text
stringlengths 171
615k
| embed_text
stringlengths 171
400
| metadata
dict |
---|---|---|
Print friendly version
Other Names for this Disease
- Hirschsprung disease mental retardation syndrome
- Mental retardation, microcephaly, and distinct facial features with or without Hirschsprung disease
See Disclaimer regarding information on this site. Some links on this page may take you to organizations outside of the National Institutes of Health.
Mowat-Wilson syndrome (MWS) is a rare genetic disorder mainly characterized by intellectual disability, distinctive facial features and seizures. Other findings vary and may include Hirschsprung disease; heart (cardiac) defects; kidney (renal) abnormalities; male genital abnormalities; and short stature. It is caused by mutations in the ZEB2 gene, which usually occur as new mutations in the affected individual. The treatment of MWS is typically directed toward the specific symptoms that are apparent in each individual.
- Mowat-Wilson Syndrome. NORD. http://www.rarediseases.org/rare-disease-information/rare-diseases/byID/1148/viewAbstract. Accessed May 14, 2011.
On this page
- Genetics Home Reference (GHR) contains information on Mowat-Wilson syndrome. Click on the link to go to GHR and review the information.
- The National Organization for Rare Disorders (NORD) is a federation of more than 130 nonprofit voluntary health organizations serving people with rare disorders. Click on the link to view information on this topic.
- Orphanet is a European reference portal for information on rare diseases and orphan drugs. Access to this database is free of charge. Click on the link to read information on this topic.
- PubMed is a searchable database of medical literature and lists journal articles that discuss Mowat-Wilson syndrome. Click on the link to view a sample search on this topic.
- The The Online Mendelian Inheritance in Man (OMIM) database contains genetics resources that discuss Mowat-Wilson syndrome. Click on the link to go to OMIM and review these resources. | Print friendly version
Other Names for this Disease
- Hirschsprung disease mental retardation syndrome
- Mental retardation, microcephaly, and distinct facial features with or without Hirschsprung disease
See Disclaimer regarding information on this site. Some links on this page may take you to organizations outside of the National Institutes of Health.
Mowat-Wilson syndrome (MWS) is a rare geneti | {
"score": 3,
"cc": false,
"url": "http://rarediseases.info.nih.gov/gard/9673/index/resources/1",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
North Korean floods raise humanitarian concerns
The Seoul-based humanitarian group, Good Friends, says the Daedong river flowing through central Pyongyang overflowed recently for the first time in 16 years, flooding several bridges and a famous landmark. The group says train and bus service to the North Korean capital has all but halted.
North Korea says the flooding has forced it to cancel next month's Arirang festival, a major annual event. The massive pageant usually features tens of thousands of North Korean performers creating tightly choreographed images praising the Stalinist regime of leader Kim Jong Il.
Leonid Petrov, a tour organizer who has been helping bring international visitors to the spectacle, says he is disappointed at the cancellation, but not surprised.
"They are badly damaged by the torrential rain. I would not be surprised if they file another appeal for humanitarian aid in the next couple of weeks or so," he said. "And of course, it would be a discrepancy if they are staging a lavish show."
North Korea says the cancellation of the festival is also a protest against planned U.S.-South Korean military exercises scheduled for late August. But the festival has been gone ahead in previous years when the military exercises were held.
U.N. World Food Program representative in Pyongyang Michael Dunford says it is still too early to say how extensively the weeks of heavy rains will affect North Korea's already desperate food situation.
A new World Food Program report estimates this month's flooding destroyed tens of thousands of hectares of farmland, and may have contaminated nearly 100,000 tons of food supplies.
The official North Korean news agency, KCNA, has reported that hundreds of people are dead or missing, and tens of thousand of houses and public buildings have been destroyed. KCNA called the economic loss "tremendous."
International Red Cross East Asia delegate Hope Weiner says the floods have taken a serious toll in the six North Korean provinces where her teams are working.
"Nearly 17,000 families remain homeless," said Weiner. "You had flash floods that either totally or partially destroyed 23,400 homes."
North Korea has suffered widespread starvation due to economic and agricultural mismanagement since the mid-1990s, with deaths estimated at more than one-million. South Korea, one of the North's main humanitarian supporters, has suspended food aid because of Pyongyang's test-firing of a series of missiles earlier this month. | North Korean floods raise humanitarian concerns
The Seoul-based humanitarian group, Good Friends, says the Daedong river flowing through central Pyongyang overflowed recently for the first time in 16 years, flooding several bridges and a famous landmark. The group says train and bus service to the North Korean capital has all but halted.
North Korea says the flooding has forced it to cancel next m | {
"score": 2,
"cc": false,
"url": "http://reliefweb.int/report/democratic-peoples-republic-korea/north-korean-floods-raise-humanitarian-concerns",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
See the original piece here.
When Republicans took control of the House of Representatives, one of their first acts was to read the Constitution aloud. I thought that was a valuable and important exercise to remind all Members of the words in our nation’s guiding document. On January 6, my friend and colleague Congresswoman Gabrielle Giffords (D-Ariz.) took the floor and said: “Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof.”
That reading of the First Amendment sits in striking contrast to the hearing House Homeland Security Committee Chairman Peter King (R-NY) conducted yesterday. The title of the hearing was the “The Extent of Radicalization in the American Muslim Community and that Community’s Response,” but what’s truly radical is using Committee time and resources to profile and demonize an entire community of people based on their faith.
As a Member of the Committee, I understand the importance of protecting the American people from a future attack. Radicalization and homegrown terrorism are serious and legitimate concerns and deserve thoughtful examination, not an ideologically motivated charade.
American Muslims are peaceful law abiding citizens and many have cooperated with U.S. authorities to help prevent terrorist attacks. More than one-fifth of the post-9/11 Islamist terrorism cases originated with tips from the Muslim community. As Los Angeles County Sheriff Lee Baca put it: “Since 9/11, 77 extremist efforts or attacks have been carried out by non-Muslim extremists in the United States. In addition, of the last 10 terror plots attempted by Muslims, seven of them have been thwarted by Muslims coming forward.”
Baca’s important point is that we should target terrorists based on actions, not religion. When state law enforcement agencies were asked to identify terror groups in their jurisdictions, Muslim extremists ranked 11th on a list of 18. Neo-Nazis, environmental extremists and anti-tax groups were all more prevalent.
In 2009, the Department of Homeland Security Office of Intelligence and Assessments concluded that white supremacist lone wolves pose the most significant domestic terrorist threat because of their low profile and autonomy. Arizona gunman Jared Loughner clearly falls into this category.
Yet the response to the shooting of Congresswoman Giffords and 18 other people has prompted even more gun purchases there, possibly by people like Loughner. In fact, a recent undercover sting by the New York City Police Department of a gun show in Arizona revealed how easy it is for people who are on the prohibited list to obtain guns and ammunition.
In my state of California, the Department of Justice estimates that the over 18,000 names on its prohibited list—which includes those who have committed felonies, domestic violence misdemeanors, and are mentally unstable— possess over 34,000 guns. Yet where is the push for stronger gun safety laws? Why do we refuse to limit the availability of weapons of mass destruction in these cases, but are all too willing and eager to target law-abiding Muslim communities as potential terrorists?
Congress should not be practicing guilt by association. It undermines the values we stand for as Americans. At a time when we need the cooperation of Muslim-Americans in uncovering potential terrorist plots, targeting their religion for an inquiry sends a dangerous message. We have to be careful that our actions do not reinforce stereotypes and fear mongering, and alienate those very communities whose help we need.
Describing our enemy in religious terms would lend credence to the lie propagated by al-Qaeda to justify terrorism—that the United States is somehow at war against Islam. The reality, of course, is that we never have and never will be at war with any peaceful religion. Our enemy is al-Qaeda and its terrorist affiliates and we must continue efforts to defeat them wherever they exist.
One key to combating extremism is winning the hearts and minds of the next generation of Muslims here and around the world. But hearings like this will only inflame anti-American sentiment. The American people deserve better.
Practicing guilt by association
See the original piece here. | See the original piece here.
When Republicans took control of the House of Representatives, one of their first acts was to read the Constitution aloud. I thought that was a valuable and important exercise to remind all Members of the words in our nation’s guiding document. On January 6, my friend and colleague Congresswoman Gabrielle Giffords (D-Ariz.) took the floor and said: “Congress shall make | {
"score": 2,
"cc": false,
"url": "http://speier.house.gov/index.php?option=com_content&view=article&id=11:practicing-guilt-by-association&catid=13:op-eds&Itemid=17",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
The Relate Advisor can suggest appropriate search terms that you might never have considered. It produces a list of words that, in the context of the database, are related to the words in your current query.
The Dictionary Advisor can verify the existence of a query word and/or its variants within a database. With this advisor, you can decide if a word might yield good results, or if it should be excluded.
The Fuzzy Match Advisor scans the database for words with spelling similar to that of a query term. It can identify correct spelling--if you're in doubt about yours--and instances where scanned material has been incorrectly interpreted during OCR (optical character recognition) processing.
[Previous Topic] [Contents] [Next Topic] | The Relate Advisor can suggest appropriate search terms that you might never have considered. It produces a list of words that, in the context of the database, are related to the words in your current query.
The Dictionary Advisor can verify the existence of a query word and/or its variants within a database. With this advisor, you can decide if a word might yield good results, or if it should be | {
"score": 2,
"cc": false,
"url": "http://uscode.house.gov/search/help/htmlsrc/advexpl.html",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
Conflicts with feral swine, also referred to as feral hogs or wild pigs, vary widely. These non-native animals cause damage to agricultural crops and livestock and threaten native wildlife and habitats.
Feral swine are not protected by Federal laws and regulations. However, a Federal Executive Order (E.O. 13112) and the National Invasive Species Management Plan identify priorities associated with control and eradication of invasive species, including feral swine. Federal and State laws govern aspects of disease control programs related to feral swine, such as those for swine brucellosis and pseudorabies. State laws and regulations identify the species’ status and the existence of hunting seasons and other authorities related to them.
Click here for the USDA’s National Invasive Species Information Center for a Species Profile of feral swine
Click here for the 54-page booklet entitled, “Managing Wild Pigs: A Technical Guide”
Click here to learn more about the feral swine conference. | Conflicts with feral swine, also referred to as feral hogs or wild pigs, vary widely. These non-native animals cause damage to agricultural crops and livestock and threaten native wildlife and habitats.
Feral swine are not protected by Federal laws and regulations. However, a Federal Executive Order (E.O. 13112) and the National Invasive Species Management Plan identify priorities associated with | {
"score": 4,
"cc": false,
"url": "http://www.aphis.usda.gov/wildlife_damage/feral_swine/overview.shtml",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
Below is the List Serve Post you selected to display.
maritime -- Ocean-Going Vessel Fuel Rule--U.S Coast Guard Fuel Switching Alert Posted: 14 Jul 2011 09:49:10
The United States Coast Guard District Eleven has issued an alert (Marine Safety Alert 11-01) to increase awareness and reiterate general guidance on fuel systems and fuel switching safety. In cooperation with the USCG, ARB is also posting the alert on our website at the following: http://www.arb.ca.gov/ports/marinevess/ogv/d11_marine_safety_alert_2011.pdf All marine notices, advisories and alerts for the Ocean-Going Vessel Fuel Rule can be found at the following: http://www.arb.ca.gov/ports/marinevess/ogv/ogvadvisories.htm Other information for marine vessel programs is available at the following: http://www.arb.ca.gov/marine The Ocean-Going Vessel Clean Fuel Regulation provides significant air quality benefits by requiring vessels to use cleaner, low sulfur distillates when visiting California ports. If you have any questions, please contact Bonnie Soriano at (916) 327-6888, or by email at firstname.lastname@example.org; or Paul Milkey at (916) 327-2957, or by email at email@example.com. Thanks, Bonnie | Below is the List Serve Post you selected to display.
maritime -- Ocean-Going Vessel Fuel Rule--U.S Coast Guard Fuel Switching Alert Posted: 14 Jul 2011 09:49:10
The United States Coast Guard District Eleven has issued an alert (Marine Safety Alert 11-01) to increase awareness and reiterate general guidance on fuel systems and fuel switching safety. In cooperation with the USCG, ARB is also postin | {
"score": 2,
"cc": false,
"url": "http://www.arb.ca.gov/lispub/rss/displaypost.php?pno=5170",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
VALIDATION OF THE EFFECT OF INTERVENTIONS AND PROCESSES ON PERSISTENCE OF PATHOGENS ON FOODS
Location: Food Safety and Intervention Technologies
Title: Validation of food grade salts of organic acids as ingredients to control Listeria monocytogenes on pork scrapple during extended refrigerated storage
Research conducted cooperatively with:
| Porto-Fett, Anna - |
| Campano, Steve - |
| Call, Jeffrey |
| Yoder, Lisa - |
| Gartner, Kelly - |
| Tufft, Linda - |
| Oser, Alan - |
| Lee, Jeehyun - |
| Hatfield Quality Meats, Inc.|
Submitted to: Journal of Food Protection
Publication Type: Peer Reviewed Journal
Publication Acceptance Date: December 1, 2010
Publication Date: March 17, 2011
Citation: Porto-Fett, A., Campano, S., Call, J.E., Shoyer, B.A., Yoder, L., Gartner, K., Tufft, L., Oser, A., Lee, J., Luchansky, J.B. 2011. Validation of food grade salts of organic acids as ingredients to control Listeria monocytogenes on pork scrapple during extended refrigerated storage. Journal of Food Protection. 74:394-402.
Interpretive Summary: Scrapple is a ready-to-eat (RTE) loaf of meat/mush that is quite popular in the northeast quadrant of the United States, where it is especially enjoyed as a breakfast item. Although there have been no reported illnesses associated with pork scrapple and only a relatively small recall (ca. 350 pounds) due to contamination of scrapple with Listeria monocytogenes, we reported that scrapple provides a very favorable environment for growth of this pathogen. Although the pathogen is eliminated during cooking/processing, if present, it can be re-introduced onto the surface of scrapple if the finished product is exposed to the food processing environment prior to packaging and/or if after being opened the finished product is mishandled or left uncovered at retail or within a consumers refrigerator. Thus, the objective of this study was to evaluate the addition of food grade antimicrobials as ingredients to control L. monocytogenes over the expected 50 d refrigerated shelf life of pork scrapple. Antimicrobials tested included blends containing various concentrations of citrate, diaceate, propionate, levulinate, and lactate. Some of the antimicrobials tested in prefatory studies were excluded from further evaluation because of problems associated with solubility, issues with product texture/sensory attributes, and/or concerns about cost or availability. However, inclusion of a lactate-diacetate-propionate blend (1.94% and adjusted to pH 5.0) as an ingredient in pork scrapple suppressed pathogen outgrowth and appreciably extended shelf life without causing untoward effects on quality. Future studies will be directed to tailor this blend for applications in other foods to lower the chances of consumers acquiring food borne listeriosis.
