasors, vector notations and basic trigonometry and analyze DC and AC circuits. You’ll have the opportunity to demonstrate working knowledge of DC and AC motors and generators. In addition, you will learn how to operate electrical equipment using controllers, and how to properly test, maintain, troubleshoot, and repair electrical circuits, motors, cables, circuit breakers, and other related electrical equipment for power distribution. From there, it’s on to NNPS and NPTU (see description below).
“A” School for ETs – The six-month Electronics Technician (ET) course in Charleston, SC, provides you with a basic knowledge of technical mathematics and a good working knowledge of electricity and electronics, solid-state devices, digital logic and systems, microprocessors, and instrumentation and control circuits. You will learn how to interpret schematic diagrams and use appropriate test equipment to isolate and correct faults in electronic systems. From there, it’s on to NNPS and NPTU (see description below).
Naval Nuclear Power School (NNPS) – Upon completion of “A” School training, MMs, EMs and ETs then attend Naval Nuclear Power School (NNPS) in Charleston, SC. Here, you will learn theory and practical application of nuclear physics and reactor engineering. The six-month course will provide you with a comprehensive understanding of a pressurized-water Naval nuclear power plant, including reactor core nuclear principles, heat transfer and fluid systems, plant chemistry and materials, mechanical and electrical systems, and radiological control.
Nuclear Power Training Unit (NPTU) – Following NNPS, MMs, EMs and ETs begin prototype training in their rating specialty at one of two Nuclear Power Training Units (NPTUs) – located in Charleston, SC, or Ballston Spa, NY. This six-month course will provide you the knowledge of the fundamentals of a Naval nuclear power plant and the interrelationship of its mechanical, electrical, and reactor subsystems. Here, you will develop oral communications skills, as well as obtain an understanding of the physical nature of nuclear radiation, its detection, interaction with matter and human health consequences, and gain knowledge of the safe operation of a complex Naval nuclear power plant and its sophisticated subsystems with an emphasis on basic industrial safety principles. In addition, you will learn to identify, troubleshoot, and correct problems in nuclear mechanical, electrical, or reactor control systems at the component level with an emphasis on reactor systems, and apply earlier technical classroom knowledge gained to the practical, safe operation of Naval nuclear power plants.
The educational opportunities available to nuclear- and submarine-trained Enlisted Sailors range from college-level classes in physics, chemistry, mathematics, electrical engineering, circuit theory, systems maintenance, communications and thermodynamics to nuclear engineering training in nuclear power plant design, construction, instrumentation and operations. The American Council on Education (ACE) has verified the extensive nature and unsurpassed quality of the Navy’s nuclear propulsion training program by recommending up to 77 semester hours of college credit.
Upon selection for nuclear and/or submarine training, you will enter the Navy in paygrade E-3. If you complete all advancement-in-rate requirements, you may advance to paygrade E-4. Enlistment and reenlistment bonuses in addition to Navy salary, special duty assignment pay, and allowances for food and housing are also available. If you volunteer and are selected to serve on nuclear submarines, you are eligible for added submarine duty incentive pay from the day you graduate from nuclear training.
You are required to be a U.S. citizen and less than 25 years old at the time of your enlistment. You must be a high school graduate with a diploma and with successful completion of one year of Algebra, and able to meet security clearance requirements.
After the Navy
Your knowledge of traditional and nuclear power will be an asset in high demand, whether with America’s Navy or the civilian sector. Your advanced understanding of the operation and maintenance of sophisticated electronics will put you at the top of any civilian job candidate list. Your experience, ability to work under pressure and advanced skill level will lead to opportunities to work closely with specialists in the fields of nuclear technology, engineering and electronics. | <urn:uuid:72fe707c-3489-4c44-af18-8b0b52c547f2> | {
"date": "2013-05-23T18:45:41",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9178708791732788,
"score": 2.828125,
"token_count": 1974,
"url": "http://www.navy.com/careers/nuclear-energy/nuclear-operations/"
} |
NetWellness is a global, community service providing quality, unbiased health information from our partner university faculty. NetWellness is commercial-free and does not accept advertising.
Thursday, May 23, 2013
Injury Prevention and Safety
which color bruise is considered to be the worst?
Health professionals used to rely on bruise color to estimate how recently an injury occurred. However, it is well known now that bruise color is not at all a reliable measure of how bad a bruise is or when the injury occurred.
Large bruises over the abdomen and pelvis that may signal that serious damage has been done to the organs underlying the bruise. The bruise itself is deceptive because you can't see the underlying damage that is far more serious than the visible discoloration. This can be deadly, especially if organs rich in blood supply such as the liver and spleen are damaged and the person bleeds to death internally.
Of course, bruises over the bone can mean that a hemorrhage occurs under the bony covering called the periosteum and also may lead to a fracture of the bone underneath. These are certainly painful but do not lead to death very often. They can look worse because of the impact of the blood vessels onto the bone as compared to soft tissue bruising over the abdomen. Bruises around the eyes and ears can damage vision and hearing if the force of the injury was significant.
The bottom line is that color is not what is so important. It is much more important what the force of the injury was and what parts of the body are underneath the force of the injury. I hope this answers your question.
Mary M Gottesman, PhD, RN, CPNP, FAAN
Professor of Clinical Nursing
College of Nursing
The Ohio State University | <urn:uuid:56c72567-b87d-48b8-b87a-7aabda38c9fe> | {
"date": "2013-05-23T18:46:26",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9511160850524902,
"score": 2.90625,
"token_count": 366,
"url": "http://www.netwellness.uc.edu/question.cfm/59757.htm"
} |
WebMD Medical News
Brunilda Nazario, MD
Jan. 25, 2012 -- Working 11-hour days may seem the norm in this economy, but regularly logging long hours can more than double a worker’s risk of depression.
People who routinely put in more than 11-hour days more than double their chances of major depression, compared to employees who typically work about eight hours a day, a new study suggests.
Long workdays take a physical toll on the body, but there's been mixed evidence of their effects on the brain. And little is known about the link between long work hours and depression.
This research looked at more than 2,000 British civil servants who had no mental health problems when the study began in 1991, and whose average age was 47. About six years later, 66 cases of major depression were found in the workers after they received mental health screenings.
Men and women who worked more than 11-hour days had a more than twofold increased risk of depression, compared to public employees who spent less than eight hours at the office.
The civil servants who were more likely to become depressed were typically younger females in lower job grades who used alcohol moderately and also had a chronic disease.
The research appears in the online journal PLoS ONE.
A variety of genetic, physical, and emotional factors can make a person vulnerable to depression. At the workplace, the prolonged stress felt by people with long hours is one of the contributing factors to depression.
"Long working hours are likely to be related to less time to relax and less sleep," says study researcher Marianna Virtanen, PhD. She is a team leader of the Work and Mental Health team at the Finnish Institute of Occupational Health in Helsinki.
"It is also possible that excessive working hours result in problems with close relationships, which in turn, may trigger depression," Virtanen says.
The current economic climate has millions of people working extremely long hours -- or holding two or three jobs just to make ends meet. Many of us are working too much. So how can you tell if all those hours are affecting your mood?
Some warning signs for depression include trouble sleeping, feeling stressed, being irritable and dissatisfied, or lacking pleasure in those things that usually make you happy. You may also make more mistakes on the job, or have trouble getting organized or concentrating.
Workaholics are not immune to depression, but Virtanen suspects it might take them longer to develop depression because they probably find their jobs more rewarding than people who may be forced to put in longer hours.
Although this research was done in the 1990s, these days technology tethers us even closer to our jobs. "Work is no longer so much tied to time and place," Virtanen says. "This may make some people feel highly attached to their work tasks outside of their usual working hours."
Although the study only looked at public employees in white-collar jobs, it's unclear if similar results would be found in blue-collar or private-sector workers.
Of course, working long hours is not the only reason people become depressed, but the study raises awareness that it can play a role, says Randy Auerbach, PhD, who researches depression at McLean Hospital in Belmont, Mass.
Auerbach said the number of cases of depression found were reasonable for this population, and that the researchers did a good job accounting for other factors that may contribute to depression, such as economic status, alcohol use, social support, and gender.
The reality is that employees are often driven to work more to hold on to the job and income they have. If it doesn't seem feasible to cut back on your hours, Auerbach says, then ask yourself, "What can I do to put my mental and physical well-being first?"
Longer work hours could result in less time with your loved ones and less time to invest in your self-care. Sleep often slides, as do plans to exercise and eat healthy foods. Time with family and friends may take a back seat.
Yet these are many of the healthy ways that buffer against stress and let people blow off steam.
"It's important to have periods with less pressure at work and shorter hours," Virtanen says. Her other tips for work-life balance include making a distinction between work and leisure, not skipping your vacation time, and taking care of your health, especially sleep and exercise.
SOURCES:Virtanen, M. PLoS One, published online Jan. 25, 2012.Marianna Virtanen, PhD, team leader, Work and Mental Health team, Finnish Institute of Occupational Health, Helsinki, Finland.Randy Auerbach, PhD, instructor, department of psychiatry, Harvard Medical School, Boston.
The Health News section does not provide medical advice, diagnosis or treatment. See additional information. | <urn:uuid:4080e215-1ca4-4e22-ad88-0502301d9fa6> | {
"date": "2013-05-23T18:45:22",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9714123606681824,
"score": 3.046875,
"token_count": 999,
"url": "http://www.newschannel34.com/webmd/depression/story/Too-Much-Overtime-May-Raise-Depression-Risk/o5iXf6gU00aKnuiVVyBCmw.cspx"
} |
The Japanese do not just dream of perfect ski slopes, they are developing the technology to produce them.
Six Japanese companies have carried out 'extensive research' to provide artificial snow for Japan's skiers when nature fails to fill the need (European patents 440 256 and 440 257).
Existing snow machines only work properly at very low ambient temperatures; otherwise they just produce slush. The new trick is to use granules of polymer, such as polyacrylic acid salts, which absorb a large volume of water. The snow makers then mix the bloated polymer with natural snow, if available, or other artificial snow. Finally they freeze the mixture.
Ice bridges form between the polymer granules and snow crystals to make good snow for skiing. The companies have tried colouring the snow with dyes and adding perfume, so that the snow smells nice as well as looking good.
To continue reading this article, subscribe to receive access to all of newscientist.com, including 20 years of archive content. | <urn:uuid:59594da8-7e1f-4f0e-affd-896e5fcdc5e8> | {
"date": "2013-05-23T19:08:06",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9192221760749817,
"score": 3.078125,
"token_count": 204,
"url": "http://www.newscientist.com/article/mg13318054.300-patents-perfumed-pistes.html"
} |
Zen, Japan and the art of democracy
Foreign observers have long been baffled by Japan’s self-discipline in the face of multiple disaster
Western Europe has experienced only one "killer" earthquake of similar magnitude to the one that struck Japan on 11 March 2011. Even so, the Lisbon earthquake of 1755, also followed by a tsunami and fire, caused a profound though arguably short-lived crisis in western thought. The indiscriminate loss of life challenged both Christian beliefs in God's benevolence and omnipotence and the Enlightenment's new, humanist conception of a well-ordered universe (the German philosopher Gottfried Leibniz's "best of all possible worlds") with man as its rational and progressive centre.
Leading intellectuals such as Voltaire put God and nature on trial and found both guilty. Believers in the wrathful Old Testament God argued, however, that the disaster was divine punishment for the sins of Lisbon. At which Voltaire thundered: "Was Lisbon more sinful than London or Paris?" Rousseau wrote a letter to Voltaire in response, chiding him for his insults - not to God but to nature. If people had dispersed themselves throughout the natural world rather than being pent up in a crowded city, there would not have been so many deaths. The descendants of Rousseau can be found among those environmentalists who see the recent catastrophe in Japan as nature's revenge for the country's whaling.
The Lisbon earthquake was a one-off in European history. Memories of it faded. God was soon back in heaven and all was right with the world. One can only imagine the effect on European thought and culture if such events had become a regular occurrence over the past two and a half centuries, as they have been in Japan. Since 1755, Japan has experienced as many as two dozen major earthquakes, as well as countless smaller ones, reminding the people of the ever-present danger beneath their feet. But, as foreign observers always remark, the Japanese accept these catastrophes with an uncomplaining stoicism and self-discipline, and without the slightest hint of theological or humanistic crisis. To understand why, we must first look at the two major religious traditions of Japan, Shinto and Buddhism.
Modern Shinto descends from the animistic beliefs of the ancient Japanese, whose myths make clear that, like the pre-Christian Romans, they did not expect their gods to be unfailingly just or benevolent. The storm god in particular, Susano-o (whose name suggests the angry whistling and howling of the wind), could act like a divine hooligan when he was in a foul-weather mood. Like Zeus with his lightning bolts, Susano-o could devastate swaths of human settlement with a single blow. He could also be vengeful and sadistic. According to the oldest collection of Japanese myths, the Kojiki (712), once, when he was angry with his sister the sun goddess, he ran amok, destroyed her rice fields, defecated in her hall, flayed her pony alive and hurled it at her spinning loom and then murdered one of her attendants. His sister was so outraged that she hid in a cave, causing darkness to fall. Only when she was tempted to peek out by her fellow gods' laughter - reputedly provoked by another goddess's striptease - was light restored to the world.
The ancient Japanese were practical, worldly people - again, much like the ancient Romans - and they seem to have felt little inclination to philosophise about why their gods took pleasure in periodically inflicting on them major natural disasters. They accepted these catastrophes as a part of human life and built their homes of lightweight materials that would not fall too heavily on their heads. It wasn't until Buddhism arrived in the 6th century that the Japanese began to try to explain their frequent experience of death and mass upheaval from a wider, philosophical perspective.
With its central doctrines of accepting that life is transient and full of suffering and that it is therefore necessary to free oneself through enlightenment from the wheel of life and death, Buddhism had a satisfying, ready-made world-view for a cataclysm-prone country. The Buddhist attitude is well expressed by the 13th-century hermit Kamo no Chomei, who fled to the hills above Kyoto to escape a series of natural and man-made disasters. In his poetic diary, An Account of My Hut (1212), he admonishes us: "The flow of the river is ceaseless and its water is never the same. The bubbles that float in the pools, now vanishing, now forming, are not of long duration: so in the world are man and his dwellings." Echoes of Heraclitus.
This sense of life as transient and fragile was elaborated into a more formal philosophy by Dogen (1200-53), the Thomas Aquinas of Zen Buddhism. Dogen's philosophy is one of impermanence and emptiness, or non-essentialism: it is not only nature that has no fixed or permanent identity; neither does man. "The thought of enlightenment . . . is the mind which sees into impermanence." Or, more poetically:
To what shall I liken the world?
Shaken from a crane's bill.
Impermanence (mujo) became a central theme of Japanese art and literature and has permeated every other realm of the culture. It may seem paradoxical that, for all nature's savagery throughout their history, the Japanese have devoted so much of their literature and art to extolling its beauty. How can one love a cruel, pitiless, indifferent nature that produces earthquakes and tsunamis? The haiku poet Matsuo Basho's answer to this conundrum comes from Zen: if nature offends your ego, then transcend your ego by becoming one with nature.
Basho's life was full of loss and sorrow, but he turned to nature to transform, or "refine", that sorrow into what he called sabi (literally a sense of loneliness). This was an impersonal, ego-less state of oneness with nature and detachment from the self. For Basho, poetic practice was an exercise in self-abnegation, rather like what John Keats called "negative capability". As Keats wrote: "With a great poet, the sense of beauty overcomes every other consideration, or rather obliterates all consideration."
The haiku poet "empties" himself to experience nature as it is, unfiltered through the human ego. In the work of an English nature poet such as Wordsworth, poet and nature are equally present (in "Daffodils", he refers to himself eight times in 24 lines). In the best of Basho, the poet vanishes and only nature remains:
Pierce through rock.
The Japanese political response to disasters or unexpected national emergencies has been less inspiring. Since the Heisei era, the reign of the present emperor, began in 1989, Japan has faced a series of emergencies: the bursting of the financial bubble in 1990, the Kobe earthquake of 1995, the Aum Shinrikyo terrorist attack that same year and the Tohoku earthquake and tsunami of April 2011. In each case, the response of the government and its elite bureaucracy has been lethargic and uninspired. If one is looking for a deeper cultural or historical reason for this apparent incapacity for quick thinking or flexible, responsive action, a good place to start with is Prince Shotoku (573-621).
Shotoku was the Alfred the Great of Japan. He "made" Japan just as Alfred made England by establishing the basis of a national identity and polity. In his constitution of 604, Shotoku advises his countrymen of the need for wa, or "harmony". The best way for a nation to attain harmony, he argues, is to have a wise ruler but, because wise rulers come along "only once in a thousand years", the next best way is to achieve consensus among the ruling class. The Japanese political establishment has taken this advice to heart ever since. The problem is that consensus does not work well in an emergency, which requires independent, decisive action on the part of a responsible leader.
Who is in charge in Japan? According to the country's first modern constitution of 1889, the emperor is sovereign - but the emperor has never really been in charge, at least not for the past millennium. Some right-wing thinkers have identified him with the Buddhist concept of mu, or "nothingness": the powerless centre of power, all the more powerful symbolically for being powerless politically. They view the emperor as a kind of negative polarity, holding the nation in harmonious, positive alignment (a mu that produces wa, so to speak). The problem is that not only the emperor, but the prime minister and all the senior government officials and bureaucrats seem to be manifestations of mu - incapable of taking a strong stand or any kind of independent action.
Fifteen prime ministers have served the emperor Akihito, who is now in the 23rd year of his reign. This is a less salutary form of mujo, or impermanence, and not one that inspires in the Japanese public much confidence in their leaders. In The Enigma of Japanese Power (1989), the Dutch journalist Karel van Wolferen describes Japan as a "stateless nation", controlled by a faceless, unaccountable, oligarchic elite from behind the scenes. Little has changed in the past 20 years.
In Ikiru (1952), Akira Kurosawa's film satirising bureaucracy, housewives in a poor neighbourhood of Tokyo petition City Hall to turn a mosquito-infested swamp into a playground. Holding their children, the women are sent from one government department to another, in a dizzying round of bureaucratic buck-passing. After finally being sent back to where they started, they explode in anger: "You're making a mockery of democracy!"
Japan's postwar democracy was still in its infancy and Kurosawa was trying to instruct his countrymen in a new way of thinking: that governments exist to serve their people. Looking at the political establishment's sluggish response to crisis 60 years later, one might doubt whether they ever took the lesson to heart.
Two weeks after the catastrophe of 11 March, doctors in Miyagi Prefecture in north-eastern Japan were complaining to the media that they and their patients were surviving on two balls of rice a day. The press was full of stories of citizens who had loaded their cars with noodles, rice or even restaurant food and had driven hundreds of kilometres to distribute these to victims throughout the coastal areas. They were able to do so because the roads were not clogged, as one might have expected, with military convoys distributing food and medicine and evacuating the wounded.
Trappings of modernity
Where was the government? The disaster had affected only a small part of the country; surely a more efficient distribution of food could have been possible, given the immense resources at Japan's command? Many had asked the same question after the Kobe earthquake - and that was not in an isolated region like Tohoku, but in a major city in central Japan. At that time, Kobe's infamous yakuza gained considerable public esteem by distributing food to the needy and homeless far more efficiently than the state was willing or able to do.
Despite its modern, democratic trappings, the Japanese government does not seem to understand that it is a public service. People exist to serve the state, not the other way around.
In the more psychologically powerful, symbolic terms preferred by the conservative establishment, the state is identified with the emperor. As the wartime slogan put it: "One hundred million lives for the emperor!"
As recently as 2000, Yoshiro Mori, the then prime minister, assured his audience at a meeting with pro-Shinto politicians, "Japan is a divine land centred on the emperor" - abrogating the postwar constitution at a single stroke. Similarly, after the Tohoku catastrophe, the governor of Tokyo, Shintaro Ishihara, caused outrage by declaring that the earthquake was "divine punishment" for Japan's present-day materialism. To which one might respond: isn't Tokyo a lot more materialistic than Tohoku, one of the poorest regions of Japan?
The present constitution, enacted on 3 May 1947, stipulates that the people are sovereign, not the emperor, as in the 1889 Meiji constitution. But many conservatives, it seems, still prefer the Meiji version. As Mori's remarks made clear, they feel nostalgia for the pre-war kokutai (national polity), which combined politics with Shinto. Again, such sentiments contravene the postwar separation of religion and state. To many right-wingers, the 1947 constitution is tainted because it was enforced by the Allied (mostly American) occupation authorities following Japan's defeat in the Second World War. It is perceived as "un-Japanese" and as an attempt to impose values that are alien to the country's culture and politics.
As the writer Yukio Mishima once remarked, the emperor is the political establishment's "joker", or trump card, to play when the chips are down. This trump card has long enabled the far right to cloak itself in the sanctified aura of "imperial tradition" and also enabled the establishment to escape the self-inflicted debacle of the Second World War almost miraculously intact, except for the token offering of a few sacrificial victims to the International Military Tribunal for the Far East in 1946-48. This was in contrast to Japan's fascist allies in Europe, where the fall of Hitler and Mussolini forced a credible break with the older political systems in Germany and Italy.
Sure enough, now that the chips are down, the emperor has been despatched to visit earthquake victims, gracing his subjects with the divinity that "doth hedge a king". The people have welcomed his visits gratefully - but not so much those of the prime minister. When Naoto Kan visited the earthquake area three weeks after the event, one homeless 72-year-old woman seemed underwhelmed. "I don't expect anything from the government," she said.
Kan came into office in 2010 vowing to replace back-room rule by bureaucrats with a newly decisive politics. If the March earthquake was his first great test, however, one can hardly say that he has impressed. Kan survived a no-confidence vote on 2 June by promising to resign in the near future; by late June the opposition parties were demanding a firm date for his departure and, in protest at his tenure, delaying the implementation of a special budget for post-earthquake reconstruction. Victims have expressed outrage that crucial work has been delayed even further because of these familiar factional squabbles.
Revolutions in Japan have never originated with the people. They, too, have been imposed from above after power struggles among the ruling elite (the so-called Meiji Restoration of 1868 is a good example). The Japanese are a profoundly conservative people, and for understandable reasons. If the ground beneath one's feet has a habit of shaking, cracking and convulsing, one would hope for social and political stability, at least. Grumbling will follow the rumblings, but the shaky foundations of the state are likely to remain standing, however precariously.
Japan today desperately needs that leader who Prince Shotoku said appears only once a millennium - if not a Shotoku, at least a Sebastião José de Carvalho e Melo, prime minister of Portugal at the time of the great Lisbon earthquake, who, when asked by panicking officials what they should do, answered: "Feed the living and bury the dead."
Roy Starrs teaches Japanese studies at the University of Otago, New Zealand.
His latest book, "Modernism and Japanese Culture" (Palgrave Macmillan, £16.99), will be published on 20 October
More from New Statesman
- Online writers:
- Steven Baxter
- Rowenna Davis
- David Allen Green
- Mehdi Hasan
- Nelson Jones
- Gavin Kelly
- Helen Lewis
- Laurie Penny
- The V Spot
- Alex Hern
- Martha Gill
- Alan White
- Samira Shackle
- Alex Andreou
- Nicky Woolf in America
- Bim Adewunmi
- Kate Mossman on pop
- Ryan Gilbey on Film
- Martin Robbins
- Rafael Behr
- Eleanor Margolis | <urn:uuid:5d8e92ce-5a64-412c-836d-550357c0aa10> | {
"date": "2013-05-23T18:34:13",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9690215587615967,
"score": 2.859375,
"token_count": 3401,
"url": "http://www.newstatesman.com/asia/2011/07/japan-essay-nature-earthquake"
} |
Jared Diamond, traditional societies and myths of the future
Civilisation’s gains and losses.
The World Until Yesterday: What Can We Learn from Traditional Societies?
Allen Lane, 512pp, £20
From the standpoint of anthropology, a distinguished practitioner of the discipline once told me, modernity is an unnecessary concept. It was a striking observation. The idea that modern human beings are vastly different from those who came before is central to the way that many people now think of themselves and, for most of them, it seems obvious that being modern is an unmixed blessing. Economists and some historians tell impressive-sounding stories of how humankind has struggled to leave behind the darkness and misery of pre-modern times to achieve its present level of wellbeing and enlightenment, while “modernisation” has been the rallying cry of generations of politicians.
To be sure, the meaning of modernisation has changed over time. If practically the entire political class today understands being modern to mean that society must adapt itself to the market, many were equally convinced until only a few decades ago that no society could be truly modern until market forces had been replaced by collective planning. Again, nowadays everyone equates being modern with acceptance of democracy and liberal values; but during the interwar years fascism was perceived as a thoroughly modern movement. Everybody celebrates modernisation and understands it as the passage to a better world but ideas of what it means to be modern are like the advertisements you watch on television – quickly dated and soon forgotten.
“‘Modern’ conditions have prevailed, even just locally, for a tiny fraction of human history,” writes Jared Diamond. “All human societies have been traditional for far longer than any society has been modern.” Diamond begins his inquiry with the wise observation that no society is fully modern. “Billions of people around the world today still live in traditional ways,” he writes, and traditional ways of life persist within the most modern societies. In the Montana valley where Diamond and his family spend their summer holidays, he tells us, “Many disputes are still resolved by informal social mechanisms rather than by going to court.”
Many Europeans who grew up in the 1950s had childhoods not unlike those Diamond has studied in traditional New Guinea villages: “Everyone knew what everyone else was doing and expressed their opinions about it, people married spouses born only a mile or two distant, people spent their entire lives in or near the village except for young men away during the world war years and disputes within the village had to be settled in a way that restored relationships or made them tolerable, because you were going to be living near that person for the rest of your life.” When a society becomes modern, older ways of living don’t altogether vanish. “The world of yesterday wasn’t erased and replaced by a new world of today: much of yesterday is still with us.”
Modernity isn’t, for Diamond, a condition that should triumph completely but this is not because he romanticises traditional ways of living. Much of The World Until Yesterday is an account of the drawbacks of life in traditional societies, some of it deriving from the author’s experience during periods of fieldwork. He describes vividly how on one of his first trips, when he spent a month with a group of New Guineans studying birds on a forest-covered mountain, his companions became agitated and refused to sleep in a beautiful valley where he had selected a place to set up camp at the base of a giant tree. The campsite was dangerous, the New Guineans explained, because the tree was dead and might fall over and kill them all. After a number of other incidents, including one in which he nearly drowned, Diamond came to see their response as an example of what he calls “constructive paranoia” – a sense of danger that comes with living in environments that are chronically unsafe for humans.
Rightly, Diamond thinks that we may have something to learn from this attitude; but he underscores clearly how it is a response to living in a world that, in some important respects, is more insecure than the one that has been built in modern times. Without modern medicine, accidents are more easily fatal or permanently disabling – and there is no place in traditional cultures for the severely impaired. As Diamond notes: “Some traditional societies, especially nomadic ones or those in harsh environments, are forced to neglect, abandon or kill their elderly.”
The paranoia he describes has another source in how, in traditional communities, encounters with strangers are infused with peril. When New Guinean Highlanders had their first sight of a European in 1933, they wept in terror. Reflecting this horror of outsiders, their relations with other tribal groups were governed by more or less continuous warfare. These are not the innocent primitives of Rousseauesque mythology but nor are they the bloodthirsty savages of Victorian imperialist folklore. Living as everyone lived until around 11,000 years ago, they are human beings in many ways like ourselves.
When a 50-year-old Yahi Indian from Northern California gave up his huntergatherer life to live in San Francisco, Diamond tells us, he was deeply impressed by matches and glue, thinking them the most admirable modern inventions (later he became attached to running water, flushing lavatories and railway trains, among other amenities). The Yahi admired these modern inventions for the same reason Europeans invented them: they add to the ease and enjoyment of life.
For Diamond, the modern world is a patchwork of such inventions but their overall impact on human well-being has been complex and mixed. The domestication of plants and animals, the emergence of large human settlements along with formal systems of justice, the expansion of states, the spread of literacy, cumulative innovation in science and technology – these are some of the developments that together produced the way we live today.
Along with their undoubted benefits, modern societies have their distinctive disorders, including the epidemic spread of diseases such as diabetes and hypertension that are unknown in traditional societies, unremitting time-scarcity and the cultural and cognitive losses that go with vanishing languages (one of the remaining 7,000 languages that are still extant disappears every nine days, Diamond tells us). As he sees it, modernity is not a unique transition that some societies have experienced at various times during the past few centuries; it is an ongoing process whose upshot is uncertain and insecure.
The fragility of civilisation is a theme that runs through much of Diamond’s work. His bestselling books Guns, Germs and Steel (1997) and Collapse: How Societies Choose to Fail or Succeed (2005) have given him the reputation of being something of a doommonger. This is only to be expected, since Diamond points to an undeniable but unwelcome truth. Modern societies are no more immune from environmental collapse than the many that have disappeared in the past – having become so closely interconnected, they are in some ways more at risk. Yet Diamond’s work is about much more than the vulnerabilities of advanced societies and it would be more accurate to describe him as inquiring into the environmental conditions that shape human communities.
One way or another, most theories of human development privilege the kind of society in which the theorist lives. Where 19th-century racial theories posited the biological superiority of Europeans, the triumphal celebrations of unending economic advance that filled the airport bookstalls in the 1990s invoked the cultural superiority of American individualism – something of which we hear rather less now that the financial crisis has shown reckless debt rather than bourgeois virtue to be the chief source of America’s apparent economic outperformance in recent times.
Diamond’s divergence from such ways of thinking is bracing and deeply instructive. Arguing that, “The explanation for the differences in types of societies existing in the modern world depends on environmental differences,” he suggests that human groups in the relatively few regions of the world with plants and animals suitable for domestication had a major advantage over others. Food surpluses led to population growth, which in turn led to political centralisation and social stratification, the growth of cities and the rise of industrial production. Rather than any built-in biological or cultural advantage, it was this environmental head start that eventually produced the modern societies we know today.
Diamond is one of our most consistently illuminating thinkers and The World Until Yesterday is a compelling account of the gains and losses that go with modern living. But if Diamond is impressive in deconstructing simple-minded ideas about what it means to be modern, he does not explain why modernisation has become such a powerful myth. Recent history is littered with vast political experiments aiming to impose models of modernisation on refractory societies, often incurring huge human costs. Not only in Russia and China in the communist era but also in many emerging countries, millions of lives have been lost or ruined by the imposition of crudely schematic plans of development. If Nazism is included as a modernist ideology aiming to remake the world on a hideous new model, probably more human beings were killed in the 20th century for the sake of a vision of the future than for any other single reason.
At this point, the scales tilt against modern societies. Traditional cultures may live in a state of continuous warfare with each other, while genocide is not unknown. No traditional people has attacked and murdered its own members on anything like the scale perpetrated by some modern states. No doubt one reason for this is that traditional societies lack a state apparatus, one of the preconditions of industrial-style killing. Yet there may be a more fundamental reason why traditional peoples do not engage in large-scale slaughter of their own members. Partly because of their non-linear, cyclical understanding of time, traditional cultures lack the idea that a new world can be brought into being by human action. To sacrifice the present generation of human beings for a hypothetical future would be literally inconceivable to them.
Traditional cultures have many disadvantages but it is silly to think of them as being simply backward when the belief that we are forever on the brink of a new world has led to so many disasters. Think of the experiment in financial deregulation that resulted, only a few years later, in an unprecedented bust in the global banking system. Undoubtedly, part of the pressure for deregulation came from selfinterest – if anyone has benefited, it is surely bankers and those with substantial financial assets. Yet the experiment could not have been attempted if an ideology that envisioned the future in terms of a self-regulating global market had not been widely promoted and accepted by mainstream politicians. We had entered a “great moderation”, we were assured, in which the buffering institutions of earlier times – a welfare state, full employment policies –were obsolete. The results of chasing this fantasy can be seen all around us.
As much as the inventions that Diamond describes, it is myths of the future that have come to drive modern life. The self-regulating market was only the latest version of a dream in which the cycles of history have been left behind. If we’d retained some of the constructive paranoia of traditional cultures, we might still not have been able to prevent the neoliberal experiment; but we would have been better prepared for the fiasco that has ensued.