Pork scrapple was formulated, with or without citrate-diacetate (0.64%), by a commercial processor to contain various solutions/blends of the following antimicrobials to control L. monocytogenes on pork scrapple during refrigerated storage: i) lactate-diacetate (3.0 or 4.0%), ii) lactate-diacetate-propionate (2.0 or 2.5%), and iii) levulinate (2.0 or 2.5%). Regardless of whether or not citrate-diacetate was included in the formulation, without the subsequent addition of the targeted antimicrobials, pathogen levels increased ca. 6.4 log CFU/g within 50 d of storage. In the absence of citrate-diacetate, but with the inclusion of the targeted antimicrobials in the formulation, pathogen numbers increased by ca. 1.3 to 5.2 log CFU/g, whereas with citrate-diacetate in combination with these antimicrobials pathogen numbers increased by ca. 0.7 to 2.3 log CFU/g. In phase II, in the absence of citrate-diacetate, when the pH of the lactate-diacetate-propionate blend was adjusted to pH 5.0 or 5.5, pathogen numbers increased by ca. < 0.5 log CFU/g, whereas with inclusion of citrate-diacetate in combination with the blend adjusted to pH 5.0 or 5.5, pathogen numbers decreased by > 0.3 log CFU/g. In phase III, inclusion of lower concentrations of this blend (1.5%, 1.94%, or 2.5%) with its pH adjusted to pH 5.5, pathogen numbers increased by ca. 0.6 and 4.7, and 0.56 log CFU/g, respectively, whereas when pH of the blend was adjusted to pH 5.0, pathogen numbers increased by < 0.62 log CFU/g. Inclusion of a lactate-diacetate-propionate blend ingredient in the scrapple formulation provides a less favorable environment for outgrowth of L. monocytogenes over the 50 d shelf life in an event of post processing contamination. | VALIDATION OF THE EFFECT OF INTERVENTIONS AND PROCESSES ON PERSISTENCE OF PATHOGENS ON FOODS
Location: Food Safety and Intervention Technologies
Title: Validation of food grade salts of organic acids as ingredients to control Listeria monocytogenes on pork scrapple during extended refrigerated storage
Research conducted cooperatively with:
| Porto-Fett, Anna - |
| Campano, Steve - |
| Call, Jeffre | {
"score": 2,
"cc": false,
"url": "http://www.ars.usda.gov/research/publications/publications.htm?seq_no_115=260606",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
Length of Hike: .55 miles (one-way) to the Fraser River
Type of Hike: Constructed hiking-only trail
Day Use Fee: None
Area Attraction: This area provides one of the few public access points along the Fraser River, which is predominately bordered by private land. This hiking trail allows access to approximately .75 miles of the Fraser River which is a popular fishing area in Grand County. Rainbow trout, German brown trout, and brook trout can all be found in the river.
For more information on Colorado Fishing Licenses: http://wildlife.state.co.us/fishing/
Trail Head Location:
6.5 miles west of Winter Park and approximately 1 mile east of Tabernash on Hwy 40, turn east onto County Road 84 towards Devil's Thumb Ranch. At the fork in the road stay left (do not go towards Devil's Thumb Ranch) and continue approximately .8 miles until you see BLM Road 2751 on the left. Turn left here and continue .8 miles until there is another fork in the road, stay left on 2751 (do not go to Hurd Peak). You will see the Fraser River Trail head parking about .6 miles after this fork.
The Fraser River Access Trail decends approximately 220 feet from the trail head parking area to the river. Along the way you will be in mostly coniferous forest, with a small stretch of sagebrush steppe and grassland near the Fraser River. The forest is mostly lodgepole pine, many of which are dead or dying. Riparian vegetation species such as grasses, rushes, sedges and willows can be found along the Fraser River. Some wildlife that might be seen in the area are mule deer, Rocky Mountain elk, pine marten, pine squirrels and several species of songbirds and woodpeckers. Moose have also been sighted in the area. | Length of Hike: .55 miles (one-way) to the Fraser River
Type of Hike: Constructed hiking-only trail
Day Use Fee: None
Area Attraction: This area provides one of the few public access points along the Fraser River, which is predominately bordered by private land. This hiking trail allows access to approximately .75 miles of the Fraser River which is a popular fishing area in Grand County. Rainbow t | {
"score": 2,
"cc": false,
"url": "http://www.blm.gov/co/st/en/fo/kfo/recreation_opportunities/Fraser_River_Trail.html",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
The Albuquerque Museum has a wealth of educational opportunities.
The Albuquerque Museum provides a variety of programs, such as:
- Tours and lectures
- Performances and demonstrations
- School programs
- Art classes, workshops, and special projects
The Museum collaborates with a wide range of organizations and individuals who contribute to The Museum's program offerings.
Education & Programming Events
Join us for these educational events from the Albuquerque Museum.
|Second Sunday at Casa San Ysidro||Jul 14, 2013 01:00 PM|
|3rd Thursday||Jul 18, 2013 05:00 PM|
|Play: "Kicking a Dead Horse"||Jul 21, 2013 02:00 PM|
|Concert Series: California Quartets||Jul 25, 2013 06:00 PM|
|Concert Series: The Farthest Place, Music from Alaska and New Mexico||Aug 01, 2013 06:00 PM| | The Albuquerque Museum has a wealth of educational opportunities.
The Albuquerque Museum provides a variety of programs, such as:
- Tours and lectures
- Performances and demonstrations
- School programs
- Art classes, workshops, and special projects
The Museum collaborates with a wide range of organizations and individuals who contribute to The Museum's program offerings.
Education & Programming E | {
"score": 2,
"cc": false,
"url": "http://www.cabq.gov/culturalservices/albuquerque-museum/education-programming/education-programming/atct_topic_view?b_start:int=5&-C=",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
Acute Coronary Syndrome and Care-Seeking Delay: A Web Based Behavioral Study
The primary aim of this study is to increase our understanding of care-seeking behavior surrounding heart attacks or acute coronary syndromes [ACS]. This study uses an internet based survey to ask individuals how they obtained medical care in the midst of a heart attack. At present, care-seeking delay among individuals stricken with a heart attack prevents them from obtaining the full therapeutic benefit of hospital based medical care in a timely manner to reduce the long term health consequences of a heart attack. By using a self-tailoring survey instrument the study attempts to take into consideration the complex social processes by which the individual and their family make decisions to seek medical care for symptoms of a heart attack. The study is designed to obtain a national sample of ACS care-seeking behavior in the United States.
Acute Myocardial Infarction
Acute Coronary Syndrome
|Study Design:||Observational Model: Case-Only
Time Perspective: Retrospective
|Official Title:||Acute Coronary Syndrome and Care-Seeking Delay: A Web Based Behavioral Study|
- Decision points and situations and circumstances critical to producing patterns of care-seeking that are efficient and expeditious or are protracted and delayed. [ Time Frame: Study participants will be asked to complete a survey of their heart attack care-seeking experiences. The survey will take from 30 minutes to 1 hour to complete depending on their care-seeking activities. ] [ Designated as safety issue: No ]By applying an integrated self-regulatory care-seeking model [ISCM] to ACS care-seeking, we can delineate decision points and circumstances that are critical to producing patterns of care-seeking that are expeditious or delayed. The ISCM model assumes that coping behaviors emerge over time and are initially guided by demographic and structural factors. As the self-regulatory processes emerge, the influence of these factors diminishes and emergent ACS evaluations, advice from others and health care providers, emerging symptoms and emotions, come to determine the duration of ACS care-seeking.
|Study Start Date:||July 2011|
|Estimated Study Completion Date:||April 2012|
|Estimated Primary Completion Date:||April 2012 (Final data collection date for primary outcome measure)|
The primary aim of this study is to increase our understanding of care-seeking behavior surrounding acute coronary syndromes [ACS] through the application and testing of an integrated self-regulatory care-seeking model [ISCM] and the utilization of a world wide web [WWW] based ISCM survey instrument. At present, care-seeking delay among individuals stricken with ACS [acute myocardial infarction [AMI], unstable angina or sudden cardiac death] prevents many patients from obtaining the full therapeutic benefit of hospital based thrombolytic and/or mechanical reperfusion therapy to reduce the morbid and mortal consequences of acute cardiovascular disease [CVD]. Results from prior studies of ACS care-seeking delay generally rely on measures of time duration from acute symptom onset [ASO] to hospital emergency department [ED] arrival and measures of social demographic and clinical variables, extracted from emergency medical system [EMS] logs and/or ED charts. By relying on such limited data sources, these studies have failed to take into consideration the complexity of the social and behavioral processes by which individuals make decisions to seek medical care for symptoms of ACS.
By applying and testing an integrated self-regulatory care-seeking model [ISCM] to ACS care-seeking, it will be possible to delineate decision points and situations and circumstances that are critical to producing patterns of care-seeking that are efficient and expeditious or are protracted and delayed. The care-seeking process in the ISCM is viewed in terms of five analytic care-seeking phases from warning or premonitory symptoms to ED arrival. By noting the presence or absence of three central phases, it is possible to distinguish patterns of care-seeking and to record the duration of each care-seeking phase and total duration of each care-seeking path to the ED. The ISCM assumes that coping behaviors emerge over time and initially care-seeking behaviors are guided by demographic and structural factors. As the self-regulatory and coping processes emerge over the course of the ACS episode, the influence of these factors diminishes and emergent ACS evaluations, advice from others and health care providers, emerging symptoms and emotions, come to dominate the care-seeking process and directly determine the duration of ACS care-seeking. The study will test and explore the following hypotheses:
- Commonly used demographic variables, such as, age, sex, education and race will prove to be only one component, along with social situational and circumstantial, cognitive and emotional variables, that significantly influence the course and duration of ACS care-seeking.
- The ISCM will show that decision process variables associated with the care-seeking phases, the Self, Lay and Health Care Provider Phases, as shown in the Figure, are important predictors of time from symptoms onset to ED arrival and in the prediction of the length of time spent in each care-seeking phase.
- The ISCM will show differences in the total duration of the 5 most frequently occurring care-seeking paths to the ED and will explain most of the differences by the variables in Hypotheses 1 and 2.
- Conditional models of subjects who use key care-seeking phases, namely the Self, Lay and Health Care Provider Phases, will identify unique predictors of time in each phase.
- Significant interaction effects [model coefficient differences] will be found for important risk variables and socially important gender, age and racial groups. For example, African-Americans will show differences in model coefficients from Non-African-Americans.
The proposed study utilizes a twice tested pilot ISCM survey instrument placed on two secure dedicated web servers to collect patient care-seeking data. The target sample size for this study is 2,314 patients who have experienced an ACS episode. Subjects will be recruited using: 1] extensive marketing of the study URL on websites of interest to cardiac patients and oriented toward cardiac health and ACS risks, such as, diabetes or hypertension; 2] placement of study information on discussion boards and chat rooms with a cardiac health focus; 3] emailing of a study flyer PDF for posting in public libraries, senior citizen centers, African-American churches, county and municipal health clinics, and HMO web sites; 4] application of a viral marketing strategy; and 5] use of selected print media, for example, AARP publications. Marketing of the study site URL will emphasize the recruitment of women, the elderly and minorities. In the data collection phase of the study, the proportions of myocardial infarction and angina pectoris subjects falling into each cell of the cross classification of age, sex and race will be derived from NHANES 1999-2000 and 2001-2002 studies. These estimates of the population proportions in these cells will be used to determine quotas for each of the cells in an attempt to ensure all risk groups are adequately represented. We will over sample African-Americans. Statistical models will be used to estimate the effects of variables that characterize the decision process on the time delay until ED arrival. Time required to move from one phase of the decision process to the next will also be modeled, as will the different paths chosen by the subjects. Models will also include patient characteristics and other circumstantial and situational variables in the decision process.
|United States, Connecticut|
|Yale University School of Nursing||Recruiting|
|New Haven, Connecticut, United States, 06536|
|Contact: Angelo A Alonzo, PhD firstname.lastname@example.org|
|Principal Investigator: Angelo A Alonzo, PhD|
|Principal Investigator:||Angelo A Alonzo, PhD||Yale University School of Nursing| | Acute Coronary Syndrome and Care-Seeking Delay: A Web Based Behavioral Study
The primary aim of this study is to increase our understanding of care-seeking behavior surrounding heart attacks or acute coronary syndromes [ACS]. This study uses an internet based survey to ask individuals how they obtained medical care in the midst of a heart attack. At present, care-seeking delay among individuals st | {
"score": 2,
"cc": false,
"url": "http://www.clinicaltrials.gov/ct2/show/study/NCT01407146?show_desc=Y",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
Disabled people - home adaptations & aids
If you are experiencing difficulties in your home because of mobility issues or a medical condition it may be possible to have your home adapted or some aids fitted to help you. You will need to be assessed by the Occupational Therapy Service as we only act on their recommendation. The budget we have to spend on adaptations or aids is limited, however, this should not prevent your needs being assessed.
Following an assessment and recommendation by the Occupational Therapy Service we will consider if its practical, feasible and reasonable to make the required adaptations to your current home.
If you are a Corby Borough Council tenant further information can be found in the Disabled adaptions leaflet in the downloads section of this page.
You can make a referral using the online form or by telephoning the Occupational Therapy Service on 01604 368899 - Monday to Friday 9:00am - 4:30pm, alternatively, you may call into the One Stop Shop in The Corby Cube, George Street, Corby NN17 1QG.
Note new OT telephone number | Disabled people - home adaptations & aids
If you are experiencing difficulties in your home because of mobility issues or a medical condition it may be possible to have your home adapted or some aids fitted to help you. You will need to be assessed by the Occupational Therapy Service as we only act on their recommendation. The budget we have to spend on adaptations or aids is limited, however, thi | {
"score": 2,
"cc": false,
"url": "http://www.corby.gov.uk/node/27135",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
Iraqi Police, Army Cooperate to Protect Pilgrims
By Jim Garamone
American Forces Press Service
WASHINGTON, March 12, 2007 Iraqi army and police forces worked together to provide security for the more than 6 million pilgrims traveling to Karbala to observe the Shiite ritual of Arbaeen, officials in Baghdad said today.
Anti-Iraqi forces targeted the pilgrims, and they were successful in a number of cases, most notably with a car bomb that killed more than 100 pilgrims on March 6. Iraqi Brig. Gen. Kassim Atta al-Moussawi said during a news conference in Baghdad today that, all told, insurgents killed more than 150 pilgrims.
Arbaeen marks the end of 40 days of mourning for the Imam Hussein, the Prophet Muhammad’s grandson, who was killed in 680. The imam and 72 followers died at the hands of fellow Muslims who sought to prevent the imam from becoming caliph, or Muslim leader. The caliphate became the foundation of Sunni Muslim rule, and the killing of Hussein was the start of the Sunni-Shiite split. Karbala is the home of the imam’s tomb and has been a site of pilgrimage since his death.
Shiite Muslims from Iraq, Iran, the Gulf States and other areas travel to Karbala and engage in ritual flagellation in remembrance of the imam. During the Saddam Hussein regime, Shiite Muslims could not mark the celebration. Iraqi and coalition officials say this year has seen the largest Arbaeen celebration in decades. The rituals ended March 10.
Kassim, speaking through an interpreter, said the volume of threats in Iraq and the volume of pilgrims made Arbaeen a potentially dangerous situation. “The enemy targets the innocent people -- children, students,” he said. “This is clear evidence of the terror of these groups.”
Despite Iraqi security forces’ limited capabilities, the Iraqi forces did well against the security threats, Kassim said, noting the forces discovered a number of caches of arms and munitions. They also foiled a number of attacks. They cooperated well with each other and the coalition, and they built trust with the Shiite majority of Iraq, the general said.
The operation to protect Karbala involved the office of the minister of national security, the governor of Karbala governate, the Ministry of Defense and the Ministry of the Interior. “There was daily cooperation between forces in Karbala and Baghdad,” Kassim said. “The great efforts … exerted achieved good results in this plan.” | Iraqi Police, Army Cooperate to Protect Pilgrims
By Jim Garamone
American Forces Press Service
WASHINGTON, March 12, 2007 Iraqi army and police forces worked together to provide security for the more than 6 million pilgrims traveling to Karbala to observe the Shiite ritual of Arbaeen, officials in Baghdad said today.
Anti-Iraqi forces targeted the pilgrims, and they were successful in a number of | {
"score": 2,
"cc": false,
"url": "http://www.defense.gov/News/NewsArticle.aspx?ID=3348",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
Maryland Natural Resources Police Recovered the Body of Missing Eleven Year Old
Kennedyville, MD - On July 26, 2009, at approximately 8:30 a.m., the Maryland Natural Resources Police recovered the body of the missing eleven year old girl from the Sassafras River. The recovery was made by NRP Officers who had continued their surface search of the area for the boating accident victim. The days search began at first light in the area of Ordinary Point, Sassafras River near Kennedyville, Maryland. The body was recovered within ½ mile of where the original accident occurred. The body will be taken to the Office of the State Medical examiner for autopsy.
|July 26, 2009||
Contact: Sgt. Art Windemuth
The Maryland Natural Resources Police is the enforcement arm of the Department of Natural Resources (DNR). With an authorized strength of 249 officers and a dedicated staff of civilian and volunteer personnel, the NRP provide a variety of services in addition to conservation and boating law enforcement duties throughout the State of Maryland. These services include homeland security, search and rescue, emergency medical services, education, information and communications services on a round the clock basis. NRP is the only police force aside from the Maryland State Police that has statewide jurisdiction.
The Maryland Department of Natural Resources (DNR), which is celebrating its 40th anniversary this year, is the state agency responsible for providing natural and living resource-related services to citizens and visitors. DNR manages more than 461,000 acres of public lands and 17,000 miles of waterways, along with Maryland's forests, fisheries, and wildlife for maximum environmental, economic and quality of life benefits. A national leader in land conservation, DNR-managed parks and natural, historic, and cultural resources attract 12 million visitors annually. DNR is the lead agency in Maryland's effort to restore the Chesapeake Bay, the state's number one environmental priority. Learn more at www.dnr.maryland.gov | Maryland Natural Resources Police Recovered the Body of Missing Eleven Year Old
Kennedyville, MD - On July 26, 2009, at approximately 8:30 a.m., the Maryland Natural Resources Police recovered the body of the missing eleven year old girl from the Sassafras River. The recovery was made by NRP Officers who had continued their surface search of the area for the boating accident victim. The days searc | {
"score": 2,
"cc": false,
"url": "http://www.dnr.maryland.gov/dnrnews/pressrelease2009/072609.asp",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
The Government is carrying out a review of the balance of competences between the EU and the UK. This is an audit of what the EU does and how it affects the UK. You can read more about it on the Foreign and Commonwealth Office (FCO) website.
We will lead on the report on education in the fourth semester, summer-autumn 2014. When we are ready to issue our call for evidence we will publish it on this page and it will also be announced on the FCO website. | The Government is carrying out a review of the balance of competences between the EU and the UK. This is an audit of what the EU does and how it affects the UK. You can read more about it on the Foreign and Commonwealth Office (FCO) website.
We will lead on the report on education in the fourth semester, summer-autumn 2014. When we are ready to issue our call for evidence we will publish it on thi | {
"score": 2,
"cc": false,
"url": "http://www.education.gov.uk/aboutdfe/departmentalinformation/reports/a00216020/eu-impact-uk",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
Page 3 of 8
Note: Separate, additional Departmental advice is available on searching and confiscations in this section of the website: Screening, searching and confiscation; advice for headteachers, staff and governing bodies.
Following a search, whether or not anything is found, the school is advised to make a record of the person searched, the reason for the search, the time and the place, who was present and note the outcomes and any follow-up action. There is no legal requirement to do this.
Schools’ general power to discipline, as set out in Section 91 of the Education and Inspections Act 2006, enables a member of staff to confiscate, retain or dispose of a pupil’s property as a disciplinary penalty, where reasonable to do so.
Where the person finds other substances which are not believed to be controlled drugs these can be confiscated where a teacher believes them to be harmful or detrimental to good order and discipline. This would include new psychoactive substances or ‘legal highs’. If school staff are unable to identify the legal status of a drug, it should be treated as a controlled drug.
Schools are not required to inform parents before a search takes place or to seek their consent to search their child. There is no legal requirement to make or keep a record of a search.
Schools would normally inform the individual pupil’s parents or guardians where alcohol, illegal drugs or potentially harmful substances are found, though there is no legal requirement to do so.
Complaints about searching should be dealt with through the normal school complaints procedure.
Page 3 of 8
Advice on schools’ powers to screen and search pupils. | Page 3 of 8
Note: Separate, additional Departmental advice is available on searching and confiscations in this section of the website: Screening, searching and confiscation; advice for headteachers, staff and governing bodies.
Following a search, whether or not anything is found, the school is advised to make a record of the person searched, the reason for the search, the time and the place, who w | {
"score": 2,
"cc": false,
"url": "http://www.education.gov.uk/schools/pupilsupport/pastoralcare/f00202357/drugadviceforschools/search-and-confiscation",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
- Special Waste Home
- Cement Kiln Dust
- Crude Oil and Gas
- Fossil Fuel Combustion
- Mineral Processing
Coal Combustion Residuals - Proposed Rule
- Notice of Data Availability
- Public Hearings
- Proposed Rule
- Frequent Questions
- Key Differences Between Subtitle C and Subtitle D Options
- Webinar Information
Coal Combustion Residuals, often referred to as coal ash, are currently considered exempt wastes under an amendment to RCRA, the Resource Conservation and Recovery Act. They are residues from the combustion of coal in power plants and captured by pollution control technologies, like scrubbers. Potential environmental concerns from coal ash pertain to pollution from impoundment and landfills leaching into ground water and structural failures of impoundments, like that which occurred at the Tennessee Valley Authoritys plant in Kingston, Tennessee. The need for national management criteria was emphasized by the December 2008 spill of CCRs from a surface impoundment near Kingston, TN. The tragic spill flooded more than 300 acres of land with CCRs and flowed into the Emory and Clinch rivers.
EPA is proposing to regulate for the first time coal ash to address the risks from the disposal of the wastes generated by electric utilities and independent power producers. EPA is considering two possible options for the management of coal ash for public comment. Both options fall under the Resource Conservation and Recovery Act (RCRA). Under the first proposal, EPA would list these residuals as special wastes subject to regulation under subtitle C of RCRA, when destined for disposal in landfills or surface impoundments. Under the second proposal, EPA would regulate coal ash under subtitle D of RCRA, the section for non-hazardous wastes. The Agency considers each proposal to have its advantages and disadvantages, and includes benefits which should be considered in the public comment period.
Coal Combustion Residuals Proposed Rule June 21, 2010
The support materials for this proposed rule and the public comments EPA received on the proposal are available for public review online at Regulations.gov.
To use Regulations.gov: In the Keyword or ID Search box, type in the docket number EPAHQRCRA20090640 and press Enter on your keyboard, or Search on the web page to receive search results.
Notice of Data Availability (NODA) October 12, 2011.
This NODA announced and invited comment on additional information obtained by EPA in conjunction with the June 21, 2010 proposed rule. This additional information is generally categorized as follows:
- Chemical constituent data from coal combustion residuals;
- Facility and waste management unit data;
- Information on additional alleged damage cases;
- Adequacy of State programs; and
- Beneficial Use.
The comment period closed on November 14, 2011. These materials and the comments received can be found in the docket.
Notice of Data Availability on Coal Combustion Residual Surface Impoundments October 21, 2010
Notice of Data Availability on Coal Combustion Residual Surface Impoundments on the proposed rulemaking on the Disposal of Coal Combustion Residuals from Electric Utilities (75 FR 35128).
This information has been posted on EPA's website for several months as part of our overall efforts to assess the structural integrity of surface impoundments and other units containing wet-handled CCRs. This information consists of responses to information requests that EPA sent to electric utilities on their coal combustion residual (CCR) surface impoundments as well as reports and materials related to the site assessments that EPA conducted on a subset of these CCR impoundments. The information is available in the docket via PDF files with permanent links to the underlying documents, helping to consolidate and make it easier for the public to search and access the information.
Coal Combustion Residuals Technical Corrections Notice August 20, 2010
The notice has five main actions:
- Extension of the public comment period from September 20 to November 19, 2010. This 60 day extension is in response to numerous requests to extend the comment period.
- Technical corrections to the proposed rule. The proposed rule as published in the Federal Register on June 21, 2010 had several inadvertent administrative errors, which could cause confusion if not corrected.
- Notice that additional support documents have been placed in the rulemaking docket for public inspection. This includes documents referenced in the proposed rule, but previously found on EPAs Coal Combustion Residuals Partnership website. The docket provides the date on which documents have been added, making the new materials easy to identify.
- Two additional Public Hearings. Given the significant public interest in the proposal and to further public participation opportunities, on August 6, 2010, EPA announced on its website that it would hold hearings in Pittsburgh, PA on September 21, 2010, and in Louisville, KY, on September 28, 2010 in addition to 5 public hearings already scheduled. Details on all the public hearings can be found on EPAs website.
- One additional webinar: On August 6, EPA announced on its website that it would conduct another webinar. Currently, the Agency has held education webinars on August 5 and August 12. Additional webinar date, scope, and format.
Announcement of Public Hearings July 15, 2010
Notice: In response to numerous requests, EPA announced that it scheduled two additional public hearings and one additional webinar on the Coal Combustion Residuals Proposed Rule. The public hearings were held in Pittsburgh, PA on September 21, 2010 and in Louisville, KY on September 28, 2010. | - Special Waste Home
- Cement Kiln Dust
- Crude Oil and Gas
- Fossil Fuel Combustion
- Mineral Processing
Coal Combustion Residuals - Proposed Rule
- Notice of Data Availability
- Public Hearings
- Proposed Rule
- Frequent Questions
- Key Differences Between Subtitle C and Subtitle D Options
- Webinar Information
Coal Combustion Residuals, often referred to as coal ash, are currently considered ex | {
"score": 3,
"cc": false,
"url": "http://www.epa.gov/epawaste/nonhaz/industrial/special/fossil/ccr-rule/index.htm",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
Capacity-Building Programs Under CAFTA-DR
The United States signed the Dominican Republic-Central America-United States Free Trade Agreement (CAFTA-DR) in August 2004 with five Central American countries (Costa Rica, El Salvador, Guatemala, Honduras, and Nicaragua) and the Dominican Republic. As a global partner in trade and the environment, Central America and the Dominican Republic represent a priority region for U.S. environmental cooperation. Recognizing the importance of protecting the environment while promoting sustainable development, the Governments negotiated an associated Environmental Cooperation Agreement (ECA), which is the basis for our environmental cooperation. EPA implements this ECA through an action plan developed in partnership with the U.S. Agency for International Development (USAID), the U.S. Department of State, and the CAFTA-DR countries.
Presently, EPA is providing technical assistance under CAFTA-DR in the areas of Environmental Impact Assessment (EIA), Wastewater Regulations, and Urban Air Quality Management.
Past EPA’s efforts in the CAFTA-DR countries have included technical capacity assistance in the following areas:
- Harmonization of Environmental Regulations
- Policies and Procedures (Wastewater)
- Environmental Law Enforcement
- Environmental Management Systems
- Environmental Impact Assessment (EIA)
- Hazardous Substances and Sound Management of Chemicals
- Strategic Approach to International Chemical Management (SAICM)
- Pollutant Release and Transfer Registry (PRTR)
- Urban Air Quality Management
- Land Use/Land Cover Mapping
- Green Customs
Explore our CAFTA-DR work in the following sections:
- Agreements and Relevant Documents
- Key Partners
- Learn More About the Western Hemisphere and the Caribbean
- April 2012: EPA, in collaboration with the Ministry of Environment and Natural Resources (MARN), El Salvador ; the Central America Commission on Development and Environment (CCAD) , USAID and Battelle Institute (Grantee) presented a two day workshop on Air Quality Communication to share experiences, techniques and tools on providing technical data to the general public ina way that is systematic and easy to understand. MARN is expected to launch the first air quality index in the nation and in the region within the next 6-8 months. This activity was part of the urban air quality management program under the CAFTA-DR agreement.
- October 2011: A sub-regional air quality forecasting workshop was held in San Jose, Costa Rica, targeted to Costa Rica and El Salvador as regional leaders, with the goal of developing potential technical resources on air quality monitoring in the region.
- October 2011: Technical review guidelines on Environmental Impact Assessement in the mining, energy and tourism sectors were completed. These guidelines will help ensure that proposed projects successfully identify, prevent and/or mitigate potential adverse impacts, and enhance potential beneficial impacts throughout the life of a project.
Environmental Impact Assessment (EIA):
To strengthen environmental impact assessment preparation and EIA reviews for effective decision-making, EPA partners with the CAFTA-DR countries' Ministries of Environment and their EIA Directors in:
- individual country consultations activities;
- training on Principles of Environmental Assessment Review; and
- strengthening and/or harmonizing review criteria for priority sectors.
To develop a comprehensive urban air quality management program, EPA works with the CAFTA-DR countries Ministries of Environment and the Central America Commission for Development and Environment (CCAD) to provide technical assistance in:
- air quality monitoring;
- air quality management training;
- air quality forecasting; technical exchange;
- public access to air quality information and
- other tools to raise air quality awareness and facilitate public participation.
Wastewater Model Regulation:
EPA provides technical assistance to the CAFTA-DR countries in the development of a regional model wastewater regulation, as part of the Harmonization of Environmental Regulations, Policies and Procedures program.
All countries have begun implementation of at least two of 11 basic elements to implement a wastewater management program, and have been provided with tools to establish wastewater discharge parameters for key industrial sectors in the region.
In addition, EPA has trained wastewater labs in the region on ISO 17025 Water Quality Standards, leading to the selection of a regional and four national Reference Labs. EPA is also completing a manual on appropriate wastewater treatment for the region.
- CAFTA-DR Free Trade Agreement
- FTA Chapter 17: Environment; Environmental Cooperation Agreement (PDF)
Additional Resources and Information:
- US Trade Representative: About the CAFTA-DR -- Full Text
- State Department: CAFTA-DR Environment Chapter
- USAID: Environment and Global Climate Change
- CCAD: CAFTA-DR (In Spanish)
Back to:Latin America and the Caribbean
For additional information on EPA's work with Latin America and the Caribbean, contact:
U.S. Environmental Protection Agency
Office of International and Tribal Affairs (2670R)
1200 Pennsylvania Ave., NW
Washington, DC 20460 | Capacity-Building Programs Under CAFTA-DR
The United States signed the Dominican Republic-Central America-United States Free Trade Agreement (CAFTA-DR) in August 2004 with five Central American countries (Costa Rica, El Salvador, Guatemala, Honduras, and Nicaragua) and the Dominican Republic. As a global partner in trade and the environment, Central America and the Dominican Republic represent a p | {
"score": 3,
"cc": false,
"url": "http://www.epa.gov/international/regions/lac/caftadr.html",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
AusGeo News March 2011 Issue No. 101
Delivering data and improved scientific understanding
Geoscience Australia's Onshore Energy Security Program (OESP) is a five-year program announced in August 2006 which is designed to reduce risk in exploration and support development of Australia's onshore energy resources.
A full description of OESP projects can be found on the Geoscience Australia website and new data releases and updates are announced through Geoscience Australia's monthly newsletter Minerals Alert.
Geoscience Australia's Onshore Energy Security Program (OESP) has acquired airborne electromagnetic (AEM) data in areas considered to have potential for uranium or thorium mineralisation. These surveys, which are managed and interpreted by scientists at Geoscience Australia, are designed to reveal new geological information at a regional scale rather than deposit-scale.
The Pine Creek AEM survey area (figure 1) is comprised of three survey areas: Woolner Granite, Rum Jungle and Kombolgie. The TEMPESTTM AEM system was used for the Woolner Granite and Rum Jungle surveys whilst the Versatile Time Domain Electromagnetics (VTEMTM) system was used for the Kombolgie survey.