John Gray is the New Statesman’s lead book reviewer. His next book, “The Silence of Animals: on Progress and Other Modern Myths”, will be published by Allen Lane in February
More from New Statesman
- Online writers:
- Steven Baxter
- Rowenna Davis
- David Allen Green
- Mehdi Hasan
- Nelson Jones
- Gavin Kelly
- Helen Lewis
- Laurie Penny
- The V Spot
- Alex Hern
- Martha Gill
- Alan White
- Samira Shackle
- Alex Andreou
- Nicky Woolf in America
- Bim Adewunmi
- Kate Mossman on pop
- Ryan Gilbey on Film
- Martin Robbins
- Rafael Behr
- Eleanor Margolis | <urn:uuid:dda5fa8d-77cd-4552-845b-0f83f2ac79f7> | {
"date": "2013-05-23T19:01:07",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9681291580200195,
"score": 2.734375,
"token_count": 2481,
"url": "http://www.newstatesman.com/lifestyle/society/2013/01/respect-your-elders"
} |
Geneva Conventions (1949)
The Geneva Conventions consist of four treaties formulated in Geneva, Switzerland, that set the standards for international law for humanitarian concerns. They chiefly concern the treatment of non-combatants and prisoners of war. They do not affect the use of weapons in war, which are covered by the Hague Conventions of 1899 and 1907 and the Geneva Protocol on the use of gas and biological weapons of 1925. They were founded by two young men—Henry Dunant, founder of the Red Cross movement and Gustave Moynier, a co-founder—who cordially loathed each other. The role of the Red Cross and Red Crescent, a voluntary humanitarian organization as a non-state actor in monitoring the treatment of prisoners of war, and the conduct of war according to international law, is an example of how civil society, because it is sometimes more neutral than states, can play a pivotal part in helping to create a better, more humane world.
The Conventions were the results of efforts by Henry Dunant, who was motivated by the horrors of war he witnessed at the Battle of Solferino in 1859. The adoption of the First Convention followed the foundation of the International Committee of the Red Cross whose founder, Henry Dunant, initiated international negotiations that produced the Convention for the Amelioration of the Wounded in Time of War in 1864.
Because some belligerents in World War II had abused the principles contained in earlier conventions, an International Red Cross conference in Stockholm in 1948 extended and codified the existing provisions. The conference developed four conventions, which were approved in Geneva on August 12, 1949.
In the decades following World War II, the large number of anticolonial and insurrectionary wars threatened to render the Geneva Conventions obsolete. After four years of Red Cross-sponsored negotiations, two additional protocols to the 1949 conventions, covering both combatants and civilians, were approved in 1977.
As per article 49, 50, 129 and 146 of the Geneva Conventions I, II, III and IV, respectively, all signatory states are required to enact sufficient national laws that make grave violations of the Geneva Conventions a punishable criminal offense, this is what created the international criminal court. More than 180 states have become parties to the 1949 conventions. Approximately 150 states are party to Protocol I; more than 145 states are party to Protocol II, though the United States is not. In addition, more than 50 states have made declarations accepting the competence of international fact-finding commissions to investigate allegations of grave breaches or other serious violations of the conventions or of Protocol I.
The conventions and their agreements
- First Geneva Convention "for the Amelioration of the Condition of the Wounded and Sick in Armed Forces in the Field" (first adopted in 1864, last revision in 1949)
- Second Geneva Convention "for the Amelioration of the Condition of Wounded, Sick and Shipwrecked Members of Armed Forces at Sea" (first adopted in 1949, successor of the 1907 Hague Convention X)
- Third Geneva Convention "relative to the Treatment of Prisoners of War" (first adopted in 1929, last revision in 1949)
- Fourth Geneva Convention "relative to the Protection of Civilian Persons in Time of War" (first adopted in 1949, based on parts of the 1907 Hague Convention IV)
In addition, there are three additional amendment protocols to the Geneva Convention:
- Protocol I (1977): Protocol Additional to the Geneva Conventions of August 12, 1949, and relating to the Protection of Victims of International Armed Conflicts. As of January 12, 2007, it had been ratified by 167 countries.
- Protocol II (1977): Protocol Additional to the Geneva Conventions of August 12, 1949, and relating to the Protection of Victims of Non-International Armed Conflicts. As of January 12, 2007, it had been ratified by 163 countries.
- Protocol III (2005): Protocol Additional to the Geneva Conventions of August 12, 1949, and relating to the Adoption of an Additional Distinctive Emblem. As of June 2007 it had been ratified by 17 countries and signed but not yet ratified by an additional 68 countries.
All four conventions were last revised and ratified in 1949, based on previous revisions and partly on some of the 1907 Hague Conventions; the whole set is referred to as the "Geneva Conventions of 1949" or simply the "Geneva Conventions." Later conferences have added provisions prohibiting certain methods of warfare and addressing issues of civil wars. Nearly all 200 countries of the world are "signatory" nations, in that they have ratified these conventions.
Clara Barton was instrumental in campaigning for the ratification of the First Geneva Convention by the United States; the U.S. signed in 1882. By the Fourth Geneva Convention some 47 nations had ratified the agreements.
Other Geneva Conventions
Other conventions of the United Nations taking place in Geneva and agreements signed there have become part of international and national laws, but are not to be confused with the above-mentioned treaties though they may be referred to as "Geneva Conventions." These include the Convention on the Territorial Sea and the Contiguous Zone, the Convention Relating to the Status of Refugees (1951) and Protocol relating to the Status of Refugees (1967), and others.
Extent of Provisions
War on Terror
The war against terror following the attack on the Twin Towers of New York's World Trade Center on September 11, 2001, has raised issues regarding the classification of prisoners. The United States classified many detainees in its facility at Guantanamo Bay as "illegal combatants" and argued that the terms of the Geneva Convention apply only to those individuals who abide by the rules of law. The ICRC, which has visited the camp and also Amnesty International, have argued that the detainees deserve the full protection of the Geneva Conventions, but the U.S.'s position was that that only some of the provisions of the Convention apply. Following a ruling by the Supreme Court of the United States in June 2006 rejecting the use of "special tribunals" to try detainees, and called for the application of the rule of law and conformity with the Geneva Conventions. Subsequently, the U.S. government announced that it would treat all prisoners captured during the war on terror according to the Geneva Conventions. On the one hand, some argue that the war on terror requires a revision of international humanitarian law to deal with changed circumstances, in which non-state actors do not follow the rules of war. On the other hand, the Supreme Court's ruling has been hailed as a vindication of the Geneva Convention's effectiveness.
West Bank and Gaza
One of the most debated issues surrounds the applicability of the Geneva Conventions to the West bank and Gaza strip following the Israeli occupation. Article two states that "The Convention shall also apply to all cases of partial or total occupation of the territory of a High Contracting Party, even if the said occupation meets with no armed resistance." The United Nations determined in 1979 that the Geneva Conventions do apply but this has been rejected by Israel, which hold that "the Fourth Geneva Convention is not applicable to the occupied territories." The International Court of Justice has ruled that the Convention does apply, which again can be interpreted as a vindication of the extent of the provisions of the Conventions.
- Human rights
- Red Cross
- Laws of war
- War crime
- ↑ The text is given at the ICRC website, Resolutions of the Geneva International Conference Retrieved February 7, 2008.
- ↑ Geneva Conventions of August 12, 1949, State Parties, Signatories Geneva Conventions of August 12, 1949, Parties / Signatories Retrieved February 7, 2008.
- ↑ Texts of all related documents available at the ICRC, 1949 Conventions and 1977 Protocols Retrieved February 7, 2008.
- ↑ Charles Lane, "High Court Rejects Detainee Tribunals." Washington Post, June 30, 2006, High Court Rejects Detainee Tribunals Retrieved February 7, 2008.
- ↑ "The Question of the Observance of the Fourth Geneva Convention of 1949 in Gaza and the West Bank," United Nations, January 1, 1979, The Question of the Fourth Geneva Convention of 1949 in Gaza and the West Bank Retrieved February 7, 2008.
- ↑ "Consider Geneva pact, Israel told," BBC News, August 24, 2004, Consider Geneva pact, Israel told Retrieved February 7, 2008.
- Bennett, Angela. 2005. The Geneva Convention the hidden origins of the Red Cross. Stroud, Gloucestershire: Sutton. ISBN 9780750941471
- Diplomatic Conference on the Reaffirmation and Development of International Humanitarian Law Applicable in Armed Conflicts, and Howard S. Levie. Protection of War Victims Protocol 1 to the 1949 Geneva Conventions. Dobbs Ferry, NY: Oceana Publications, 1979. ISBN 9780379007862
- Jinks, Derek. 2005. The rules of war: the Geneva Conventions in the age of terror. New York: Oxford University Press. ISBN 9780195183627
- Levie, Howard S. The Law of Non-International Armed Conflict Protocol II to the 1949 Geneva Conventions. Scientific collection of the Henry Dunant Institute. Dordrecht: M. Nijhoff, 1987. ISBN 9789024734917
- Roth, Kenneth, Minky Worden, and Amy D. Bernstein. 2005. Torture - does it make us safer? is it ever OK?: a human rights perspective. New York: New Press. ISBN 9781595580573
All Links Retrieved February 7, 2008.
- Texts and commentaries of 1949 Conventions & Additional Protocols
- ICRC overview of the Geneva Conventions
- Reference Guide to the Geneva Conventions
- www.SupportGenevaConventions.info: Coalition for re-affirming and extending the Geneva Conventions
New World Encyclopedia writers and editors rewrote and completed the Wikipedia article in accordance with New World Encyclopedia standards. This article abides by terms of the Creative Commons CC-by-sa 3.0 License (CC-by-sa), which may be used and disseminated with proper attribution. Credit is due under the terms of this license that can reference both the New World Encyclopedia contributors and the selfless volunteer contributors of the Wikimedia Foundation. To cite this article click here for a list of acceptable citing formats.The history of earlier contributions by wikipedians is accessible to researchers here:
Note: Some restrictions may apply to use of individual images which are separately licensed. | <urn:uuid:4551846c-77a0-4f84-99fe-ce7f22367b68> | {
"date": "2013-05-23T18:51:18",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9234458208084106,
"score": 3.890625,
"token_count": 2171,
"url": "http://www.newworldencyclopedia.org/entry/Geneva_Conventions_(1949)"
} |
About this product:
This graphic shows an approximate representation of coastal areas under a hurricane warning (red), hurricane watch (pink), tropical storm warning (blue) and tropical storm watch (yellow). The orange circle indicates the current position of the center of the tropical cyclone. The black line and dots show the National Hurricane Center (NHC) forecast track of the center at the times indicated. The dot indicating the forecast center location will be black if the cyclone is forecast to be tropical and will be white with a black outline if the cyclone is forecast to be extratropical. If only an L is displayed, then the system is forecast to be a remnant low. The letter inside the dot indicates the NHC's forecast intensity for that time:
D: Tropical Depression – wind speed less than 39 MPH
S: Tropical Storm – wind speed between 39 MPH and 73 MPH
H: Hurricane – wind speed between 74 MPH and 110 MPH
M: Major Hurricane – wind speed greater than 110 MPH
NHC tropical cyclone forecast tracks can be in error. This forecast uncertainty is conveyed by the track forecast "cone", the solid white and stippled white areas in the graphic. The solid white area depicts the track forecast uncertainty for days 1-3 of the forecast, while the stippled area depicts the uncertainty on days 4-5. Historical data indicate that the entire 5-day path of the center of the tropical cyclone will remain within the cone about 60-70% of the time. To form the cone, a set of imaginary circles are placed along the forecast track at the 12, 24, 36, 48, 72, 96, and 120 h positions, where the size of each circle is set so that it encloses 67% of the previous five years official forecast errors. The cone is then formed by smoothly connecting the area swept out by the set of circles.
There is also uncertainty in the NHC intensity forecasts. The Maximum 1-minute Wind Speed Probability Table provides intensity forecast and uncertainty information.
It is also important to realize that a tropical cyclone is not a point. Their effects can span many hundreds of miles from the center. The area experiencing hurricane force (one-minute average wind speeds of at least 74 mph) and tropical storm force (one-minute average wind speeds of 39-73 mph) winds can extend well beyond the white areas shown enclosing the most likely track area of the center. The distribution of hurricane and tropical storm force winds in this tropical cyclone can be seen in the Wind History graphic linked above.
Considering the combined forecast uncertainties in track, intensity, and size, the chances that any particular location will experience winds of 34 kt (tropical storm force), 50 kt, or 64 kt (hurricane force) from this tropical cyclone are presented in tabular form for selected locations and forecast positions. This information is also presented in graphical form for the 34 kt, 50 kt, and 64 kt thresholds.
Note: A detailed definition of the NHC track forecast cone is also available. | <urn:uuid:4ce27885-3064-4fd9-bf45-8ddd0080f661> | {
"date": "2013-05-23T18:30:51",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9019753932952881,
"score": 3.03125,
"token_count": 628,
"url": "http://www.nhc.noaa.gov/refresh/graphics_at3+shtml/144553.shtml?gm_track"
} |
These are additional global health resources, and inclusion of the resources on this page does not imply endorsement by the NHLBI. See also Partners in Global Health.
The Observatory of Innovative Practices for Complex Chronic Disease Management responds to the need to harness the power of information and communication technologies to support a global network of managers, researchers, health professionals, patients and caregivers interested in transforming the management of complex chronic diseases, thus facilitating continuous improvement of quality in health care, worldwide.
C3 Collaborating for Health
C3 brings together policy-makers, businesses, government, teachers, health experts, young professionals, academics and others to design ways to make it easier to be healthy, and to put these ideas into action. C3 seeks to promote 3 behaviour changes: stopping smoking, eating a better diet (including avoiding the harmful use of alcohol) and increasing physical activity.
NCD Action Network
NCD Action and the Young Professionals Chronic Disease Network (YP-CDN) address local and global non-communicable disease needs by building networks, campaigns, and projects that are both grassroots and globally focused. Members are students and experts in their fields – including public health professionals, doctors, sociologists, anthropologists, philosophers, nutritionists, communicators, architects, and anyone else who is committed to addressing NCDs. Members are encouraged to share their ideas, passions, and expertise, and in doing so, help them turn their creative passion into real-world projects that have measurable impact on the local and global burden of NCDs.
3FOUR50.com is an awareness-raising and action-based online social network aimed at preventing chronic diseases. The name represents the Oxford Health Alliance's key message: three risk factors, tobacco use, poor diet, and lack of physical activity, contribute to four chronic diseases: heart disease, type 2 diabetes, lung disease, and some cancers — which, in turn, contribute to more than 50 percent of deaths in the world. However, by addressing the risk factors, many of these deaths could be prevented.
Community Interventions for Health (CIH)
Oxford Health Alliance's CIH initiative acts upon the urgent need to design, implement, and assess cost-effective, comprehensive interventions for three risk factors for chronic diseases (poor diet, tobacco use, lack of physical activity), adaptable to different cultures and communities. The research is unique in its scale and scope — the interventions will be tracked across multiple countries and multiple settings: schools, health-care centers, work places, and local communities.
Global Development Network (GDN)
The GDN is an international organization that works with developing country researchers and policy research institutes to support the generation and sharing of world-class, policy-relevant research on development.
Institute of Medicine, Preventing the Global Epidemic of Cardiovascular Disease: Meeting the Challenges in Developing Countries
The Institute of Medicine is convening an ad hoc committee to study the evolving global epidemic of cardiovascular disease and will offer conclusions and recommendations pertinent to its control and to a range of public and private sector entities involved with global health and development.
ProCor is a global network promoting cardiovascular health in developing countries and other low-resource settings. ProCor is a program of the Lown Cardiovascular Research Foundation, a tax-exempt, nonprofit organization, based in Brookline, Massachusetts, USA.
- 2008-2013 Action plan for the global strategy for the prevention and control of noncommunicable diseases. World Health Organization, Geneva, 2008. (PDF)*
- Disease control priorities in developing countries, second edition. Jamison DT, Breman JG, Measham AR, et al, eds. Oxford University Press and the World Bank, Washington, D.C., 2006.
- Preventing chronic diseases: a vital investment. WHO global report, World Health Organization, Geneva, 2005.
- Public policy and the challenge of chronic noncommunicable diseases. Adeyi O, Smith O, Robles S. The World Bank, Washington, D.C., 2007. (PDF)*
*PDF files require Adobe Acrobat.
Nabel EG, Stevens S, Smith R. Combating chronic disease in developing countries—partners in progress. Lancet, 2009.
- Daar AS, Singer PA, Persad DL, Pramming SK, Matthews DR, Beaglehole R, Bernstein A, Borysiewicz LK, Colagiuri S, Ganguly N, Glass RI, Finegood DT, Koplan J, Nabel EG, Sarna G, Sarrafzadegan N, Smith R, Yach D, Bell J. Grand challenges in chronic noncommunicable diseases. Nature. Nov 22:450:494-6, 2007.
- Abegunde D, Mathers CD, Adam T, Ortegon M, Strong K. The burden and costs of chronic diseases in low-income and middle-income countries. Lancet 370:1929-38, 2007
Asaria P, Chisholm D, Mathers C, Ezzati M, Beaglehole R. Chronic disease prevention: health effects and financial costs of strategies to reduce salt intake and control tobacco use. Lancet 370:2044-53, 2007.
- Beaglehole R, Ebrahim S, Reddy S, Voute J, Leeder S, on behalf of the Chronic Disease Action Group. Prevention of chronic disease: a call to action. Lancet 370:2152-7, 2007.
Gaziano T, Galea G, Reddy KS. Scaling up interventions for chronic disease prevention: the evidence. Lancet 370:1939-46, 2007.
- Horton R. Chronic diseases: the case for urgent global action. Lancet 370:1881-2, 2007.
- Lim SS, Gaziano TA, Gakidou E, Reddy KS, Farzadfar F, Lozano R, Rodgers A. Prevention of cardiovascular disease in high risk individuals in low-income and middle-income countries: health effects and costs. Lancet 370:2054-62, 2007.
Quam L, Smith R, Yach D. Rising to the global challenge of the chronic disease epidemic. Lancet 368:1221-3, 2006.
- Strong KL, Mathers CD, Leeder S, Beaglehole R. Preventing chronic diseases: how many lives can we save? Lancet 366:1578-82, 2005.
Last Updated: January 24, 2013 | <urn:uuid:a32f0312-cd41-45f1-b838-9c8a954dec16> | {
"date": "2013-05-23T18:59:44",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.862519383430481,
"score": 2.546875,
"token_count": 1338,
"url": "http://www.nhlbi.nih.gov/about/globalhealth/resources/index.htm"
} |
1. Loopback Test
A loopback test can be used to troubleshoot serial communications. It can show problems in the serial port, the cable, or the software generating the messages without having to connect to third party hardware. By connecting the proper wires, a loopback test can verify the operation of serial communication. Loopback tests can be used for RS-232, RS-422, and RS-485 serial communication.
For more information on RS-232, RS-422, and RS-485 see the Serial Communication Overview. Note that not all serial devices, especially those with many connections on one card, allow hardware flow control on every serial output of the device.
To perform a loopback test for RS-232, the TXD pin must be connected to the RXD pin. This allows the data to flow from the transmit to the receive pins. Since the communication is differential for RS-422 and RS-485, the TXD+ connects to the RXD+ and the TXD- connects to the RXD- pins.
A more advanced loopback test that allows hardware flow control will need more pins connected to allow the flow control signals to be properly passed. For RS-232, the CTS and RTS pins must be connected along with the DTR and DSR pins. For RS-422 and RS-485, CTS+ should be connected to RTS+ and CTS- should be connected to RTS-.
For more information about National Instrument’s serial interfaces, visit ni.com/serial.
DE-9 (DB9) Connector
The DE-9 connector is the most common serial connector. This connector is found on National Instrument’s one and two port serial interfaces.
Figure 1: Pinout diagram for DE-9 Connector
To perform a loopback test with no hardware flow control, you will need to connect pins 2 and 3 for RS-232 and pins 4 to 8 and 5 to 9 for RS-422/485. These connections can be seen in red below (figure 2 for RS-232 and figure 3 for RS-422/485).
When using hardware flow control, you will need to connect pins 4 to 6 and 7 to 8 for RS-232. Pins 7 and 8 are used for RTS/CTS hardware flow control where pins 4 and 6 are used for DTR/DSR hardware flow control. For RS-422/485, you will need to connect pins 2 to 3 and 6 to 7. Both of these connections are required for RTS/CTS hardware flow control since RS-422/485 have differential connections. These connections can be seen in blue below (figure 2 for RS-232 and figure 3 for RS-422/485).
Figure 2: RS-232 female DE-9 plug with connections required for loopback test
Figure 3: RS-422/485 female DE-9 plug with connections required for loopback test
This connector is not as common as the DE-9 connector. This connector can still be used to perform a loopback test with a method similar to the one used for the DE-9 connector.
Figure 4: Pinout diagram for DB-25 Connector
Most of the pins on DB-25 connectors are not connected since only nine pins are used for RS-232, RS-422, and RS-485 communication.
To perform a loopback test with no hardware flow control with a DB-25 connector, connect pins 2 to 3 for RS-232. For RS-422/485 connect pins 5 to 20 and 7 to 22. The required connections can be seen in red on figures 5 and 6.
For hardware flow control using RS-232, pins 4 and 5 must be connected along with pins 6 and 20. When using RS-422/485, pin 5 must connect to pin 20 and pin 7 must connect to pin 22. This will allow the loopback test to use the proper flow control lines. These connections can be seen in blue on figures 5 and 6.
Figure 5: RS-232 female DB-25 plug with connections required for loopback test
Figure 6: RS-422/485 female DB-25 plug with connections required for loopback test
10P10C (RJ50) Connector
This connector is most commonly found on National Instrument’s 4 port serial interfaces. The National Instrument 4 port serial interfaces come with 4 10P10C to DE-9 male converter cables.
Figure 7: Pinout diagram for RJ50 Connector
It is not recommended to use the 10P10C connector by itself to perform a loopback test due to the small separation between pins. Using a 10P10C to DE-9 connector (Part Number 192190-01), a looback test can be performed using the methods described above.
3. Performing a Loopback Test in Hyperterminal
1. Create a new connection with any name and icon.
2. Select the communications port you would like to test
3. Select the type of flow control you would like to use. Note that Xon / Xoff is software flow control and will only require that the TXD and RXD pins to be connected.
4. Type a message using the computer's keyboard. Any data that shows in Hyperterminal is received from the device.
4. Performing a Loopback test in Measurement & Automation Explorer
1. Open Measurement & Automation Explorer and select the communications port you would like to use.
2. Ensure the proper settings are selected for flow control.
3. Save the settings by selecting the Save button then select the Open VISA Test Panel button
4. On the Write tab, type the message you would like to send (followed by a \n) then select Execute
5. On the Read tab, select Execute and verify the message
5. Performing a Loopback test in LabVIEW
Note: For a free evaluation copy of LabVIEW, visit ni.com/trylabview
1. Start LabVIEW
2. Select Help»Find Examples...
3. Browse to Hardware Input and Output»Serial»Basic Serial Write and Read.vi
4. Ensure the proper settings are selected, enter the string you would like to write in the "string to write" box, and then select the white run arrow on the toolbar. | <urn:uuid:5bf52f27-bc9b-4e61-944a-44e54805be13> | {
"date": "2013-05-23T18:32:31",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.863890528678894,
"score": 3.328125,
"token_count": 1318,
"url": "http://www.ni.com/white-paper/3450/en"
} |
View Full Version : Preventitive health- food deficiencies
Jul 25, 2007, 12:10 AM
Natural Health (http://www.guardiannewsngr.com/natural_health/article08)
How folic acid in flour slashes congenital problems
DR. Philippe De Wals of Universit� Laval's Department of Social and Preventive Medicine has published a study clearly indicating that the addition of folic acid to flours has led to a 46 per cent drop in the incidence of congenital neural tube deformation (mainly anencephaly and spina bifida) in Canada.
Such deformations either result in the child's death or in major health problems, including physical and learning disabilities. De Wals's work as head of a team of a dozen Canadian researchers appears today in the New England Journal of Medicine.
The neural tube is the basis of the embryo's nervous system. Poor development of the neural tube, which is sometimes due to a lack of folic acid, can result in major health problems. Folic acid is found in green vegetables, fruit, whole grains, and meat. However, even a balanced diet won't supply enough folic acid for a pregnant mother and the child she is carrying.
Before 1998, Canadian medical authorities were already recommending that women in their child-bearing years consume vitamin supplements containing folic acid. "Canada decided to add folic acid to all flour produced in the country because formation of the neural tube in embryos is particularly intense during the first four weeks of pregnancy, which is before a lot of women even know they're pregnant. Since half of Canadian pregnancies are unplanned and the human body can't store folic acid, it is better to integrate folic acid into the food chain than to focus exclusively on taking vitamin supplements," stated De Wals. Health Canada still recommends taking folic acid supplements to women in their child-bearing years.
Researchers De Wals and Fassiatou Tairou of Universit� Laval's Faculty of Medicine compared the incidence of neural tube deformations before and after the introduction of folic acid--enriched flours for over two million births in Canada. Between 1993 and 1997, the incidence was 1.58 per 1,000 births. Between 2000 and 2002, the rate dropped 46 per cent to 0.86. The biggest improvement occurred in the parts of Canada that had the highest rates of neural tube deformation before 1998 - Newfoundland, Prince Edward Island, and Nova Scotia. In Qu�bec, the drop was also pronounced, but closer to the Canadian average.
Currently, only Canada, the United States, and Chile require that folic acid be added to flour. The effectiveness of this practice, as demonstrated by De Wals's team, could encourage other countries to follow suit. Every year, approximately 200,000 cases of spina bifida and anencephaly occur world-wide, adding folic acid to food could reduce that number by half.
Jul 25, 2007, 12:13 AM
Thisday Online'Glitteratti section (http://www.thisdayonline.com/nview.php?id=84230)
A –Z On Foods … What You Were Never Told About Food And Your Heart.
Wellness & Wellbeing with DR. BISOLA AKINDEKO, 07.22.2007
Beer Ancient civilizations way back in about 5000 B.C. stumbled onto something: fermented wheat and barley. Realizing that this was something good, people recorded it; the world’s oldest known recipe, scribbled on a 4000 – year-old Sumerian tablet, is for beer. As part of our heritage, beer is in a sense a dietary staple. But when it comes to heart health, beer should be viewed as a “good-news bad-news” food. In fact in Nigeria, beers like Gulder, Star, Stout etc actually form part of the staple daily diets of certain individuals.
First, the good news: If drinking is kept “light” or moderate, the equivalent of one to two beers a day, studies show that alcohol has a protective effect against heart disease. Alcohol’s benefit seems to be in raising the cholesterol good-guy HDLs which help scavenge and eventually remove cholesterol from the body. But since women already have higher HDL levels than men, the protective action of alcohol seems to be more beneficial for men.
The news for beer gets even better. Because beer is made from fermented grains, some phytochemicals called flavonoids end up in a bottle of beer. These flavonoids are similar to the heart-healthy phytochemicals found in red wine. According to heart researchers, flavonoids keep blood cells called platelets from becoming sticky and clumping together to form a clot, risking heart attack or stroke. Flavonoids found in beer also help protect artery-clogging LDLs from damaging blood vessel walls. Flavonoid content of beers varies. Dark beers have more pigment, owing to a higher flavonoid content. Largers or lighter beers contain less.
Now for the bad news: Beer contains alcohol – about half an ounce in a 12-ounce, 150-calorie serving. Alcohol spells trouble for those concerned about hypertension. My research studies clearly show that alcohol intake is directly associated with high blood pressure. People who consistently drink six or more drinks daily have a greatly increased risk of suffering from hypertension. Heavy drinking also aggravates blood pressure in people who already have hypertension.
So is beer a heart-healthy drink? If you keep beer drinking in moderation (one to two drinks a week) and don’t already have hypertension, go for it. But keep in mind that drinking any alcohol beverage to excess has its risks, such as driving under the influence and operating machinery while intoxicated. Additionally, excessive alcohol can also increase risks for certain cancers, especially in women who also don’t seem to gain much heart-health benefit from alcohol in the first place.
Bell Peppers (or “Ata rodo”)
For starters, bell peppers come in an array of colors that are sure to liven up any plate. And it’s their color – yellow, orange, red, green, and even purple – that determines the extent of their heart-protecting powers. Bell peppers pack a good dose of the antioxidants vitamin C and carotenes, and research shows these antioxidants work together in protecting the heart. Specifically, vitamin C and the carotenes found in bell peppers, lutein and zeaxanthin, help to keep LDLs from becoming a menace to blood vessels.
Depending on a pepper’s color, the content of this antioxidant team varies. As a pepper ripens, it may change from green to red for example, and the vitamin C content increases along with the carotene levels. One green bell pepper contains about 140 percent of the Daily Value for vitamin C, but a red pepper has a whopping 280 percent. That’s not bad for only 30 calories per serving. The content of the carotenes, lutein and zeaxanthin, goes up nine times as the pepper changes color. Yellow and orange peppers, along with purple, also have carotenes that protect the heart. In general, the more intense and brilliant the color, the better.
Bell peppers are best eaten raw for maximum vitamin C and carotene content. But since they’re so rich in these nutrients, cooking peppers, such as baking or microwaving, still leaves behind plenty of heart-healthy goodness. Use a mix of freshly sliced peppers as a dipper for your favorite low-fat dip or in salsa. Grilled peppers make a great addition to fish, chicken, lean beef, or grilled tofu. Or why not chop some fresh pepper into your stew after cooking.
No matter how you slice it, bread is good food. And it’s good for your heart, too. Since Biblical times, bread has been synonymous with nourishment. Virtually all cultures around the world have some form of bread as a dietary staple. And while not all of these should come to you as a slice of bread, it still leaves a lot of room each day for enjoying the heart-warming goodness of bread and bread products. A serving of bread is one slice, about one ounce or 28 grams. Be aware that when slicing your own from a freshly baked loaf you’re likely to serve up a hearty slice that may equal two or even three servings. A bagel, average frozen variety, equals two bread servings, while the king-sized variety may equal four.
Bread-like goodies including scones and doughnuts most often have added sugar and fat. If you are looking for whole grain, low-fat goodness, be careful when shopping amongst these treats. Many of these baked goods come with unwanted fat, anywhere from one to five teaspoons in a croissant. A bran muffin, for example, while a good source of fiber may have over 15 grams of fat in one muffin-that’s 135 fat calories! If you can purchase fat-free versions, by all means do. Remember your heart loves bread, not fat.
Tops on my list of favorite foods is fresh baked whole-grain bread slathered with berry fruit spread. What’s your favorite way to eat bread? How about a hearty slice to mop a sauce off your plate, or toasted sourdough bread with a sprinkle of grated Parmesan cheese, fresh basil, and a tomato slice? Stuffed with an omelets maybe even tuna filling or crumbled into a bowl of steamy hot, vegetable soup? Any way you slice it, bread is good, heart-healthy food.
Jul 25, 2007, 12:19 AM
I don't know how many people have been following the Dangote NAFDAC bouhaha some of which was highlighted on this richest black man thread (http://www.nigeriavillagesquare.com/board/articles-comments/38780-richest-black-person-world-dangote-interview-2.html). Well, in the interest of fairness, I decided to follow this case since it deals with a public health issue and the complaince or lack of Dangote Group
SON Commends Dangote for Sugar Fortification
Thisday archives (http://www.thisdayonline.com/archive/2004/07/26/20040726bus15.html)--------------------------------------------------------------------------------
Dr. John Akanya, the Director General of Standards Organisation of Nigeria (SON) has commended the management of the Dangote Group for its efforts to meet the challenges of producing refined fortified Sugar in Nigeria.
Dr. Akanya gave this commendation recently in Lagos, shortly after leading a team of SON officials to inspect Dangote's
Sugar Ref~nery in Apapa. The inspection was to verify Dangote's level of compliance with the directive to fortify locally refined Sugar with Vitamin A. Vitamin A Sugar fortification is meant to enhance efforts to eradicate diseases due to Vitamin A deficiency in Nigeria.
The SON boss said that Dangote as an organization has encouraged SON in the battle to ensure quality and standard in Sugar production in Nigeria. He said it is encouraging that Dangote is not limiting its fortification efforts to Sugar but also extends to other products.
He noted that though fortification of refined Sugar with Vitamin A is a government policy, Dangote as a stakeholder has shown a lot of determination towards its actualization.
Said he, "We know because of the technicalities involved, there may be some hiccups, but we are very delighted at your efforts and what you have achieved."
He stated further that Dangote has demonstrated its interest in the Sugar fortification. "You have interest because you have invested, we are also interested because we want to protect interest that will make Nigeria move forward and we need every
Nigerian to work with us, and we want to encourage you on what you are doing," he declared.