The main geological target in the Kombolgie survey area, which contains the Nabarlek uranium deposit, was the Paleoproterozoic Katherine River Group metasediment unconformity. The survey covered sections of the Alligator River, Cobourg Peninsula, Junction Bay, Katherine, Milingimbi and Mount Evelyn 1:250 000 map sheets (Costelloe et al 2009). In the Kombolgie survey, flown during 2008, 8800 line kilometres of VTEMTM data were acquired, covering an area of 32 000 square kilometres.
In 2009 the processed response data and conductivity estimates to 600 metres depth were produced by the survey contractor Geotech Airborne using commercial version (3.30) of EM FlowTM (Macnae et al 1998; Stolz and Macnae 1998), The Phase-1 Kombolgie conductivity estimates were made available through the Geoscience Australia Sales Centre.
Further research was carried out in order to extract additional value from the electromagnetic data. In this process, Richard Lane of Geoscience Australia and Professor James Macnae of the Royal Melbourne Institute of Technology, discovered that in parts of the survey area geologically plausible conductivity estimates could be generated to depths exceeding 1500 metres (figure 2).
Consequently, reprocessing of the Kombolgie AEM data by Geoscience Australia, using a more recent version (5.23-13) of EM FlowTM, has produced an enhanced set of conductivity estimates. These reveal new geological information including subsurface geological features that are associated with unconformity-related as well as sandstone-hosted Westmoreland-type and Vein-type uranium mineralisation. The datasets are also suitable for interpretation focussed on other commodities including metals and potable water as well as for landscape evolution studies. The improved understanding of the regional geology to depths greater than 1500 metres in selected areas will be of considerable benefit to mining and mineral exploration companies.
Full results and interpretation from the Pine Creek Airborne Electromagnetic Project, including the Kombolgie VTEMTM Survey, will be presented at an industry workshop immediately after the Northern Territory Geological Survey's Annual Geoscience Exploration Seminar to be held in Alice Springs on 24 March 2010. A one-day workshop for industry and other stakeholders will be held in Perth on 7 June.
The new conductivity sections are now available through the Geoscience Australia website free of charge.
Regional scale, deep crustal seismic surveys have been a major component of the Onshore Energy Security Program (OESP). To date, thirteen seismic surveys have been conducted as part of the Program and the datasets and products from these surveys are being released progressively as processing and interpretation is completed. These data are accessible via the Geoscience Australia website.
A major survey was proposed to image the Kidson Sub-basin, an under-explored depocentre of the Canning Basin in Western Australia, as the final seismic acquisition under the OESP (see AusGeo News 97). However this survey had to be deferred because it was not certain that land access negotiations could be completed for the data acquisition to commence before the end of the OESP.
Instead seismic data will now be acquired over the South Carnarvon Basin and the Officer Basin in Western Australia. The South Carnarvon survey aims to image the Byro Sub-basin, an under-explored depocentre with both hydrocarbon and geothermal energy potential. The sub-basin is in the onshore section of the Carnarvon Basin, Australia's premier petroleum producing province (figure 3). The acquisition phase of this survey is scheduled to commence in April 2011 and the resulting datasets will link with data acquired by Geoscience Australia during the offshore Southwest Frontiers Project in late 2008 and early 2009.
The Yilgarn-Officer-Musgrave survey aims to image the western Officer Basin, another of Australia's under-explored sedimentary basins with hydrocarbon potential (figure 5). The survey data will also build on the geoscientific knowledge of the architecture of Australia's crust and the region's relationship with the western Yilgarn and central Musgrave cratons.
Acquisition of seismic data in this area is planned to commence in May 2011.
For more information email firstname.lastname@example.org
Onshore Energy Security Program maintains momentum (AusGeo News 97) | AusGeo News March 2011 Issue No. 101
Delivering data and improved scientific understanding
Geoscience Australia's Onshore Energy Security Program (OESP) is a five-year program announced in August 2006 which is designed to reduce risk in exploration and support development of Australia's onshore energy resources.
A full description of OESP projects can be found on the Geoscience Australia website a | {
"score": 2,
"cc": false,
"url": "http://www.ga.gov.au/ausgeonews/ausgeonews201103/onshore.jsp",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
Note: This message is displayed if (1) your browser is not standards-compliant or (2) you have you disabled CSS. Read our Policies for more information.
Most references to Indiana's canal era emphasize the failures. The canal era and canals, however, need to be studied as "a once vital dimension in the growth of the Old Northwest." Canals contributed "agricultural expansion and the export of agricultural surpluses, the import of eastern merchandise, and economic diversification towards manufacturing and commerce" (Shaw, 107, 105).
the two . . . canals which were completed and in operation for some twenty to forty years - the Whitewater and the Wabash and Erie canals - had a positive impact upon their regions, served to stimulate agricultural and urban growth, and helped develop the towns, the millsites, the population, and the trade which the railroads of a later time dominated so completely. Gray, 129.
The 468-mile-long Wabash and Erie Canal was the longest canal in the country. It connected Lake Erie at Toledo with the Ohio River at Evansville in 1853. It was begun in 1832 at Fort Wayne, and crossed through Peru (1837), Lafayette (1843), and Terre Haute (1849). It cost approximately $8,200,000.
After 1841, Indiana could not pay the interest on its canal and internal improvements bonds - many of which had been purchased by people in foreign countries. Work on the Wabash and Erie Canal continued because of more grants from the federal government of land to sell. Bondholders, under the leadership of attorney Charles Butler, supported continued operation and completion of the canal under trustees to recoup some of their money. There were periods when the canal was profitable. Floods, vandalism, and railroads (which were built along the canal routes) finally caused closure of the canal in 1874.
The Whitewater Canal in the Whitewater Valley of southeastern Indiana eventually extended from Cincinnati, Ohio to Hagerstown, Indiana. The canal was proposed in 1825. Progress was first made with the incorporation of the Whitewater Canal Company in 1826. Much of the canal was completed through the efforts of private citizens who organized into construction companies. Explore the timeline in this issue for events of its progress.
After the Whitewater Canal ceased operations in 1865,
. . . it continued to serve a number of mills and, on the section between Milton and Connersville, to develop hydro-electric power for almost a century thereafter. . . . the canal had a long history and a long term of spasmodic usefulness. . . . Among the earliest in Indiana, they [canal supporters of the Whitewater Valley] were also foremost in determination, in tenacity, and in blind courage. Fatout, 156.
The map below demonstrates that canals were an important step in the process of connecting the areas of the United States. As Shaw notes, "the cost of transportation fell dramatically from more than ten cents per ton mile to as little as a cent; a canal network of 3,326 miles was built by 1840 at a cost of more than $125 million, and the way was opened for the railroad to follow" (100).
Indiana's late entry into the canal era, in hindsight, doomed its efforts. New York, Pennsylvania, and Ohio had built over 1,000 total miles of successful canals by 1830. In 1830, only Pennsylvania (seventy miles) and Massachusetts (three miles) had built railroads. By 1840 in all states, the complete mileage of canals was nearly equal to the complete miles of railroads. By 1850, the complete railroad miles were roughly two and one-half times the canals. By 1860, the complete railroad miles were roughly eight times the canals. The canal era had given way to railroads (Taylor, 79-80).
Canals were expensive. Most were possible only with governmental support from states. Many were possible only because the U.S. Congress granted public land that could be sold to support construction. The concept of such public support for internal improvements has continued to the present day, for example, with the interstate highway system.
Rochester, later Cedar Grove, Franklin County, is typical of towns that prospered or were founded because of canal construction. Carefully read the advertisement. What other transportation advantage did the town offer? What were some of the canal-related businesses?
Brookville Indiana American, August 2, 1844. | Note: This message is displayed if (1) your browser is not standards-compliant or (2) you have you disabled CSS. Read our Policies for more information.
Most references to Indiana's canal era emphasize the failures. The canal era and canals, however, need to be studied as "a once vital dimension in the growth of the Old Northwest." Canals contributed "agricultural expansion and the export of agric | {
"score": 4,
"cc": false,
"url": "http://www.in.gov/history/2517.htm",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
Note: This message is displayed if (1) your browser is not standards-compliant or (2) you have you disabled CSS. Read our Policies for more information.
A Newsletter for Parents and Teachers
Lissa Shanahan, Regional Librarian
Carole Rose, Editor
Summer Reading Program
“Be Creative @ Your Library” is the theme for the 2009 statewide children’s summer reading program, sponsored by the Indiana Talking Book and Braille Library. From June 1-July 30, children ages 5-13 who are registered with the Talking Book program are invited to have fun reading books and earning some great prizes.
All participants will receive reading certificates, food coupons from Wendy’s, stickers, and bookmarks. Young readers can also win kazoos, tambourines, echo microphones, silly putty, book bags, and more. The outstanding reader in each grade as well as the top braille and large print readers will receive t-shirts and canvas totes. There will be two grand prize drawings—one for grades K-3 and one for grades 4-7. Children who select and read one or more titles from our theme-related reading list will earn an extra entry in the drawing. Prizes will be awarded when all books borrowed during the summer have been returned.
Cover letters and summer reading applications will be sent in late April. If you do not receive this information by the end of April or early May, please let us know. You can help make sure that your child is enrolled in the program and receives his/her first shipment of books on or before June 1 by completing and returning the application to the library by the week of May 11. If you aren’t able to get the application back to us until later in the month, your child will still be able to take part. Teachers with students who are eligible, but have yet to sign up for the Talking Book program, and would be interested in reading during the summer, may contact the library for an application or download one from our web site. Visit www.library.in.gov , click on the Talking Book and Braille Library page and print out the application form.
For further information about the summer reading program, contact Carole Rose, coordinator of children’s services at (317) 232-0609,(800) 622-4970, or email@example.com
The theme for this year’s summer program suggests ideas for projects that will not only encourage children to be creative, but will also celebrate and recognize their accomplishments. The Talking Book and Braille Library would like to showcase the talents of our young readers by inviting them to create.
Several years ago, we asked students to submit short stories, poetry, personal narrative, or other items of interest. We gathered the entries together and produced a book in braille, large print, and on cassette. The project was very rewarding for everyone involved.
Once again we are inviting young readers to submit a story, poem, personal experience piece, or other article of interest, for inclusion in another compilation. Rules for submission include:
Contributors may submit more than one entry.
Entries may be submitted in print, braille, in an audio format, or as an email attachment.
Emails should be sent to Carole Rose at firstname.lastname@example.org
Writing done in the classroom should be submitted by the end of the academic year. Children may submit entries during the summer.
Young writers will receive a copy of this collection in an audio format. The production of braille and large print copies may be limited due to budget constraints. An alternative may be to offer the book online for downloading by people with computer access.
We also want to recognize the talents of those students who are not writers. Many are involved in music or a variety of arts and crafts. We are interested in submissions in these areas—videos, painting, drawing, tactile art, craft projects, etc. Projects done in the classroom should be submitted by the end of the academic year. Projects may be completed at home and submitted during the summer. We are also interested in receiving writing or arts and crafts items that were completed during the early part of the 2008-2009 academic year.
All items received will be displayed in exhibit cases here at the library during the summer and during our 2009 Indiana Vision Expo which will be held on Saturday, September 26. For recognition purposes, please be sure that the student’s name and grade level are included with each item submitted.
Please help us showcase our talented young patrons by encouraging them to participate in this very special activity. For further information, contact Carole Rose.
2009 Indiana Vision Expo
Parents, teachers, and students who have attended any of our three previous Indiana Vision Expos may be interested to know that the 2009 Indiana Vision Expo will be held at the Indiana State Library on Saturday, September 26, from 9:30 AM until 3:00 PM. If you’ve never attended one of these events, please mark your calendar and plan to join us.
This year, a very special guest will be with us to help celebrate the 7575th anniversary of the Talking Book program in Indiana. Mitzi Friedlander, a long-time NLS Talking Book narrator will be giving two presentations. For the past forty years, Ms. Friedlander has narrated books in the studios of the American Printing House for the Blind. She has read more than 1500 titles for adults and children. Children who have read Charlotte's Web, a Henry and Mudge book or books by Beverly Cleary have enjoyed her superb narration. A question and answer period will follow each presentation, and Ms. Friedlander will spend time meeting patrons.
The Indiana Vision Expo has its own web site: indianavisionexpo.org. The site will feature a complete list of exhibitors as well as links to those exhibitors who have web sites. The site will also be updated as soon as new Expo info becomes available. Information will also appear in the summer edition of Indiana Insights and in flyers which will be distributed a few weeks prior to the event. You may also contact Carole Rose, Indiana Vision Expo Coordinator at (317) 232-0609, (800) 622-4970, or email@example.com
The new digital talking book players and flash memory cartridges will be available for distribution to patrons within the next few months. The new player will be about half the size of the current cassette machine. The flash memory cartridge is about the same size as a cassette but somewhat thinner, and an entire book will be contained on a single cartridge.
We are compiling a list of persons who have let us know they want a digital player as soon as possible. So far, only four of the patrons on our list are children. We believe that this new system will be very popular with young readers. They should be pleased to learn that books from the NLS web site can be downloaded onto an SD card or thumb drive and played on the DTB player. Books may either be stored on the memory device or deleted to make room for more downloads. Having your child’s name on a list does not guarantee that he/she will receive a machine within the first month, but it does ensure that patrons in good standing whose names are on the list will receive a player as soon as possible. Please let us know soon if your child wants his/her name added to the list. | Note: This message is displayed if (1) your browser is not standards-compliant or (2) you have you disabled CSS. Read our Policies for more information.
A Newsletter for Parents and Teachers
Lissa Shanahan, Regional Librarian
Carole Rose, Editor
Summer Reading Program
“Be Creative @ Your Library” is the theme for the 2009 statewide children’s summer reading program, sponsored by the Indiana Talkin | {
"score": 2,
"cc": false,
"url": "http://www.in.gov/library/2394.htm",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
Oakland Marriott City Center
ATTORNEY GENERAL RENO:
Thank you, Tom Quinlan. My thanks to the Oakland Chamber of Commerce, to the Commonwealth Club, and to everyone in the East Bay area who has made this day possible.
We are the greatest industrial nation in the world. But our real strength does not lie in our factories or our technology. Our ultimate strength is in our people.
What impacts the lives of our people most? It may be your child's teacher that gives you new hope that he really is going to learn to read, maybe your boss and your fellow workers and how your boss treats you and the care that she or he gives to the working environment in which you spend most of your day. It may be the policeman, who by tone of voice and manner and firmness conveys trust but a willingness to enforce the law. It may be a job or lack of a job. It may be the doctor, the rabbi, the priest. It may be a stranger who feels alienated or a stranger that comes together with you. It may be your neighbor or your grocer. But it is one word, "community," a word that means so much to so many people.
YOUNG PEOPLE: Janet Reno, we're the young people of Oakland, and we're here today to support Mumia Abu-Jamal, an African-American political prisoner on death row in Pennsylvania. And we're here in a peaceful manner. And we're here representing the people of Oakland, people of color on the outside right now. And Oakland supports Mumia.
GENERAL RENO: Here's what I would suggest, ladies.
YOUNG PEOPLE: (Unintelligible.)
GENERAL RENO: Wait, wait, wait, wait, wait, everybody. Let me hear. Let me hear them. It's very important that we hear young people. Let me hear them.
YOUNG PEOPLE: (Unintelligible.)
GENERAL RENO: May I suggest this. Let me finish talking, and then let me spend some time with you, get all the details, and follow up. Do you have enough time? I won't take more than about 25 minutes.
YOUNG PEOPLE: Thank you. We want to hear what you have to say. But we also want everyone else who's concerned about community safety to hear what we have to say. So I just want to make a brief statement.
GENERAL RENO: Okay. That will be fine. Go right ahead.
YOUNG PEOPLE: Thank you. We're here today to talk about real community safety, and no community is safe as long as police corruption goes unchecked. We want to ask -- we want to ask Janet Reno to launch an investigation into the Philadelphia Police Department's handling of the case of Mumia Abu-Jamal. We believe that there was corruption, and we want a -- want that investigated. We want -- we want you to take a stand for real community safety along with the investigation.