Also speaking after the factory inspection, Mrs M. E. Eshiett, the Deputy Director of SON, commended Dangote's efforts so far on the fortification of its Sugar with Vitamin A. She, however, advised the organization to do a post sale analysis of its Sugar by collecting samples from the market for analysis in the laboratory to ascertain its Vitamin level after exposure to light and air, two major ways through which Vitamin can be lost.
She also urged Dangote to install a thermometer in its store, where imported Vitamins are stored before use to be able to ascertain and maintain the appropriate temperature required for the vitamins.
The General Manager, Dangote Sugar Refinery, Mr Maryould M. Elsunni, while speaking after the factory inspection stated thit the Dangote Group took the challenge of Sugar fortification with Vitamin A seriously because of its importance to the health of Nigerians. He said: "When you gave us the challenge on Sugar fortification, we took it and we are happy for what we have achieved, we probably have the best system for Sugar fortification in the world today," he boasted.
He added that Dangote pursued the Sugar fortification with Vitamin A seriously because the company is aware that the whole nation will benefit from the policy. "If Sugar fortification with Vitamin A helps in the reduction of Vitamin deficiency disease, the nation is a winner, our children are winners and Dangote is a winner," he said.
According to him, he will be personally delighted if Dangote's efforts held in the eradication of blindness among children in
Nigeria because as a father, he loves children and will want to do anything to help protect their future.
He disclosed that since the commencement of the fortification programme, Dangote Refinery has been training its staff to ensure that they know hoe to use the equipment for the fortification.
Mr Knut Ulvmoen, Dangote Group Managing Director assured the SON Inspectors that Dangote is committed to Sugar fortification with Vitamin A as well as the fortification of its other food products with important micro nutrients.
Mr Olakunle Alake, Executive Director, Strategic Services, Dangote Group who was also present at the factory inspection assured the SON team that Dangote remained committed to Sugar fortification with Vitamin A.
There were reports that Dangote failed to meet the required compliance which lead to it's plant closure.
Dangote Faults Nafdac Over Mill Closure
Daily Champion (Lagos)
22 May 2007
Posted to the web (http://allafrica.com/stories/200705220891.html) 22 May 2007
By Ebere Nwoji
DANGOTE Group of Companies yesterday reacted to the recent closure of its Kano Floor Mills by the National Agency for Food Drug Administration and Control (NAFDAC) describing the regulatory agency's action as a punitive rather than corrective measure.
The company at a media briefing to state its position on the matter expressed surprises at the action of NAFDAC questioning the rationale behind closing its six factories for an offence committed in only one product Danvita which is just one per cent of products manufactured in the Dangote factories in Kano State.
Dangote Chief Operating Officer, Mr Olakunle Alake at the briefing explained that Danvita which is Dangote's brand of semolina is a good quality product used as a vehicle to carry nutrients and not a life endangering product as alleged by NAFDAC.
He condemned the action of NAFDAC in sealing the Kano factory of the company saying it is odd, absurd, unprofessional and unusual arguing that NAFDAC after all had certified the product after carrying out all necessary analysis to confirm that the product is produced to meet the recommended standard.
He related the circumstances that led to the closure of the factory saying NAFDAC on Wednesday, May 16, paid unscheduled visit to the Dangote Kano plant requesting to see the facilities for and records of the company's fortification of Danvita with Vitamin 'A' premix.
He said the NAFDAC officials were promptly informed that the company's equipment for the fortification had just been acquired for the Kano plant and would soon be installed.
The Dangote boss said NAFDAC was also informed that similar equipment had been installed and commissioned at Apapa and Ilorin plants which are available for their inspection next month.
He said in spite of this explanation NAFDAC requested for records of the company's fortification for the past one year which they were given.
Mr Alake however, said he was surprised on Thursday May 17 at about 2.45 pm to see three vehicles, fully loaded with NAFDAC officials, armed policemen and members of the press storm the factory under the leadership of NAFDAC zonal deputy director, Mrs I PC Nnani announcing to the Dangote Kano management team that she had come to seal the factory for non-fortification of its Danvita brand of semolina with Vitamin 'A'.
He said the NADFAC director immediately ordered all the staff of the company to not only leave the factory building but also the administrative building services and maintenance building.
He said after this order the Dangote Kano complex was sealed without even the presence of the company's security personnel to watch over the assets of the company.
According to him, neither the explanation to the agency that the product in question was produced from one of the six mills and that the company was prepared to suspend production from the mill until full compliance nor the company's request to be allowed to continue production of its flag product the Dangote brand flour from the other five mills moved the agency.
Lamenting further the action of NAFDAC Mr. Alike stated "our Kano floor mills directors and management team were at NAFDAC for the meeting on May 18, 2007 adding even though some of their inferred effects of non-fortification left us in total shock, we as a company have business, nutritional and pharmaceutical expertise to know that there was no basis for the request by NAFDAC to recall our Danita product," he explained.
This issue and the controversy it generated obviously cost the NAFDAC DG, Dr Akunyili a ministerial slot... this was blogged about here (http://nigeriahealthwatch.blogspot.com/) and debated here (http://www.nigeriavillagesquare.com/board/articles-comments/38780-richest-black-person-world-dangote-interview-2.html) in the articles section. Stay tuned to this page for more information on this issue
Jul 25, 2007, 12:26 AM
Thisday Glitteratti (http://www.thisdayonline.com/nview.php?id=84234)
Benefits of Tea
Health with Vivian Eyota, 07.22.2007
Tea has antioxidant, anti-inflammatory and anticancer benefits. An antioxidant works against “free radicals” which are unbalanced molecules that oxidize skin and body cells leading to aging. The plant leaf known as Camellia sinensis is where black tea, green tea, oolong tea and white tea are derived. Drinking tea contributes to beautiful skin and a healthy body with additional benefits such as reducing the risk of heart attack and preventing osteoporosis.
The teas derived from this plant differ in the way they are dried and fermented. They are rich sources of Vitamin C and E and contain Tannic acid. Tannic acid helps clean the skin and eliminate odour causing bacteria. Green Tea also contains the amino acid L-theanine which has a calming effect against the caffeine found in tea. There are also herbal teas made from dried plants, flowers and leaves such as hibiscus, chamomile, mint, rose petals and rosehips.
Black Tea is fully fermented during processing and has the antioxidant benefits found in green and white tea but to a lesser extent. It doesn't taste as grassy as green tea because it is fermented. The fermentation process reduces the antioxidant effect.
Green Tea is not fermented at all and Oolong Tea is in between black and green tea in processing. Green Tea probably is the most beneficial of all teas owing to its properties and availability. Its proven anti-inflammatory properties are beneficial to the skin. It is also known to help strengthen teeth (due to the fluoride content), inhibit breast and ovarian cancer, burn fat, reduce insulin resistance and promote a healthy heart to mention a few. Research has shown that the breast cancer risk in Japanese women is significantly reduced in those who drink 6-10 small cups of green tea per day.
White Tea is the least processed of all teas and is similar to green tea. It tastes light and sweet and does not have the grassy taste of green tea. The white tea leaves are picked and harvested before the leaves fully open and the buds are covered with white hair hence the name. It has the most benefits of all the teas as it contains the most cancer fighting antioxidants and its scarcity makes it more expensive. There is considerably less caffeine in white tea (15mg per serving) than the other varieties with Black Tea containing 40mg per serving and Green Tea 30mg per serving. White Teas are produced mostly in China and Japan . The Darjeeling region of India also produces some fine white teas.
Health Benefits of Herbal Teas
There are several plants used for herbal teas and the health benefits are varied. The following are some commonly consumed herbal teas .
• Chamomile Tea calms the nerves, induces sleep, eases cold symptoms and soothes the stomach. The flowers are used.
• Ginger Root Tea improves circulation, relieves cold and flu symptoms, eases stomach cramps and nausea, eases menstrual cramps and regulates blood sugar.
• Rooibos Tea is herbal tea from South Africa . It's distinctively red in colour, and has a strong sweet taste, with a nutty aftertaste. It's rich in antioxidants and has relaxing properties.
• Fennel Tea from its seeds, improves appetite, aids the digestive process, relieves stomach cramps, eliminates flatulence and soothes sore throat and cough.
• Kava Kava Tea promotes sleep, is a muscle relaxant, eases anxiety, is a diuretic and it promotes urinary tract health. The roots are used.
• Mint Tea from its leaves eases stomach and digestive problems, helps relieve headaches and is relaxing.
• Rosehip Tea from its seed pods or “hips” has antioxidant properties, is a good source of Vitamin C, eases headaches and prevents bladder infections.
• St. John's Wort Tea from its leaves relieves anxiety and irritability, is a relaxant, lifts the spirit and improves mood.
• Thyme Tea from its leaves boosts the immune system, promotes perspiration, is antiseptic and it eases sore throat and cough.
• Yarrow Tea from its flowers reduces cold symptoms and chest congestion and improves digestion and appetite.
• Valerian Tea from its roots is a relaxant, promotes sleep, eases nerves and relieves stomach cramps.
• Licorice Root Tea relieves cough and sore throat, improves digestion, eases menstrual cramps, reduces seasonal allergies and is believed to increase libido.
• Burdock Root Tea stimulates the liver, cleanses the blood, is anti-inflammatory, helps regulate blood sugar and has antioxidant properties.
• Cinnamon Tea from its bark improves circulation, eases cold and flu symptoms, relieves stomach upsets and menstrual cramps and helps regulate blood sugar and insulin.
• Strawberry Leaf Tea from its leaves and not the fruit soothes the stomach, relieves diarrhoea, and helps ease arthritis and rheumatism.
• Nettle Tea from its leaves is rich in Vitamins A and C, cleanses the blood, improves liver and kidney function, eases cough and other respiratory problems, and relieves diarrhoea and constipation.
• Sage Tea from its leaves calms nerves, improves digestion and eases lung congestion and cough.
• Fruit Teas Various fruits have also been used as infusions for tea.
Tea Beauty Tips
• Eye puffiness can be treated by applying cool moistened tea bags over them for about 10minutes.
• Soaking feet in black tea helps reduce odour because of its astringent and antibacterial properties
• Placing a moistened green tea bag over an insect bite or wound helps soothe the area and reduce itching and swelling.
• A cooled strong cup of green tea may be used as an astringent for acne prone skin.
• Herbal Tea could add colour to hair. Sage will darken hair, Chamomile lightens blonde hair and Hibiscus tea gives red hair highlights.
• Using black or Ceylon tea for mixing henna hair colour instead of water improves the intensity.
• Sunburned skin may be soothed by having a tea bath. Run a tap over 4 to 5 teabags of Green, Jasmine or Oolong tea to fill bathtub and soak in warm water. Gently pat body dry and apply a soothing moisturiser.
Jul 28, 2007, 12:10 AM
July 24, 2007
Is It Safe to Eat?
President Bush took a potentially useful step last week, appointing a cabinet-level committee to find ways to ensure the safety of imported food and other products. But his actions would be a lot more credible if the administration had not been cutting the staff and budget of food safety programs at the Food and Drug Administration while also planning to eliminate half of the agency’s laboratories.
Hearings before a House oversight subcommittee raised serious questions about the F.D.A.’s ability to protect the public against contaminated or adulterated foods. William Hubbard, a former top agency official who consults for a coalition of industry and consumer groups, told the committee that the F.D.A. has lost some 200 food scientists and 700 field inspectors over five years, exactly the wrong direction when food imports are skyrocketing. He also noted that the small budget increase the White House has proposed for food safety next year would be a decrease after accounting for inflation.
As if that weren’t discouraging enough, the committee’s chief investigator described how porous the current safety shield is. Agency personnel, he said, inspect less than 1 percent of all imported foods and conduct laboratory analyses on only a tiny fraction of those. Overwhelmed entry reviewers at one field office have so many items to screen that they typically have less than 30 seconds to decide whether an import needs closer scrutiny. Importers also learn to game the system by sending goods to lax entry points or mislabeling them. And they are allowed to take possession of suspect goods and arrange testing by private laboratories whose work is often shoddy or driven by financial concerns.
The F.D.A. insists that its plan to close 7 of the agency’s 13 laboratories will actually improve its capabilities, by allowing greater investment in modern equipment and training at the six remaining laboratories. That could conceivably be true, but the House investigator worries that there could be a tremendous loss of talent when laboratory analysts resign rather than be relocated. Congress and its research arm, the Government Accountability Office, will need to determine if this is a genuine move toward modernizing some aging laboratories, or a step that could further weaken the F.D.A.
Powered by vBulletin® Version 4.2.1 Copyright © 2013 vBulletin Solutions, Inc. All rights reserved. | <urn:uuid:21b5029c-570a-4805-9aab-b964ffdda5db> | {
"date": "2013-05-23T18:30:12",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.947424054145813,
"score": 2.59375,
"token_count": 5802,
"url": "http://www.nigeriavillagesquare.com/forum/archive/index.php/t-11480.html"
} |
Because you have chronic kidney disease, you should take steps to protect your kidneys. Make changes to what you eat, manage your blood pressure, and manage your blood sugar if you have diabetes.
You also need to be careful about all of the medicines you take. Read this brochure to learn more, and talk with your pharmacist if you have questions.
Healthy kidneys filter wastes and extra water from your blood to make urine. The kidneys also help remove some medicines from your blood.
Why your pharmacist and provider need to know about your medicine and supplement use
Your kidneys do not filter as well as they did in the past. This can cause an unsafe buildup of medicines in your blood. Some medicines also can harm your kidneys.
Your pharmacist and healthcare provider need to know what medicines you take so they can give you advice on how to protect your kidneys. These medicines include:
You may be told to:
If you take OTC medicines for headaches, pain, fever, or colds, you may be taking nonsteroidal anti-inflammatory drugs (NSAIDs). NSAIDs are OTC medicines that can be harmful to your kidneys. Common NSAIDs include ibuprofen and naproxen.
Ask your pharmacist or provider if the OTC medicines you take are safe to use. You also can look for NSAIDs on Drug Facts labels like the one below.
Active Ingredients (in each caplet) Purposes Ibuprofen 200mg (NSAID)* Pain reliever/Fever reducer Pseudoephedrine HCI 30mg Nasal decongestant
*nonsteroidal anti-inflammatory drug
- sinus pressure
- nasal congestion
- minor body aches and pains
Remember that you can always talk with your pharmacist or provider about your medicines.
Page last updated: March 1, 2012 | <urn:uuid:6748202e-1832-40ca-b06a-ca61d887a0ba> | {
"date": "2013-05-23T18:52:54",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9243679642677307,
"score": 2.9375,
"token_count": 378,
"url": "http://www.nkdep.nih.gov/resources/CKD-Medicines.shtml"
} |
Acoustic trauma is injury to the hearing mechanisms in the inner ear due to very loud noise.
Acoustic trauma is a common cause of sensory hearing loss. Damage to the hearing mechanisms within the inner ear may be caused by:
The health care provider will usually suspect acoustic trauma if hearing loss occurs after noise exposure. Audiometry may determine how much hearing has been lost.
The hearing loss may not be treatable. The goal of treatment is to protect the ear from further damage. Eardrum repair may be needed.
A hearing aid may help you communicate. You can learn coping skills, such as lip reading.
Hearing loss may be permanent in the affected ear. Ear protection may prevent the hearing loss from getting worse.
Progressive hearing loss is the main complication of acoustic trauma.
Tinnitus (ear ringing) can also occur.
Call for an appointment with your health care provider if:
Injury - inner ear; Trauma - inner ear; Ear injury
Lonsbury-Martin BL, Martin GK. Noise-induced hearing loss. In: Cummings CW, Flint PW, Haughey BH, et al, eds. Otolaryngology: Head & Neck Surgery. 5th ed. Philadelphia, Pa: Mosby Elsevier; 2010:chap 151.
O’Handley JG, Tobin EJ, Shah AR. Otorhinolaryngology. In: Rakel RE, ed. Textbook of Family Medicine. 8th ed. Philadelphia, Pa: Saunders Elsevier; 2011:chap 19.
Updated by: Linda J. Vorvick, MD, Medical Director and Director of Didactic Curriculum, MEDEX Northwest Division of Physician Assistant Studies, Department of Family Medicine, UW Medicine, School of Medicine, University of Washington. Seth Schwartz, MD, MPH, Otolaryngologist, Virginia Mason Medical Center, Seattle, Washington. Also reviewed by David Zieve, MD, MHA, Medical Director, A.D.A.M. Health Solutions, Ebix, Inc.
The information provided herein should not be used during any medical emergency or for the diagnosis or treatment of any medical condition. A licensed physician should be consulted for diagnosis and treatment of any and all medical conditions. Call 911 for all medical emergencies. Links to other sites are provided for information only -- they do not constitute endorsements of those other sites. Copyright 1997-2013, A.D.A.M., Inc. Duplication for commercial use must be authorized in writing by ADAM Health Solutions. | <urn:uuid:8d62b7fd-dcd0-4f76-94fc-0547223c03cb> | {
"date": "2013-05-23T18:32:37",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8860333561897278,
"score": 2.9375,
"token_count": 529,
"url": "http://www.nlm.nih.gov/medlineplus/ency/article/001061.htm"
} |
The Nobel Peace Prize 1990
Award Ceremony Speech
Presentation Speech by Gidske Anderson, Chairperson of the Norwegian Nobel Committee
Your Royal Highnesses, Your Excellencies,
Ladies and Gentlemen,
This year's Nobel Peace Prize has been awarded to the President of the Soviet Union, Mikhail Sergeyevich Gorbachev.
The Norwegian Nobel Committee has made this award in recognition of the leading role he has played in the radical changes that have taken place in East-West relations. President Gorbachev has undoubtedly cooperated with other persons and other nations. But we recognise quite clearly that his manifold personal contributions and his efforts on behalf of the Soviet Union have proved decisive. For this reason the Nobel Committee has in 1990 decided to honour him.
We are experiencing dramatic changes in a world that is still rent with conflict. Nevertheless, we also have clear evidence that a peace process has started. East and West, the two mighty power blocs, have managed to abandon their life-threatening confrontation and have, instead, embarked on the long and patient road to cooperation on the basis of negotiation. The task now is to create a peaceful framework for the far-reaching transformation which will inevitably continue to take place in our part of the world.
We have already seen the fruits of this new climate between East and West.
Ancient European nations, such as Poland, Czechoslovakia, Hungary, and now East Germany too, have regained their freedom and have, for better or for worse, assumed responsibility for their own national destiny. Even though this process of detente still has its problems and is yet not terminated in all parts of our continent of Europe, it is nevertheless possible today, maybe for the first time in many hundreds of years, to envisage a Europe of the people and, we hope, also a Europe at peace.
This is due not least to the fact that the armaments race is ebbing out in our part of the globe.
In mistrust and fear this race has been going on for close on half a century. The result has been a terrifying waste of intellectual and material resources on both sides of the Iron Curtain.
Here too, we now at last see a change.
Comprehensive negotiations, bilateral as well as multilateral, accompanied by concrete and realistic compromise, have led to a process involving substantial reductions in standing armies and death-dealing armaments. Within the last few months disarmament agreements have been reached which are without parallel in our part of the world, in this or indeed in previous centuries.
In making this year's award of the Peace Prize, the Nobel Committee wishes to emphasise the tremendous potential which is now available for a more secure world, and for a more responsible and rational use of our resources.
The way in which confrontation has been replaced by cooperation has also had its consequences in other parts of the world. Several regional conflicts have been resolved, or at least come closer to a solution. The uncompromising attitude of the Cold War has given way to a pattern of negotiation, in which the interests and responsibility of the regional communities themselves have replaced old ideological considerations, or the all-too-often ruthless laws of the balance of power.
These changes have given the United Nations a new lease of life: for the first time since its creation after the Second World War this organisation has been able to play the role for which it was originally intended. It can now start to exercise its supremely important responsibility for the creation of an international community based on the rule of law and the establishment of peace between nations.
The award this year of the Peace Prize to the President of the Soviet Union, Mikhail Gorbachev, is an historic event not least because some of the previous awards made by our Committee - for example to the great champion of human rights Andrei Sakharov in 1975, and to the trade union leader Lech Walesa in 1983 - were received with cool hostility in the Soviet Union and in Poland at the time, involving the rejection, in these countries, of all that the Norwegian Nobel Committee stood for. On these grounds too the award constitutes a landmark. The Norwegian Nobel Committee considers that there is thus a historical link between today's event and December 10th, 1975, and 1983, which augurs well for the future.
The Norwegian Nobel Committee is an independent organisation answerable neither to the Government nor to the National Assembly (the Storting) of our country. The five members of the Committee are only answerable to their own consciences, and their decisions are based on the personal political judgment and sound common sense of each one. The guidelines governing our work are nevertheless clearly set out: these are to be found in Alfred Nobel's testament, written nearly a hundred years ago.
The award this year is very much in line with Alfred Nobel's own wishes and desires. Nobel wanted the prize to be awarded to someone who had worked to promote "fraternity between nations". That was the expression generally used in his day to denote the substitution of international cooperation for conflict. Nobel also wished his prize to be given to someone who had actively promoted a reduction in "standing armies" and worked for the "holding of peace congresses", what we today would call disarmament and negotiation.
Seldom has our Committee felt more in tune with Alfred Nobel's wishes than this year.
It is with a special sense of satisfaction that we award the Peace Prize to President Gorbachev. Each one of us, maybe in our different ways, has experienced the tension and threat of war that have cast a dark shadow over all the post-war years. The new-found openness and willingness to cooperate shown by the Soviet Union, and its readiness to accept realistic compromise, have created fresh hope under his leadership.
We fully realise that the Soviet Union is undergoing a dramatic period of transformation within its own borders: dictatorship is to be replaced by greater democracy, centralisation by the right of each republic for self-determination, a command economy by a freer market. This transformation is inevitably a painful process, involving great sacrifice. But we should like the many peoples of the Soviet Union to know that the respect and expectation of the outside world for their great country have never been as profound as today. There has been nothing comparable since the "Great Patriotic War", which this country and our Western Allies fought together against the barbarism of National Socialism. At that time the road that led from world war to Cold War proved disappointingly short. It is our hope that we are now celebrating the end of the Cold War.
Mikhail Sergeyevich Gorbachev was born in 1931 in a small village just outside Stavropol, north of the Caucasus Mountains, in a region that forms part of the Russian Republic, adjoining the ancient non-Russian countries of Georgia, Armenia and Azerbaijan, with their profound Christian and Muslim roots. Our laureate is in fact a native of the southern Soviet Union. He comes of peasant stock, and was born 14 years after the great revolution which shook not only the Russian Empire but the entire world. He was born during the dramatic collectivisation of Soviet agriculture, and grew up on a collective farm, where his father worked at a tractor station.
He was an eight-year-old schoolboy when the last world war broke out, and only 10 years old when Germany attacked the Soviet Union. His schooling was both sporadic and limited by wartime conditions: he was forced to work as a replacement for soldiers fighting at the front. When peace came he was 14 years old, and was able to continue his education, but, in common with most young people of his age, worked during his summer holidays. He was soon involved in the Communist Party's youth organisation, and was rapidly promoted. As a matter of course he joined the Communist party at the age of 21.
Two years before, he had left his native village in the Northern Caucasus, and made his way to the capital to embark on the study of law at the University of Moscow. Here he not only met Raisa Titorenko, who subsequently became his wife, but was also active in the Communist Party student movement, with responsibility for ideology and propaganda among fellow students in his faculty. He took a degree in law and then returned to Stavropol, where he was employed full-time in the Communist youth movement. By the age of 25 he was in fact a member of the establishment, with agricultural questions as his chief concern. In 1967, he took a second degree, this time in agriculture, and was rapidly promoted in the local party hierarchy.
By the 1970s this year's laureate was active politically on the national scene: his breakthrough came in 1978, when at the age of 47, he was given joint responsibility for the entire agricultural set-up of the Soviet Union in the Communist Party's Secretariat in Moscow, which meant permanent residence in the capital. Seven years later he was elected leader of the Soviet Union's Communist Party, the most influential post in the country. This was in 1985, by which time he was 54 years old. He is now a figure of international prominence. While still retaining the position of Party Secretary, he is also elected President of the Soviet Union by a reformed parliament.
Although Mikhail Gorbachev is a man of quite outstanding talent and ability, he insisted recently that the story of his own family is actually history itself or in other words the history of the Soviet Union. Gorbachev is in fact a child of the revolution and the world war, of Lenin's, Stalin's, Khrushchev's and Breshnev's Soviet Union. And like most people in this world he is a product of the society in which he grew up.
Today, this Soviet society is a historical experiment which is being shaken to its foundations, and this is so not least because Mikhail Gorbachev was also capable of breaking the mould of the society from which he sprang. Or as he personally expressed it in the televised interview, in which he spoke of the perestroika which he symbolises: "We came to the conclusion that we could no longer continue to live the way we were. We needed major changes in every department of life".
Our laureate has in fact been a Communist all his life; and he still is to this day, even though this might shock us, as he declared in an interview he recently gave in the USA. We are not really so shocked. But this is neither the time nor the place to discuss the Soviet Union's internal affairs. The Norwegian Nobel Committee has given President Gorbachev the Peace Prize for his leading role in international politics.
Our Committee has nonetheless observed one aspect of life in the Soviet Union - the much greater openness President Gorbachev has introduced. This has to a very large extent helped to promote international confidence. Greater openness has in many ways ensured a basis for the comprehensive agreements on disarmament and cooperation between East and West that we are witnessing today.
An entire world is today watching the Soviet Union's dramatic and heroic struggle to overcome the awesome economic, social and political problems which shake the country. The Norwegian Nobel Committee, not least, is also watching.
It is our wish that the award of the Peace Prize to its President, Mikhail Sergeyevich Gorbachev, will be recognised as a helping hand in an hour of need, as a greeting to all the peoples of the Soviet Union, as a sign that the outside world is watching their struggle with a sense of fellow feeling, and with a sense of participating in the historical events that are taking place.
It has been suggested that the award of this year's prize to the President of the Soviet Union by the Nobel Committee was somewhat bold. Our boldness is, however, nothing like the boldness shown by Mikhail Gorbachev when he embarked on the course which has today led to the receipt of the Nobel Peace Prize, or the boldness shown by the many peoples of the Soviet Union too in rewriting history.
From Nobel Lectures, Peace 1981-1990, Editor-in-Charge Tore Frängsmyr, Editor Irwin Abrams, World Scientific Publishing Co., Singapore, 1997
Copyright © The Nobel Foundation 1990
MLA style: "The Nobel Peace Prize 1990 - Presentation Speech". Nobelprize.org. 23 May 2013 http://www.nobelprize.org/nobel_prizes/peace/laureates/1990/presentation-speech.html | <urn:uuid:595a62e9-0ac5-479c-ac10-ea4785758260> | {
"date": "2013-05-23T18:31:22",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9770872592926025,
"score": 2.625,
"token_count": 2529,
"url": "http://www.nobelprize.org/nobel_prizes/peace/laureates/1990/presentation-speech.html"
} |
Hurricane Sandy has churned northward through the northern Caribbean, across Cuba, and through the Bahamas during the past three days, leaving in its wake plenty of mayhem. Sandy's story may not yet be finished.
While it is quite normal to see tropical cyclones rear their ugly heads across the Caribbean during October and even into November, these storms normally will track northward for a short time before turning harmlessly off to the northeast, into the Atlantic.
The Weather Channel has this special coverage.
Thanks to a large roadblock in the upper atmosphere across the North Atlantic and eastern Canada during the next several days, it appears Hurricane Sandy will not make an escape away from the U.S. East Coast. Blocking high pressure at upper levels from Atlantic Canada to southern Greenland and the North Atlantic as well as a strong upper-level low-pressure area through the east-central Atlantic will combine with a developing upper-level trough through the eastern U.S. to steer the storm into the northeast coast.
The strong upper-level trough diving into the eastern U.S. will likely close off into an upper-level low through the Mid-Atlantic region by Monday and capture Sandy as it moves northeastward then northward through the western Atlantic. Thereafter, as Sandy becomes a very intense post-tropical storm Tuesday, most computer models move the storm northwestward well south of Cape Cod at first and then to the west south of New England to near the New Jersey coast by Tuesday evening.
Thereafter the intense North Atlantic gale is expected to stall briefly before meandering off to the north or northeast across New England or New York state later next week. The aforementioned scenario is quite rare and could even become a historical event before all is said and done. The most recent event with any resemblance would be the now famous "Perfect Storm" of late October 1991.
There were a couple of hurricanes during the past 150 years that have tracked northward toward the Carolinas and then northwestward into the Mid-Atlantic states, most notably Hurricane Hazel in 1954. This storm has potential to outdo all of the above. Sandy is expected to take a track northeastward over the warm Gulf Stream until it reaches a position well east of the Mid-Atlantic Coast. Only then will it be captured and turned to the northwest and west toward the northeast coast. This track will allow the storm to maintain tropical characteristics longer than normal.
By the time Sandy transitions to a post-tropical gale well south of New England Monday night or Tuesday it will then be able to tap into the enormous amount of upper-level jet-stream energy supplied by the developing trough and upper-level low through the Mid-Atlantic states. This transformation could allow post-tropical Sandy to be more intense than the tropical version was when it was moving from Jamaica to Cuba.
The central pressure of the intense gale could produce some all-time low barometer readings for some locations. Computer models are forecasting the central pressure to fall as low as 27.80 inches by Tuesday within this storm.
A major difference from the tropical to the post-tropical Sandy will be the wind field. The strong winds surrounding Hurricane Sandy were mostly within 150 miles of the center. The post tropical version of Sandy should see the gale wind field expand outward to as much as 400 miles in all directions. This is why it is important not to focus on the center of post-tropical Sandy because damaging winds could occur from as far north as Maine to as far south as Cape Hatteras at the same time.
The track of this storm may also bring a significant storm surge and coastal flooding and the associated damage into a large portion of the northeast coast from Maine to New Jersey. Sustained easterly winds could reach as high as 40 to 60 mph along coastal areas with gusts exceeding 75 mph in exposed areas, and this will push ocean waters into the coast. While the exact track of the storm is yet to be set in stone, there appears to be a considerable threat to the New York City area for a large and possibly record storm surge. For this to happen, the post-tropical Sandy would have to track west or northwestward into the central New Jersey coast. A track a little different would probably spare New York City the worst.
The full moon occurs Monday and that only worsens the situation for coastal flooding by adding on a couple of feet of water to the storm surges.
Strong westerly to northwest winds to the south of the storm, possibly through the Chesapeake Bay and Delaware Bay regions, could lead to very low waters at times of low tide. This has been a problem in the past with some notable strong storms.
Other potential problems with this storm will be strong winds across inland areas that could bring down trees and power lines leading to widespread power outages. Heavy rainfall of as much as 2 to 4 inches with local amounts exceeding 6 inches could lead to local flooding early and significant river flooding later on next week. If the current scenario pans out there could be major disruptions to travel throughout a large portion of the Northeast during the early- and mid-week period of next week.
With cold air rushing into the storm as it reaches the northeast coast Tuesday, we can't rule out some snow for portions of the Appalachians from southwest Pennsylvania to West Virginia.
The final track and intensity of post-tropical Sandy is yet to be pinned down, but it does appear with decent certainty that one of the most highly populated portions of the U.S. is going to be dealt a blow of significant proportions from Monday into Wednesday of next week.
Source: The Weather Channel
Posted by Northern Ag Network | <urn:uuid:08f1366c-edbb-4512-b5a3-29c1b54ccccf> | {
"date": "2013-05-23T19:00:27",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9675702452659607,
"score": 2.71875,
"token_count": 1154,
"url": "http://www.northernag.net/AGNews/tabid/171/articleType/ArticleView/articleId/7489/Hurricane-Sandy-Bears-Down-on-East-Coast.aspx"
} |
The Norwegian Radiation Protection Authority (NRPA) is the competent national authority in the area of radiation protection and nuclear safety in Norway. The NRPA was created in 1993 through the consolidation of the former Nuclear Energy Safety Authority with the National institute of Radiation Hygiene.