We have a pledge here, a pledge for real community safety that we want Janet Reno to sign. And it's a pledge that to have real community safety is launching an investigation into the Philadelphia Police Department, which has already been done and came up with a lot of corruptions of what happened there. And we need another one. And so, we want you, Janet Reno, to sign this pledge for real community safety for our community, low-income communities, communities of color, for Mumia Abu-Jamal. For Mumia.
GENERAL RENO: Thank you very much. I'll be happy to talk with you right after I finish.
YOUNG PEOPLE: Will you sign the pledge?
GENERAL RENO: I don't know. I haven't read it.
The business community, it is people speaking out. It is people with strong feelings. It is people coming together to resolve the issues that divide us. Six-and-a-half years ago, I left Miami, a rambunctious young city that had its problems and a city that I loved. I worried, when I came to Washington, that I would lose my sense of community. But I have found that not to be the case. I have just gained communities.
This is about my third visit to Oakland and, to the East Bay area, my fifth. And each time I come, I gain a strength. Mr. Quinlan asked me if these things got old hat. They don't get old hat when you go to Highland Hospital, listen to young residents, trauma surgeons and people who care, coming together to figure out what they do to make sure that there are no more young people in those hospital beds who are the victims of violence.
It's not old hat when you go to Minneapolis five years ago and see what the situation was and come back last spring and see what it is now. It's not old hat to go to Boston and hear how they have reduced the number of youth homicides over a two- or three-year period by the community coming together. It gives me faith and hope and a conviction that America, as it comes together, can solve its problems with respect to crime, with respect toward the economy, with respect to diversity, and with respect to the quality of living.
What makes a community? What makes a community strong? What makes it safe? What makes it prosperous? What brings it together? I think the first has already been alluded to. A community that is strong is a community that has come together, where everyone feels that they have a role in addressing the problems that plague the community. A police officer can't do it alone. Chief Word would tell you that his police department can't, by itself, deal with the problem of crime in Oakland. But a police department that has strong business community support can be a much stronger force.
The educators here will tell you that they can't educate by themselves. They need the police working with them in sensitive, thoughtful ways. But they also need the business community in terms of developing school-to-work programs, in terms of developing programs that give young people mentoring and tutoring opportunities that can open the doors to a future that is constructive and positive.
To doctors, teachers, parks and recreation specialists, community activists, all of us must come together if we're to make a difference. But I will tell you that the glue, the strength I see in communities comes for certain when the business community is involved in ever so many ways.
The second factor, the second ingredient of a strong community is that people must come first -- all the people, not just some of the people.
We talk in terms of programs. But today, I look down on two -- I didn't look down on them figuratively. I was standing up and they were in bed. But I talked with two young men who had been the victims of violence. These were human beings who had been the subject of violence that did not have to occur. It's not a program that will help them. It was those residents, those physicians who had saved their lives. It was social workers, educators, street people, and others who were doing so much to make a difference in the -- their lives and the lives of others, putting people first, putting all people first, children, the disadvantaged, minorities, making everyone realize that this country is a land of equal opportunity, and if we leave some people back, we are weaker and the lesser for it all.
Communities must invest in people and invest wisely. They must begin early and build foundations. The child development experts have consistently told me that the first three years of life are the most important. That's when the child learns the concept of reward and punishment and develops a conscience. 50 percent of all learned human response is learned in the first year of life.
If a child grows up not to know what punishment means, if a child does not have a conscience, what good are all the prisons going to be 15 years from now unless we make an investment in children now?
What good --
What good are all the great universities going to be in terms of preparing our whole population to live and work in the 21st century if we don't provide that child a foundation in the first years of life that is so critically important? Look at how we will waste our money if we pay for remedial programs in community colleges because we fail to invest up front in sound instead of childcare. We can make so much of a difference.
Something is wrong with the nation that pays its football players in the six-digit figures and pays its school teachers what we pay them --
The business community can be a tremendous ally, a tremendous ally of law enforcement and of education. But it's not just there. The 45-year-old who's out of a job because he -- his skill has become obsolete, we've got to develop consistent retraining programs that he knows or she knows will be available to them, much as K through 12 is available, so that people can know that there is a long and evolving opportunity in life.
But as we give people opportunity, we must hold them accountable. We too often seek to hold people accountable who don't have the tools or the wherewithal at age 12 or 13 or 14 to be accountable. Let's give them the tools. Let's let them know that there's no excuse for putting a gun up beside somebody's head and threatening them, that there are going to be fair, firm consequences that fit the crime. But let us make sure that we balance opportunity and the tools to live a strong and positive life with accountability.
What is the Federal role in this? I never liked the Feds coming to town in Miami and telling us what to do or telling us we want this and giving nothing in return. And so I resolved when I came to Washington to do everything I could to form a partnership with communities across America. And in that effort, we have funded and encouraged new community strategies, community policing, crime prevention programs, community courts. I've encouraged Federal prosecutors and investigators to work closely with their local counterparts and to reach out through -- across disciplines, to work with educators, the faith community, and other local leaders. The administration in Congress have taken steps to reduce violent crime, passing the Brady Act and the Assault Weapons Ban, and we've mounted an unprecedented effort to get illegal guns off the streets. We've expanded the nation's drug court program and supported states in the fight again domestic violence.
But throughout the last six years, I've seen over and over and over again that where the difference is made is in community and in the people who make up that community and in the businesses that support progressive efforts within the community. Communities across America have learned that when you commit ingenuity, management skills, expertise, you can make a difference.
Communities across America have learned that when you come together, when you use your best knowledge to invest in people, there is a resolve. And what is the resolve? Violent crime has dropped seven years in a row to its lowest level in three decades.
Murders have fallen by more than 20 percent in larger cities and suburban communities. The juvenile crime rate is down for the fourth year in a row.
Now, as a former state prosecutor, I know it can go back up like that. And it goes back up too often because people become complacent and they say we solved the crime problem; now, let's think about something else. Or they think it's easier to go play golf on a Sunday morning than it is to work with kids. We cannot become complacent. So there is still too much violence in this land.
We are still one of the most violent nations in the world. But, ladies and gentlemen, this does not have to be. Let me give you anexample. In the five years from 1992 through 1996, the City of Chicago recorded 3,063 gun homicides, 3,063. In the same period, Toronto, across the border, recorded 100 gun homicides -- two cities of similar size. Violence as we know it in America does not have to be.
We have a golden opportunity right now. By virtually any measure, Americans are experiencing unprecedented economic prosperity. Now is the time to act. We can renew our efforts, strengthen our partnerships, use common sense in analyzing crime problems and designing strategies to solve them, and watch crime continue to go down.
Today, I come before you with what is, in part, a challenge and with what is, in part, an earnest plea to harness the power, the ingenuity, and the resources of the business community in the East Bay area to further our advantage in the fight against crime and to end for once and for all the culture of violence in this country, to use the prosperity of today to build a better future for tomorrow and to raise a new generation of Americans prepared to live and work safely and peacefully and constructively in the 21st century.
Let us look at how we provide a comprehensive system that gives our children the foundation of living upon which we can build opportunity, upon which we can build skills, and upon which we can rest safely. In the midst of our nation's prosperity, we have an opportunity to make sure that the economic expansion extends to the most economically disadvantaged and vulnerable of our citizens and that no one is left behind.
Now, some of you business people may say, "That's not my problem." If we make all our citizens productive, if we build a work force with the skills necessary to fill the jobs to maintain your company as a first-rate company and this nation as a first-rate nation, everybody is going to be the better for it.
The unskilled and unemployed are responsible for a significant portion of the crime in this country. But crime and prosperity go together. Over 40 percent of the nation's prison population never completed high school. About 36 percent of our jail population was unemployed prior to their most recent arrest. And nearly half of this group had a monthly income of less than $600. Given the right opportunities, however, the economically disadvantaged could become part of the work force that fills the jobs and maintains this country's prosperity. It is an investment that is not penny-wise or pound-foolish.
What can the business community do? First of all, the biggest complaint I hear from principals is, I can't get parents to school for parent-teacher conferences or to find out how their children are doing or to have their -- see their children in school plays. Give them time from work to go see their children in action at school, and it will return --
Just think of what would happen in the East Bay area if every business joined with schools and pediatricians across the East Bay area to make sure that every child that was eligible was enrolled in the children's health insurance program which benefits disadvantaged children. It's an investment, again, in our future. The child who does not receive proper preventative medical care up front is going to be a burden on you and me and our communities as taxpayers down the road because we failed to invest in preventative medical care that could have saved dollars down the road. Here is a way with a program that now exists that we can make a difference. Think of what would happen if we could, through employers, through schools, through pediatricians, make sure that every child is registered. Let us make sure that children have mentors and tutors who can make a difference.
I've been to Boston to a program at Roxbury where there are tutors and mentors who have been trained and who know how to talk to kids. They come from the corporate sector, and they have made such a difference. For I asked the young people, what could have been done to have prevented you from getting into trouble in the first place. And they say, somebody to talk to, somebody who understands how hard it is to grow up today, how unsafe and alone you too often feel, and somebody who knows when to give me a pat on the back and when to give me a figurative kick in the backside.
Children are more alone and unsupervised, according to the Carnegie Foundation, than in any time in our history. The corporate community providing that mentor, that role model, that person to look up to can make such a difference.
You can, for example, deal with a crisis that I heard described by both teachers -- and it may not be so in this instance; but in another city, I asked the young people what we should do about violence. They said, We think we've got that licked, but what we want are computers. We don't have any computers in our school. And then, he said, but what we need is somebody to teach the teachers how to teach us to use the computers. And one of the teachers said "Amen." Think of what you could do in designing with an elementary school the best computer training program imaginable. The teachers and everybody would appreciate it.
I have just come, as I've indicated, from a program of the East Oakland Partnership to Reduce Juvenile Gun Violence. It's a partnership which involves a collaboration of 26 public and nonprofit agencies and involves Highland Hospital. I asked the partners who were there today, when I told them that I was coming here, What could I tell the community about what needs to be done? What can the business community do to help you? They said, almost right out of the box, Get involved with the schools.
And today, you'll hear about Bayer's collaboration with the City of Berkeley in the school-to-work program, which takes students in high school and their first year of junior college and teaches them skills industry is looking for. You'll hear how the police department has worked with Federal Express and the community surrounding the airport to ensure that community policing officers keep in touch with local businesses' safety concerns. You'll hear from the Oakland A's, a baseball team that helps refurbish Little League fields so inner city kids have alternatives to hanging out on the streets and getting into trouble.
And I just want to tell you a personal experience. I went to a Miami community where kids could not play on the field because it was so torn up; they had so much glass and bottles and junk. They didn't have uniforms. We suddenly had the Reno's Rangers. And those kids were so excited and so involved. And so I salute you for that effort. It makes again such a difference.
The A's also have a Read to Succeed program, encouraging young people who might ordinarily not pick up a book to read four books and get a free ticket to an A's game. Way to go.
And you heard from your U.S. Attorney, our great Bob Mueller, about the valuable work he's doing with the Oakland Chamber of Commerce and the City Manager on Project Exile. You'll see the message on billboards and buses in the coming weeks: In Oakland, illegal guns get you five years in prison. But you will hear more because I asked -- as I asked this morning about what the Oakland Chamber of Commerce was doing, they suddenly started talking about a whole new additional inventory of things that they're talking about. And it was exciting and wonderful. And I just congratulate you for the enthusiasm that you're conveying to at least the community around you.
We are seeing many different kinds of partnerships form for the purpose of creating safer, more sustainable communities. Public-private partnerships contribute so much and leave so little room for criminals to get hold. In Brooklyn, New York, a pharmaceutical company worked with a local law enforcement effort, educators, and community organizations to renovate a 150-year-old building for a K-8 -- through 8 public school. They installed a video monitoring system for the local subway stations, shut down open-air drug markets, built a park and a playground, and encouraged other businesses to move into the area. And crime has dropped dramatically in the two precincts surrounding the area.
But there are two problems that businesses must deal with because they sometimes find them in their own home ground. The first is domestic violence, which is, with increasing frequency, spilling over to the workplace. We must do more in terms of employee assistance programs, in terms of partnership with the medical community and the criminal justice community to end violence in the home. For unless we focus on domestic violence in every arena in which we see it, we will never end violence on our streets, in our schools, or in this nation. It is an effort that we must renew a focus upon if we are to make a difference.
And the second is workplace violence itself. Let us work together with the mental health community and with others to establish means of identifying early warning signals and developing means within the workplace to resolve conflict without knives and guns and fists and violence.
And finally, there is a phenomenon developing in this country that we must come to grips with if we are ever going to effectively end the culture of violence in this country. For the next five years, each year, 400- to 500,000 people will return from jails and prisons across this country to communities like Oakland, Richmond, Albany, Berkeley, San Francisco. This is because of the success of police and prosecutors in sending people to jail for the crimes they have committed.
We can let them come back without an education. We can let them come back to the apartment over the open-air drug market where they got into trouble in the first place. We can let them come back without a safety support system. And guess what? They're going to be doing it all over again, and we're going to see the crime rate go up again.
Or, with the business community taking the lead, we can develop reentry programs where business, law enforcement, and others work together to make sure that, while in prison, that person utilizes their time through constructive educational programs that will prepare them for the workplace and make them a constructive contributor. It will involve focus on alternative housing sites, on support mechanisms. I have proposed a concept of a reentry court that will properly control public safety considerations. But unless we come to grips with this issue, we will never begin to face the problems on a long range basis.
What can business do? You can do so much. You can bring a business-like analysis to the problems and help police and others try to figure out where the crime is, what the impact is, and how we can address it. You can take on challenges. How do you take that housing stock that's 50 or 100 years old and delapidated and decaying and a problem? Use the contractors in the community to be innovative and bold about how you clear it away, how you refurbish it, how you build it up, but how you make the environment of Oakland, of Richmond, of the communities we care about in this nation an environment in which you would want your children to live.
For the last six-and-a-half years, I have had the chance to visit with people across this nation. I came to Washington with the devout belief that public service was one of the greatest callings that anybody could undertake. I came with an abiding faith and regard for this nation and a deep love for my country. I've now had an opportunity to see emerging democracy, ministers of justice coming from small countries just coming out from dictatorships, other countries having taken the leap a long time ago, but falling backwards, and now returning to the folds of democracy. And you appreciate democracy as never before. You appreciate this nation as never before.
And these six-and-a-half years have given me an absolute conviction that, when America comes together, when it works together in communities, it can solve its problems and truly make a difference and that the communities of America, whether it be Oakland or Miami, can have a strong future, a safe future, a prosperous future when people come together with business as the glue that makes it happen.
(Applause and, at 1:09 p.m., end of remarks.) | Oakland Marriott City Center
ATTORNEY GENERAL RENO:
Thank you, Tom Quinlan. My thanks to the Oakland Chamber of Commerce, to the Commonwealth Club, and to everyone in the East Bay area who has made this day possible.
We are the greatest industrial nation in the world. But our real strength does not lie in our factories or our technology. Our ultimate strength is in our people.
What impacts the liv | {
"score": 2,
"cc": false,
"url": "http://www.justice.gov/archive/ag/speeches/1999/12399.htm",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
Review of the Terrorist Screening Center
(Redacted for Public Release)
Audit Report 05-27
Office of the Inspector General
The TSC has successfully created a consolidated database of unclassified watch list information from supporting agency systems. However, the accuracy and completeness of the information contained in the database is as critical as the consolidation effort itself. There is little room for error because a single name omitted from the TSDB could result in a suspected terrorist successfully applying for a visa, being admitted to the United States, or failing to be identified when stopped for a traffic violation.
One of the TSCís primary goals under HSPD 6 was to maintain thorough, accurate, and current information. Although the TSC does not create terrorist-related information, it is responsible for ensuring that all necessary terrorist-related information maintained by NCTC and the FBI is transferred to the TSC and accurately maintained in its consolidated database.
Our review of the accuracy and completeness of the terrorist watch list was divided into two separate tracks. First, we analyzed the consolidated database as a whole, including a review of the number of records in the database, any duplication that existed within those records, the fields of information available for screeners to view on the TSDB 1A and 1B screens, and the population of those fields within the databases. We also reviewed the descriptive categories and handling instructions that are applied to each record within the database. Second, we tested individual records within the database for accuracy and completeness. This included reviewing a sample of FBI and NCTC records from the respective agency databases (i.e., VGTOF and TIPOFF) and tracing them forward to the TSDB 1A and 1B to determine if complete and accurate information was carried forward into the TSDBs. Additionally, we reviewed a sample of the forms FBI agents use to nominate individuals for inclusion in the consolidated database, and traced those forms to the TSDB to determine if the individuals were, in fact, included in the database and that the information was accurate. We also checked known terrorist names against the TSDB 1A and 1B to determine whether those individuals were in the database.54
We first reviewed the TSDB 1A and 1B to gain an overall understanding of its contents. This included reviewing the number of records that each database maintained and the structure for each record. In addition, we analyzed the types of categories and handling instructions assigned to individual terrorist records. Our review found several problems, including inconsistent record counts, duplicate records within the consolidated database, limited identifying information shown to screeners on the TSDB 1A and 1B screens, lack of needed fields within the TSDB, and weaknesses related to the instructions for handling encountered individuals as well as the descriptive information related to the type of threat posed by subjects in the database.
On October 22, 2004, NCTC officials estimated that there were approximately 170,000 unique individuals who were known to the U.S. government as known or suspected terrorists or as having ties to terrorism. As of January 2005, the TSDB 1A and 1B included a total of 455,002 and 237,615 active records, respectively. Both databases include unique individuals and aliases. Since both databases were maintained and updated simultaneously, theoretically both should have had the same number of records. However, as indicated above, we found a difference of 217,387 records between the two databases in January 2005.
According to TSC officials, this disparity resulted from the immediate need during the earliest days of the TSC to develop a comprehensive database (TSDB 1A) of potentially high-risk suspects. Accepting records directly from numerous databases resulted in duplicate records being imported into the TSDB 1A. Further, TSC officials said the complex task of consolidating large and often incompatible data systems required accepting less than optimal data. For example, in creating the TSDB 1A, the TSC imported records directly from the Treasury Enforcement Communications System (TECS), thereby receiving records that were unique to TECS and were not included in its sub-systems Ė the Interagency Border Inspection System (IBIS) or the National Automated Immigration Lookout System (NAILS). These unique TECS records were not included in the 1B database because, according to TSC staff, they had not been provided to NCTC and there was significant concern about the quality of the records.
TSC officials informed us in early March 2005 that they had successfully addressed the significant difference in record counts between the TSDB 1A and 1B. They reported that they reduced the difference to about 40,200 records existing in TSDB 1A but not in TSDB 1B. This group of records has undergone initial review and the TSC stated that it consists of 39,000 records awaiting additional vetting by NCTC and 1,200 that will require manual correction at the TSC.
The use of unique identifying numbers in a database is an important internal control for minimizing duplicate records. According to TSC officials, both the TSDB 1A and 1B assigned unique identifying numbers for every record added to the databases. Likewise, TIPOFF records, including all aliases, each have a separate unique identifier.
However, the VGTOF database assigns a distinct record number to each individual in the database, and known aliases or varying identifying information for the individual are recorded within the original record. When included in the TSDB, a new record is created for every combination of identifying information contained on a VGTOF record. For example, two dates of birth listed on one VGTOF record for an individual would be included in the TSDB as two records Ė one for each date of birth. As a result, both of these records in the TSDB will show the same VGTOF number, while each will have a unique TSDB record number.
The TSDB should not contain multiple records with the same TIPOFF or TSDB record number; however, it is possible to have multiple records with the same VGTOF number. Further, each record within the TSDB should represent a unique combination of identifying information for an individual. For example, an individual who [SENSITIVE INFORMATION REDACTED] would have two records, each with the same [SENSITIVE INFORMATION REDACTED]; however, the [SENSITIVE INFORMATION REDACTED] would be different. The TSDB should not contain multiple records with completely identical identifying information. In addition, because aliases refer to the same individual, the databases to which an individualís record should be exported (e.g., CLASS, IBIS, VGTOF) and the instructions regarding how the individual is to be handled should be the same.
Duplicate records within the TSDB can cause a time-consuming and possibly confusing experience for screeners when researching a specific individual. The call screener can mistakenly rely on one record while a second, more complete record may be ignored. This can result in important information being missed. Also, if update information is transferred for a record in the TSDB 1B that has duplicate entries, then one of the duplicate records may be updated while the other may not. This situation would result in two identical record numbers containing different information.
We attempted to determine whether duplicate records existed within the TSDB 1B.55 Although we did not identify duplicate TSDB 1B numbers, we did find duplicate records. We found 31 records that had duplicate information in five core identifying fields [SENSITIVE INFORMATION REDACTED]. Of these, 15 records also had duplicate TIPOFF record numbers.
Our review of the duplicate records revealed that six contained different information describing the individualsí association with terrorism. For example, for one set of duplicates one record reflected that the person was "Likely to Engage in Terrorism if Enters in U.S." while the other record reflected that the same individual "Provides Support, Safehouse, Weapons, Funds, ID, etc." An additional 16 records had either conflicting or missing handling instructions. These descriptions and instructions are used by the front-line law enforcement officers to assess and determine the level of threat posed by the individual encountered and help to protect the safety of these officers. Therefore, it is essential that this information be accurate and consistently applied to all records related to one individual.
In addition to the 31 duplicate records, we found 4 records for which the "unique" TIPOFF record number was duplicated, but for which the 5 core fields were not all the same. The TSC could not explain how this occurred.
In our review of the duplicate records, we also identified instances where instructions for which database a record was to be included were omitted, conflicted, or not applied. For example, on multiple occasions records nominated for inclusion on the TSA No-Fly list were not forwarded to that list. However, associated records (such as aliases) that similarly were nominated for the No-Fly list were, in fact, included on the list.
Overall, the TSC could not explain why duplicate records existed in the TSDB 1B. Based upon our observations and analyses, one probable cause for some of the duplicative information was the transfer of the FBIís data on international terrorist records from the VGTOF to NCTC. At the time the TSC established the consolidated database, NCTC was not receiving international terrorist records from the FBI because the agencies had not yet come to agreement on the terms of information sharing. As a result, to implement and maintain the most accurate and comprehensive database of terrorist information, TSC officials decided to include international terrorist information directly from the FBI. When the FBI later transferred its international terrorist records to NCTC, the volume of data, coupled with the excessive manpower required to review each record, precluded NCTC from reviewing each record to ensure that it did not forward any duplicate or outdated records to the TSC. TSC officials indicated that they plan to address this issue by manually reviewing and deleting any duplicate records that have been created as a result of this process and updating any outdated information. We believe that the TSC should regularly perform queries of its consolidated watch list database to ensure duplicate records are not being created.
Although we had been informed that the TSDB 1B was created with information solely from the FBI and NCTC, we found five records in the database that were not derived from the NCTC or FBI databases. IT contractors at the TSC could not explain why these records were included in the 1B database if they did not come from either of the primary source systems. This is significant because the TSDB is an index of summary information owned by other agencies, and it must be able to identify the source of records in order to obtain necessary supporting information and appropriately assist law enforcement. TSC managers said they would look into this matter, but as of March 2005 had not provided an explanation for this situation.
For each of the international terrorist names included in the two TSC databases, an Immigration and Nationality Act (INA) code is assigned by NCTC that provides a description of how a specific individual is associated with international terrorism. There are 25 different INA codes that can be assigned to each international terrorist record in TIPOFF, but the system includes controls to ensure that only one INA code is assigned; 8 of the codes indicate that the individual should be considered armed and dangerous. This data is subsequently transferred to the TSC for inclusion in the consolidated databases. The following table displays the distribution of records in the TSDB 1B according to the INA code.
In reviewing the descriptions of the 25 INA codes, we found that they do not appear to be mutually exclusive and that a suspected terrorist may fit more than one category. The TSDB does not allow for more than one INA code to be applied to each record. Consequently, this restriction may limit the amount of descriptive information available on particular records in the consolidated database.
Records originating from the FBI do not contain INA codes because the categories were developed for the purpose of assigning an identifier to aliens. In an effort to make TSDB record structures consistent for both foreign and domestic records, the TSC directed the FBI to assign one of three possible codes to the data it sent to the TSC. The FBI developed a program that automatically assigns one of the three INA codes to a domestic terrorist record based on the existing handling instructions. This automated process occurs every time new domestic terrorist records are transferred to the TSC. The Director of the TSC explained that the purpose of assigning an INA code to domestic terrorist records entered into the TSDB 1B was to have a single standardized method for identifying the type of terrorist threat presented by each subject in the database.
In our opinion, the three codes currently being used do not provide an adequate description of domestic terrorist activities. We recognize the TSCís objective of standardizing the use of descriptive codes, but using descriptions more applicable to international terrorist activities to describe domestic terrorist activities diminishes the usefulness of the coding system. Instead, we believe that specific descriptions of domestic terrorist activities should be developed and applied to domestic terrorist records.
As noted previously, one of the benefits from the TSCís efforts to develop the TSDB is that the sharing and consolidation of all available watch list information puts law enforcement personnel in a better position to take appropriate action when individuals are identified. The TSC has attempted to provide law enforcement personnel with the necessary handling instructions for individuals whose names appear in the consolidated database. According to TSC officials, all records in the consolidated watch list database should have a handling code assigned.56 FBI agents nominating a record for inclusion in the VGTOF and other databases assign a handling code based on the information available about the individual, including whether a valid arrest warrant exists or if the person is considered armed and dangerous. For international terrorist records received from NCTC, the TSC assigns a handling code based on the designated INA code, the extent of identifying data available, and any other information that may be related to how the individual should be treated.
Missing Handling Codes
Based on our review, we found that 336 records in a subset of 109,849 did not have a handling code assigned.57 Of these records, at least 160 of the individuals were described as armed and dangerous, according to the designated INA codes. It is important that the appropriate handling code be assigned to each record so that law enforcement officers are adequately protected.
INA Codes vs. Handling Codes
For records in the TSDB 1B, we compared the INA codes to the handling instructions in the database to determine if the two corresponded. In our small sample of VGTOF records, we found several instances where records had handling instructions that did not correspond to the level of threat indicated by the descriptive category. For example, we identified at least 19 instances where records were categorized with INA codes designated as "armed and dangerous" but the records had handling instructions that were applicable for individuals requiring the lowest level of law enforcement response.58 In addition, we found 12 instances where INA code 5, a designation applied to group members not considered to be armed and dangerous, was applied to handling codes 1 and 2, which require the highest level of safety precautions due to the more significant threat the subjects may present.
We found that the INA codes were misapplied because of a problem with the FBIís programming language used to transfer records from VGTOF to TSDB 1B. For each VGTOF record sent to the TSC for inclusion in the TSDB, the TSC requested that the FBI assign an INA code based on the previously assigned handling code. The TSCís protocol for assigning handling codes to records with pre-existing INA codes stated that if a subject was issued a non-armed and dangerous INA code, then a handling code 4 was to be applied, which is representative of the lowest level of law enforcement response. According to FBI officials, the opposite message was communicated for assigning INA codes to records with pre-existing handling codes. FBI officials stated that they were told to apply an armed and dangerous INA code to records designated handling code 4 and a non-armed and dangerous INA code as a default to all other handling codes. When notified of our concerns, the TSC Quality Assurance staff acknowledged that the wrong INA codes had been applied to the VGTOF records, and the Director of the TSC informed us that she would look into this matter.
The results of this test led us to perform a search on the entire 1B database to determine the general consistency between INA and handling codes. We found at least 31,954 records with INA codes that were categorized as "armed and dangerous" but had handling codes conveying instructions applicable for individuals at the lowest level, which does not require the encountering law enforcement officer to contact the TSC or any other agency. As shown in the following table, the INA codes for some of these records described these individuals as: 1) having engaged in terrorism; 2) likely to engage in terrorism if they enter the United States; 3) hijacker; 4) hostage taker; 5) [SENSITIVE INFORMATION REDACTED]; and 6) user of explosives or firearms.
At the time of our field work, TSC officials could not explain this apparent mismatch, but informed us that they would look into this matter. This situation, which represents a weakness in the database and places front-line law enforcement officers in a vulnerable position, should be addressed as quickly as possible.
During our review, we found that records in the TSDB 1A contained different identifying fields than records in the TSDB 1B. The following table compares the available fields for a given record in each database.
TSC officials explained that they are working to increase the available fields in the 1B database. As discussed in Chapter 5, TSDB 1B was programmed to include additional information fields, such as specific biographical data, but these fields have not yet been enabled.
In addition, during our testing of the TSDB 1A database, we found that for domestic terrorist records, certain fields of information were all consistently omitted from the screen display even though this data was maintained in the database. Therefore, although the TSDB 1A was capable of displaying eight possible fields of information, as few as three were often displayed. This left the screeners with limited data to make initial determinations of potential matches. TSC IT personnel were previously unaware of the limited screen information and said that the screen interface was not programmed correctly to display all of the information to screeners. The TSCís failure to recognize this shortcoming is another example of the weaknesses in IT management, which were discussed in Chapter 5.
In our review of the TSDB 1B, we found that there were no separate fields specifically designated to identify [SENSITIVE INFORMATION REDACTED]. This type of information is important when attempting to verify the identity of an individual. Currently, the [SENSITIVE INFORMATION REDACTED] field in the 1B database is closely related to the [SENSITIVE INFORMATION REDACTED] field. [SENSITIVE INFORMATION REDACTED] We found this use of the [SENSITIVE INFORMATION REDACTED] field for recording the [SENSITIVE INFORMATION REDACTED] of an individual to be inconsistent with the title of the field. The fact that one database field can reflect two very different sets of information makes the field vulnerable to errors. In addition, the information is subject to misinterpretation by screeners who are using the information in the data fields to identify potential terrorists. We believe that this dual usage of the [SENSITIVE INFORMATION REDACTED] field should be corrected with separate fields that specifically identify the [SENSITIVE INFORMATION REDACTED].
We reviewed the information contained in the TSDB 1A and 1B to determine whether the databases were complete, accurate, and properly consolidated. Using formulated queries, names of known or suspected terrorists, and judgmental samples pulled from the two primary supporting databases, we assessed the completeness and accuracy of the information contained within the consolidated database, the timeliness of the information consolidated, and other issues related to the database.
To perform our tests of TSDB 1A and 1B records, we selected judgmental samples from the TIPOFF and VGTOF databases and traced them forward to the consolidated database, verifying whether the unclassified information contained in the source records was accurately transferred to and displayed in the TSDB 1A and 1B. We also performed testing on nominated additions, modifications, and deletions from the FBI to determine the timeliness of the resultant actions and to assess the completeness and accuracy of the changes made. Further, we searched selected known or suspected terrorist names in the TSDB to ensure they were included in the consolidated database. The results of our findings are discussed below.