The NRPA is responsible for:
- overseeing the use of radioactive substances and fissile material
- coordinating contingency plans against nuclear accidents and radioactive fallout
- monitoring natural and artificial radiation in the environment and at the workplace
- increasing our knowledge of the occurrence, risk and effects of radiation
The Radiation Protection Authority is organized under the ministry of Health and Care Services. It provides assistance to all ministries on matters dealing with radiation, radiation protection and nuclear safety. | <urn:uuid:6e35132a-2415-4460-b406-b474f87faf9d> | {
"date": "2013-05-23T18:37:50",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9209378361701965,
"score": 3.15625,
"token_count": 146,
"url": "http://www.nrpa.no/eway/default.aspx?pid=240&trg=Main_6342&Main_6342=6394:0:15,6230:1:0:0:::0:0&CenterAndRight_6394=6393:0:15,6254:1:0:0:::0:0"
} |
- Dietary Supplements
- Health Conditions
- Healthy Nutrition
- Cardiovascular Health
- Skin Care
- Natural Remedies
Blood Sugar as One of Blurred Vision Causes – Updated Article With Extra Information
Diabetes is a disease with many side effects. Many people refer to diabetes as the ‘slow poison’. It causes a lot misbalance in life, affecting the whole body of the sufferer. Diabetes occurs when the sugar level in the blood is too high and remains untreated for a very long time. When the sugar level is too low, hypoglycemia may result. This usually occurs when a person is suffering from diabetes and has taken too many diabetic medicines or has injected too much insulin. Hypoglycemia is more dangerous than hyperglycemia. The treatment for someone with hypoglycemia is typically address in a temporary situation, by providing the patient with something that contains higher glucose (ie: orange juice).
Blurred vision in diabetes is caused by hyperglycemia which is higher levels of sugar in the body. Some of the symptoms of high blood sugar are frequent urination, increased hunger and thirst, lethargy and headache. If a person is suffering from any of these symptoms he or she should immediately contact the doctor. Diabetes is a major culprit for blurred vision or even vision loss. Studies have shown that if you are diabetic, you have 25 times more chance than a non sufferer of losing your sight. This disorder is known as diabetic retinopathy. Retinopathy has two types; non-proliferative and proliferative. Non-proliferative retinopathy is associated with the early stages of the disorder. It causes the small retinal blood vessels to break and leak. It does not call for any medical action unless the central vision of a diabetic person becomes hazy, or if straight lines appear curved. Proliferative retinopathy is a severe disorder. It causes the unusual growth of retinal blood vessels inside the eye which leads to bleeding. If not detected and treated in the early stages this disorder can even cause blindness.
Blood sugar is a chronic disease and it affects each and every organ of the body which is why it is referred to as the ‘slow poison’. If diabetes has not been diagnosed yet in a person, then blurred eye vision may come and go as the sugar level will increase and decrease, but once a person experiences this he or she should not take it lightly. They should immediately consult a doctor and get the necessary tests done. If you delay and do not see a doctor, the sugar levels will damage the blood vessels which are in the back of your eye. The longer diabetes remains undiagnosed the higher the chances of diabetic retinopathy.
Diabetics can lead normal, constructive lives and if the diet is monitored carefully, will not experience any eye problems. Since the body of the diabetic processes sugars differently, the intake of anything that contains glucose or that converts to sugars during digestion should be maintained. A combination of diet and medication can keep vision problems as well as circulatory problems that are associated with diabetes from afflicting the patient.
For the original article, go to, click hereClick here to discuss this article on forum.
The information supplied in this article is not to be considered as medical advice and is for educational purposes only.
|Diabetes Prevention19 Nov 2010| | <urn:uuid:c0ab75d6-8349-40f0-a18c-09bce25777e7> | {
"date": "2013-05-23T18:52:46",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9445163607597351,
"score": 3.140625,
"token_count": 693,
"url": "http://www.nutralegacy.com/blog/general-healthcare/blood-sugar-as-one-of-blurred-vision-causes/"
} |
Brazil deforestation hits record low
BRASILIA, Brazil (AP) — Deforestation in Brazil's Amazon rainforest has dropped to its lowest level in 24 years, the government said Tuesday.
Satellite imagery showed that 1,798 square miles (4,656 square kilometers) of the Amazon were deforested between August 2011 and July 2012, Environment Minister Izabella Teixeira said a news conference. That's 27 percent less than the 2,478 square miles (6,418 square kilometers) deforested a year earlier. The margin of error is 10 percentage points.
Brazil's National Institute for Space Research said the deforestation level is the lowest since it started measuring the destruction of the rainforest in 1988.
If you have any technical difficulties, either with your username and password or with the payment options, please contact us by e-mail at email@example.com | <urn:uuid:b952b7ad-2411-47e8-be27-c8df6faafc0f> | {
"date": "2013-05-23T18:54:29",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9420026540756226,
"score": 2.65625,
"token_count": 180,
"url": "http://www.nwherald.com/2012/11/27/brazil-deforestation-hits-record-low/asj5qam/"
} |
OhmSantih Yoga has developed yoga for kids program, with the intention to provide the children with a fun way to develop their critical skills in a non-competitive environment. The critical skills can be broken down into different levels; physical, psychological and physiological.
On a physical level, some asanas work on enhancing the child’s strength and flexibility and in some instances, the growth of the child can be enhanced through spine elongating asanas. On a psychological level, some asanas can deliver benefits such as increasing his/her self-esteem and thus improving their leadership skills and team work and also helps to release stress and anxiety, thus increasing the ability to relax. The ability of the child to concentrate and focus will also be enhanced through the asanas and the pranayama exercises. On a physiological level, asanas can help improve digestion and also to strengthen the immune system of the children and at the same time, increase their bodily resistance against invading bacteria and viruses, thus fending off various illnesses.
On the other hand, we have also gathered evidence over the years that yoga for kids will benefit children with ailments such as asthma and sinusitis and also children with special needs, such as Down syndrome, Autism Spectrum Disorder and Cerebral Palsy. Take for an example, in the case of Autism Spectrum Disorder, the muscle tone can be improved and the flapping symptom can be minimzed. More importantly, the gentleness of yoga allows them to integrate their natural gift of enthusiasm with series of movements and breathe without having to face competition or stress.
Retrospectively, many of the parents out there may feel that to bring yoga into the child’s life may not seem viable; however through the many years of teaching, it is undeniable that yoga indeed can improve a child’s life immensely and Ohmsantih yoga is honoured to have witness many of such cases. | <urn:uuid:623e75a0-aa1f-4850-aee6-48b59973b94d> | {
"date": "2013-05-23T18:52:09",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9529498815536499,
"score": 2.515625,
"token_count": 388,
"url": "http://www.ohmsantih.com/courses-fees/kids-yoga-singapore/"
} |
help with a lesson plan
by, 03-18-2008 at 04:44 PM (2410 Views)
I'm currently planning a lesson to do with 4th-6th graders as part of a practicum in my Education program at university. I was hoping to select a poem that is very descritive to read to the kids as they draw what they see through the words. My initial idea was to use Coleridge's "Kubla Kahn," but I've since decided that this will probably be too difficult a poem for 4th-6th graders (based on experience I've had with 'em).
I'm looking for something that won't be too easy, preferably something with metaphors so that I may seque to brief instruction on those. I want to make the activity somewhat challenging, and one of my ideas is to mandate that I will only read the poem perhaps three times and they must come to agreement on when those three repetitions can be used. | <urn:uuid:863a5925-342e-4218-9827-3f32ac3d44b9> | {
"date": "2013-05-23T18:32:32",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9880972504615784,
"score": 2.703125,
"token_count": 202,
"url": "http://www.online-literature.com/forums/entry.php?4875-help-with-a-lesson-plan&bt=19051"
} |
William H. Rehnquist
William H. Rehnquist's service on the Supreme Court allowed him to witness - and direct - a dramatic transition in political ideology. From associate justice in 1972 through his role as chief justice in 1986, Rehnquist struggled against liberal colleagues Brennan, Marshall, and Blackmun. Later, as the leader of a conservative court, Rehnquist enjoyed the luxury of sitting in the majority. And as chief justice, Rehnquist often attracted the support of the liberal remnant of the Court. A highly practical man, Rehnquist found inspiration in Charles Evans Hughes' practice of compromising to secure the broadest majority. In many ways, Rehnquist's desires to maintain high credibility for the Court and the law, the result of a general perception of judicial unity, has contributed greatly to his success in mobilizing the Court's conservative shift. Thus, despite the current return of the Court to a more moderate balance, Rehnquist's conservative vision and influence will no doubt stay strong during his tenure.
William Hubbs Rehnquist was born in Milwaukee, Wisconsin on October 1, 1924. He enjoyed a relatively undistinguished childhood in his middle-class suburban home. The son of a paper salesman, Rehnquist grew up in a heavily conservative household in which popular Republican leaders such as Alf Landon, Wendell Wilkie, and Herbert Hoover were idolized. World War II erupted before Rehnquist had a chance to complete his education and the future chief justice enlisted in the air force branch of the army as a weather observer. He served in North Africa.
Like many Americans in his generation, Rehnquist attended college after World War II with the support of scholarship money from the GI Bill. At Stanford, he earned both a bachelor and a master of arts degree in political science. A distinguished student, Rehnquist was elected to Phi Beta Kappa in 1948. He continued his education at Harvard where he received another master of arts degree -- this time in government -- two years later. Rehnquist returned to Stanford Law School in 1950; he graduated at the top of his class. (Sandra Day O'Connor, who would eventually serve with him on the Supreme Court, graduated third from that same class.)
At law school, Rehnquist started down the path that would eventually take him to the Supreme Court. Having already established a reputation among his instructors and peers as a brilliant legal thinker and an able scholar, Rehnquist impressed one professor sufficiently to earn a private interview with Supreme Court Justice Robert Jackson, who was visiting the law school. Rehnquist's professor, a former clerk for Jackson, arranged the meeting in hopes that his favored student could convince Jackson of his qualifications for a clerkship. Rehnquist walked away from that meeting feeling he had failed to impress Jackson in the slightest. However, his fears proved false as Jackson eventually selected him for clerkship that year. Rehnquist's clerkship under the moderate Jackson did not alter his conservative beliefs in any noticeable manner. Instead, his exposure to the other clerks may have served only to confirm his conservativism.
Rehnquist married Natalie Cornell, whom he had met during his law school years, after his completing his clerkship. He also moved to Phoenix, Arizona to work for a law firm there. Rehnquist chose Phoenix for its pleasant weather and favorable political leanings. The next few years passed uneventfully for Rehnquist. He, together with his wife, raised a son and two daughters. Following advice given to him by Justice Felix Frankfurter, Rehnquist began his participation in the Republican Party. He became a Republican Party official and achieved prominence in the Phoenix area as a strong opponent of liberal initiatives such as school integration. Rehnquist campaigned for Republican presidential candidate Barry Goldwater during the 1964 elections. During that time, he befriended Richard Kleindienst, another attorney from Phoenix. When Richard Nixon rose to the presidency a few years later, he appointed Kleindienst deputy attorney general of his administration. Kleindienst sought Rehnquist for the position of deputy attorney general in the Justice Department's Office of Legal Counsel. When Justice John Marshall Harlan retired in 1971, the Nixon administration chose Rehnquist as Harlan's replacement. A Democratic Senate overwhelmingly confirmed his nomination. On January 7, 1972, Rehnquist -- and fellow nominee, Lewis Powell -- took their oaths of office.
In his early days on the Court, Rehnquist was outspoken as the Court's lone dissenter despite the presence of three other Republican appointees. He battled against the expansion of federal powers and advocated a strong vision of state's rights. Rehnquist also differed from the majority's view that the Fourteenth Amendment applied to non-racial issues such as the rights of women, children, and immigrants. Although his dissents at the time influenced very little of the Court's conclusions, Rehnquist provided the future Court many valuable ideas which inspired the later conservative shift. Rehnquist's views led him to oppose the majority in several important decisions. In his opinion, the liberal faction of the Court too often tried to shape public policy by expanding the scope of the law beyond its original meaning.
By 1986, Rehnquist held significant persuasive power. After Chief Justice Burger retired from the Court, President Reagan nominated Rehnquist to replace him. Liberals howled in protest. Many painted Rehnquist as a racist and conservative extremist. Opponents alleged racist behavior (an old charge) when Rehnquist was a Republican official in Phoenix. Others charged that he had mishandled a family trust. In the end, however, these accusations remained unproved and the Senate confirmed Rehnquist by a solid majority.
As chief justice, Rehnquist won the respect of his colleagues through his efficient management of court affairs. Rehnquist has also revealed a moderation in his views by voting with liberals to protect gay rights and free speech. A widower, Rehnquist engaged his free time with quiet hobbies. He maintained the tradition of a Christmas carol party, which he hosted every year.
In 2004, Rehnquist was diagnosed with anaplastic thyroid cancer. Though his physical condition declined, he continued in his role as chief justice and died on September 3, 2005, a month shy of his 81st birthday.
|Clerk||Law School||Terms Clerked|
|Charles J. Cooper||Alabama (1977)||1978|
|Michael J. Meehan||Arizona (1971)|
|Brett L. Dunkelman||Arizona (1980)||1981|
|Kevin R. Boyle||Arizona (1997)||1999|
|William R. Lindsay||Berkeley (1985)||1986|
|Jeffrey L. Bleich||Berkeley (1989)||1990|
|William S. Eggeling||Boston (1974)||1975|
|John C. Englander||Boston (1983)||1984|
|Stephen M. Sargent||BYU (1993)||1994|
|Jay T. Jorgensen||BYU (1997)||1999|
|Monica J. Wahl (Shaffer)||Chicago||1990|
|Maureen E. Mahoney||Chicago (1978)||1979|
|David B. Jaffe||Chicago (1981)||1982|
|J. Anthony Downs||Chicago (1986)||1987|
|Lindley J. Brenza||Chicago (1987)||1988| | <urn:uuid:af777708-800b-49cf-99ab-33c0dca09d0d> | {
"date": "2013-05-23T18:44:49",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9728573560714722,
"score": 2.875,
"token_count": 1535,
"url": "http://www.oyez.org/justices/william_h_rehnquist?order=field_education_value&sort=asc"
} |
Ankle-Brachial Index Test
This test is done by measuring blood pressure at the ankle and in the arm while a person is at rest. Measurements are usually repeated at both sites after 5 minutes of walking on a treadmill.
The ankle-brachial index (ABI) result is used to predict the severity of Reference peripheral arterial disease Opens New Window (PAD). A slight drop in your ABI with exercise means that you probably have PAD. This drop may be important, because PAD can be linked to a higher risk of heart attack or stroke.
Why It Is Done
This test is done to screen for peripheral arterial disease of the legs. It is also used to see how well a treatment is working (such as medical treatment, an exercise program, angioplasty, or surgery).
The ABI result can help diagnose peripheral arterial disease (PAD). A lower ABI means you might have PAD. A slight drop in the ABI with exercise, even if you have a normal ABI at rest, means that you probably have PAD.
A normal resting ankle-brachial index is 1.0 to 1.4. This means that your blood pressure at your ankle is the same or greater than the pressure at your arm, and suggests that you do not have significant narrowing or blockage of blood flow.Reference 1
An abnormal resting ankle-brachial index is 0.9 or lower. If the ABI is 0.91 to 0.99, it is considered borderline abnormal.Reference 1
What To Think About
You may experience leg pain during the treadmill portion of the test if you have peripheral arterial disease (PAD).
Undiagnosed arterial disease in the arms can cause inaccurate test results.
Blood pressure readings may not be accurate when the blood vessel being measured is hardened by calcium (calcified). Arteries may calcify more than usual if you have Reference diabetes Opens New Window or kidney problems (renal insufficiency).
A very abnormal ABI test result may require more testing to determine the location and severity of PAD that might be present.
Rooke TW, et al. (2011). 2011 ACCF/AHA Focused update of the guideline for the management of patients with peripheral artery disease (updating the 2005 guideline): A report of the American College of Cardiology Foundation/American Heart Association Task Force on Practice Guidelines. Journal of the American College of Cardiology, 58(19): 2020–2045.
|By:||Reference Healthwise Staff||Last Revised: October 18, 2011|
|Medical Review:||Reference Rakesh K. Pai, MD, FACC - Cardiology, Electrophysiology
Reference David A. Szalay, MD - Vascular Surgery | <urn:uuid:7d14f124-f8e2-4256-ae3d-34c41c2f2ca7> | {
"date": "2013-05-23T18:53:28",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9002015590667725,
"score": 3.34375,
"token_count": 582,
"url": "http://www.pamf.org/health/healthinfo/index.cfm?A=C&hwid=aa115638"
} |
PBS KIDS® HOSTS “SHARE THE EARTH” CELEBRATION IN HONOR OF EARTH DAY
New eco-focused episodes and classic favorites airing April 18 – 22
Arlington, VA – March 16, 2011 – PBS KIDS will host its sixth annual PBS KIDS “Share the Earth” celebration in honor of Earth Day by featuring new and favorite episodes encouraging children to care for and respect the environment. From April 18 – 22, families can view brand new eco-friendly episodes on-air from SID THE SCIENCE KID, CURIOUS GEORGE®, MARTHA SPEAKS, WILD KRATTS, and ARTHUR, while learning about recycling, habitats, alternative energy and more. In addition, favorite Earth-focused episodes from SUPER WHY!, WORDGIRL®, and more will also be airing throughout the week.
“As a leader in educational children’s media, PBS KIDS offers many resources to get kids excited about exploring science and the natural world around them,” said Lesli Rotenberg, senior vice president, Children’s Media, PBS. “This year, we’re celebrating Earth Day with content on-air, online, and beyond to help families discover that their next learning adventure could be as close as their own backyard.”
The “Share the Earth” celebration continues online for both kids and parents. PBSPARENTS.org will feature a special “Simple Ways to Protect the Earth” page with new ideas for activities parents can do with their kids in celebration of Earth Day, such as gardening and craft ideas. An Earth Day channel on both PBSKIDS.org/video and PBSKIDSGO.org/video will feature Earth-themed episodes from favorite shows such as THE CAT IN THE HAT KNOWS A LOT ABOUT THAT! and WORDGIRL from April 15 through 22. In addition, a new web exclusive episode of DESIGN SQUAD NATION, “Sustainable South Bronx,” will run on PBSKIDSGO.org, along with accompanying eco activity ideas for kids.
Following is a listing of the episodes airing the week of April 18 -22 (Check local listings for air dates and times).
SID THE SCIENCE KID
NEW “Where Did The Water Go?" ("What happens to water that goes down the drain?")
While brushing his teeth, Sid wonders what happens to all the dirty water when it goes down the drain. At The Science Center, Sid and his friends explore how water travels in and out of our homes through pipes. And here's something Sid and his friends never realized: there's lots of water in the world, but you can't drink it all! We can only use fresh water, and there aren't a lot of fresh water sources in the world. That's why it's important not to waste water!
NEW "Clean Air!" ("Why does Sid's Dad wear a mask when he paints?")
Sid the roving reporter is investigating something strange in his backyard--his Dad is wearing a mask while painting. Sid discovers that his Dad is protecting his face so he doesn't breathe in the dirty fumes. At school, Sid and his friends discover that people and animals on Earth need to breathe clean air, and when we pollute the air around us, it affects the air that everyone breathes. The kids also discover that trees have a really important role in keeping our air clean!
NEW “Reused Robot" ("Where does trash go when we throw it away?")
Sid's toy robot is broken, so he wants to throw it "away." Sid's Mom tells him there is no such thing as "away," and when we put something in the trash, we are actually creating waste. Sid and his friends explore the idea that everything we throw away goes somewhere. This leads to an investigation of how to recycle and reuse items so that we make less trash.
NEW “Save The Stump" ("Can an old stump be a home for tiny creatures?")
Sid is super excited because his Dad is clearing out space in the yard for a basketball court! While Sid and Dad are surveying the land, Sid notices a big stump teeming with little creatures! During a special field trip to The Science Center, Sid and his friends discover that there are animal habitats all around us, even in old stumps, and if one habitat is destroyed, all of the other habitats and animals are affected.
NEW “Wagstaff Races”/ “The Missing Metal Mystery”
“Wagstaff Races” - Wagstaff City's environmental club is having a "Go Green Go-Cart Race," fueled by alternative energy. Using sun, wind, and pond scum, the gang gathers at the starting line. Who will win the trophy — and most importantly, how?
“The Missing Metal Mystery” - Who’s been stealing things from the local junkyard? When Detective TD announces the identity of his main suspect, everyone is shocked.
NEW ”Falcon City”
The Kratt brothers are itching to fly with the world’s fastest animal, the Peregrine falcon, which can hit top speeds of 240 mph. But their efforts are side-tracked when the rest of the Wild Kratts team challenges them to find the falcon in the city instead of in the wild, and Chris’ Creature Power Suit is accidentally activated with Pigeon Powers! But then they discover that Zach is sending his Zachbots to clean off a building that has a peregrine falcon nests with chicks. Martin and Chris must activate their Peregrine falcons powers and harness the force of gravity to pull off a high flying creature rescue!
NEW “The Blue and the Gray”
Martin and Chris are absorbed in a hilarious competition to discover who is the best acorn planter, blue jays or gray squirrels, when a strange Creature Power Suit malfunction transforms Martin into an acorn and grows him into an Oak tree! Chris activates the squirrel powers of his Creature Power Suit, but gets waylaid by a bobcat and goshawk, and Aviva, Koki, and Jimmy can’t find them. It’ll take some animal-loving Wild Kratts kids to get them out of this mess
NEW “Follow the Bouncing Ball”/ “Buster Baxter and the Letter from the Sea”
“Follow the Bouncing Ball” - Alberto Molina’s beloved soccer ball, signed by his favorite Ecuadorian soccer star, El Boomerang, is lost! Is it the same soccer ball bouncing all over town, eluding potential captors?! This kicks off the first of 10 stories which follow the incredible journey of “El Boomerang” around the world! Come, follow the bouncing ball!
“Buster Baxter and the Letter from the Sea” - While on vacation with the Read family, Buster discovers a message in a bottle on the shore. Could it be an urgent message from the people of the Lost City of Atlantis? Buster is determined to find out and sends them a message back…by throwing his own bottles in the ocean! Will he learn that keeping the beach and waters clean is the real message?
“The Cherry Tree”
Muffy will do anything to have a gigantic Dream Bouncy Castle at her party, or so she thinks. When her favorite cherry tree is cut down to make room for the castle in her yard, she starts to have regrets. Then to make matters worse, she learns that cutting down trees hurts the environment, too. What can Muffy do to fix the damage she’s done?
NEW “Follow That Boat”/“Windmill Monkey”
“Follow That Boat” – Steve needs an A to pass his history class and his model papyrus boat is sure to make the grade. George helps him test the boat in Endless Park’s pond, but a sudden rainstorm sweeps it down the sewer grate! While searching for the boat, Steve and George learn that debris from the street ends up in the ocean. Will they ever find Steve’s little boat in the big ocean or will he be taking history again next year?
“Windmill Monkey” – George proudly finishes planting his rooftop garden when he turns around to find that Compass and his friends have eaten all the seeds. The scarecrow overlooking the garden didn’t scare them at all! While buying more seeds, George spots a windmill and learns how the wind can power just about anything. The inspired monkey sets out to create the world’s first wind powered scarecrow in hopes that will keep his seeds safe. But some things are more easily planned than done!
“Tiddalick the Frog”
Whyatt’s mom tells him that he’s wasting water. This is a really big problem and he's not sure how to fix it. So the Super Readers dash into the Australian folk tale of Tiddalick the Frog and make the acquaintance of a funny amphibian whose puddle jumping is using up all the water and leaving his neighbors in the dust – literally! As the Super Readers help Tiddalick and his dry friends, they learn how important water is to the planet, along with a valuable lesson about conservation.
All is not well in Perfectamundo, a dome-enclosed cybersite, when orange spots are discovered building up on the dome’s interior surface, blocking the site’s precious sunlight. What source could be responsible for the spots multiplying so fast? Is it Hacker’s new factory that pours out orange clouds through smoky stacks? It can’t be that new Digifizz toy, with its tiny burst of colorful sparkles shooting into the air each time it gets used. With time running out, the CyberSquad must come to grips with the power of multiplication and use it to undo the site’s pollution problem.
ANGELINA BALLERINA™ THE NEXT STEPS
“Angelina and the Dance-a-thon”
Angelina and her friends organize a dance marathon for the Chipping Cheddar Earth Club as part of their "Camembert Cares" school project. After Gracie accidentally recycles the pledge sheet, Angelina uses her ingenuity to save the day!
“EARTH DAY GIRL”
When the villainous (and very large) Birthday Girl learns that planet Earth is having a special celebration on the same day as her happy occasion, she decides to wreak environmental havoc, just to teach the Earth a lesson. Can WordGirl find a way to stop the Birthday Girl’s eco-rampage and save Earth Day?
MAYA & MIGUEL™
“EVERY DAY IS EARTH DAY”
For a school Earth Day project, the kids decide to clean up an old lot and plant a community garden. But as the deadline approaches, a rainstorm hits, turning the patch of dirt into a muddy mess. How will Maya get her friends out of the muck this time?
THE ELECTRIC COMPANY
“The Flube Whisperer”
Keith sends away for a Skeleckian pet that lives in a biosphere. But when the biosphere malfunctions, will Manny save the day?
CLIFFORD THE BIG RED DOG®
It’s Keep Birdwell Beautiful month and the kids are doing their part by planting a flower garden. Seeing this, the dogs decide to create a doggie flower garden of their own. But when Cleo hears that almost anything grows in Birdwell Island soil, she decides she’d much rather grow a garden full of dog toys! She soon learns, however, that working alone for a selfish end is not nearly as rewarding as working together for the whole community.
BARNEY & FRIENDS™
“Home Sweet Earth: The Rainforest”
It’s Earth Day, a great time for everyone to learn how to help take care of our world, but Ben is wasting paper while BJ isn’t too concerned about cutting down a tree to make room for a new playground. After a trip to the rainforest and a meeting with Mother Nature, everyone learns the importance of taking care of our world. As Earth Day comes to an end, Barney reminds us all that taking good care of our Earth is the natural thing to do for the people we love.
About PBS KIDS
PBS KIDS, the number one educational media brand for kids, offers all children the opportunity to explore new ideas and new worlds through television, online and community-based programs. More than 21 million children watch PBS KIDS on TV, and more than 21 million engage with PBS KIDS online each quarter. For more information on specific PBS KIDS programs supporting literacy, science, math and more, visit PBS.org/pressroom, and follow PBS KIDS on Twitter and Facebook.
Curious George is a production of Imagine, WGBH and Universal. Curious George and related characters, created by Margret and H.A. Rey, are copyrighted and trademarked by Houghton Mifflin Harcourt Publishing Company and used under license. Licensed by Universal Studios Licensing LLLP. Television Series: (c) 2011 Universal Studios. All Rights Reserved.
# # # | <urn:uuid:8faefe37-70dd-408e-998e-c86acda5d5ca> | {
"date": "2013-05-23T19:00:11",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9293407797813416,
"score": 2.875,
"token_count": 2810,
"url": "http://www.pbs.org/about/news/archive/2011/pbs-kids-earth-day/"
} |
Ray Tracing and Gaming - Quake 4: Ray Traced Project
Quake 4: Ray traced
An algorithm was invented for this work that uses rays for collision detection (CD). A polygon-exact CD is quite easy for direct weapons. Only one ray is needed to determine the target. Shooting this ray works through the exact same mechanisms and data structures as shooting a ray to get a color value in rendering.
(Polygon exact collision detection using ray tracing)
For the player model a bounding sphere was approximated through many rays like in a radar system.
(Bounding sphere approximated through rays)
An interesting special effect which I want to present here in more detail is water. As we expect it from nature water should reflect the surrounding environment and it should be possible to look through the water with some refractions going on. Water in motion should not look flat; there should be some visible height differences in the waves. I want to present you some examples of water in games that we have seen the last years. Of course these 'optimizations' had to be done to make the game render fast enough, so this should not be a critic of the game or company itself. It should just show how water looks today in some games, what it lacks and how it could look in ray tracing games.
('Far Cry' (2004): The reflection in the water shows only the mountains, not the trees.)
('Far Cry': Taking a close look at the reflections you see that the resolution is lower then the rest of the world.)
('Gothic 3' from 2006: Quite unspectacular water without any reflections)
The water in 'Quake 4: Ray traced' (http://www.q4rt.de/) uses an animation set of many normal maps to simulate the height differences from the waves. One ray is used for reflection on that normal maps, one ray is used to get the refraction through the water. The result is nice looking water.
('Quake 4: Ray traced': The water reflects the environment and the player)
Samples from Q4RT in action can be seen in this video: | <urn:uuid:66434d82-fa1d-46e1-bec2-495a6fcc3f25> | {
"date": "2013-05-23T19:07:32",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9370315074920654,
"score": 2.65625,
"token_count": 441,
"url": "http://www.pcper.com/reviews/Graphics-Cards/Ray-Tracing-and-Gaming-Quake-4-Ray-Traced-Project/Quake-4-Ray-traced?pcper_ajax_tabs_block_tab=0&referer=node%2F36157&args="
} |
Are you taking your PPI consistently, but still not having complete relief of your symptoms? Maybe it's what you’re putting in your mouth. Your diet and eating habits can actually make your digestive condition worse.
There are a couple of ways certain foods can cause problems. Some may relax the lower esophageal sphincter (LES) — a muscle that acts as a valve between your esophagus and stomach. If this muscle relaxes and doesn’t close properly, acid can reflux back up into the esophagus. Also, some foods may irritate the damaged lining of the esophagus or stomach.
Learn about foods and ways of eating that may be causing you to reach for those extra antacids.
You may want to think twice before sitting down for a big pasta dinner or an all-you-can-eat pizza buffet. Tomato-based products, such as sauces, are acidic foods that may increase reflux symptoms and cause stomach irritation. Other acidic culprits include citrus fruits like grapefruits, lemons, oranges, and their juices.
Eating large portions of food can lead to indigestion and increase the pressure in the stomach, pushing acid into the esophagus. To avoid this discomfort, eat smaller, more frequent meals.
Spearmint and peppermint extracts are used in many foods, but unfortunately, they may exacerbate the symptoms of GERD. Mint may relax the muscles in the gastrointestinal tract, including the LES. But don’t put away your mint-flavored gum just yet! Studies show that chewing gum for one hour after a meal reduces acid reflux. Gum is thought to work by increasing saliva production, which helps to neutralize acid.
Caffeine and Carbonation
That morning cup of coffee or afternoon soda may be causing you discomfort. Caffeine is thought to increase acid levels and relax the LES, which can aggravate an existing ulcer or worsen acid reflux. Some studies show that even decaf coffee may relax the LES. Carbonated beverages, such as sodas or carbonated waters, may lead to acid reflux by increasing the pressure in your stomach.
Fatty foods trigger reflux symptoms by decreasing the pressure of the LES. Eating too many fatty foods can increase digestive symptoms and may lead to weight gain. There is a link between being overweight and GERD. Studies show that obese people with GERD who lose weight have significant improvement in their symptoms. If you have recently gained weight and your clothes are too tight, this too may be making your symptoms worse. Tight-fitting clothes put pressure on the stomach, causing acid to flow into the esophagus.
Hot, Hot, Hot!
Spicy foods can make your heartburn and stomach pain sizzle. Foods with a little kick are often responsible for GERD symptoms. Although spicy fare may irritate the stomach of people with ulcers, it does not cause ulcers. Actually, people with ulcers do not need to follow a bland diet, as previously thought. However, if a specific spicy item does cause problems, it may be a good idea to avoid that food.
Are you a chocoholic? Be careful, because those little treats you are allowing yourself could wreak havoc on your esophagus. Chocolate aggravates GERD by relaxing the LES. That chocolate snack may be particularly problematic at night time.
Snacking late may increase the risk of nighttime heartburn. To avoid this nocturnal discomfort, don’t eat two to three hours before lying down to sleep. Raising the head of your bed may also help to keep the acid in your stomach where it belongs.
Having a few drinks this weekend? Before mixing that martini, think about the consequences. Alcohol may trigger GERD symptoms in three ways:
- Increasing acid secretion
- Relaxing the LES
- Slowing the movement of food through the gut
One study showed that men who drank alcohol and smoked were more likely to have GERD. Smoking contributes to digestive problems by increasing acid secretion, relaxing the LES, and decreasing saliva (saliva neutralizes acid). Smokers are more prone to ulcers, and smokers and drinkers may take longer to heal when they have an ulcer.