To verify the completeness and accuracy of VGTOF records maintained within the TSDB 1A and 1B, we judgmentally selected a sample of 59 records (for 58 individuals) from a universe of 104,116 VGTOF records as of August 2004. Our sample of records was traced forward to the 1A and 1B databases to ensure that each record was included in the consolidated database and that all pertinent, unclassified information intended for inclusion in the TSDB was present. Our analysis found all 59 records contained in the TSDB 1A. However, eight of these records, all for different individuals, were missing from the TSDB 1B. In addition, 5 records in our sample of 59 contained inaccuracies in record content between the information contained within the VGTOF database and information in the TSDB 1B. The omissions and inaccuracies of these records resulted from problems in a number of different areas and are explained in detail in the following sections.
VGTOF File Not Sent to the TSC
On a daily basis, the TSC receives updated files from VGTOF for inclusion in the TSDB 1B. During our testing of the 59 sample records, we identified 2 VGTOF records that were not included in the 1B database. We contacted the FBIís Criminal Justice Information Services (CJIS) Division, who informed us that these records existed on a June 11, 2004, update file that ultimately was never sent to the TSC.59 CJIS officials said this resulted from a lack of back-up coverage when the individual normally responsible for sending the update file to the TSC was out of the office. Upon closer examination of the update file that was not sent to the TSC, we found that the file contained 12 new records (representing 6 separate persons, 2 of whom were in the records we identified as missing from the database) and 8 modifications to existing records (representing the records of 4 separate persons).
Technological Difficulties with NCTC
As previously discussed, HSPD 6 directed that all terrorist information in the possession of the U.S. government, with the exception of purely domestic terrorist information, must be provided by federal departments and agencies to NCTC for inclusion into its database. The MOU resulting from HSPD 6 called for NCTC to serve as the primary data source for the TSCís consolidated database, with the exception of purely domestic terrorist information that would be provided by the FBI. As a result, NCTC took control of the State Departmentís TIPOFF database in November 2003 to serve as the central repository for all international terrorist information. However, because the FBI possessed international records prior to the establishment of NCTC, it was necessary for NCTC to obtain this data from the FBI. This data, originally housed in the FBIís VGTOF database, was sent electronically to NCTC for inclusion in the TIPOFF database. The records subsequently would be sent electronically to the TSC for inclusion in the TSDB.
The NCTC experienced a number of technical difficulties in uploading the VGTOF data file into TIPOFF. As a result, the information was delayed from inclusion in the TSDB 1B for approximately one month. We identified a total of 6 records from our sample of 59 that were not included in the TSDB 1B for this reason. A second search for these records a month later found that all but one of the records had been added to the database. One record remained unaccounted for, and the TSC could provide no explanation as to why this record was missing from its database. When we questioned TSC officials about NCTCís difficulties, they expressed little knowledge of the problem. As a receiver of such vital information, the TSC needs to establish procedures to identify potential barriers to the timely receipt of these important terrorist records. We estimate that the NCTC uploading difficulties may have affected a total of 20,000 records, a significant number of records for which the TSC does not have a suitable level of assurance.60
Missing or Conflicting VGTOF Data
Our analysis further revealed that important and relevant information within the 59 sampled VGTOF records was not always included on records in the TSDB. In other instances, the information was incorrect. Specifically, VGTOF contains a miscellaneous text field that, while not searchable because of its format, often provides important identifying information that could be missed by the TSC or information that conflicts with the TSC record information. One VGTOF record within our sample contained information in the miscellaneous field indicating that the subject was not a U.S. person, while the TSC record indicated that the subject was a U.S. person. Conflicting information such as this can confuse screeners and possibly contribute to the misidentification of an innocent person, or the inappropriate release or admittance of a dangerous individual.
Two additional records within our sample included text in the miscellaneous field identifying the subjects as [SENSITIVE INFORMATION REDACTED]. However, the TSDB 1B records showed the individuals as U.S. persons with no additional information provided. TSC and CJIS officials also attributed this situation to the programming of the TSDB 1B database. As previously reported, the [SENSITIVE INFORMATION REDACTED] field in the TSDB 1B database is closely related to the [SENSITIVE INFORMATION REDACTED] field. The two sample records mentioned above did not contain a [SENSITIVE INFORMATION REDACTED], and therefore should have reflected the individuals as [SENSITIVE INFORMATION REDACTED].
Another sampled VGTOF record identified a [SENSITIVE INFORMATION REDACTED] in the miscellaneous column that was not reflected in the TSDB record. CJIS officials explained to us that [SENSITIVE INFORMATION REDACTED] were erroneously entered into the miscellaneous field instead of the [SENSITIVE INFORMATION REDACTED] field when FBI field agents entered the data directly into VGTOF. As a result, unless the TSC specifically searches the miscellaneous text field, any information that was incorrectly entered into the miscellaneous field will be missed. The TSCís assumption of responsibility for the VGTOF file records in August 2004 should reduce similar data entry errors because FBI field personnel no longer have the ability to directly enter information. However, the TSC will need to ensure that past data entry problems do not limit the amount or quality of data contained within the TSDB records.
One record within our sample of VGTOF records showed text in the miscellaneous field that stated the individualís reported biographical data may not be accurate. TSC screeners may miss such important information unless the TSC establishes procedures to require review of the miscellaneous text field of each VGTOF record in order to identify such potentially useful information.
TSC-Identified VGTOF Errors
We were informed during initial interviews with the TSC Chief of Operations that, upon establishment of the TSC call center, the VGTOF data was tested for accuracy and was found to possess a 40 percent error rate based on a sample of 20 records. Errors were said to exist mainly in the handling codes, and we were told that NCIC was responsible for fixing the problem. At the time, the VGTOF database contained approximately 15,000 names. While we did not perform this test, we considered this information when we performed our own testing of the VGTOF database to assure that an accurate representation of the information contained in the database was reported. TSCís Chief of Operations at the time of our inquiry informed us that the FBIís Counterterrorism Division had been informed of the problem and the FBI issued an Electronic Communication directing its field offices to immediately "clean-up" the record information.
However, we learned later from the TSC Quality Assurance staff that no follow-up action had been taken by the TSC to ensure the VGTOF data had been corrected. In our opinion, the TSC needs to follow up to ensure that other FBI units have taken the necessary steps to correct erroneous information.
To determine the completeness and accuracy of TIPOFF records maintained within the TSDB 1A and 1B, we judgmentally selected a sample of 51 records (all separate individuals) from a universe of 185,628 TIPOFF records as of August 2004. Our sample was traced forward to the 1A and 1B databases to ensure that each record was included in the consolidated database and that all pertinent, unclassified information was present. From our analysis, we found that 2 of the 51 records were missing from the TSDB 1A. This appeared to result from record deletion, although as stated previously the 1A database does not maintain an audit trail of changes. In addition, 3 records from our sample of 51 were missing from the TSDB 1B. We also identified that 12 records in our sample contained inconsistent information when compared against the records in TSDB 1A and 1B. The omissions and inaccuracies of these records resulted from a variety of problems that are discussed in the following sections.
TIPOFF Records Missing from TSDB
Our review of the TIPOFF records traced to the consolidated database identified active records in TIPOFF that had been deleted from the TSDB 1B, as well as active TIPOFF records that had never been included in the 1B database. Because the entire contents of TSDB 1A were overwritten on a daily basis, no history was retained in the 1A database to determine if the records deleted from 1B had ever existed within 1A.
TIPOFF records sent to the TSC marked for deletion from the consolidated database often result when an individual no longer is considered a threat to the U.S. government. When a record is sent for deletion, the TSC nominations staff receives a prompt on the electronic NCTC file to delete the record. However, NCTC retains the original record in its system but deactivates the record by excluding it from the TSDB and other supporting systems. Our review of a sample of the TIPOFF records revealed two records that were not in the TSDB 1B but did reflect, through the historical information available, that the records had been included in the 1B database in the past. Each of these records was appropriately denoted as being exempt for inclusion in the TSDB.
Records missing from the TSDB that were active within the TIPOFF database and which had been marked for inclusion in the TSDB require further examination. We identified three such instances of active TIPOFF records that should have been included in the TSDB. In these three instances, the TSDB 1B did not contain a history of the records ever being included in the 1B database. Officials at the TSC informed us that they are unsure of the reason why these TIPOFF records were missing from the TSDB 1B.
To maintain a complete and accurate subset of all terrorism watch list related information, the TSDB must contain all records possessed by the U.S. government related to individuals who may pose any level of terrorist threat. A record not passed to the TSC for inclusion in the database and other supporting systems creates vulnerability should that individual be encountered and contributes to the incomplete status of the TSDB.
Missing or Conflicting TIPOFF Data
Our trace of the TIPOFF records within the TSDB revealed a number of discrepancies in the content of record data within the two databases. Again, we identified errors related to the [SENSITIVE INFORMATION REDACTED] field in the TSDB 1B database being closely related to the [SENSITIVE INFORMATION REDACTED] field. For one record in our sample, [SENSITIVE INFORMATION REDACTED]. However, upon our review of this record in the TSDB 1B database, we identified that [SENSITIVE INFORMATION REDACTED].
We also identified two instances where a TSDB 1A and/or 1B record did not accurately reflect important identifying information contained in the source TIPOFF record. Specifically, one TIPOFF record in our sample showed the particular individual as a male with no listed date of birth who had an INA code 89, "Lost/Stolen Passports." The related TSDB 1B record showed this individual as a female with a date of birth who had an INA code 5, "Group Member." The TSDB 1A record for this individual showed the individual with the same date of birth and a description of "FTO Member," short for Foreign Terrorist Organization Member.61 The second instance mentioned showed a TIPOFF record with an INA code 2, "Any Other Unlawful Activity," while the related TSDB 1B record was applied an INA code 89, "Lost/Stolen Passport." No warning was shown in the 1A database for this record.
Additionally, we found nine instances where no warning was reflected on the TSDB 1A screen for TIPOFF records within our sample. Of those instances, seven records had no handling code either.
Such a large database requires significant controls to ensure that the information contained within the system maintains the highest level of integrity, both in its completeness and accuracy, as well as its ability to provide users with the most current information available. We feel that the TSDBs display several vulnerabilities in controls over data validity and integrity.
The FBIís Terrorist Watch and Warning Unit (TWWU) receives requests from FBI field agents to include an individual with ties to terrorism into the appropriate federal databases. These requests are provided on nomination forms, which indicate whether the request is an initial submission, a supplement to the initial submission, or a request for removal from the databases. We selected for review nine nomination forms based on TWWU completed activity and the type of requests made.
From our analysis of this limited number of transactions, we determined that nominations to the consolidated database could be untimely, sometimes resulting in delays of up to 45 days. The delay in entering this information into the consolidated database presents a vulnerability to the screeners in correctly identifying an individual, and contributes to the incompleteness and inaccuracy of the database as a whole. In addition, the TWWU is making errors in the delivery of the nomination forms to the appropriate agency for inclusion into the applicable database. For example, one form was submitted to the TWWU on August 26, 2004, to nominate an individual related to domestic terrorism for inclusion in the VGTOF database. This nomination form was reviewed by the TWWU and, instead of being provided to the TSC for data entry into the VGTOF database, the form was incorrectly provided to NCTC. The NCTC mistakenly included this purely domestic matter into the TIPOFF database. On September 9, 2004, the TSC received NCTCís regular electronic file of updated records and uploaded this particular record into the TSDB. On October 1, 2004, the day we identified this error, NCTC sent its regular electronic update file with a deletion prompt for the record. As a result, the record was deleted from the TSDB. At that time, the TSC Nominations Unit staff called the TWWU to request the nomination form so they could appropriately enter the record into the VGTOF database from which they would correctly upload the record into the TSDB. This example shows that these errors can cause a lengthy delay in the inclusion of terrorist records in the TSDB and supporting databases. These mistakes can cause incompleteness in the consolidated database, which can create a security vulnerability.
We performed limited testing on the TSDB 1A and 1B to determine if publicly known terrorists were included in the consolidated database. We selected for our review a total of 39 names: 14 from news media accounts, 19 from the FBIís Most Wanted list, and 6 from the DOSí List of Terrorists under Executive Order 13224. We searched both TSDB 1A and TSDB 1B for these 39 names. Our analysis concluded that 37 of the 39 names were in both the TSDB 1A and 1B. Of the two remaining names, one was recorded accurately in the 1A database but contained significant spelling variations in 1B; the other name was included only in TSDB 1A where the individual was identified as armed and dangerous. These latter two names both originated from the DOSí List of Terrorists under Executive Order 13224. TSC officials said they regularly checked their database against names reported in the news, broadcast on television, or included on lists such as the FBIís Most Wanted.
Our review of the 39 known terrorist names also revealed that TSDB records for five of the individuals were not marked for export to the appropriate receiving databases. It is critical that the TSC develop strong controls to ensure that each name in the TSDB is appropriately marked for export to the relevant supporting systems so necessary actions are taken if the individual encounters a law enforcement officer. The omission of a watch listed name on any one of the applicable supporting databases could result in a failure to identify and detain a potential terrorist in the United States.62
The TSC maintains information from an array of organizations to fulfill its mandate to maintain a complete, accurate, and thorough consolidated database of terrorist information. Our review of the consolidated watch list identified a variety of issues that contribute to weaknesses in the completeness and accuracy of the data, including variances in the record counts between TSDB 1A and 1B, duplicate records, missing or inappropriate handling instructions or categories, missing records, and inconsistencies in identifying information between TSDB and source records.
The TSC must establish a mechanism for regularly testing the information contained within the consolidated databases. A database containing such vast amounts of information from multiple government agencies cannot be maintained successfully without standard procedures to ensure that the information being received, viewed, and shared is of the utmost reliability.
We recommend that the TSC: | Review of the Terrorist Screening Center
(Redacted for Public Release)
Audit Report 05-27
Office of the Inspector General
The TSC has successfully created a consolidated database of unclassified watch list information from supporting agency systems. However, the accuracy and completeness of the information contained in the database is as critical as the consolidation effort itself. There is little | {
"score": 2,
"cc": false,
"url": "http://www.justice.gov/oig/reports/FBI/a0527/chapter7.htm",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
WASHINGTON – The Justice Department today reached a Fair Housing Act settlement with a group of developers, builders, architects and engineers related to the design and construction of two Memphis-area apartment complexes. Today’s settlement resolves the government’s claims, as well as those filed by the Memphis Center for Independent Living (MCIL), a disability rights organization. The suits were brought to enforce provisions of the federal Fair Housing Act that require newly or recently constructed dwellings to include features designed to make them more accessible to persons with physical disabilities.
“Those who design and construct housing units may not ignore their obligation to make them accessible to persons with disabilities,” said Wan J. Kim, Assistant Attorney General for the Civil Rights Division. “The Justice Department will continue its vigorous enforcement of all the fair housing laws.”
In 2004, the court ruled that the defendants violated the Fair Housing Act by failing to design and build accessible pedestrian walkways from ground floor apartment units to public street and on-site amenities at the apartment complexes. The court also found a number of other violations, including the defendants’ failures to provide accessible clubhouses; accessible parking at complex amenities; thresholds at breezeways without steps; bathroom, bedroom, and walk-in closet doors wide enough for wheelchair passage; thermostats within the reach of persons in wheelchairs; reinforcements in bathroom walls; adequate clearance space for wheelchair passage into the kitchen and use of counter space; and sufficient clear floor space in front of bathroom sinks. The settlement, which still must be approved by the court, requires the defendants to retrofit apartments; to retrofit public and common use areas; to provide accessible pedestrian routes; to pay damages and civil penalties; and to undergo training on the requirements of the Fair Housing Act and the Americans with Disabilities Act.
Fighting illegal housing discrimination is a top priority of the Justice Department. In February 2006, Attorney General Alberto R. Gonzales announced Operation Home Sweet Home, a concentrated initiative to expose and eliminate housing discrimination in America. This initiative was inspired by the plight of displaced victims of Hurricane Katrina who were suddenly forced to find new places to live. Operation Home Sweet Home is not limited to the areas hit by Hurricane Katrina and targets housing discrimination all over the country.