Know Yourself and Communicate With Your Doctor
We are all individuals. Not everyone will have the same reaction to each food. The best way to determine your food triggers is to keep a food and symptom journal--write down what you eat, how much you consume, and how you feel afterward. You may soon be able to identify the foods or habits causing you to take those extra antacids. Make sure to talk to your health care provider if you are not experiencing relief from your symptoms despite being on a PPI. | <urn:uuid:c4efc2f0-fa23-4d86-b763-0e9b3336093b> | {
"date": "2013-05-23T18:51:41",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9413283467292786,
"score": 3.28125,
"token_count": 986,
"url": "http://www.pdrhealth.com/proton-pump-inhibitors/foods-to-avoid-while-taking-proton-pump-inhibitors"
} |
Some of our nation’s costliest social problems—like child abuse and neglect—are rooted in early childhood. April is National Child Abuse Prevention Month, a time to recognize the proven policies that help break the cycle of abuse and that promote the social and emotional well-being of children and families.
Voluntary home visiting matches parents with trained professionals to provide information and support during pregnancy and throughout their child’s early years—a critical developmental period. Increasingly, states are turning to evidence-based home visiting programs in an effort to prevent abuse and neglect.
Learn more about how home visiting gives families a solid foundation and helps states save money.
The Annie E. Casey Foundation, Kids Count Data Center, National Kids Count Program, "Children who are confirmed by child protective services as victims of maltreatment by age group (Percent) – 2009," accessed February 28, 2012.
Olds DL, Eckenrode J, Henderson CR, Kitzman H, Powers J, Cole R, Sidora K, Morris P, Pettitt LM, Luckey D, “Long-term Effects of Home Visitation on Maternal Life Course and Child Abuse and Neglect: 15-Year Follow-up of a Randomized Trial,” Journal of the American Medical Association. 1997; 278(8): 637-643.
U.S. Department of Health and Human Services (USDHHS), Administration on Children, Youth and Families, "Child Maltreatment 2008," accessed February 28, 2012.
Fang X, Brown DS, Florence CS, Mercy JA, "The economic burden of child maltreatment in the United States and implications for prevention," Child Abuse & Neglect. 2012; In Press.
Olds DL, Eckenrode J, Henderson CR, Kitzman H, Powers J, Cole R, Sidora K, Morris P, Pettitt LM, Luckey D, “Long-term Effects of Home Visitation on Maternal Life Course and Child Abuse and Neglect: 15-Year Follow-up of a Randomized Trial,” Journal of the American Medical Association. 1997; 278(8): 637-643; Lowell DI, Carter AS, Godoy L, Paulicin B, Briggs-Gowan MJ, “A randomized controlled trial of Child FIRST: A comprehensive home-based intervention translating research into early childhood practice,” Child Development. 2011; 82(1): 193-208.
Lee E, Michell-Herzfeld SD, Lowenfels AA, Greene R, Dorabawila V, DuMont KA, “Reducing low birth weight through home visitation: a randomized controlled trial,” American Journal of Preventive Medicine. 2009; 36(2):154–160.
Levenstein P, Levenstein S, Shiminski J A, Stolzberg JE, “Long-term impact of a verbal interaction program for at-risk toddlers: An exploratory study of high-school outcomes in a replication of the Mother-Child Home Program,” Journal of Applied Developmental Psychology. 1998; 19: 267-286. | <urn:uuid:733fd407-8fda-4953-8657-78d6094a193e> | {
"date": "2013-05-23T18:59:53",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.85927414894104,
"score": 2.859375,
"token_count": 647,
"url": "http://www.pewtrusts.org/our_work_report_detail.aspx?id=85899375913&WT.rss_ev=f&WT.rss_f=Children%20and%20Families&WT.rss_a=Infographic:%20Preventing%20Costly%20Child%20Abuse&WT.z_contenttype=Report"
} |
New on the IBM developerWorks, there's an article looking at using the Scilab software integrated into PHP to perform some more complicated mathematical processing.
Scripting languages like Ruby, Python, and PHP power modern-day server-side Web development. These languages are great because you can easily and rapidly build Web sites. However, their downfall is their inefficiency with complicated algorithms, such as those found in mathematics and the sciences. [...] In this article, we'll investigate one particular way to merge the power of a particular bit of scientific software - Scilab - with the ease of development and Web-friendliness of a server-side language: PHP.
Your script uses the Scilab tool from the command line, called via something like exec, and parsing the output to spit the results back out to the viewer. They show how to create two pages with form elements for allowing the user to interact with the script and one that helps you generate a graph based on some results. | <urn:uuid:134f1f86-6c7d-48c9-abb1-a1be577339f4> | {
"date": "2013-05-23T18:52:13",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9368700385093689,
"score": 2.6875,
"token_count": 199,
"url": "http://www.phpdeveloper.org/tag/scilab"
} |
Gamma ray bursts
are believed to be the most energetic phenomena in the universe.
In one second they can emit more than 100 times the energy that
the sun does throughout its entire 10 billion year life. This energy
output is short lived, however, and within days the burst has faded
forever beyond the reach of our telescopes.
3000 bursts having been detected through their gamma ray emission,
only 30 have been seen with ground-based telescopes, and only one
of these has been observed within an hour.
In an ambitious
project to detect the gamma ray bursts in the crucial first minute
of their occurence, the School of Physics has entered a collaboration
with the University of Michigan, Los Alamos National Laboratories,
and Lawrence Livermore National Laboratory, to place a robotic telescope,
ROTSE-III, at Siding Spring Observatory.
triggered into action by a signal relayed through the Internet from
an earth-orbiting satellite. The specially designed mounting for
ROTSE-III allows it to point to any position in the sky and take
an image within 5-10 seconds. The images are then automatically
analysed for any new or rapidly varying sources, and this information
is made available to other observatories throughout the world within
minutes. The precise positions provided by ROTSE-III are essential
to allow the worlds largest telescopes to observe the gamma
for the new telescope occurred in March 2001. The enclosure and
weather station were installed in April 2001, with the telescope
itself to be delivered in mid-2002. | <urn:uuid:41af5c95-84cb-4b31-990a-6fbb28055062> | {
"date": "2013-05-23T18:52:15",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9197797179222107,
"score": 3.875,
"token_count": 327,
"url": "http://www.phys.unsw.edu.au/ANNUAL_REPORTS/2001/research11.html"
} |
During this tutorial you will be asked to perform calculations involving trigonometric functiions. You will need a calulator to proceed.
| The purpose of this tutorial
is to review with you the elementary properties of the trigonometric functions.
Facility with this subject is essential to success in all branches of science,
and you are strongly urged to review and practice the concepts presented
here until they are mastered. Let us consider the right-angle triangle
shown in Panel 1. The angle at C is a right angle and the angle
A we will call θ. The lengths of the
sides of the triangle we will denote as p, q and r. From your elementary
geometry, you know several things about this triangle. For example, you
know the Pythagorean relation,
q² = p² + r². That is, the square of the length of the side opposite the right angle, which we call the hypotenuse, is equal to the sum of the squares of the lengths of the other two sides.
We know other things. For example, we know that if the lengths of the three sides of any triangle p, q and r are specified, then the whole triangle is determined, angles included. If you think about this for a moment, you will see it is correct. If I give you three sticks of fixed length and told you to lay them down in a triangle, there's only one triangle which you could make. What we would like to have is a way of relating the angles in the triangle, say θ, to the lengths of the sides.
It turns out that there's no simple analytic way to do this. Even though the triangle is specified by the lengths of the three sides, there is not a simple formula that will allow you to calculate the angle θ. We must specify it in some new way.
|To do this, we define three ratios of the sides of the triangle.
One ratio we call the sine of theta, written sin(θ), and it is defined as the ratio of the side opposite θ to the hypotenuse, that is r/q.
The cosine of θ, written cos(θ), is the side adjacent to θ over the hypotenuse, that is, p/q.
This is really enough, but because it simplifies our mathematics later on, we define the tangent of θ, written tan(θ), as the ratio of the opposite to the adjacent sides, that is r/p. This is not an independent definition since you can readily see that the tangent of θ is equal to the sine of θ divided by the cosine of θ. Verify for yourself that this is correct.
All scientific calculators provide this information. The first thing to ensure is that your calculator is set to the anglular measure that you want. Angles are usually measured in either degrees or radians (see tutorial on DIMENSIONAL ANALYSIS). The angle 2º is a much different angle than 2 radians since 180º = π radians = 3.1416... radians. Make sure that your calculator is set to degrees.
Now suppose that we want the sine of 24º. Simply press 24 followed by the [sin] key and the display should show the value 0.4067. Therefore, the sine of 24º is 0.4067. That is, in a triangle like panel 1 where θ = 24º, the ratio of the sides r to q is 0.4067. Next set your calculator to radians and find the sine of 0.42 radians. To do this enter 0.42 followed by the [sin] key. You should obtain a value of 0.4078. This is nearly the same value as you obtained for the sine of 24º. Using the relation above you should confirm that 24º is close to 0.42 radians
Obviously, using your calculator to find values of sines is very simple. Now find sine of 42º 24 minutes. The sine of 42º 24 minutes is 0.6743. Did you get this result? If not, remember that 24 minutes corresponds to 24/60 or 0.4º. The total angle is then 42.4º
| The determination of
cosines and tangents on your calculator is similar. It is now possible
for us to solve the simple problem concerning triangles. For example, in
Panel 2, the length of the hypotenuse is 3 cm and the angle θ
is 24º. What is the length of the opposite side r? The sine of 24º
as we saw is 0.4067 and it is also, by definition, r/3.
So, sine of 24º = .4067 = r/3, and therefore, r = 3 x 0.4067 = 1.22 cm.
|Conversely, suppose you knew that the opposite side was
2 cm long and the hypotenuse was 3 cm long, as in panel 3, what is the
angle θ? First determine the sine of θ
You should find that the sine of θ is 2/3, which equals 0.6667. Now we need determine what angle has 0.6667 as its sine.
If you want your answer to be in degrees, be sure that your calculator is set to degrees. Then enter 0.6667 followed by the [INV] key and then the [sin] key. You should obtain a value of 41.8º. If your calculator doesn't have a [INV] key, it probably has a [2ndF] key and the inverse sine can be found using it.
|One use of these trigonometric functions which is very important is the calculation of components of vectors. In panel 4 is shown a vector OA in an xy reference frame. We would like to find the y component of this vector. That is, the projection OB of the vector on the y axis. Obviously, OB = CA and CA/OA = sin(θ), so CA = OA sin(θ). Similarly, the x-component of OA is OC. And OC/OA = cos(θ) so OC = OA cos(θ).|
|There are many relations among the trigonometric functions
which are important, but one in particular you will find used quite often.
Panel 1 has been repeated as Panel 5 for you. Let us look at the sum cos²
+ sin². From the figure, this is (p/q)² + (r/q)², which
[(p² + r²) / (q²)]. The Pythagorean theorem tells us that p² + r² = q² so we have
[(p² + r²) / q²] = (q²/q²) = 1. Therefore, we have;
Our discussion so far has been limited to angles between 0 and 90º. One can, using the calculator, find the the sine of larger angles (eg 140º ) or negative angles (eg -32º ) directly. Sometimes, however, it is useful to find the corresponding angle betweeen 0 and 90º. Panel 6 will help us here.
|In this xy reference frame, the angle θ
is clearly between 90º and 180 º, and clearly, the angle a,
which is 180 - θ
( a is marked with a double arc) can be dealt with. In this case, we say that the magnitude of sine, cosine, and tangent of θ are those of the supplement a and we only have to examine whether or not they are positive or negative.
For example, what is the sine, cosine and tangent of 140º? The supplement is 180º - 140º = 40º. Find the sine, the cosine and the tangent of 40º. | <urn:uuid:00f865ac-a066-4877-8d69-479bd1350ad2> | {
"date": "2013-05-23T19:00:52",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9184698462486267,
"score": 4.0625,
"token_count": 1681,
"url": "http://www.physics.uoguelph.ca/tutorials/trig/trigonom.html"
} |
|May20-06, 05:24 PM||#1|
Stuck on couple related rates problems..
1. A ship with a long anchor chain is anchored in 11 fathoms of water. The anchor chain is being wound in at a rate of 10 fathoms/minute, causing the ship to move toward the spot directly above the anchor resting on the seabed. The hawsehole ( the point of contact between ship and chain) is located 1 fathom above the water line. At what speed is the ship moving when there are exatly 13 fathoms of chain still out?
For this problem I started with this drawing.. http://img.photobucket.com/albums/v4...n/untitled.jpg
And then from there, I had no idea where to go... there hawsehole being 1 fathom above the water really gets to me, perhaps making the above drawing void. Another thing I don't understand is that it says it's anchored in 11 fathoms of water.. how could the question be asking what speed the boat would be moving if it were at 13 fathoms?
2. A ladder 41 feet long was leaning against a vertical wall and begins to slip. Its top slides down the wall whilte its bottom moves along the level ground at a constant speed of 4ft/sec. How fast is the top of the ladder moving when it is 9 feet above the ground?
For this one.. I didn't even know what to do.. of course I drew a triangle, hypotenuse of 41 and the vertical side of 9 feet.. and then.......?
Mainly, I think problems such as these are really easy, but I have a really hard time picturing the problem or drawing it out. I don't know which numbers apply to dx/dt and dy/dt..
|May20-06, 05:48 PM||#2|
And tehy are asking what is the speed when there is 13 fathoms of *chain* still out, which is the length of the hypothenuse on your triangle. Of course this length will be larger or equal to 12 fathoms (it will be equal to 12 fathom when the boat will be right above the anchor)
If we call "L" the length of the hypothenuse, then what you want is to write dx/dt in terms of dL/dt (which is the number they give you). All you have to do is to write an expression relating x and L (and other known values), isolate x in terms of those constants and L, and differentiate both dised with respect to t. You will get dx/dt = expression in terms of constant, L and dL/dt.
|Similar Threads for: Stuck on couple related rates problems..|
|im stuck in a couple electromagnetics problems||Introductory Physics Homework||10|
|Related Rates Problems||Calculus & Beyond Homework||1|
|Related rates - some problems =)||Calculus & Beyond Homework||5|
|stuck on a related rates problem||Introductory Physics Homework||5|
|A couple pretty easy integration problems im stuck on||Calculus||3| | <urn:uuid:db125f45-2e18-420f-93eb-28e0f5ee7577> | {
"date": "2013-05-23T18:39:35",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9421030879020691,
"score": 2.71875,
"token_count": 677,
"url": "http://www.physicsforums.com/showthread.php?t=121518"
} |
Edwin M. Stanton (1814-1869)
Edwin McMasters Stanton was appointed U.S. attorney general by President James Buchanan, then became secretary of war under Abraham Lincoln, continuing in that post under Andrew Johnson. Outspoken and abrasive, he alienated Johnson by taking sides against him on the issue of Reconstruction and was suspended by the President, but was reinstated by the Senate. When Johnson's impeachment failed, Stanton resigned. He was nominated to the Supreme Court by President Ulysses S. Grant, but died four days after his confirmation.
- 1864 circa 5 years
- Original Format:
- Photographic Print
- Mathew Brady
- download hi-res watermarked image
All Licensed images are available for download as jpeg files at 300 dpi of original size.
If your project requires an image at higher resolution, please contact us (be sure to include item number). Custom requests may require an additional charge. | <urn:uuid:46ab44df-4782-42bc-9b58-edb028397ea5> | {
"date": "2013-05-23T18:58:01",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9630997776985168,
"score": 2.734375,
"token_count": 195,
"url": "http://www.picturehistory.com/product/id/18265"
} |
Hops is native to a great part of the northern half of the world, customarily located in northern European, west central Asian, and North American regions. The earliest reported case of growing hops was in central Europe in 736, with the ensuing centuries seeing hops grown extensively in Bavarian, Bohemian and Slovenian regions, and later in England. Hops was first cultivated in North America in 1629; cultivation began in Japan, China and Korea in the 1860s. Hops is produced in many different regions these days, but roughly three quarters of all hops originates from Germany, North America, and China.
Traits and properties:
The most widely recognized use of hops is to flavor beer, leading to its significance globally as a commercial agriculture product. While hops is a comparatively minimal component of beer, quantity-wise, it is a significant one since it imparts the unique bitter taste of beer, a property possessed uniquely by hops. Initially, hops was utilized in making beer since it not only imparts taste, but acts to naturally preserve beer, keeping it from turning sour and increasing its shelf life dramatically. This permitted beer to be shipped a long way, instead of having to be used near the brewery, allowing brewers to greatly expand operations.
The earliest reported use of hops for medicinal purposes was by ancient Egyptians and Babylonians who were convinced it safeguarded against leprosy and plague. European medicinal use of hops goes as far back as its ninth century use to treat 'melancholy', acquiring the name vermifuge and effective for eradicating parasites. When the twelth century rolled in hops were recognized as an aperitif, a depurative, and a laxative and was applauded for its properties of sedating and relaxing. Later this was used as a treatment for people with liver problems and any general digestive complaints. On the North American continent, hops was widely utilized in native remedies, especially among Cherokee people who used it to treat rheumatism, swelling, pain, breast and female reproductive organ issues, kidney stones, and so on. In traditional Chinese medicine, hops is used for all sorts of different ailments like sleeplessness, restlessness, and for bad cramps; it is also used to treat lack of appetite. Chinese lab research has documented effective results with hops for treating conditions of TB, leprosy, bacillary dysentery, silicosis as well as asbestosis. The Ayurvedic Pharmacopoeia of India suggests the use of hops for anxiousness related to nervous stress, headache, and poor digestion, reporting it works primarily for sedation, hypnosis, and fighting bacteria.
Nowadays, hops is used most often for its relaxing effect on nerves, and its properties of sedation to improve sleep habits. Positive effects on the female endocrine system have been noted, specifically in Europe, from hops. There is a high content of flavonoids, which is a form of phytoestrogens, and this has become a very common ingredient for natural breast enhancements. Clinical studies have shown that consumption of hops alone promotes breast development. In fact, beer which has a high hop content, has even been touted by some doctors as being a breast enhancer if consumed in large quantities. Yet other contemporary uses for hops are to treat IBS and premature ejaculation, along with its characteristics as a diuretic to help those retaining water or suffering excessive uric acid. Hops tea is apparently a wonderful remedy for delirium tremens, and you can add honey to it to ease the symptoms of bronchitis.
In order to reduce the pain due to the inflammation of abscesses, boils, swellings, and neuralgic and rheumatic complaints including easing skin infections, eczema, herpes, and ulcers, Hops tea is used as an external application in the form of a poultice. Dried hops has long been sewn into pillows to combat insomnia and nightmares. Hops is used in shampoos to treat dandruff and oiliness due to its anti-septic and sebhorrheic traits, and has lately been considered beneficial for growing and conditioning hair and scalp, leading to its use in a lot of hair growth items. Hops is actually good for the skin in general as it stimulates the cutaneous metabolism, so you'll often find it listed as an ingredient in toiletries and cosmetics.
Natural Breast Enhancement Without Surgery | <urn:uuid:02741903-2e99-4b5e-a674-21963d7137ec> | {
"date": "2013-05-23T18:52:59",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9681899547576904,
"score": 3.578125,
"token_count": 910,
"url": "http://www.pills4breastenlargement.com/breast-enhancement-pills-ingredients-and-science.php"
} |
Email : email@example.com
Pinguicula can be found in north, central and south America, in Greenland, in most parts of Europe, at the very north-western tip of Africa and in some scattered areas in Asia. They are not present in many parts of Asia, the middle east, most parts of Africa and southern Asia including Oceania.
The two main centres of diversity are found in central America/Caribbean and in Europe. North and east Siberia as well as far north east Asia are home to a small group of species which are either endemic (P. algida, P. ramose and P. variegata) or widespread (P. villosa, P. alpina, P. macroceras and P. vulgaris). The Himalaya in southern Asia is also hosting P. alpina. Large stretches of land in Canada and the north eastern and western coats of the USA are colonised by 3 species that can also be found in Europe or Asia (P. vulgaris, P. villosa and P. macroceras). The south eastern tip of the USA is also host to a group of related and endemic species. A few additional and endemic species are scattered on the slopes of the Andes mountains of south America from Columbia to Terra del Fuego in Argentina.
Even though Pinguicula can be found on many continents, most species have very restricted distribution ranges and can actually exist as just a few isolated colonies. On the same way, plant density may be high on a limited surface of land but individual colonies may be separated by large distances. Few species make exception to this rule. P. vulgaris has the largest distribution range, covering most of northern America, Greenland, Iceland, many parts of Europe and north western Russia. A closely related species, P. macroceras, covers the coats of north eastern Asia and north western America. P. villosa can be found on most of the arctic circle (except in western Canada). Finally P. alpina can be found in several parts of Europe, the Himalaya, north western Russia and northern Siberia. Species with mid-size distribution ranges include P. lusitanica and P. grandiflora in western Europe.
Most Pinguicula species originate from cold to very cold habitats at high latitudes or altitudes. Only the south eastern USA and Caribbean species live under warm climatic conditions. P. lusitanica on the western coast of Europe, P. crystallina on the northern part of the Mediterranean ocean and some Mexican species will be intermediate in their temperature requirements since they will need non-freezing winters and will appreciate warmer conditions during the summer. The only climatic conditions that are common to all Pinguicula are a very humid air, air temperatures that do not change too fast and a very wet soil during their growing season (often with flowing rather than standing water).
Most Pinguicula will be found growing in calcareous and rocky soils. However, some species are found in acidic bogs (P. lusitanica, P. corsica), some in sphagnum moss (P. villosa) and some on tree branches (P. casabitoana, P. lignicola).
Previously published groupings of Pinguicula species distinguished species on their ability to form an hibernaculum in the winter (temperate versus tropical types). The species of each type were subsequently divided into two subgroups on their ability to produce different leaves early in the spring and in the summer (homophyllous versus heterophyllous). Recent genetic studies do not totally support such views. Nevertheless, such clustering of species translates well into individual growing requirements.
The rosette of temperate species (homophyllous and heterophyllous) reduces to a tight bud made of scale-like non-carnivorous leaves in the winter. Such buds bear no roots with the exception of P. alpina (Asian species still need to be examined for this criterion). They should all be kept near or below freezing temperatures as long as they are formed. They indeed need to stay cold for a certain time before being able to sprout in response to higher temperatures. They are also sensitive to rotting if in contact with a non-frozen damp organic substrate.
Tropical species can either form carnivorous leaves all year long (homophyllous group) or develop a more or less compact winter bud made of succulent, non-carnivorous leaves (heterophyllous group).
Most tropical homophyllous species experience cold, even near, or periodically below freezing, temperatures in the winter. However, such cold periods do not last long and are quickly replaced by warmer conditions. Rosette sizes rarely diminish during such times. Growth may simply cease to resume as soon as temperatures warm up. Plants keep their roots all through the winter season and need to be kept wet all year long. Prolonged near-freezing conditions never result in healthy individuals.
Tropical heterophyllous species only form carnivorous leaves in the warm seasons. In the winter, they form more or less tight hibernacula made of succulent leaves. Winter hibernacula contain few or no root. They are very sensitive to rotting and should be kept dry until they resume growth. They should also be kept cold (below 10°C) and can stand below freezing temperatures is their substrate is totally dry.
Carnivorous Pinguicula leaves exhibit many tiny glands on their surface to glue, digest and eat insects and plant debris that are small enough not to escape. After catching a prey, the leaf rolls slowly around its catch to form a bowl below it or increase contact.
Pinguicula leaves harbour 2 types of glands: pedunculate glands that bear a drop of mucilaginous secretion (these are the tiny ones we see on the surface of the leaves and that generate rainbows when the sun shines on them), and sessile glands that lay flush on the leaf surface. The peduncles are made of only one cell and are therefore very small. The sessile glands do not generate large enough bodies of liquids to be seen by the human eye. For most species, the glands are only present on the upper surface of the leaves. But, in a few examples, they can be found on both sides of the leaves (P. gigantea, P. longifolia subsp longifolia). In that later case, the leaves are permanently erect or hanging in the air to prevent contact of the carnivorous underside of the leaves with the substrate. The density of glands on a leaf surface is purely related to the species and not to the state of feeding of the plant.
The pedunculate glands are involved in mucilage production (to glue preys). They secrete few digestives enzymes that are mostly produced by the non-mucilaginous sessile glands. Upon prey capture, the movement of the prey will trigger a large secretion of fluid from the pedunculate gland. This water comes from a reservoir cell located below the peduncle. As the reservoir empties itself, the gland sinks in the epidermis, therefore creating the curling effect. Together, bowl-formation and the mucilage will prevent the digested matter from escaping before being taken up. The small enzymatic activity of the early secretion will initiate prey digestion. The first nitrogenous compounds leaking from the digested prey will trigger a large enzyme production by the sessile gland. This secretory system is a ‘one-off’ system that will fire itself completely in one go and will not function again a second time if a second prey were to fall on the same spot.
Secretion and absorption through the glands is made possible thanks to the presence of holes (called cuticular gaps) in the cuticle (protective wax cover of the leaf) on top of the glands. These holes are like wounds through which the plant ‘bleeds’ (hence the droplets we see) permanently, placing its interior in direct contact with the outside world. Such cuticular holes are very rare for plants since they lead to dehydration and represent entry gates for infectious organisms. Luckily for Pinguicula, the digestive secretions prevent infectious organisms from developing. However, dehydration is a problem for Pinguicula which dehydrate faster than normal plants and will only perform best in very humid environments when they express carnivorous leaves. This phenomenon is worsened by the weak root system of Pinguicula which cannot pump much water quickly. In their non-carnivorous state (winter bud of most species), drier conditions can be supported. The lack of roots of winter resting plants will still require a fairly humid air.
Laws of physics reveal that water vapour pressure at a given relative humidity value (RH) increases exponentially as the temperature is raised. Lower exponential curves are obtained for lower relative humidity values so that the curves are very close to each other at low temperatures and far from each other at high temperatures.
Fig 3 : Psychrometric charts
The above laws of physics also reveal that the sudden lowering of air temperature will lead to leaf dehydration even of the air is saturated in humidity. In this scenario, the plant is warmer than its environment. This will create a water vapour pressure deficit between the plant and its environment because water vapour pressures change with temperature. This dehydration effect will be more pronounced if the outside air is dry, if the original temperature is high or if the drop in temperature is severe. This may explain why Pinguicula in their native habitat and in cultivation do best in an environment where temperature does not fluctuate too fast or too much during the day. The curling of leaves or hiding behind grasses are things Pinguicula naturally do and that will lead to a buffering of external changes. | <urn:uuid:e180ebc2-3ee0-4c9b-8eaf-5496d3fb5005> | {
"date": "2013-05-23T18:43:57",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9440979957580566,
"score": 3.140625,
"token_count": 2043,
"url": "http://www.pinguicula.org/pages/culture/Overview.htm"
} |
Epiphany can be defined as the sudden realization of the essence or meaning of something, as well as the understanding of the truth of certain situations or one’s life as a whole. In Death in Venice, Gustav von Auschenbach’s recognition of his love for and obsession with Tadzio is a kind of epiphany that, while not exactly beneficial or positive marks a point in which the character experience complete clarity and begins to express honesty about his previously rejected desires.
Gustav von Auschenbach, having led a life of dedication to his craft, prides himself on disciplined perfectionism and dignity. His life up to the point at which the novel takes place has been largely uneventful. Many ominous occurrences help to illustrate Gustav’s state of mind at the story’s opening. His exchange with a strange gondola rower who turns out to be a criminal, as well as his sighting of a disturbing old man dressed to look youthful are both v
aguely perilous encounters which serve to establish Gustav’s uneasiness. Upon discovering Tadzio, Gustav slowly allows his principles and dignity to erode as his obsession expands. Tadzio seems to tap into the lifelong desires that Gustav has repressed in the interest of being fully committed to his work. The end result of this obsession, however, is the writer’s death.
While not necessarily in the dark before this epiphany, von Auschenbach was certainly very repressed. After feeling a vague need for a vacation, he travels to Venice completely unaware of what waits for him. The obsession is something that, given his principles, is extremely hard to verbalize. However, when he finally declares, “I love you,” it is clear that he has accepted the truth about his feelings and desires. Though neither overtly religious or spiritual, von Auschenbach’s epiphany marks a change in his profound change in his state of mind and worldview and could therefore be seen as spiritual. This epiphany was solely brought on by the travel experience, before which von Auschenbach had lived a stable and principled life. His deeply ingrained longings were awakened through his trip to Venice and his sighting of Tadzio. While von Auschenbach’s Venetian experience led him to a greater freedom and honesty, which is not to be ignored, his travels ultimately resulted in his mental torture and death.
Epiphany is not always positive, as indicated by Death in Venice. Discovery, especially self-discovery, can be quite painful and sometimes thoroughly detrimental. Gustav von Auschenbach, having lived a monotonous and increasingly stagnant life was unable to process the hard truths of his dangerous desires, considering them foreign, unpleasant, and sinful; his inability to ever speak or reach out to Tadzio being proof of this. While it was certainly a moment of complete honesty, von Auschenbach’s revelation and declaration of his love led him to further introversion. The downward spiral that began with the first time he laid eyes on the young boy grew from a preoccupation to a complete obsession leaving him unable to focus on anything else and changing his worldview and philosophy to suit his festering desires. This epiphany of his uncontrollable lust led to his bizarre death but allowed him to gain a deeper knowledge of himself.
In the biography of Naguib Mahfouz it is mentioned that the 1919 revolution in Egypt greatly affected the author. While Mahfouz wrote a novel more directly related to the revolution (Palace Walk) elements of revolution can be seen in The Journey of Ibn Fattouma. Ibn Fattouma sets out on his journey to find Gebel, a promise land of sorts. He makes his way through different societies along the way, and encounters many different lifestyles. He flees his home city because of the corruption that exists there, but as he travels through the different lands, he finds that problems exist in all societies.
The idea of revolution can easily be seen in the first place Fattouma settles, Mashriq. The whole society is based on a free love, free thought foundation, a stark contrast to more rigid societies. Even though this culture is open and free spirited, it is not without rules and regulations, and Fattouma rebels against these guidelines by trying to raise his family in the ways of Islam. The other lands reflect revolution through their insistence on upholding freedoms and security, and in the final land that he enters, the importance of self awareness. The majority of Ibn Fattouma’s resistance is passive, relating directly to the Egyptian revolution, which was a non-violent effort to stop the British occupation of the country.
The interesting aspect of the story lies in the final pages when Ibn Fattouma finally catches a glimpse of the land of Gebel and the book’s ending before we learn about the secrets the place may hold. Gebel is Ibn Fattouma’s chance to create a better existence for the people in his homeland. He travels for years in order to find this elusive land, and we never find out if he finds what he’s looking for. People travel to see new places and things and gain new experiences that will help them change their view of the palce they call home. Fattouma travels for exactly this reason, to find something in a distant land that will change the place he came from. As readers we don’t see the final leg of his journey because this secret that he seeks is unattainable. There is no one secret to perfection in life, and we do not see Gebel because Ibn Fattouma has already learned what he needs to know to make his homeland a better place. Through his travels he has learned to accept other cultures and is able to embrace their strengths and weaknesses. It is the skill, not the instant life perfection supposedly housed in Gebel, that will potentially help him make his home a better place.
I really like Ian McEwan’s novels. Before reading The Comfort of Strangers I had read Atonement, and found both to be interesting and engaging. McEwan’s stories are often dark and sinister, turning everyday moments into tragic events. There is something about the way he describes chaos and violence that is almost poetic, however disturbing the situation might be. As I began reading The Comfort of Strangers, I was instantly drawn in by McEwan’s style, but I was waiting to stumble across the story-altering twist, the piece of information that would drastically change the meaning of everything before it. With twelve pages left in the book, the twist came on page 115 when Caroline shows Mary the wall of pictures of Colin.
I’m not usually the type of person to yell at the characters in horror movies or books, I don’t usually tell them to leave the dark, scary basement, but McEwan made me care about Colin and Mary, and as Mary saw the pictures on the wall, I wanted her to run as fast as she could away from the crazy woman next to her. Even though I had expected things to go badly for Colin and Mary, when everything went downhill I wasn’t expecting how horribly wrong it would become. I was expecting some sort of confrontation between Robert, Caroline and Colin, but I was not expecting it to end in death, or at least not death in such a gruesome manner. Colin’s murder removes any of the romanticism that sometimes accompanies death in fiction; there are no dramatic final words, no tearful goodbyes. Because the story shifts to Mary’s perspective, we drift in and out of consciousness with her and miss Colin’s final breath, making his death even more sinister.
I think McEwan’s main accomplishment in The Comfort of Strangers is the message he presents regarding the dangers of travel. His characters go off to Italy to rediscover the strength in their relationship, and instead find themselves facing down death. It is this idea, that any traveler at any time in any place could easily fall victim to a dark and sinister death at the hands of someone more familiar with their surroundings that adds a truly chilling overtone to the entire story. Anyone could take a wrong turn and end up in a dark alley with an unsavory character, but that’s not exactly highlighted in any of the travel brochures that promise fun times and beautiful scenery. Colin and Mary wanted an authentic experience so much that they were unable to see the danger their new authentic acquaintances represented.
I took a trip to England once. I had always wanted to travel there, and I had finally gotten my chance with a trip through school. I was very excited, ready to see all the sights and hear all the British accents. Without actually visiting, I had decided that England was my favorite country, though I couldn’t tell you why. Perhaps it was something about the way the rolling hills looked in pictures of the English countryside, although it could just as easily been the funny hats the Queen’s guards wear, I was always intrigued by the little things. In any case I had never been so excited for a trip in my life.
After a plane ride that seemed to take forever we landed at Heathrow airport in London. We stumbled out of the terminal and onto our little bus, perfect for our group of ten people. I’m not sure how long it took, be we ended up in the tiny town of Frome. Our hotel was small, but the sliding door in my room opened onto the lawn overlooking a perfect set of rolling English hills.
We spent the next ten days taking day trips on our bikes to all sorts of beautiful and exciting places like Stonehenge and the historic bathhouses in Bath. We saw caves and monuments and lots of rolling hills. I actually spent some time getting very lost on one of those hills, surrounded by tall grass and sheep. All these experiences were enjoyable and interesting, but they weren’t as life altering as I had wanted them to be.
About halfway through the trip we spent a day off schedule. This was the first day that we didn’t have every moment planned out, and it turned out to be the most interesting. Our bike trip for the day took us to a beach. It was July, but the air was cool and the water was cooler and the beach was deserted. Instead of sand the entire beach was made up of smooth, beautiful rocks and pebbles. We spent about two hours just having fun, running around over the shining rocks, trying to skip stones and some of us even dared to brave the chilling water.
It was on that rocky beach that I began to feel like this trip was going to be something unbelievably important in my life. There was something about sitting on the smooth rocks, staring out to the horizon that spoke to me better than a guided tour of Stonehenge ever could. I can’t say exactly why that moment was so important to me, but It was the moment my trip really began. I sat on that beach and stared out at the ocean, thinking that if only I could see far enough, I could see America, I could see the east coast that I called home. To be fair if I had seen any big mass of land it most likely would have been Ireland, but the idea of seeing my home from a completely different angle was fascinating to me. We left the beach, but I took a part of it with me, using the feeling of looking at things in different ways to enhance the rest of my trip. I’ll never forget the feel of those wet rocks beneath my bare feet, and I’ll never forget how my trip to England forever changed the way I travel.
While many of the novels we read had elements of epiphany, there were a few that stood out the most. I think that the epiphany in Sputnik Sweetheart is perhaps the most unique epiphany that we read about. When Sumire realizes that in order to be happy with Miu, she has to seek out a part of Miu that no longer exists in their current reality. In many ways this relates directly to why most people travel in the first place. In many cases, travel is a tool for discovering another part of or way of life that is not evident in one’s everyday life. People travel to escape the banality of the day-to-day, and they go searching for something more. In Comfort of Strangers for example, Colin and Mary go to Italy to search for a new strength that will help them improve their relationship. They too, embark into an alternate type of reality, a reality parallel to their own that is only accessible to them because they are traveling.
The realization that Sumire comes to is life altering, not only for Sumire, but for Miu and the narrator as well. By seeking out something completely different and leaving behind everything she knows, Sumire leaves the people she cares about in the dark. They are greatly affected by her departure and go to great lengths trying to find her. The question is, was Sumire’s epiphany a good thing or a bad thing? Because we don’t follow Sumire on her journey, we aren’t really aware if she found what she was looking for, but we do see the damage her disappearance does in the lives of Miu and especially the narrator.
In The Comfort of Strangers, Colin and Mary experienced a moment that seems to help them realize a goal of their trip. Much of this class has been based around the idea of finding the authentic experience through travel. While in the bar with Robert, Colin and Mary “began to experience the pleasure, unique to tourists, of finding themselves in a place without tourists, of making a discovery, finding somewhere real…they in turn asked the serious, intent questions of tourists gratified to be talking at last to an authentic citizen.” (McEwan, 29) They manage to find a small sliver of authenticity amid the normal tourist culture, and while this is important in the story, what comes of this discovery is perhaps more pertinent. Later in the story, the couple realizes that their authentic encounter with Robert has actually caused a great detriment to their ability to completely enjoy their trip. They spent so much time searching for something authentic that once they found it failed to notice how dangerous it could be. The epiphany here lies in the idea that while authentic experiences are welcome, it is important to realize that the safety and familiarity of tourist experiences are indispensably valuable.
I don’t believe in God. Not the God of my Catholic school classmates, the one who didn’t exist when they were out partying on Saturday nights, drinking and sleeping around, but who loved them on Sunday mornings and forgave them for their sins, even if they were still hung over. This God hasn’t appealed to me since I was twelve, when I decided I didn’t want to be confirmed in my parents’ church. I guess I believed in God before that, but I can’t remember. I know I liked going to church on Sundays and baking the bread for Communion in my Sunday School class. I have never been to Europe and been inside the Duomo in Florence, or the Siena Cathedral or walked around the Cathedral Complex at Pisa, but I do study art history, so I know what they look like. They are impressive, especially when you think about how they were built. They didn’t have modern technology. These immense buildings, all the more impressive as they move towards High Gothic, towards the sky, were built by hand. Many workers, stonemasons and artists and sculptors, put their entire life into a building that wasn’t completed in their lifetime. The first time I walked into the Cathedral of St. John the Divine in Morningside Heights, near Columbia, I got goosebumps. It is HUGE (it is, after all, the largest cathedral in the world, and the third largest church). Like, jaw-dropping huge. Bobst is overwhelming in its own way, but Bobst is not a House of God. This building was constructed (with a lot of problems along the way, not unlike many of the thirteenth and fourteenth century churches) as a monument to this Lord. It was designed by an architectural firm, and its design has changed many times, and it is still unfinished. But despite all of this, it is still a House of God. I remember standing in the nave the first time I went there and being overwhelmed. I have already said I don’t believe in God. And I still stand by that statement, but for that moment, I felt like there had to be something to this: people have devoted their entire lives to this building, and hundreds and thousands of people have devoted their entire lives to churches and cathedrals across Europe. Are they doing their lives’ work for something or someone that doesn’t exist? It made me hope that there was something to it: that there really is a God, even a Christian one. It seems like too many people have devoted too much time to something for it not to exist.
On the Road is one of, if not the most important book of the Beat Generation. It defines an era, an attitude, a way of life. And it is utterly annoying and frustrating. I read On the Road and Dharma Bums in high school, and I enjoyed them both, but rereading this novel was torturous. I haven’t had any experiences like some of the people in our class, although I have felt out of place in my life, but I found nothing to identify myself with Sal and his friends. They were selfish, whiney alcoholics and drug addicts, looking for something to waste time on. I think many of them may have been genuine, but this fact didn’t redeem their aimless lives. I don’t think Jack Kerouac’s value as an American novelist can be debated, because he surely embodied the aimless feeling of this generation, but I think in many ways he is seen as a role model, and many teenagers and young adults have the desire to embody his lifestyle and to go on the road as he did. I think what is missing here is what he discovers at the end. How do his journeys change him, or inspire him to change; what does he learn? I read the book before, and I remembered nothing about it. I think that says something. The novels we love the most we may forget, but when we start to read them again it comes back to us. On the Road stayed a mystery all the way through. I didn’t learn anything from Sal or his friends, except maybe what not to do.
A Concise Chinese-English Dictionary by Xiaolu Guo suggests a kind of epiphany very different from what an epiphany is traditionally thought to be. The Oxford English Dictionary defines epiphany as “a manifestation or appearance of some divine or superhuman being,” and this is typical: a religious experience. But Xiaolu Guo makes the idea of an epiphany a very ordinary, everyday experience, without removing the sacred from it. In the novel Zhuang is living in a foreign country, learning about both the culture she is trying to become a part of and about love. The book is set up as both a dictionary and a journal. Each entry is a new word: it contains the definition, provided by a dictionary, and her experiences of the word. Each new word, and each new entry, is a kind of epiphany. She is not just learning words but she is learning what they mean, and how their meaning affects her life. In learning these new words and their meanings she is learning the difference between her culture at home in China and the Western culture.
One entry is entitled “Future Tense,” and in it she discusses Love, as a Chinese concept and as a Western concept:
‘Love,” this English word: like other English words it has tense. ‘Loved’ or ‘will love’ or ‘have loved.’ All these specific tenses mean Love is a time-limited thing. Not infinite. It only exist in particular period of time. In Chinese, Love is (ai). It has no tense. No past and future. Love in Chinese means a being, a situation, a circumstance. Love is existence, holding past and future.
If our loved existed in Chinese tense, then it will last for ever. It will be infinite.
She explains that Chinese does not have past, present, or future tenses. Everything is in one tense: this makes learning English very difficult because the Chinese speaker must learn that things exist “in a particulr period of time:” she must learn this about love as well, but not in the abstract way in which she learns is school. She is not learning about love from a teacher in a classroom, but from a lover in the world. She must learn as she experiences.
Every new experience she has and every new word she learns is an epiphany. Even though these epiphanies become commonplace, I think they are sacred experiences, if not in a religious sense. Love is a sacred thing, and so is everything else that she learns about. Everything she learns is taken for granted by those who already know it, but for her each word is something completely new, and her joy in learning words is expressed to other people.
Frank took my hand.
“Thank you God…”
I tried to keep my eyes closed, but the urge to examine the table, the people, Brian – who I had looked at many times before, but was somehow different – was overwhelming. The prayer droned on and I closed my eyes again and waited for something terrible to overtake me. The plane ride had been filled with admonitions about what I shouldn’t say and shouldn’t do and shouldn’t be. Without saying anything at all, he had transmitted these fears through the stale, chilled air of the coach cabin.
My hair felt too short against my neck. I couldn’t free my hands to adjust my sweater to hide my androgyny. I was stuck exposed with what I was sure was atheist, feminist whore written on my forehead. An itch began to creep up my arm. I breathed deeply and practiced acceptance. Jesus looked down from above the mantle, chiding me for my feeble attempt at Buddhist practice.
“…and thank you Jesus for bringing Brian and Marisa safely from New York to be with us on this special day. Amen.”
Brian squeezed my hand.
It was the first time he had acknowledged my presence since we’d arrived.
The drive from Milwaukee was the first indication that I would be spending the holiday alone with his family. His mother nervously asked him to drive. The humming silence of the engine and the tires on the road was broken only occasionally by church gossip and exits fast approaching on the left and right. I sat quietly passing judgment about the infrequency of his calls home and the wayward brother he never talked about and the religion he had so wholeheartedly forsaken in exchange for anger and regret.
His childhood home was unassuming. The siding matched the sparse lawn and said nothing of the trauma contained within its boxy four walls. I couldn’t remember why we’d come here. I thought maybe after five years some of the pain would have washed away. Selfishly, I wanted to see where he’d come from. I wanted to tell him that it actually wasn’t so bad. I wanted to erase his memories. F
rank finished eating and got up without a word. The television flickered back on and, beer in hand, he faded away.
I asked Margie about her job and about the renovations in the basement, but the words seemed hollow.
I washed the dishes while they looked up cell phone plans and Black Friday sales on the internet. The kitchen felt cold.
Rather than argue in the house, we went out and cranked up the heat in the car. I wanted to tell him to come back. I wanted him to know how much it hurt to be in the same room with him and feel alone. I wanted to shake him and see the light come back on behind his eyes. But we didn’t speak. We didn’t say a word. The radio clicked on and we sat staring straight ahead listening to the Christmas music they erroneously play before Thanksgiving. I glanced over at him and he was looking back. The tears ran down his face. I took his hand and we waited for the words that could, however inadequately, express the moment.
Several days and at least 3 or 4 drafts later, I'm still struggling to communicate my ideas.
I was quite interested in the "inexpressibility topos". Hence the struggle. I actually picked up a book about Montale by Clodagh Brook that specifically tackles the inexpressibility topos in Montale's work. While much of it was irrelevant, it developed a useful history of the idea (Dante through the Modernists), which I found quite illuminating.
There is certainly more than one connection to be made with Sputnik Sweetheart, but a few stood out:
(1) Brook highlights the significance of WWI for the Modernists - “One of the primary theories to emerge is that a world which had undergone such radical transformations in those years needed a concomitant upheaval in its means of expression” (Brook 6). I wonder if the same might be said of the impact of the Tokyo gas attacks on Murakami. On reading Underground, I found a number of places in which he questions his own capacity to represent the realities of the individuals he interviewed. He was especially struck by an interview with Ms. "Shizuko Akashi", who, as a result of the sarin attack, lost both her memory and ability to speak. When faced with the necessity to speak for her, he questioned "just how vividly could [his] choice of words convey to the reader the various emotions (fear, despair, loneliness, anger, numbness, alienation, confusion, hope…) these people had experienced” (236). This problem takes on even greater meaning in the second section of his book when Murakami suggests that terrorism and perhaps violence in general is the manifestation of a need for self-expression that exceeds the capacity of words and language.
Given the timing of Sputnik Sweetheart's publication, it seems likely that many of the themes and issues that the Tokyo gas attack provoked for Murakami were still reverberating as he penned his novel.
(2) Having already strayed off the path of a formalist reading of the novel, it doesn't seem like much of a stretch to imagine Sumire as a kindred spirit to Murakami. She seems to share his uncertainty about the capacity of her prose. By her own account, her writing is lacking something essential. “Problem is, once I sit at my desk and put all these down on paper, I realize something vital is missing. It doesn’t crystallize – no crystals, just pebbles.” In response, K recounts the story of the Chinese gates built with the bones of soldiers who had died in war. “When the gate was finished they’d bring several dogs over to it, slit their throats, and sprinkle their blood on the gate.” The ritual was thought to revive the soldiers’ souls and complete the gate. Although Murakami returns several more times to the baptismal blood bath, its meaning is never revealed. Through his use of metaphor, Murakami extends the practice of elevating the ineffable. The very thing that would make Sumire's writing complete and perhaps, because of her sense of the inextricable link between her idea of self and her capacity to express, would Sumire herself whole is "some form of truth harboured beyond the word" (Brook 1).
(3) All of these themes come to a head with Sumire’s last words, so to speak. Sumire’s epiphany at the end of the document that K reads on her computer is simultaneously revelatory and dissatisfying for the reader. It on the one hand offers an acknowledgment of the coexistence of two worlds and hints at an explanation for Sumire’s disappearance (which would be an epiphany for the reader) and on the other hand denies the reader closure by ending with an unanswered and perhaps unanswerable question.
“I’m in love with Miu. With the Miu on this side, needless to say. But I also love the Miu on the other side just as much. The moment this thought struck me it was like I could hear – with an audible creak – myself splitting in two. As if Miu’s own split became a rupture that had taken hold of me.
One question remains, however. If this side, where Miu is, is not the real world – if this side is actually the other side – what about me, the person who shares the same temporal and spatial plane with her?
Who in the world am I?”
There is an incapacity of language to answer the question of her own reality. The novel is ultimately just an ellipsis, a sort of meta-aposiopesis, “pointing towards it without voicing it” (Brook 11).
In Underground, Murakami writes, “Reality is created out of confusion and contradiction, and if you exclude those elements, you’re no longer talking about reality” (363). This is undoubtedly what we encounter in the novel. Each effort to pin down some truth about the characters (K’s evasion of self-description, Miu’s trauma, and indeed Sumire’s disappearance), leads further away from reality. Words become increasingly inadequate to express the multiplicity of selves each character ostensibly represents. As Murakami concludes in Underground, “The mountains are not mountains anymore; the sun is not the sun.” | <urn:uuid:d7e673fb-153e-404a-aca3-541516115d61> | {
"date": "2013-05-23T18:30:24",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9797863960266113,
"score": 2.578125,
"token_count": 6274,
"url": "http://www.placestudies.com/page/travel-fictions/home"
} |
Singapore, the tropical city-state situated off the southern tip of the Malaysian Peninsula, is a carefully managed combination of Western progress and Eastern and Colonial history. Clusters of skyscrapers and malls dominate the island's downtown but restored colonial buildings lay beneath Singapore's modern veneer. Singapore's downtown core is the Colonial District, where public buildings, hotels and cricket grounds were the domain of British residents.
Singapore's appealing ethnic quarters of Little India, Chinatown and Arab Street retain their own distinct flavor. Equatorial Singapore's high humidity, abundant rainfall and uniform temperature of 27ºC - 31ºC, (81ºF - 88ºF) encourages the abundance of tropical greenery found throughout the island and in it's first-rate nature and wildlife reserves.
Shaped like a flattened diamond, Singapore is 42km/26mi across and 23km/14mi north to south. Most of the four million inhabitants are descended from those arriving from China, India, Malaysia and Europe. Singapore thrives financially and has minimal unemployment; a result of Singapore's compliant population agreeing with their government to put the interest of society ahead of the interest of the individual, in return for once unimaginable levels of prosperity. Some of the ensuing regulations seem extreme: jaywalking, chewing gum and eating on public transit all carry significant fines. The outcome is that Singapore is a clean, safe place to visit, and its public places are smoke-free and hygienic.
Since the 13th C the island has been named Singapore (Singapura) or Lion City when a Sumatran sultan sheltering on the island sensed that the lion he sighted was a good omen and decided to build a new city.
Singapore remained a Sultanate until 1819, when the astute Stamford Raffles of the British East India Company arrived and quickly struck a treaty with local rulers to set up a British trading post. An influx of Malays, Chinese, Indians, Arabs and Europeans arrived at the British port and Singapore's population grew. Singapore's progress declined during World War II when the island fell into the hands of the Japanese. After the war citizens started lobbying for independence from Britain, achieving it in 1965.
Singapore receives over a million visitors annually. International cruise-ships call at the Singapore Cruise Centre on the south end of the island. Changi International Airport is situated in the east. Singapore is connected by causeway to Malaysia. Well-paved roads, on which drivers stay left, connect all parts of the island. Singapore has an excellent public transportation system but can also be toured on foot, to discover small shops, temples, or the daily scene. The entire state is compact enough to be explored in a few days.
5 Shenton Way Unit 37, Singapore, Singapore 068808, Singapore | <urn:uuid:9476c3ae-d70e-4b2a-9326-642695a73684> | {
"date": "2013-05-23T18:31:07",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9415486454963684,
"score": 2.65625,
"token_count": 571,
"url": "http://www.planetware.com/tourist-attractions-/singapore-sin-sin-sin.htm"
} |
Let's Talk About: Cosmic collisions
Share with others:
It has been almost 100 years since Edwin Hubble measured the universe beyond the Milky Way Galaxy. Today, astronomers believe that as many as 100 billion other galaxies are sharing the cosmos. Most of these cosmic islands are classified by shape as either spiral or elliptical, but stargazing scientists have discovered galaxies that don't quite fit these molds.
Common to this "irregular" category are galaxies that interact with other galaxies. These gravitational interactions are often referred to as mergers, and their existence invites the question: Is the Milky Way collision-prone? To evaluate the probability, look to the Andromeda Galaxy. Located more than 2.5 million light-years away, Andromeda appears as a small fuzzy patch in the sky. However, there is nothing miniature about it. Similar to the shape (spiral), size and mass of the Milky Way, Andromeda is home to a trillion other stars.
Astronomers have known for decades that our galactic neighbor is rapidly closing in on us -- at approximately 250,000 miles per hour. They know this because of blueshift, a measured decrease in electromagnetic wavelength caused by the motion of a light-emitting source, in this case Andromeda, as it moves closer to the observer.
Recently, data collected from the Hubble Space Telescope has allowed astronomers to predict a merger with certainty, in 4 billion years. Our sun will still be shining, and Earth will most likely survive the impact. Reason being, galaxies, although single units of stars gravitationally tied together, are mostly gigantic voids. One can compare a galaxy-on-galaxy collision to the pouring of one glass of water into another. The end result is a larger collection of water, or in the case of a cosmic collision, a larger galaxy. Future Earth inhabitants, billions of years from now, could look up and observe only small portions of such an event because it will take 2 billion years for these cosmic islands to become one.
First Published November 29, 2012 12:00 am | <urn:uuid:ebb1ace8-11cc-4b0f-87f2-0f8f23923491> | {
"date": "2013-05-23T18:46:16",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9489831328392029,
"score": 3.9375,
"token_count": 415,
"url": "http://www.post-gazette.com/stories/news/science/lets-talk-about-cosmic-collisions-664068/"
} |
Modeling is the process of taking a shape and molding it into a completed 3D mesh. The most typical means of creating a 3D model is to take a simple object, called a primitive, and extend or “grow” it into a shape that can be refined and detailed. Primitives can be anything from a single point (called a vertex), a two-dimensional line (an edge), a curve (a spline), to three dimensional objects (faces or polygons).
Using the specific features of your chosen 3D software, each one of these primitives can be manipulated to produce an object. When you create a model in 3D, you’ll usually learn one method to create your model, and go back to it time and again when you need to create new models. There are three basic methods you can use to create a 3D model, and 3D artists should understand how to create a model using each technique.
1. Spline or patch modeling: A spline is a curve in 3D space defined by at least two control points. The most common splines used in 3D art are bezier curves and NURBS (the software Maya has a strong NURBS modeling foundation.) Using splines to create a model is perhaps the oldest, most traditional form of 3D modeling available. A cage of splines is created to form a “skeleton” of the object you want to create. The software can then create a patch of polygons to extend between two splines, forming a 3D skin around the shape. Spline modeling is not used very often these days for character creation, due to how long it takes to create good models. The models that are produced usually aren’t useful for animation without a lot of modification.
Spline modeling is used primarily for the creation of hard objects, like cars, buildings, and furniture. Splines are extremely useful when creating these objects, which may be a combination of angular and curved shapes. When creating a 3D scene that requires curved shapes, spline modeling should be your first choice.
2. Box modeling: Box modeling is possibly the most popular technique, and bears a lot of resemblance to traditional sculpting. In box modeling, one starts with a primitive (usually a cube) and begins adding detail by “slicing” the cube into pieces and extending faces of the cube to gradually create the form you’re after. People use box modeling to create the basic shape of the model. Once practiced, the technique is very quick to get acceptable results. The downside is that the technique requires a lot of tweaking of the model along the way. Also, it is difficult to create a model that has a surface topology that lends well to animation.
Box modeling is useful as a way to create organic models, like characters. Box modelers can also create hard objects like buildings, however precise curved shapes may be more difficult to create using this technique.
3. Poly modeling / edge extrusion: While it’s not the easiest to get started with, poly modeling is perhaps the most effective and precise technique. In poly modeling, one creates a 3D mesh point-by-point, face-by-face. Often one will start out with a single quad (a 3D object consisting of 4 points) and extrude an edge of the quad, creating a second quad attached to the first. The 3D model is created gradually in this way. While poly modeling is not as fast as box modeling, it requires less tweaking of the mesh to get it “just right,” and you can plan out the topology for animation ahead of time.
Poly modelers use the technique to create either organic or hard objects, though poly modeling is best suited for organic models.
A Workflow that Works
The workflow you choose to create a model will largely depend on how comfortable you are with a given technique, what object you’re creating, and what your goals are for the final product.
Someone who is creating an architectural scene, for example, may create basic models with cubes and other simple shapes to create an outline of the finished project. Meshes can then be refined or replaced with more detailed objects as you progress through the project. This is an organized, well-planned way to create a scene; it is a strategy used by professionals that makes scene creation straightforward. Beginners, on the other hand, tend to dive in headfirst and work on the most detailed objects first. This is a daunting way to work, and can quickly lead to frustration and overwhelm. Remember, sketch first, then refine.
Likewise, when creating an organic model, beginners tend to start with the most detailed areas first, and flesh out the remaining parts later, a haphazard way to create a character. This may be one reason why box modeling has grown to be so widely popular. A modeler can easily create the complete figure before refining the details, like eyes, lips, and ears.
Perhaps the best strategy is to use a hybrid workflow when creating organic models. A well planned organic model is created using a combination of box modeling and poly modeling. The arms, legs, and torso can be sketched out with box modeling, while the fine details of the head, hands, and feet are poly modeled. This is a compromise professional modelers seek which prevents them from getting bogged down in details. It can make the difference between a completed character, and one that is never fleshed out beyond the head. Beginners would be wise to follow this advice.
Another aspect of proper workflow is creating a model with an ideal 3D mesh topology. Topology optimization is usually associated with creating models used in animation. Models created without topology that flows in a smooth, circular pattern, may not animate correctly, which is why it is important to plan ahead when creating any 3D object that will be used for animation.
The most frequently discussed topology is the proper creation or placement of edgeloops. An edgeloop is a ring of polygons placed in an area where the model may deform, as in the case of animation. These rings of polygons are usually placed around areas where muscles might be, such as in the shoulder or elbow. Edegeloop placement is critical when creating faces. When edgeloops are ignored, models will exhibit “tearing” when animated, and the model will need to be reworked or scrapped altogether in favor of a properly-planned model.
The next step to creating great models is simply to practice and examine the work of artists you admire. Some of the best 3D modelers are also fantastic pencil-and-paper artists. It will be well worth your time to practice drawing, whether you’re a character creator or a wanna-be architect. Good modeling requires a lot of dedication. You’ll need to thoroughly understand the software you’re using, and the principles of good 3D model creation laid out above. Character artists will need to learn proportion and anatomy.
By understanding these basics of modeling you’ll save yourself a lot of frustration and discouragement, and you’ll be well on your way to becoming a prolific 3D artist. | <urn:uuid:cbdd5ef3-8a0e-4e76-9220-168c785b09a8> | {
"date": "2013-05-23T19:06:33",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9342575073242188,
"score": 3.890625,
"token_count": 1490,
"url": "http://www.primagallery.com/category/abstract-paintings"
} |
Is there such a thing as too much money?
by Fred E. Foldvary, Senior EditorWhat is inflation? There are two economic meanings of inflation. The first meaning is monetary inflation, having to do with the money supply. To understand that, we need to understand that the impact of money on the economy depends not just on the amount of money but also on its rate of turnover.
We all know that money circulates. How fast it circulates is called its velocity. For example, suppose you get paid $4000 every four weeks. You are circulating $4000 13 times per year. Then suppose you instead get paid $1000 each week. Your total spending is the same, but now you are circulating $1000 52 times per year. The velocity of the money is 52, but the money you hold has been reduced to one fourth its previous amount, although the money held times the velocity is the same. The effect on the economy is the money supply times the velocity.
Monetary inflation is an increase in the money supply, times the velocity, which is greater than the increase in the amount of transactions measured in constant dollars. Simply put, if velocity does not change, monetary inflation is an increase in money that is greater than the increase in goods.
Price inflation is an on-going increase in the price level. The level of prices is measured by a price index, such as the consumer price index (CPI). Usually, price inflation is caused by monetary inflation. So let’s take a look at recent monetary inflation.
The broadest measure of money is MZM, which stands for money zero maturity, funds which can be readily spent. The Federal Reserve Bank of St. Louis keeps track of various measurements of money. Its data show that on an annual basis, MZM increased by 13 percent in January 2008, 36 percent in February, and 23 percent in March. These are huge increases, since gross domestic product, the total production of goods, increased at an annual rate of only .6 percent during these months. In 2006, MZM grew at an annual rate of only 4 percent.
High monetary inflation results in high price inflation. Indeed, in May 2008 the consumer price index rose by 4.2 percent from the level of May 2007. For the month, the increase for May was .6 percent, an annual rate of 7.2 percent. The “Consumer Price Index for All Urban Consumers” (CPI-U) increased 0.8 percent in May, before seasonal adjustment, for an annualized increase of 9.6 percent. The “Consumer Price Index for Urban Wage Earners and Clerical Workers” (CPI-W) increased 1.0 percent in May, prior to seasonal adjustment, for a whopping annual increase of 12 percent.
The rapid rise in oil prices fueled the increase in the price of gasoline, while the greater demand for grains made food prices rise, but beneath these rises is the monetary inflation that creates a higher demand for goods in general. The government reports that “core inflation,” not counting gasoline and food, is lower, but what counts for people is everything they buy, including food and fuel. If you have to pay much more for food and gasoline, there is less money for other things, so of course these will not rise in price as much.
In making monetary policy, the Federal Reserve targets the federal funds interest rate, which banks pay when they borrow funds from one another. During the financial troubles during the first few months of 2008, the Fed aggressively lowered the federal funds rate to 2 percent and also indicated that it would supply limitless credit to banks that borrowed directly from the Federal Reserve.
The Fed lowers the interest rate by increasing the supply of money that banks have to lend; to unload it, banks charge borrowers less interest. To start, the Fed buys U.S. Treasury bonds from the public. The Fed pays for the bonds not by using old money it has lying around but by increasing the reserves held by the banks in their accounts at their local Federal Reserve Bank then using that new money.
This increase in reserves or bank funds is a creation of money out of nothing. Actually, this does not violate the law of conservation, because this creation of money is at the expense of the value of all other money holdings. Every extra dollar created by the Fed decreases the value of the dollars you hold by a tiny amount.
Most monetary reformers stop there, but that is not enough. The current financial instability is also caused by the real estate boom-bust cycle, since even with sound money, an economic expansion would spark a speculative boom in land values. In a competitive market, when produced goods rise in price, producers usually supply more, bringing the price back down or limiting the rise. But land is not produced, so with increased demand, the price has nowhere to go but up. Speculators drive the price of land based on expectations of even higher future prices, but at the peak of the boom, the price becomes too high for those who want to use the land.
Real estate stops rising and then falls, and that brings the financial system down with it, as we have witnessed during the past year. To prevent the inflation in land prices, we need to remove the subsidy, the pumping up of land value from the civic benefits paid by returns on labor and capital goods. We can remove the land subsidy by tapping the land value or land rent for public revenue. Land-value tapping or taxation plus free-market money and banking would provide price and financial stability.
Only the free market can know the right money supply. Some people think the government could just print money and spend it. That is what is happening in Zimbabwe, which has an inflation rate of one hundred thousand percent. Much of the population has fled the country. Once government can create money at will, there is really no way to limit it, and if there is some limiting rule, then the money supply becomes too rigid. Only free market competition and production can combine price stability with money-supply flexibility.
-- Fred Foldvary
Copyright 2008 by Fred E. Foldvary. All rights reserved. No part of this material may be reproduced or transmitted in any form or by any means, electronic or mechanical, which includes but is not limited to facsimile transmission, photocopying, recording, rekeying, or using any information storage or retrieval system, without giving full credit to Fred Foldvary and The Progress Report.
Part III, The Trouble With Money and its Cure
A Better Way to Pay for Railways?
How Economic Systems Really Work
Email this article Sign up for free Progress Report updates via email
What are your views? Share your opinions with The Progress Report:
Page One Page Two Archive Discussion Room Letters What's Geoism? | <urn:uuid:accf12a7-8aaf-4627-9f32-8cccc672aeeb> | {
"date": "2013-05-23T18:45:41",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9523249864578247,
"score": 4.15625,
"token_count": 1400,
"url": "http://www.progress.org/2008/fold564.htm"
} |
The most romantic way I have ever heard Chaos Theory described is, “there are patterns, and even great beauty, in seemingly chaotic events.” Formally, Chaos Theory is defined as a sub-discipline of mathematics that studies complex, or dynamic, systems.
These complex systems contain so many moving parts that it takes computers to calculate and model all of the movements of the system. In fact, it has been said that the emergence of this theory could not have happened without the invention and proliferation of the computer.
Up until what is called the Quantum Mechanical Revolution, “people believed that things were directly caused by other things.” In Latin it is referred to as post hoc ergo propter hoc, or after, therefore, because of it. In essence, if one thing follows another, it must have been caused by it.
It is the basis of Freudian psychoanalysis, “a belief that malfunctions in the mind are the results of traumas suffered in the past” and that Regression Therapy—pinpointing when and how these traumas occurred—would allow us to heal. It is called linear cause and effect.
Chaos Theory, however, tells us that it is less about linear effect and more the existence and production of patterns caused by many different forces, the most important of which are initial conditions, popularly referred to as The Butterfly Effect.
The Butterfly Effect posits that the flapping of a butterfly’s wings in South America could affect the weather in Texas, meaning that the smallest, seemingly inconsequential part of a system can have a huge effect on all the other parts. Simply said, “unless all factors can be accounted for, large systems would be impossible to predict with total accuracy because there are too many unknown variables to track.”
The study of Chaos Theory has helped us understand simple, or everyday, phenomena such as water boiling on a stove and complex events such as how birds migrate, how vegetation spreads and the structure of stars in the night sky, but its origins stem from the study of weather systems.
It all started in 1960 when Edward Lorentz created a weather-model on his computer at the Massachusetts Institute of Technology. Lorentz’s weather model consisted of an extensive array of complex formulas that successfully modeled, and later helped predict, the weather and turned a large, unpredictable system into one of those everyday phenomena, the daily weather forecast.
This month’s Quality continues in the tradition of Mr. Lorentz with Michelle Bangert’s analysis of our annual spending study, “Quality Spending Stays Strong,” and a roundtable discussion on the importance of the budget process titled, “The Budget Process Revealed.” Also, check out Genevieve Diesing’s feature, “A Closer Look at the Skills Gap.”
Enjoy and thanks for reading! | <urn:uuid:9ba90793-fbf1-4bce-950c-7da7b7cd1c1f> | {
"date": "2013-05-23T18:45:51",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9545955061912537,
"score": 3.296875,
"token_count": 601,
"url": "http://www.qualitymag.com/articles/90891-chaos-theory"
} |
A world first study has found smoking prevention advertisements sponsored by tobacco companies targeted at parents do not work and may encourage teenagers to take up smoking.
The study published online today by the American Journal of Public Health in the United States examined youth exposure to tobacco company television advertising campaigns and how that exposure influenced smoking-related beliefs and behaviour.
The study's lead author, Professor Melanie Wakefield, from The Cancer Council Victoria and an NHMRC Principal Research Fellow, began the U.S. funded research while working at the University of Illinois at Chicago (UIC).
Professor Wakefield and her team of researchers from Bridging the Gap, a policy research program based at the University of Illinois at Chicago (UIC) and the University of Michigan, found that among 16 to 18 year olds, higher youth exposure to parent-targeted ads was, on average, associated with lower perceived harm of smoking, stronger approval of smoking, stronger intentions to smoke in the future, and a greater likelihood of having smoked in the past 30 days.
They also found that 14 to 18 year olds were generally not influenced by increasing exposure to tobacco industry youth-targeted ads, which stressed that it is not cool for young people to smoke. The final sample size for the report was 103,172 students.
"This research provides the clearest evidence to date that tobacco industry-sponsored smoking prevention ads don't work and that they are acting as a marketing smokescreen to promote tobacco to youth," Professor Wakefield said.
"Tobacco-sponsored ads targeted at youth have no impact and those targeted at parents seem to have an adverse effect on students who are in their middle and later teenage years. The ads give the impression that youth should not smoke because they are too young - and that's not a good enough reason. There is no mention in these ads of the serious health risks of smoking," she said.
Quit and VicHealth Centre for Tobacco Control Director, Mr Todd Harper, said despite the tobacco industry's attempts at an image makeover, they remain the perennial wolf in sheep's clothing.
"The tobacco industry claim to do all they can to discourage youth smoking, but these tobacco industry sponsored advertisements appear to be priming teens to take up a habit that will eventually kill two out of three lifetime smokers.
"The tobacco industry admit they are simply trying to delay youth smoking as opposed to preventing uptake all together, implying young people are fair game in a deadly recruitment drive for customers.
"We must not forget that this is an industry whose objective is to sell more products, and therefore addict more smokers and this has not changed over time, " he said.
Mr Harper said the success of the current tobacco control campaign in Australia illustrates an advertisement doesn't need to explicitly suggest that parents talk to their kids about smoking for that discussion to take place.
"The recent campaign in Australia, focusing on the graphic health warnings on cigarette packs, inspired discussion about the health effects of smoking within families, supporting the idea a media campaign does not have to be targeted at youth, to have a positive impact on youth.
"An effective tobacco control message will generate conversation and debate without that specific instruction from the advertisement," Mr Harper said.
ph: (03) 9635 5400
mob: 0417 303 811 | <urn:uuid:d196e2b3-e157-4b0f-b3d6-62d28dee6929> | {
"date": "2013-05-23T18:53:14",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9650148749351501,
"score": 3.0625,
"token_count": 669,
"url": "http://www.quit.org.au/resource-centre/media/media-centre/media-2006/media-november-201011/1_nov_2006.html"
} |
The Danone Fund for Nature
After a 10-year partnership with Ramsar, another major environmental milestone was achieved in 2008. During the Conference of the Parties to the Ramsar Convention in Changwon, South Korea, the Ramsar Convention, IUCN and Danone signed an agreement: the “Danone Fund for Nature”. This agreement is intended to combat climate change through field projects for the restoration of specific wetlands that make a non-negligible contribution to carbon sequestration. This restoration programme focuses on mangroves, plants with a strong potential for carbon capture and which play a vital role for biodiversity. Indeed, in addition to absorbing CO2, mangroves act as fish “nurseries”, produce fruit, honey, etc. They are also a source of ecotourism, filter water, and provide protection against flooding.
A pilot mangrove replanting project was initiated in Senegal. Four years later, three further field projects in India and Indonesia demonstrated the success of this initiative and, in their wake, a new collaboratively developed methodology was approved by the United Nations Framework Convention on Climate Change (UNFCCC).
Photos © J-F. Hellio and N. Van Ingen
For more information about this methodology, which evaluates the impact of mangrove restoration on efforts to combat climate change, see: http://cdm.unfccc.int/methodologies/DB/CKSXP498IACIQHXZPEVRJXQKZ3G5WQ.
From the “Danone Fund for Nature” to the “Livelihoods Fund”
Thanks to the “Danone Fund for Nature” the Danone Group has developed a new approach to the carbon economy by creating the “Livelihoods Fund”, an Investment Company with Variable Capital (ICVC) enabling it to develop carbon sequestration (like the mangrove restoration project) or energy efficiency projects in developing countries. This Fund works by using the carbon absorption capacity of certain ecosystems, such as mangrove wetlands, to finance economic development of village communities through the restoration of these key environments.
Watch the video clip: http://www.youtube.com/watch?v=cJaeQeAJHT4
The Livelihoods Fund includes the following components:
Livelihoods Venture: a company which includes all the operational project management, engineering, economic and sustainable development skills. It mission is to identify local programmes with strong ecological, economic and social potential, and replicability; and to implement them in collaboration with local NGOs and rural communities.
Livelihoods Network: an association which facilitates exchanges and sharing of skills among a network of NGOs and experts. It also serves as a think-tank for issues touching on “Livelihoods”.
Livelihoods Steering Committee: this body is made up of representatives of organizations and other personalities including Anada Tiega, Secretary General of the Secretariat of the Ramsar Convention on Wetlands of International Importance, and Julia Marton-Lefevre, Director General of IUCN (International Union for Conservation of Nature), two organizations that along with Danone initiated the early pilot projects. Other members of the Steering Committee include: Luc Guyau, Independent President of the Council of the FAO, Tony Simons, Director General of ICRAF, the World Agroforesty Centre (Nairobi), Michel Griffon, agronomist and researcher, President of the Scientific Council of the French Global Environment Facility.
For further information on the Livelihoods Fund:
For further information on the IUCN-Ramsar-Danone partnership: | <urn:uuid:25c6779c-fe4c-4478-8fa6-debcbc12ee34> | {
"date": "2013-05-23T19:00:39",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9123494029045105,
"score": 2.609375,
"token_count": 766,
"url": "http://www.ramsar.org/cda/ramsar/display/main/main.jsp?zn=ramsar&cp=1-63-98-398%5E23925_4000_0__"
} |
Slavery's effects live on
As of the 1860 census, the last before the American Civil War, 2.3 million slaves lived in the Lower Southern states—nearly 50 percent of the entire Lower Southern population at that time. The numbers for the Upper South didn’t fare much better, with 1.2 million slaves, about a third of the population. All told, Southern and Border States totaled four million slaves, or half the population of today’s New York City.
These mind-boggling numbers reveal the tremendous effect of slavery on the African population in the 19th century. Slavery continues to effect today’s African American population, as Dr. Patricia Newton’s presentation for African-American Heritage month on Post-Traumatic Slavery Disorder will attest.
Newton wants to explore the long-term effects of the chattel slavery experience on African populations. Chattel, as defined on dictionary.com, is “another form of cattle; any item of movable or immovable property except the freehold.”
While Post-Traumatic Slavery Disorder may be a new term to many of us, Newton is an expert on the topic and makes an interesting case for the correlation between the Disorder and emerging patterns in African-American life.
With control groups in the Caribbean and the North American continent, Newton explores clinical case histories and makes comparisons between the trauma experienced by Africans forced into the United States and slavery, Jewish Holocaust victims, and veterans of the Gulf and Vietnam wars. In addition, neurological data relative to the effect of trauma on the brain, psyche, and body will also be explored. Identification of the problems and suggestions for healing will be discussed in an attempt to clarify the direction that African-Americans must take in the 21st century.
Newton’s speech is a prestigious one during African-American Heritage Month and investigates an important and timely topic. But slavery in its many forms occurs around the world each day, and must be recognized and fought against year round.
Dr. Patricia Newton will present on Post-Traumatic Slavery Disorder on Tuesday, February 19 at 7pm at UVA’s Clark Hall, Room 147. The event is free and open to the public and is sponsored by the Office of African-American Affairs. Please call La Tasha Levy at 924-7923 for more information. | <urn:uuid:90e35a8d-c9b3-4664-bf74-b8e8630cbf29> | {
"date": "2013-05-23T19:09:37",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9341321587562561,
"score": 3.796875,
"token_count": 488,
"url": "http://www.readthehook.com/95124/slaverys-effects-live?quicktabs_1=2"
} |
Network With Us
Join us on Facebook to get the latest news and updates.
Lauren Boulden's Story
Using Think-Alouds to Get Inside Langston Hughes' Head
Over my past few years of teaching, there have been multiple occasions where I have been stumped on how to present a particular concept to my students. I've always been able to turn to ReadWriteThink.org for hands-on, engaging lessons. For example, I knew I wanted my students to develop their skills when it came to interacting with text, particularly with poetry. While searching through the myriad options on ReadWriteThink, I came upon "Building Reading Comprehension Through Think-Alouds."
At first, I planned to use the lesson exactly as written: Read Langston Hughes's poem "Dream Variation" and model a think-aloud with students; then have the students try their hand at some think-alouds using other poetry. After working out all of the details, I realized I could develop some additional skills, which would fit perfectly into the scope and sequence of my class. After completing the think-aloud to "Dream Variation," I broke students into selected groups. Each group was given a different Langston Hughes poem and asked to complete a think-aloud. The next day, the students were put into a new jigsaw group where they were solely responsible for sharing what their Langston Hughes poem conveyed. Based on the meanings behind their group mates' poems, along with using the knowledge of both their poem and "Dream Variation," students were asked to figure out who Langston Hughes was as a man. What did he stand for? What were his beliefs? What did he want out of life? Students used clues from the various poems to fill in a head-shaped graphic organizer to depict their understanding of who Hughes could be. This simple lesson of working with poems and think-alouds turned into a few days of group communication, text deciphering, inferences, and even an author study!
Without great lessons available on ReadWriteThink.org, such as "Building Reading Comprehension Through Think-Alouds," my students would never have been able to tackle so many key reading strategies in such a short amount of time.
Grades 6 – 8 | Lesson Plan | Standard Lesson
Students learn components of think-alouds and type-of-text interactions through teacher modeling. In the process, students develop the ability to use think-alouds to aid in reading comprehension tasks.
Lauren describes how she used ReadWriteThink in her classroom.
I have been teaching seventh- and eighth-grade language arts in Delaware for the past five years. I grew up in Long Island, New York, but have called Delaware my home since completing my undergraduate and master’s work at the University of Delaware. Teaching and learning have become my prime passions in life, which is why my days are spent teaching English, directing plays, organizing the school newspaper, and teaching yoga in the evenings. | <urn:uuid:d55ba202-34fa-4fe6-b6ae-698c282eb244> | {
"date": "2013-05-23T18:51:49",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9695732593536377,
"score": 3.5625,
"token_count": 625,
"url": "http://www.readwritethink.org/about/community-stories/using-think-alouds-inside-36.html"
} |
Last July (2012), I heard from a colleagues working at the edge of the Greenland ice sheet, and from another colleague working up at the Summit. Both were independently writing to report the exceptional conditions they were witnessing. The first was that the bridge over the Watson river by the town of Kangerlussuaq, on the west coast of Greenland, was being breached by the high volumes of meltwater coming down from the ice sheet. The second was that there was a new melt layer forming at the highest point of the ice sheet, where it very rarely melts.
A front loader being swept off a bridge into the Watson River, Kangerlussuaq, Greenland, in July 2012. Fortunately, nobody was in it at the time. Photo: K. Choquette
I’ve been remiss in not writing about these observations until now. I’m prompted to do so by the publication in Nature today (January 23, 2013) of another new finding about Greenland melt. This paper isn’t about the modern climate, but about the climate of the last interglacial period. It has relevance to the modern situation though, a point to which I’ll return at the end of this post. | <urn:uuid:c8dad88b-1cd0-43ad-8153-71e09064a07e> | {
"date": "2013-05-23T18:37:53",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9761591553688049,
"score": 2.78125,
"token_count": 251,
"url": "http://www.realclimate.org/index.php/archives/2013/01/"
} |
From Spoiled Sausage to Faces in 200 Years: Happy Birthday, Botox!
Makenzie on 25 Apr 2012 at 3:30pm
Botox turned 10 years old on April 15th. Or rather, the FDA approval for cosmetic use had its 10 year anniversary. However you want to look at it, this injectable, reverser-of-time has transformed the medi-beauty industry. The number of Botox procedures has jumped 67% since 2002, according to statistics from the American Society for Aesthetic Plastic Surgery. And 6.4 out of 10 reviewers say it's worth a shot.
In honor of this occasion, the folks over at In Your Face, a column for the Orange County Register, created an in-depth timeline of the origins of Botox. From being discovered in spoiled sausages to inhabiting the faces of huge Hollywood stars, it has come a long way.
1820s: German doctor Justinus Kerner identifies a toxin in spoiled sausages that causes food poisoning. The paralytic illness caused by Kerner's "sausage poison" earns the name "botulism," from a Latin word ("botulus") for sausage. Kerner speculates that small doses of the toxin might be used to treat nerve disorders and excessive sweating.
1895: Belgian bacteriologist Emile Pierre van Ermengem discovers that Clostridium botulinum bacteria produce the botulism toxin.
1920s: Botulinum Toxin Type A is first isolated from the Clostridium botulinum bacteria in a purified form as a stable acid precipitate by Dr. Herman Sommer at the University of California, San Francisco.
1940s: During World War II, American scientists explore potential use of botulinum toxin as a weapon. The U.S. produces botulinum toxin capsules for Chinese prostitutes to drop into the food of high-ranking Japanese officials. The plan is not put into effect because the military found it to be ineffective as a weapon.
1946: Researcher Edward J. Schantz, Ph.D. succeeds in purifying Botulinum Toxin Type A into crystalline form, for the first time providing scientists with the raw material necessary to study the molecule in greater detail.
1949: Researcher Dr. Arnold Burgen and colleagues in London discover that botulinum toxin blocks communication between nerves and muscles.
1960s: Ophthalmologist Alan Scott in San Francisco injects botulinum toxin into monkeys to see whether it relaxes muscles that cause crossed eyes.
1978: Scott wins approval from the Food and Drug Administration for extensive multi-site tests of botulinum toxin as a treatment for crossed eyes in humans. He calls the drug Oculinum and establishes Oculinum Inc. to make and sell it. | <urn:uuid:ec975484-d253-4fc7-94b6-f898a1166e61> | {
"date": "2013-05-23T18:48:45",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9160208106040955,
"score": 2.828125,
"token_count": 582,
"url": "http://www.realself.com/blog/happy-birthday-botox"
} |
The book of Job, especially chapter 39, implies that God created the nephesh creatures (“soulish” animals like birds and mammals) to serve and/or to please human beings. They are termed soulish because God has endowed each of them with a mind, a will, and the capacity to express and experience emotions. These animals are equipped and motivated to emotionally bond with and to nurture, serve, and please other members of their species and human beings. Moreover, these nephesh species were evidently endowed with this capacity before any human even existed, a characteristic that appears problematic for evolutionary or naturalistic scenarios.
Recently, a British team of research psychologists has published a paper announcing the discovery of a new bonding feature between humans and nephesh creatures. Their study demonstrates for the first time that human yawns are contagious to domestic dogs. For their experiment they tested twenty-nine dogs from twenty-four different breeds spanning ages two to fifteen.1 Twenty-one of the dogs yawned when they observed a human do so.
Some dog breeds were better at catching human yawns than others. For example, the Labrador breeds, known to form especially strong bonds with humans, seemed especially adept.
Such behavior indicates that dogs possess the capacity for empathy towards humans. However, the yawning response may reveal more. In human-human interactions contagious yawning is known to modulate levels of arousal. Thus, in the words of the researchers, “yawn contagion [between humans and dogs] may help coordinate dog-human interaction and communication.”
The study provides yet one more piece of scientific evidence that birds and mammals really were pre-designed before humans even existed to form emotional relationships with human beings in such a manner that they could enhance humanity’s well being. These animals serve and please us. More amazing still, each soulish species appears designed to serve and/or please us in a manner distinct from all others.
- M. Ramiro et al., “Dogs Catch Human Yawns,” Biology Letters 4 (October 23, 2008): 446-8. | <urn:uuid:e21b69d8-d562-4507-9d3f-0d8826313a9b> | {
"date": "2013-05-23T18:51:46",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9577916264533997,
"score": 3.625,
"token_count": 434,
"url": "http://www.reasons.org/articles/dogs-catch-human-yawns"
} |
©InfoThe British Red Cross has supported health clinics offering life-saving advice and treatment in Balochistan, northern Pakistan since 2000. These clinics, run by the Pakistan Red Crescent Society, are in areas that lack access to even the most basic health services. Many people live in semi-desert, rural communities where coal mines provide the main source of income. The mines offer little protection to workers, so breathing problems and injuries related to mining are common.
Saving lives and changing minds
The British Red Cross supports two mobile clinics operating from the towns of Quetta and Mastung, and two static health centres in Quetta and Nushki. In the first six months of 2012, these four clinics provided basic health care services to over 35,000 vulnerable people, with a special focus on helping women and children. The clinic teams include male and female doctors and health workers, as well as nurses and a pharmacist.
A lot of the clinics’ work is related to pregnancy. In some areas, literacy levels are low and cultural values don’t encourage women to make independent decisions. Counselling sessions tackle the beliefs that stop some people using family planning services – 3,955 took place in the first six months of 2012.
In the same period, 1,984 children were immunized against serious diseases and 7,467 people took part in health and hygiene education sessions – most of them women.
What do the clinics offer?
Family planning services
These include advice, counselling and check-ups as well as access to contraceptives.
Treatment for diseases
People can get help for illnesses like pneumonia and malaria, and referral to other clinics and hospitals for tuberculosis treatment.
Help during and after pregnancy
Support includes check-ups and home visits.
Sessions cover issues like hygiene, the importance of boiling water, breast feeding and vaccinations. People also learn about health problems like worms and diarrhoea, and first aid for emergencies like broken bones, burns and snake bites.
Find out about our health care work in Sierra Leone | <urn:uuid:67ad599b-f10b-46d7-b039-64c23f99162e> | {
"date": "2013-05-23T18:45:44",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9487037062644958,
"score": 2.765625,
"token_count": 417,
"url": "http://www.redcross.org.uk/What-we-do/Health-and-social-care/Health-issues/Community-healthcare/Healthcare-in-Pakistan"
} |
Adopting a New Flight Plan Whooping Crane Migration Route Shifted West into Safer Air Space
By LEN WELLS Courier & Press correspondent (618) 842-2159 or firstname.lastname@example.org
The route of the annual 1,250-mile migration of endangered whooping crane juveniles, led by an ultralight aircraft, has been shifted this fall to a more westerly route because of concerns about pilot and bird safety.
The route, from the Necedah National Wildlife Refuge in central Wisconsin to a closed area of the Chassahowitzka National Wildlife Refuge on the west coast of Florida, will bring the birds through parts of the Tri-State.
It will take the birds the entire length of Illinois and across Western Kentucky, with overnight stops in Wayne County, Ill., and Union County, Ky.
“The route was shifted west because the easterly route was pretty scary,” said Liz Condie, director of communications for Operation Migration, the group that works to ensure the birds’ survival.
“Going over the Cumberland Ridge, there was no place to set down to retrieve a bird if there had been a problem,” she said.
Officials hope, too, for better weather along the westerly route by picking up more favorable winds.
“For the safety of the birds, we
cannot divulge the exact location of each stopover other than down to the county level,” Condie said. “At each stop, the birds will be housed overnight in portable pens to protect them from predators and to keep them far away from human contact.”
While the stopover locations are kept secret, Operation Migration officials try to schedule gathering sites for local residents to catch a glimpse of the birds as they lift off to continue their southerly trek.
“A few days before the scheduled stopover, we try to alert the local residents of where they can congregate to watch a flyover,” Condie said.
Because of fluctuating weather conditions, those interested in tracking the birds should check Operation Migration’s Web site at www.operationmigration.org for a more specific date and time.
The whooping crane chicks that take part in the reintroduction project are hatched at the U.S. Geological Survey’s Patuxent Wildlife Research Center in Laurel, Md. There, imprinting begins with the chicks still inside their eggs being exposed to ultralight aircraft sounds. Once hatched, the young chicks are reared in total isolation from humans.
To ensure the impressionable cranes remain wild, each handler and pilot wears a crane puppet on one arm that can dispense food, or by example, show the young chicks how to forage as would their real mother.
At 45 days of age, the young birds are transported by air, in individual containers, to the reintroduction area at the Necedah National Wildlife Refuge in Wisconsin.
Because of differing age ranges, the birds usually are moved in three shipments and housed at three separate locations within a closed area of the refuge. Over the summer, the Operation Rescue crew of pilots, biologists, veterinarians and interns conditions the birds to follow the aircraft, which, along with its pilot, has been accepted as a surrogate parent.
Once the birds’ dominance structure has been established and their endurance is sufficient, the migration begins, typically in October. Using four ultralight aircraft, Operation Migration’s pilots, along with a ground crew consisting of biologists, handlers, veterinarians and drivers, cover up to 200 miles a day, depending on weather conditions.
This year’s migration to Florida has been scheduled to begin Oct. 17. The shortest migration has taken 48 days to complete. The longest, 97 days, was recorded last year.
Because of destruction of habitat and overhunting, whooping cranes were on the verge of extinction in the 1940s when their population was reduced to only 15 birds. Since falling under the protection of the Endangered Species Act of 1973, the only naturally occurring population of migrating whooping cranes has grown to more than 200 birds.
Named for their loud and penetrating unison calls, whooping cranes live and breed in wetland areas where they feed on crabs, clams, frogs and aquatic plants.
An adult whooping crane stands 5 feet tall, with a white body, black wing tips and a red crest on its head.
Anyone encountering a whooping crane in the wild is asked to avoid approaching it, staying back at least 600 feet. In all cases, officials ask that people remain concealed and not speak loudly enough for the birds to hear them. Especially during the migration, residents are warned not to trespass on private property in an attempt to view the cranes.
(c) 2008 Evansville Courier & Press. Provided by ProQuest LLC. All rights Reserved. | <urn:uuid:1fea6546-1d45-4f80-b956-022db1d4eed7> | {
"date": "2013-05-23T19:00:29",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9453749656677246,
"score": 2.640625,
"token_count": 1012,
"url": "http://www.redorbit.com/news/science/1559276/adopting_a_new_flight_plan_whooping_crane_migration_route_shifted/"
} |
Internal Displacement: Global Overview of Trends and Developments in 2010 - Timor-Leste
|Publisher||Internal Displacement Monitoring Centre (IDMC)|
|Publication Date||23 March 2011|
|Cite as||Internal Displacement Monitoring Centre (IDMC), Internal Displacement: Global Overview of Trends and Developments in 2010 - Timor-Leste, 23 March 2011, available at: http://www.refworld.org/docid/4d932e121e.html [accessed 23 May 2013]|
|Disclaimer||This is not a UNHCR publication. UNHCR is not responsible for, nor does it necessarily endorse, its content. Any views expressed are solely those of the author or publisher and do not necessarily reflect those of UNHCR, the United Nations or its Member States.|
|Number of IDPs||Undetermined|
|Percentage of total population||Undetermined|
|Start of current displacement situation||2006|
|Peak number of IDPs (Year)||150,000 (2006)|
|Causes of displacement||Generalised violence|
|Human development index||120|
An estimated 150,000 people were displaced in 2006 within Timor-Leste, as their homes and property in the capital Dili were seized or destroyed during violence between rival army and police factions and among the wider population. They sought refuge either in the city, in government buildings, schools or churches and subsequently in makeshift camps, or else with families or friends in rural districts. The causes included political rivalries and land disputes dating back to the struggle for independence from Indonesia, divisions between "easterners" and "westerners", and also chronic poverty and the lack of prospects of the youth population.
In 2008, around 30,000 IDPs were still in the camps, and the government distributed cash compensation to people agreeing to leave. Partly due to the lack of available land, the government only supported IDPs returning home. During 2010, a last group of 1,000 IDPs received the compensation and the last transitional shelters were closed.
Most land and property disputes involving returnees were usually resolved locally, with squatters often agreeing to leave in exchange for some of the IDPs' compensation money; but cases involving conflicting ownership claims could not be resolved in the absence of a national framework. A new land law has been drafted, but some civil society organisations have highlighted the potential of further conflict, as the law does not enable people who have moved into homes abandoned since December 1998 to gain secure ownership.
The UN introduced the cluster system in 2009, even though the humanitarian crisis was already over and most agencies had turned to development activities. In 2010, UNDP and the government conducted programmes in which both returnees and receiving communities participated to identify their shared priorities. | <urn:uuid:7372d15a-36d2-4013-92b1-dd01411089a5> | {
"date": "2013-05-23T18:32:47",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9475686550140381,
"score": 2.546875,
"token_count": 577,
"url": "http://www.refworld.org/cgi-bin/texis/vtx/rwmain?page=topic&tocid=4565c2253e&toid=4565c25f49d&publisher=&type=&coi=TMP&docid=4d932e121e&skip=0"
} |
The Federal Budget and Appropriations Process
The budget and appropriations process are the steps through which the U.S. decides annual spending. Learn about these inter-related process.
Federal Budget Process
Step 1: President’s Budget Request
The budget process begins with the president’s submission to Congress of the administration’s proposed budget for the coming fiscal year, which begins on October 1. The budget must be submitted by the first Monday in February. The president’s proposal does not have the force of law, but includes detailed spending levels for all programs. Though only input to the budget process, it generally sets the tone for the process in three ways:
- It reveals the president’s beliefs about how much money the federal government should spend (not only in the coming fiscal year, but also in the following five years or more) as well as how much it should tax.
- It sets the president’s priorities for spending, such as how the president would like to fund issues including education, defense, and health.
- It suggests changes to spending and tax policies.
The president’s proposal is formally written up by the White House’s Office of Management and Budget (OMB), and it usually includes thousands of pages of supporting information, such as historical tables of past budget statistics.
Step 2: Congressional Action
The Congressional Budget Act of 1974 directs that, following the submission of the president’s budget proposal, the House and Senate Budget Committees (with assistance from the Congressional Budget Office, a nonpartisan body) create the budget resolution. A budget resolution serves as the general framework within which Congress will make its decisions about specific spending and taxing levels. Budget resolutions are concurrent congressional resolutions — they do not have the force of law and they do not require the president’s signature. They do not directly provide funding to any organization or program, but establish the structure of the budget.
To create a budget resolution, the Budget Committees gather reports and hold public hearings to question administration officials about the budget as a means of gaining input. They also receive “views and estimates” from congressional committees regarding details on budget issues that relate to each committee’s particular area of focus. This information usually takes the form of letters submitted to the chairman and ranking member of the Budget Committee within 6 weeks of the president’s budget proposal; these letters provide the Budget Committees with general direction and advice.
Each Budget Committee then compiles all of this information to formulate the budget resolution, which it does in a series of meetings called “markup” sessions; these sessions allow for discussion and consideration of the information, while committee members may offer their own input into the budget framework being created. Upon completion of the markups, the Budget Committee will present its budget resolution to its respective house, “on the floor.” A rule under the Congressional Budget Act of 1974 requires the full Senate to consider the budget resolution by April 1 each year.
The House and Senate independently proceed to debate, offer amendments, and vote upon their respective budget resolutions; amendments may be enacted by a majority vote. The House and Senate pass budget resolutions that differ from each other, so the two versions of the resolution go to a conference committee that meets to resolve differences and formulate a single budget resolution. The committee sends this version back to the House and Senate as a conference report. Both chambers consider the report, and once they have agreed to it through a majority vote (which they generally do, without making changes), the final version of the budget resolution takes effect. This is supposed to happen by April 15, but the process often takes longer to complete.
Step 3: The Budget Resolution — A Closer Look
The budget resolution is a crucial component of the budget process because it lays out the plan for spending and taxes for the following fiscal year. While the president’s budget proposal is very detailed, the budget resolution simply consists of a set of numbers dictating the specific amounts of money that Congress is permitted to spend in each of the 20 “budget functions” or “functional allocations,” categories of spending including transportation, agriculture, and health. Thus, the budget resolution does not set the annual spending levels for specific programs (this is done by the Committees on Appropriations — see the Appropriations Process), but rather sets targets. The budget resolution also distributes among the congressional committees the total spending figures that it has laid out for each budget function. The budget resolution lists these figures in a table called the 302(a) allocation.
Within the budget resolution, Congress also includes directions as to how it wishes to appropriate (spend) the money, either through discretionary or mandatory spending:
Discretionary spending refers to the funds allocated each year in the annual appropriations bills that are set by Congress for the purpose that it chooses. RESULTS Global focuses most of its efforts upon influencing discretionary spending through the appropriations process. See the next step in the Federal Budget Process, Discretionary Spending and the Appropriations Process, for more information.
The discretionary budget accounts for about one-third of the federal government’s total spending. Money in this category of spending is generally used for such programs as housing, education, and foreign aid. The president and Congress must act each year to ensure that spending on these programs continues.
The House and Senate Appropriations Committees determine the discretionary spending levels for the programs funded by the federal government on an annual basis.
Mandatory spending is enacted by law and does not depend on any annual appropriations bill. This type of spending makes up two-thirds of the total federal budget per year. It mostly includes entitlement programs that are consistently funded each year based upon the rules set forth by them. When Congress creates a program, such as Medicaid, it determines who will be eligible to receive financial benefits under the program, often determined by such criteria as age or income. Congress then estimates the number of people each year that will be eligible for the program, using this number to formulate its spending for the program. The president and Congress can change the level of mandatory spending for a program by altering the criteria for eligibility or the formula for payment. However, the government does not need to take action annually to ensure that the program continues to be funded.
The committees that set policy and the maximum funding levels allowed for these types of entitlement programs are called Authorizing Committees.
Measuring Federal Spending: The government measures the amount of money it spends each year in two ways: budget authority and outlays. Budget authority (BA) refers to the amount of money that Congress will authorize the government to spend on certain activities or programs. Outlays, also known as expenditures, are what the government actually spends in any given year. For instance, a bill could be passed that appropriates $75 million to build a hospital — this $75 million is provided in budget authority. However, the hospital may take several years to build and therefore, the money would not all be spent in the year during which it was originally appropriated. Thus, $75 million in outlays would not be used until the following year or more, when the hospital is built.
Note: In addition to setting spending levels, the budget resolution determines how much money the government will collect in revenue (the income of the government from taxation and other sources) for the following five years. The difference between the spending and revenue levels resolves whether there will be a surplus or a deficit, for which the budget resolution sets target levels as well; these targets are detailed in the “budget aggregates” section of the resolution.
Step 4: Discretionary Spending and the Appropriations Process
After the plan for the budget has been laid out in the president’s budget request and the budget resolution, the appropriations process — whereby money is finally distributed through appropriations bills — must take effect. Appropriations bills provide the funding that governmental programs such as national defense, education, homeland security, and foreign aid need to continue their activities. Thus, while the budget resolution has set goals for spending levels, appropriations bills actually provide this money to agencies. Spending through the appropriations process is considered discretionary spending.
Appropriations bills are created by the House and the Senate Appropriations Committee under the general direction of the budget resolution. There are 12 appropriations bills considered annually in the Committees on Appropriations for FY 2008 (this number can change from year to year). Both the House and the Senate Committees on Appropriations include 12 subcommittees, each of which has the responsibility of developing one appropriations bill.
The Appropriations Committee determines its spending levels for its appropriations bills based upon the 302(a) allocation it receives from the budget resolution (the budget resolution divides the money it is appropriating to each of the 20 budget functions among the congressional committees). In other words, the allocation sets the limit of the funding level allotted to the appropriations bills. The 302(a) allocation is mandated in Section 302(a) of the Congressional Budget Act of 1974.
The Congressional Budget Act of 1974 also includes a Section 302(b), termed the 302(b) sub-allocation. Under this section, the House and Senate Appropriations Committees must divide among its 12 subcommittees the total funding allotted to its programs; i.e., it must sub-allocate the money it has received in the 302(a) allocation. View the sub-allocations for the appropriations process of FY 2010.
Subcommittees on Appropriations Set Funding Levels for the 12 Appropriations Bills
When the subcommittees have received directions about the total amount of money that has been sub-allocated to them, they may proceed with work upon their respective appropriations bill. The subcommittees base their determinations of funding levels upon information gathered through public hearings, while also considering the previous year’s funding levels and the president’s budget request. The appropriations subcommittee members weigh in on their priorities and provide essential input to their subcommittee’s key decision makers —the chairman and ranking minority member — through “wish list” letters. The chairman and ranking minority member use these letters to determine funding levels for the agencies under their subcommittee’s jurisdiction. The subcommittee proceeds to vote upon these levels. When its members have come to an agreement, the subcommittee sends these bills to its Appropriations Committee (either for the House or the Senate). This committee begins a markup session to discuss, consider, and offer amendments (alterations) to the bill.
Appropriations Committees Send Bills to Full Chambers (the House or the Senate)
Once the Appropriations Committee has completed its work upon a bill, this legislation must be sent to its full chamber, either the Senate or the House. Traditionally, the consideration of the appropriations bills begins in the House of Representatives. Therefore, the Appropriations Committee will present the appropriations bill along with its report to the House of Representatives for floor consideration. The Budget Act of 1974 sets June 10 of each year as a target date to have completed the House Appropriations Committee’s work on its appropriations bills; however, the committee usually begins to report its bills in May or June, finishing all or most of the bills by July or by the annual recess in August (the Senate’s Committee on Appropriations works to follow the same timetable). When the appropriations bill is “on the floor,” representatives debate the bill and offer amendments after hearing opening statements from the chair and the ranking minority member of the subcommittee for which the bill applies.
After the bill is passed in the House, it is sent to the Senate, which also considers the bill and amendments it wishes to make. Once the Senate has made its changes, a conference committee must be formed to reconcile the differences between the House and the Senate versions of the bill. These negotiations usually take place between the chair and ranking minority members of the full Appropriations Committees, as well as the members of the subcommittee with jurisdiction over the bill. Upon reaching an agreement, the bill is once again sent to the chambers, both of which generally accept the conference report.
Congress Sends Reconciled Appropriations Bills to the President
Just as for any bill, the president may:
- approve the bill by signing it so that it becomes a law
- veto (or strike down) the bill
- take no action for ten days; if Congress is in session, it automatically becomes a law; if Congress has adjourned its second session, the bill has been “pocket-vetoed” and dies.
Should the president veto the bill, Congress can attempt to override the veto (which would enable the bill to become a law) with at least a two-thirds majority vote by a quorum, i.e., a minimum number of members that need to be present in order for Congress to do business.
Congress must pass and the president must sign every appropriations bill before October 1, which is the start of the federal fiscal year. Often, Congress and the president are unable to complete action on every bill before this date. Thus, a continuing resolution (CR) must take effect. A continuing resolution will continue to fund the appropriations bills from the previous year as a temporary solution, so that funding is not completely cut off to a program or agency.
[Emergency] Supplemental Appropriations Bills
At times, the government must respond to an unanticipated circumstance that arises during the middle of a fiscal year and requires funding. In this case, a supplemental appropriations bill (or an emergency supplemental appropriations bill) is employed. For example, a supplemental spending bill might be needed in order to respond to natural disasters such as Hurricane Katrina. These emergency supplemental spending bills were once a rarity but have now become much more common, especially since the U.S. military invasion of Iraq. Many criticize these spending bills, as they have grown dramatically in size and often include money for unrelated programs that do not appear urgent; because they have been used for predictable, as opposed to emergency, spending; and because they reduce transparency of the overall budget process.
Omnibus Appropriations Bills
At the end of the legislative cycle, the Appropriations Committee may decide to consolidate several appropriations bills into one, which is known as an omnibus appropriations bill. The committee will generally create this type of bill when they are struggling to pass all the appropriations bills by October 1, perhaps due to disagreements among Congressmen or to a large amount of work being done on another spending bill.
Federal Appropriations Process
The appropriations process is critical to the creation of a budget in Congress each year — it provides the money! Specifically, there are 12 annual appropriations (spending) bills that must be passed annually to keep programs and agencies of the government running; each is considered by a different appropriations subcommittee. By working to influence these bills, RESULTS can influence the funding of the programs related to our issues of focus.
The steps that RESULTS takes to influence the appropriations process are illustrated by this example of the Basic Education funding requests in the Foreign Operations Appropriations Bill for Fiscal Year (FY) 2005.
January through May: Appropriations Bills are Considered by the Appropriations Subcommittees
RESULTS’ work began immediately in January 2004, when the House and Senate Appropriations Committees began consideration of the following year’s budget (FY 2005). The president submitted his budget request in the beginning of February, which the House and Senate Budget Committees used to create a budget resolution (a blueprint for government spending levels). From January through May, the appropriations committees compiled their own requests for the funding levels of the twelve appropriations bills, using input from civil society. The appropriations committees then finalized these funding levels after receiving directions from the budget resolution. Specifically, the budget resolution determines the amount of money to be allocated to each committee (called “302(a) allocations”). Once the Committees on Appropriations receive their overall spending level, the “302(b) sub-allocations” then direct the chairmen of the Appropriations Committees to decide how much each of their twelve subcommittees should receive. These twelve subcommittees in turn must determine how to distribute their money among the programs funded within their appropriations bills.
Funding for basic education is included in the appropriations bill of the Subcommittee on State, Foreign Operations, and Related Affairs (“Foreign Ops”). First, the House Foreign Ops Subcommittee would consider funding requests for basic education. Therefore, RESULTS urged members of this subcommittee to include our funding requests in their “wish lists” letters to their chairman and ranking minority member (the key decision-makers). Wish list letters allow members to weigh-in on their key funding priorities. We asked our grassroots volunteers to meet with or write letters to their members of Congress on the subcommittee, passing along a draft wish list letter provided by RESULTS staff that included our requests.
When determining funding levels, the chairman and ranking minority member will consider input not only from their subcommittee members but also from those congressmen not on their subcommittee. Therefore, RESULTS also asked all of its grassroots volunteers to meet with or write to their members of Congress, urging their member to send a letter to the chairman or ranking minority member to bring attention to our issues (these letters are not called “wish lists,” since the congressmen are not part of the subcommittee itself). Depending on the representative that writes, these letters can be of great importance to the chairman and ranking member, and they can reinforce the requests made by subcommittee members.
Another way for members of Congress to express their support for an issue is by adding their name to a congressional sign-on letter. RESULTS generates sign-on letters to be sent to key decision-makers, for instance, of the Committee on Appropriations or one of its subcommittees.
In general, our best chance to influence legislation is at this stage, when it is being considered by a subcommittee of appropriations.
Mid-May through June: Appropriations Committees Complete Work and Send Bills to Full House and Senate
The State, Foreign Operations, and Related Affairs Subcommittee completed its work and set the funding level request for Basic Education at $400 million. The subcommittee then sent the bill to the full Committee on Appropriations. During this stage, RESULTS re-emphasized our requests to the chairman and ranking minority member of the Committee on Appropriations, who determine final appropriations levels among the different foreign affairs accounts and programs (though the Committee on Appropriations and the full House usually do not change the subcommittee’s recommended funding level). The Committee on Appropriations passed the Basic Education funding request, and the bill was sent to the full House of Representatives for consideration on the floor. Following the recommendations of the Committee on Appropriations, the House approved the subcommittee’s $400 million funding level request for Basic Education.
The bill was then considered in the Senate by its Committee on Appropriations, specifically its Subcommittee on State, Foreign Operations, and Related Affairs (“Foreign Ops”). RESULTS next worked with Senate members of this committee to request an even higher level of funding for Basic Education funding than the amount requested by the House.
After June 30, But Before October 1: Conference Committee Reconciles Both Versions of the Bill, and It Is Sent To the President for Final Approval
After consideration by the Senate Appropriations Committees and subsequently the full Senate, the Senate set its level of funding for Basic Education at $335 million. A conference committee was then formed to reconcile the differences between the House and Senate versions of the bill. At this point, RESULTS again went to members of both chambers, asking the House to continue to support the $400 million it had originally requested while also asking the Senate to support $400 million (since the House had proposed a larger level of funding than the Senate). Ultimately, the conference committee settled on the House’s request of $400 million for Basic Education funding; this was a great success, since the funding level was set at the higher House level. The conference committee sent the final version back to both the House and the Senate for one last approval before it was presented to and signed by the president.
What is the Foreign Operations Appropriations Bill?
The Foreign Operations Appropriations Bill is perhaps the most relevant appropriations bill for our global work to end hunger and poverty. This bill is considered in the Subcommittee on State, Foreign Operations, and Related Affairs and provides funding to Basic Education, HIV/AIDS, child survival programs, tuberculosis, UNICEF, microfinance programs, and other foreign assistance activities. Within the Foreign Ops Appropriations Bill, Basic Education and microenterprise are funded under the Development Assistance Account (DA), while most of our health programs are funded within the Child Survival and Health Programs Fund.* RESULTS also works to influence the appropriations bill considered by the Subcommittee on Labor, Health, and Human Services, Education, and Related Agencies (“Labor HHS”) because domestic TB programs are funded through this subcommittee’s appropriations bill; for FY 2008, President Bush requested money for the Global Fund to Fight AIDS, TB, and Malaria in this bill as well (the Global Fund is usually funded through the Foreign Ops subcommittee).
*The Development Assistance Account (DA) and Child Survival and Health Programs Fund (CSH) are two of the many accounts within a bill to which money is allotted to support specific programs. Another such example is the Economic Support Fund (ESF).
Visit our Skills Center to learn more about how RESULTS influences the legislative process.
The Center on Budget and Policy Priorities, Introduction to the Federal Budget Process.
Committee on the Budget, United States Senate, The Congressional Budget Process: An Explanation (pdf).
The U.S. Government Printing Office, Citizen’s Guide to the Federal Budget: Fiscal Year 2001 (pdf).
CRS Report for Congress, The Congressional Appropriations Process: An Introduction (pdf). | <urn:uuid:739d6ead-43e3-4d07-a226-8f59d95cc5b7> | {
"date": "2013-05-23T19:05:16",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9526269435882568,
"score": 3.234375,
"token_count": 4429,
"url": "http://www.results.org/issues/the_federal_budget_process/"
} |
Out of Egypt
Found In: Mourning & Bereavement, Torah Portion: Parashah, Passover
Shared by Tamar Stern | Poem
"G-d will surely remember you, and then you must carry up my bones out of here with you" (Exodus 13:19)
Now it is time to depart from the Egypt of daily life
into a moment of question and promise;
We bring you with us to the seder table
the way Moses hoisted up Joseph's bones
and carried them to the promised land.
We carry you now, in memories, on our journey
as we buy gefilte fish
and change the dishes
as we set the tablecloth
and we warm up the chicken soup
as we wonder if there is enough food
and not to forget the boiled eggs.
We carry you now
who carried us, when we were little, with your arms
who supported us with love,
we carry you now as you become the story we will retell
the way we carry the Torah...
the way the Torah lifts us. | <urn:uuid:640cf4d4-248a-4ab1-b68e-890037ee81d8> | {
"date": "2013-05-23T18:38:19",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8921698927879333,
"score": 2.53125,
"token_count": 230,
"url": "http://www.ritualwell.org/ritual/out-egypt"
} |
Graffiti Vandalism in Riverside
Winners were recognized at a City Council meeting on May 21, 2013. View the winning Poster Contest entries HERE. View the winning Video Contest entries HERE.
Take Back the Wall
The City of Riverside spends more than $1.3 million each year for Graffiti abatement. In addition, money is spent by other public agencies, utility companies, and private property owners to remove graffiti from their properties.
Nationwide, the American public spends nearly $12 billion each year to fight graffiti.
What is Graffiti?
Graffiti consists of inscriptions, slogans and drawings scratched, scribbled or painted on a wall or other public or private surface.
Today, graffiti is a sign of urban decay. James Q. Wilson, Shattuck Professor of Government at Harvard University and author of “Thinking About Crime,” together with George L. Kelling, a research fellow at the John F. Kennedy School of Government Harvard, first introduced the world to the Broken Window Theory.
The theory contends that if a broken window is left unfixed it can quickly encourage more crime and vandalism to the neighborhood because it sends a message of indifference to observers. Graffiti is one element of the broken window theory. Once graffiti shows up somewhere, if left untreated, generally more graffiti follows.
Graffiti has become everyone’s eyesore and everyone’s problem. It generates fear of neighborhood crime and instability. It is costly, destructive, lowers property values and sends a message that people of the community are not concerned about the appearance of their neighborhood. It is against the law, and in cases where the cost of clean-up equates to $400 or more, is punishable as a felony. Graffiti is not art; it is vandalism and criminal.
Parents may be liable for up to $25,000 for each graffiti incident pursuant to Civil Code 1714.1. | <urn:uuid:96ac251b-42b1-418b-9442-447fb859f314> | {
"date": "2013-05-23T18:32:19",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.918872058391571,
"score": 2.71875,
"token_count": 393,
"url": "http://www.riversideca.gov/graffiti/default.asp"
} |
Wind Energy Technology
photo of Judith Gap Wind Project by Pat Judge
Harnessing the wind for our power is cost-competitive today. The region has a good start in develooping wind projects, but we could be doing much more with very little effort.
Download this Wind fact sheet here. (536kB PDF file)
As the above table shows, the Pacific Northwest has the potential to generate over 137,000 aMW of electricity from wind power. This is enough to provide nearly four times the current electricity consumption in the region. The majority of the region’s potential wind resources are in Montana, which alone has enough potential wind resources to supply one quarter of the electricity needs of the United States.2
Nearly 2,300 MW of nameplate wind power capacity is currently generated at Northwest wind farms and projects currently in development could triple that figure over the next several years.3 Texas leads the United States in wind development with over 4,350 MW of currently installed capacity each. California, has nearly 2,500 MW of installed capacity and Colorado, Minnesota, and Iowa are also making rapid investments in wind power, with over 1,000 MW currently in service in each state.4
Between 2001 and 2007, the U.S. wind generating capacity expanded at a remarkable rate of 49% per year on average. By the end of 2007, the U.S. had over 16,800 MW of wind capacity online, enough to power over 1.5 million homes for the entire year!5
However, Europe currently remains far ahead of the U.S. in wind development, with 56,535 MW of wind capacity online as of the end of 2007.6
Advances in technology and increased experience have made wind power competitive with many traditional sources of electricity, especially when factoring in risk factors for traditional generation resources such as fuel volatility and future environmental regulation. The price of wind-generated electricity has decreased approximately 90% from the early 1980s; modern wind farms now generally have levelized costs in the range of 4-7 cents per kilowatt-hour over the life of a project (excluding any tax credits) making them competitive with many new coal or natural gas facilities. Costs for individual projects vary and depend on the strength and consistency of the wind, financing terms, and transmission infrastructure. All else being equal, the cost effectiveness of wind farms generally increases with the turbines’ capacity factor, the size of the turbines, and number of turbines installed.7
Tapping our domestic wind resources brings a host of economic benefits. Since the strongest wind resources are often located in rural areas, rural counties and landowners can benefit from wind power. Wind farms are capital intensive, infusing money into the local economy during construction phases and paying property taxes to the host county and royalties to local landowners during operation. At the 24 MW Klondike Phase I Wind Farm in Sherman County, Oregon, the wind project contributes 10% of the county’s property tax base. Wind turbines are also compatible with rural land uses like farming and ranching and can provide extra income to property owners via power sales or royalty payments. On average, landowners make between $2,000 and $7,000 annually for each modern wind turbine located on their land.
In contrast, a natural gas plant drains an estimated $200,000-$350,000 per MW of capacity out of the regional economy annually for fuel imports. Additionally, wind energy produces 27% more jobs per kilowatt-hour than coal plants, and 66% more jobs than natural gas plants.9
Wind energy is clearly a homegrown energy source that strengthens the economy and increases the nation’s energy security.
Turbine blades, modeled after airplane wings, rotate due to a pressure differential caused by air moving over the surface of the blade. The blades cause a rotor to turn, which drives an electrical generator. Turbines can adjust so that they always face toward the wind.
Wind turbines can be designed to operate either at variable speeds or at a single, fixed speed. The variable speed designs are more complex but they convert wind power into electricity more efficiently.
Most wind turbines are designed to use wind blowing anywhere from 8 to 56 mph. Sizes for new U.S. utility-scale turbines for onshore sites range from 850 kW to 2.5 MW and turbines rated 3.5 MW and larger are being used in offshore wind projects.
While variable, wind energy can be integrated into a utility system using existing load-matching capabilities for a minimal cost of 0-0.5 cents/kWh.10 Weather forecasting can predict wind power output with a fair degree of confidence. Additionally, multiple wind sites in different locations can be combined to create a relatively stable power supply curve.
Wind turbines generate electricity without producing any pollutant emissions. In contrast, fossil fuel plants emit toxic mercury, nitrous oxides that cause smog, sulfur dioxide that causes acid rain and large quantities of carbon dioxide, the main greenhouse gas. Although wind is one of the most benign power sources, if not properly sited, it too may have environmental impacts. Wildlife and avian impacts are often the greatest concern. New tower, blade and turbine designs and careful siting help minimize environmental impacts.
The federal production tax credit offers an important tax credit to new wind production. Each state in the region offers several additional incentives for wind development, from residential projects to utility-scale developments. Oregon, for example, provides personal and business tax credits and low-cost financing for renewable energy projects, while Washington provides small wind turbine owners a strong production incentive and grants sales tax exemptions for renewable energy equipment. Idaho offers a residential tax deduction and a sales tax exemption for renewable energy sys-tems as well as low-interest loans for small-scale wind installations and state-backed bonds for utility-scale wind projects. Finally, Montana offers corporate income and property tax incentives and a residential tax credit for renewable energy installations. Additional incentives are offered as well.
See AWEA's map of wind projects in the US:
Updated February 19, 2008
Sources and Notes:
1. Wind potential from Renewable Energy Atlas of the West, Land and Water Fund of the Rockies, et al. (July 2002).
- Installed capacity from RNP's list of Northwest renewable energy projects, ((add link to project list here)).
- Capacity factor from Fifth Northwest Electric Power and Conservation Plan, Northwest Power and Conservation Council (NWPCC) (May, 2005). See Appendix I.
- Levelized costs include transmission and integration costs and the federal Produc-tion Tax Credit.
2. 2005 Northwest consumption from NWPCC, op. cit. note 1.
- 2004 total U.S. electricity generation from Annual Energy Outlook 2006, Energy Information Administration (Feb. 2006). See Table A8.
3. Installed capacity and projects in development from RNP, op. cit. note 1.
4. “U.S. Wind Energy Projects”. American Wind Energy Association (AWEA) (Jan 16, 2008). www.awea.org/projects/ accessed 2/19/08
5. Annual growth figures from “Wind Power, U.S. Installed Capacity”, AWEA, www.awea.org/faq/instcap.html, accessed 2/19/08.
- 2007 year-end installed capacity from “Installed US Wind Power Capacity Surged 45% in 2007”, AWEA (Jan 17, 2008).
6. “Statistics”, European Wind Energy As-sociation, www.ewea.org/index.php?id=180, accessed 2/19/09.
7. Cost trends from “The Economics of Wind Energy”, AWEA (Feb 2005).
- Levelized costs include transmission and integration costs and the federal Production Tax Credit.
8. Graphic from “Renewable Energy”, New South Wales Department of Energy, Utilities and Sustainability. www.seda.nsw.gov.au/ren_wind_body.asp, accessed 9/27/06 .
9. Natural gas fuel cost assumes a 55% efficient combined cycle plant with a 90% capacity factor using natural gas at $4-$7/mmBtu.
- Jobs figures from “Wind Energy for Rural Economic Development”, US Department of Energy, EERE (2003).
10. Wind Taskforce Report, Western Governor’s Association (March 2006).
11. U.S. from “U.S. Installed Capacity”, AWEA. NW from RNP, op. cit. note 1.
"Montana … alone has enough potential wind resources to supply one quarter of the electricity needs of the United States." | <urn:uuid:6c83d7f9-9c9b-4e6b-85d3-8805c84ba9d8> | {
"date": "2013-05-23T18:45:57",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9199206233024597,
"score": 3.0625,
"token_count": 1815,
"url": "http://www.rnp.org/node/wind-energy-technology"
} |
Would it really be so difficult to determine how chapter divisions are marked in all surviving ancient books?
The question of chapter divisions and headings in ancient literary and technical texts is a long term interest of mine, as anyone who chooses to look may discover by clicking on the tag at the end of this post. We find, in later medieval texts, that these ancient texts are often divided, not merely into books, but also into chapters, with chapter headings. It does not seem well known or classified, just how often we find this. Chapter divisions and titles are a cinderella subject, largely ignored or treating in passing.
In my last post, I looked at what chapter divisions and titles there were in a renaissance manuscript of Pliny the Elder’s Natural History. The NH is an interesting work to investigate, for this subject, since the author states in the preface that book 1 of the work is a list of capituli. So we do know that these items existed in the autograph, whereas we generally have no such certainty in other works.
Capituli, or “subject headings”, are perhaps just a list of topics covered, in the order in which they appear in the text. There is no necessity to suppose that the text was formally divided into “chapters”, in the manner of a modern work –indeed some of the capituli refer to no more than a handful of lines of text, before the next capitulum appears in the margin, so we might better say “sections” — and we can see that in the Pliny ms. it is not.
So while the English word “chapter” perhaps derives from the Latin capitulum — or does it? Do we know this, and if so, how? — the term is perhaps one that is rather different. Perhaps we need a word study of the appearance of the English word, and how it was originally used, and how it came to mean what it means today. Is it used to translate capitulum in medieval English texts? There is clearly a research project here.
Likewise we ought to locate all uses of the term capituli in ancient literature — and likewise the Greek kephalaia — and from this determine its meaning or meanings, and any change that they underwent during the ancient and medieval period. This might begin with an electronic search, and it really should not take more than a couple of weeks to do.
But finally … we need to look at ancient books themselves, and see just what is in the margins, or gathered at the start of books, or whatever. Do we have chapter titles marked? Are they numbered? Are there collections of them at the start of the book, in a multi-book history? Or is it a case that the early mss just have a list of topics at the start of each book, and that these are mirrored in the body of the work, gradually, by subsequent readers and copyists? Which works have these elements?
It sounds like a large task. But is it? A commenter on my last post pointed out that, in some ways, it is a superficial task. All we have to do is look through the manuscript at a high level. And that may not be so hard to do.
For the number of actual ancient books is not that great. The Codices Latini Antiquiores of E. A. Lowe lists all the fragments of ancient Latin books. The number of codices which are more or else intact is probably not that great. I don’t know about Greek mss from antiquity, but surely there is a list somewhere?
Nor does it necessarily involve a lot of travel. The IRHT in France has a huge collection of microfilms of manuscripts. Admittedly this is not nearly as good as colour images — and whether a link is in red ink or black might well be important here — but a couple of weeks work at a microfilm reader in Orleans might well answer many of these questions, and provide a base of data from which some solid conclusions might be drawn. It sounds like a solid piece of work for a PhD thesis, for a student who is prepared to work hard.
I feel tempted myself; but of course I am not an academic, and I don’t have the time. Sadly, I fear, I don’t have the energy any more either! But the whole question of chapter divisions, titles, etc, is one that simply needs a pioneer to go into it. It’s not that hard to do; just that no-one has really attacked it.
I’ve always thought of the task of working out the history of the chapter titles for endless different literary and technical works was one that would require an army of scholars. Indeed a great manuscript scholar once wrote to me that it would require scholarly collaboration.
But why not simply examine what is in all the surviving ancient codices, up to the 8th century, and publish details of what is to be found therein?
How long would that really take? | <urn:uuid:941a2c2b-59b5-4746-b563-6a2e62ad47d3> | {
"date": "2013-05-23T18:59:43",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9710742831230164,
"score": 3.1875,
"token_count": 1039,
"url": "http://www.roger-pearse.com/weblog/2012/04/12/would-it-really-be-so-difficult-to-determine-how-chapter-divisions-are-marked-in-all-surviving-ancient-books/"
} |
Tip of the Week
This winter, millions of Americans will be hitting the roads and facing cold temperatures, along with the snowy and icy conditions winter weather brings. These factors are not only a nuisance, but at times, very dangerous, even for the most confident and experienced drivers. Simple driving maneuvers, such as starting, stopping and making turns can become very challenging if vehicles are not properly prepared for inclement weather. To prepare vehicles for the winter months ahead, here are some simple tips to help you arrive safely at your destination.
- Traction is key: The economy has forced many to postpone tire purchases, but with wet weather and unpredictable winter conditions ahead, now is not the time to have low tread on your tires. Your tires need good traction to help keep your car on the road. It's important to have the correct tire tread and in particularly cold climates, drivers should consider investing in winter tires.
- Feel the pressure: As temperatures change, so does tire pressure. Proper tire inflation is essential for increased automotive safety, optimum driving performance and even good fuel mileage. Tires should be inflated to the vehicle manufacturer recommendations printed on the vehicle door placard or in the glove box and should be checked at least monthly. Over-inflation can lead to premature or irregular tire wear and under-inflation reduces a vehicle's fuel efficiency by an average of 3.3 percent.
- Keep it clean: Consumers' cars, trucks or SUVs are likely weathering the harsh conditions and corrosive elements associated with winter, including freezing rain, snow, ice, sand and salt. Keeping vehicles clean will help protect them from the chemicals and dirt that may attack the car's finish and undercarriage. Be sure to use quality cleaners and waxes specifically designed for handling a car's finish.
- Keep it flowing: Oil is the lifeblood of the engine, helping to keep it running efficiently and effectively. Not sure what oil to use? Defer to a professional or use the grade of motor oil recommended by the vehicle manufacturer to achieve optimum engine protection and fuel efficiency.
- Be prepared: Keep a survival kit handy. A flashlight with fresh batteries, a blanket, water bottles, cellphone charger, jumper cables, flares, a "help" sign, and a first aid kit will prepare you for emergency situations or unexpected breakdowns.
According to CNN Money, here are 10 James Bond cars you might be able to afford:
2002 Aston Martin Vanquish
1980 Lotus Esprit Turbo
1996 BMW Z3
1977 Lotus Esprit S1
1971 Ford Mustang Mach 1
1961 Sunbeam Alpine Series II
1969 Mercury Cougar XR7
1974 AMC Hornet
1981 Alfa Romeo GTV6
1997 BMW 750iL
Q: I own a Toyota Venza that in my opinion has a rough and harsh ride. The tire size is P245/55R19 Bridgestone Dueler. Will changing the tire size make the ride any better?
A: There is no question that when the tire size is changed to a larger aspect ratio there is more flexibility between the tire and rim, which equals a smoother ride. There are many readers that will not suggest changing the tire profile. Let me tell you that I do this every day to save my customers from buying a replacement vehicle. You can change the tire size keeping in mind that no more than one-fourth inch in overall diameter is recommended.
- Junior Damato, Talking Cars columnist
GateHouse News Service | <urn:uuid:178f038c-1f5a-4b63-8188-e90a8f2e1d8b> | {
"date": "2013-05-23T19:02:16",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9299084544181824,
"score": 2.59375,
"token_count": 709,
"url": "http://www.rrstar.com/blogs/autobits/x2105838311/Auto-Bits-Dont-let-winter-weather-catch-you-by-surprise"
} |
The Santa Clara Valley Transportation Authority (VTA), known at that time as "County Transit," was on its way towards the goal of building a mass transit system that would serve the ever-growing urbanized area, becoming an alternative to the automobile and a driver of economic development.
It began with the federal government supporting that vision with a $2-million grant in 1982 to fund preliminary engineering of the first phase. Construction of the line officially commenced with the light-rail maintenance facility. The Guadalupe Light Rail Division, located in downtown San Jose on Younger Street, was completed in 1986 and is used to store, clean and repair light-rail vehicles. The second phase of construction and first segment of in-street track installation began in 1985. Although the initial tracks only spanned 1.5 miles, they were essential for testing the light-rail vehicles as they were delivered.
Today, Santa Clara VTA's light-rail service spans 42.2 miles and 62 stations, connecting with Santa Clara VTA buses, Caltrain, Altamont Corridor Express, Capitol Corridor Intercity Rail Service and one day, Bay Area Rapid Transit. Santa Clara VTA currently operates 99 low-floor vehicles. More than 10 million trips were taken in fiscal year 2012 and the system is on track to carry 11 million riders in fiscal year 2013.
"As light rail hits its stride, I know the best years are ahead for our system," said Santa Clara County Supervisor and VTA Board Chair Ken Yeager. "Like Silicon Valley, light rail has evolved and changed through the decades. As our economy continues to grow, and as we look for ways to reduce congestion and air pollution, light rail is needed more now than ever." | <urn:uuid:0c77bbf3-f705-4276-bc83-a7d4719e2953> | {
"date": "2013-05-23T19:05:37",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9701148271560669,
"score": 2.609375,
"token_count": 349,
"url": "http://www.rtands.com/index.php/passenger/rapid-transit-light-rail/santa-clara-vta-light-rail-celebrates-25-years-of-service.html?channel=1%20Ballast,%20Ties%20and%20Rail"
} |
RWJF Priority: Use pricing strategies—both incentives and disincentives—to promote the purchase of healthier foods
Prices can significantly affect family food choices and are emerging as an important strategy in the movement to reverse the childhood obesity epidemic. For example, when healthy foods like fruits and vegetables are more affordable, children are less likely to gain excess weight. And leading health authorities, including the Institute of Medicine, recommend new policies to reduce overconsumption of sugar-sweetened beverages, which are one of the top sources of calories in the American diet.
The resources below, from RWJF grantees and partners, explore the possible health and economic impacts of using pricing strategies to promote consumption of healthy foods and beverages and discourage consumption of unhealthy products. | <urn:uuid:3cd46b83-2936-49a0-9b1f-a7fc2baa9e50> | {
"date": "2013-05-23T19:07:09",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9314009547233582,
"score": 3.15625,
"token_count": 152,
"url": "http://www.rwjf.org/en/about-rwjf/program-areas/childhood-obesity/strategy/policy-priority-pricing-strategies.html?t=topics%3A499&t=topics%3A260&t=topics%3A1813"
} |
Standard DefinitionStandard-definition television (SDTV) is a television system that uses a resolution that is not considered to be either high-definition television (HDTV 720p and 1080p) or enhanced-definition television (EDTV 480p). The two common SDTV signal types are 576i, with 576 interlaced lines of resolution, derived from the European-developed PAL and SECAM systems; and 480i based on the American National Television System Committee NTSC system.
High DefinitionHD video has higher resolution than SD video, which results in a sharper picture. Typical HD display resolution will be 1,280×720 pixels (720p) or 1,920×1,080 pixels (1080i/1080p).
For our latest tips, offers and competitions join us on | <urn:uuid:c566f6e8-568e-48d8-92b9-45ee8cc9a01b> | {
"date": "2013-05-23T19:00:45",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9173039793968201,
"score": 3.015625,
"token_count": 161,
"url": "http://www.sainsburysentertainment.co.uk/en/Books/search.html?t=9780091900380§ion=books"
} |