More information about Operation Home Sweet Home is available at the Justice Department Web site at http://www.usdoj.gov/fairhousing. Individuals who believe that they may have been victims of housing discrimination can call the Housing Discrimination Tip Line (1-800-896-7743), email the Justice Department at firstname.lastname@example.org, or contact the U.S. Department of Housing and Urban Development at 1-800-669-9777.
The federal Fair Housing Act prohibits discrimination in housing based on race, color, religion, national origin, sex, disability and familial status. Since January 1, 2001, the Justice Department’s Civil Rights Division has filed 216 cases to enforce the Fair Housing Act, 97 of which have alleged discrimination based on disability. More information about the Civil Rights Division and the laws it enforces is available at http://www.usdoj.gov/crt. | WASHINGTON – The Justice Department today reached a Fair Housing Act settlement with a group of developers, builders, architects and engineers related to the design and construction of two Memphis-area apartment complexes. Today’s settlement resolves the government’s claims, as well as those filed by the Memphis Center for Independent Living (MCIL), a disability rights organization. The suits were | {
"score": 2,
"cc": false,
"url": "http://www.justice.gov/opa/pr/2007/February/07_crt_078.html",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
Youth Safety and Health on the Job
Every year, youth are injured on the job throughout the state because young workers or their employers are not following the state’s child labor laws. Child labor laws were created to promote safety and health in the workplace and prohibit youth from working long hours, which can jeopardize their development and education.
- Workplace Injuries
- Unsafe Working Conditions
- Workplace Sexual Harassment or Discrimination
- Safety Tips for Young Workers
If you have an accident or are injured at work, you are covered by workers’ compensation. Missouri law guarantees certain workers’ compensation benefits to employees who are injured or become ill because of their jobs.
Employees must report the injury IMMEDIATELY (within 30 days) to their supervisor or their employer’s designee. Failure to do so may jeopardize your ability to receive workers’ compensation benefits.
If you have questions about workers’ compensation, please contact your employer for additional information. Or, you may contact an Information Specialist at the Missouri Department of Labor and Industrial Relations, Division of Workers’ Compensation at 1-800-775-COMP.
Inexperience in the workplace is a safety concern as well as unsafe working conditions. Youth are encouraged to report any unsafe conditions or equipment to their supervisor. If unsafe working conditions persist, you have the right to report the condition to the Occupational Safety and Health Administration (OSHA), by calling the Kansas City office (800-892-2674) or the St. Louis office (800-392-7743).
Discrimination or Sexual Harassment
If you encounter problems with discrimination or sexual harassment while on a job or while applying for a job, you have the right to file a complaint with the Missouri Commission on Human Rights or the federal Equal Employment Opportunity Commission (EEOC). To file a discrimination complaint, contact the Missouri Commission on Human Rights or the EEOC.
Helpful Safety Tips for Young Workers
- Know the locations of emergency exits.
- Do not respond to incidents unless your are trained in first aid.
- Be sure to report any injury, regardless how minor, at the time it happens.
- Working with toxic chemicals or chemicals that require use of Personal Protective Equipment (PPE) is prohibited for youth under 16.
- Working in a confined space is prohibited for youth under 16.
- Work requiring Personal Protective Equipment (PPE) is prohibited for youth under 16.
- Use of ladders and scaffolding are prohibited for youth under 16.
- Use of power-driven machinery, except some lawn and garden machinery, is prohibited for youth under 16.
- Cooking is a prohibited occupation for youth under 16.
- Beware of hot surfaces.
- In case of a fire, make sure you know how to use a fires extinguisher. Leave large fires to the professionals.
- With any burn, immerse or cover the burned area with cold water.
- If you receive a cut, receive first aid then make sure all surfaces are properly cleaned to protect you and others from blood-borne diseases.
- Do not wear loose clothing or dangling jewelry that can get caught.
- Keep long hair restrained.
- Protect your feet by wearing enclosed shoes.
- Never use electrical devices while standing in water.
- Never work alone, especially in the evening.
- If there is a robbery attempt, do not attempt to be a hero. Never argue or struggle with the perpetrators.
- Never lift from a sitting position. Sitting puts more pressure on the spine.
- Push rather than pull a load.
- Report any unsafe conditions or equipment to your supervisor. | Youth Safety and Health on the Job
Every year, youth are injured on the job throughout the state because young workers or their employers are not following the state’s child labor laws. Child labor laws were created to promote safety and health in the workplace and prohibit youth from working long hours, which can jeopardize their development and education.
- Workplace Injuries
- Unsafe Working Co | {
"score": 3,
"cc": false,
"url": "http://www.labor.mo.gov/DLS/YouthEmployment/youth_safety.asp",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
Women of Protest: Photographs from the Records of the National Woman's Party contains photographs documenting the activities of this militant organization in the woman’s suffrage movement. Included are a time line, images of parades and other protest activities and images of women imprisoned for their activities in support of the suffrage movement.
These online exhibits provide context and additional information about this collection.
- Suffrage Prisoners
- Detailed Chronology
- Historical Overview of the National Women’s Party
- Profiles of Selected Leaders of the National Women’s Party
- Tactics and Techniques of the National Women’s Party Suffrage Campaign
These historical era(s) are best represented in the collection although they may not be all-encompassing.
- Emergence of Modern America — 1890-1930
Related Collections and Exhibits
- Votes for Women
- Votes For Women Suffrage Pictures, 1850-1920
- American Women: A Gateway to Library of Congress Resources for the Study of Women's History and Culture in the United States
- Words and Deeds In American History
Recommended additional sources of information.
Specific guidance for searching this collection.
For help with general search strategies, see Finding Items in American Memory.
Women of Protest: Photographs from the Records of the National Woman's Party presents approximately 500 photographs documenting the broad range of tactics employed by the National Woman’s Party and individual portraits of the organization’s leaders. The bulk of the photographs in the online collection pertain to the period from 1913 to 1922. Photographs depict dramatic pageants to commemorate the 75th anniversary of the Seneca Falls Convention of 1848, mass rallies and parades, White House pickets, and the arrest and imprisonment of party members. Photographs verify the National Woman’s Party efforts to secure passage of the 19th Amendment and the subsequent abortive campaign for passage of an Equal Rights Amendment.
Women of Protest: Photographs from the Records of the National Woman's Party primarily focuses on the development of a more active movement within the campaign for a women’s suffrage amendment. The collection documents mass demonstrations and acts of civil disobedience during the short span of time from the development of the National Woman’s Party to the ratification of the 19th Amendment and the subsequent efforts to obtain an Equal Rights Amendment. The photographic collection documents the efforts of Alice Paul and other prominent women in this pivotal period in American history.
The collection includes several features useful in introducing this phase of the campaign for suffrage: a timeline, three essays on the tactics and leaders of the NWP, and a gallery of photos depicting women who were sent to jail for their activities in support of suffrage. The collection can be searched by keyword and browsed by title and subject.
1912-1914: Mass Demonstrations and Formation of the Congressional Union for Woman Suffrage
By the turn of the twentieth century, the National American Woman Suffrage Association (NAWSA) had developed a strategy of securing a woman’s right to vote in municipal elections and seeking full suffrage through state constitutions. This strategy of focusing on state efforts reduced the association’s Congressional Committee to relative obscurity until revitalized by the appointment of Alice Paul and Lucy Burns as joint chairs of the Committee in December 1912. Paul and Burns first met in England, where they had both been jailed for participating in demonstrations organized by the Women’s Social and Political Union. Both women had been influenced by the radicalism of British suffrage leader Emmeline Pankhurst.
Paul and Burns organized a massive suffrage parade as the first effort of the newly revitalized NAWSA’s Congressional Committee. The parade was planned for March 3, 1913, on the eve of President Woodrow Wilson’s inauguration. Women also held open-air meetings in conjunction with the parade. Look at the photos listed below and the full captions and Notes to learn more about this event:
- “Distributing hand bills advertising Inaugural Suffrage Parade”
- “Inez Milholland Boissevain preparing to lead the March 3, 1913, suffrage parade in Washington, D.C.”
- “Crowd converging on marchers”
- “Open air meeting calling upon Congress to pass the national woman suffrage amendment. Mrs. Mary Beard is speaking.”
- “Open air meeting calling upon Congress to pass the national woman suffrage amendment. Mrs. John Rogers speaking.”
Use your analysis of the photos and accompanying information to answer the following questions:
- Describe the woman at the head of the parade. What did her appearance symbolize? Do you think this was an effective way to start the parade?
- How did onlookers respond to the parade?
- Why might the organizers of the parade have planned open-air meetings to be held at the same time? Why might women from prominent families be effective speakers at such meetings?
- Despite the success of the parade, the leadership of NAWSA feared that Paul and Burns would alienate supporters by endorsing the radical tactics of the British movement. Why do you think leaders of NAWSA were fearful that massive demonstrations on behalf of woman suffrage would hinder the movement? Is there any photographic evidence to support their position?
Paul and Burns, although they continued to serve as chairs of the Congressional Committee, formed a new organization known as the Congressional Union for Woman Suffrage. Although distinct from the Congressional Committee, its directors and members of the executive board were the same. The Congressional Union lobbied elected officials and gave notice to the Democratic Party, which had control of the executive and legislative branches, that it would hold them responsible for congressional inaction on suffrage. NAWSA leaders confronted Paul and Burns with an ultimatum that they divorce themselves from the Congressional Union and abandon threats to hold the Democratic Party responsible for failure to secure a suffrage amendment in order to retain their positions in NAWSA’s Congressional Committee. Paul and Burns refused.
1915-1917: Formation of the National Woman’s Party and Picketing the White House
Throughout 1915, Alice Paul, Lucy Burns, and the Congressional Union organized state branches, held a national convention of women voters, collected 500,000 signatures on a suffrage petition, and testified before Congress, among other activities. At the end of the year, CU and NAWSA made a last attempt to reconcile, but the attempt failed. In June 1916, CU’s leaders formed the National Woman’s Party.
After President Wilson’s reelection, Alice Paul called for members of the National Woman’s Party to picket the White House to convince the president to put pressure on Democratic senators to vote in favor of a constitutional suffrage amendment. Lucy Burns led most of the picket demonstrations. Picketers were not molested and, in fact, the president often waved to them as he left the White House. To maintain interest in the press, Paul and Burns organized groups representing women from different walks of life to picket on different days.
- Why do you think continued press coverage was an important aspect of the National Woman’s Party’s strategy?
- How might having women picket in groups from different walks of life raise interest in the movement?
Once the United States entered World War I, things changed. In June 1917, the police began arresting women outside the White House. Undaunted by these arrests, women marched to the White House on Independence Day, carrying banners reading “Governments derive their just powers from the consent of the governed;” they were promptly arrested. In a demonstration on August 14, 1917, a melee broke out as women carried banners addressing the president as “Kaiser Wilson.” Servicemen often agitated demonstrators and, in some cases, attacked pickets while policemen did nothing to prevent the confrontation.
In October 1917, police announced that if women continued to picket the White House, they could expect sentences of up to six months in prison. The day following the announcement, Alice Paul marched from party headquarters to the White House carrying a banner with one of Wilson’s slogans, “The time has come to conquer or submit for there is but one choice - we have made it.”
- What do you think were the benefits of picketing the White House? What costs might this strategy have had for the NWP?
- What was the point of including slogans on picketers’ banners? Why might these slogans provoke onlookers? Which of the slogans that you have seen in the photos is most appealing to you? Explain your answer.
- Why do you think the U.S. entry into World War I changed the situation for the NWP picketers? What parallels could you draw with public and government responses to protestors during other wars?
- Why do you think Alice Paul continued to defy the police by sending picketers to the White House? In her place, what would you have done?
- To what extent did the arrest and incarceration of picketers play into the hands of the National Woman’s Party?
Paul and other picketers were arrested but given suspended sentences. Returning to the picket line, Paul and Rose Winslow were arrested and given seven-month jail sentences for obstructing traffic. First offenders received six-month sentences. Paul and Winslow considered themselves political prisoners and organized a hunger strike. Hunger strikes spread throughout the district jail and to area workhouses, where other women picketers had been incarcerated. Jailers began force-feeding, a painful and humiliating experience that Paul had endured while jailed in England several years earlier.
- How did long jail sentences arouse public support?
- A political prisoner is a person detained by a government because the government believes the person’s ideas or image threaten the security of the state. Why did suffrage prisoners consider themselves to be political prisoners? Do you agree that the jailed suffragists were political prisoners?
- Why would members of the National Woman’s Party resort to a hunger strike? What could they expect to gain by refusing to eat?
Arrests at the gates of the White House did nothing to stop the daily gathering of women picketers. More women were arrested and given sentences varying from six days to six months. (See the Gallery for photos of many of the women who served jail time as a result of their participation in suffrage protests.) Lucy Burns received a six-month sentence; Mary Nolan, 73, was sentenced to six days in consideration of her advanced age. Nolan and most others arrested on November 10, 1917, were sent to Occoquan Workhouse in Virginia. On arrival at the workhouse, women refused to put on prison uniforms or work; the guards became violent, kicking and beating the prisoners in what became known in the suffrage movement as “The Night of Terror.” Women again resorted to a hunger strike. Upon their release, many were too weak to walk on their own.
What advantage would the National Woman’s Party gain through publication of photographs like this one?
1918-1920: The Fight for Approval of the Suffrage Amendment
In January 1918, President Wilson announced his support for the suffrage amendment, and the U.S. House of Representatives passed the proposed amendment. Despite support by prominent political leaders, including former President Theodore Roosevelt, conservative senators stood firm in opposition to the extension of suffrage. The National Woman’s Party redoubled their efforts to affect the vote in the Senate.
In a lobbying attempt, the National Woman’s Party gathered signatures on a petition supporting passage of a suffrage amendment and delivered it to Senator Jones of New Mexico, Chairman of the Suffrage Committee. Of the 96 senators representing the 48 states in the union, 62 supported ratification in October, two votes short of the two-thirds majority needed to send the amendment to the states for ratification. Women who demonstrated outside the Senate Office Building were arrested.
Although President Wilson had expressed his support for the suffrage amendment, the NWF wanted him to be more active in urging passage of the amendment. President Wilson left Washington in December 1918 to attend the international peace conference in Versailles. In January 1919, the National Woman’s Party devised a new tactic to pressure for the adoption of a suffrage amendment to the Constitution. Members would gather with copies of the president’s speeches on issues relating to democracy and burn them in urns outside public buildings, including the White House. With a banner implying that the president was a hypocrite, women outside the White House burned a speech Wilson had given on his grand tour of Europe. These “Watchfires of Freedom” resulted in more arrests and often provoked counter demonstrations.
Forced to move from the gates outside the White House, activists moved across the street to Lafayette Square and continued their demonstrations, including burning presidential speeches, while Wilson was at the peace negotiations.
- What was the purpose of the Watchfire demonstrations?
- As with some banners carried by pickets, the Watchfire demonstrations focused on President Wilson’s own words. What is the effect of using an opponent’s words to support a position? Can you think of other cases in which activists have used this strategy?
On Wilson’s return from Europe, he was to deliver a speech at the Metropolitan Opera House in New York. Doris Stephens, Legislative Chairman of the National Woman’s Party, and several other picketers managed to cross the police barricade. The demonstrators were arrested after being attacked by onlookers.
To keep public attention on the Senate, the NWP devised a new strategy—the “Prison Special.” Women who had served sentences for demonstrating donned their prison uniforms and set out on a coast-to-coast tour in February and March 1919, making speeches in support of a suffrage amendment.
Republicans had gained control of the Congress in the off-year election. In May 1919 the House of Representatives again passed a suffrage amendment. By June the Senate, now with a Republican majority, passed the amendment by a vote of 66 to 30, two more than the two-thirds required. The job was far from complete, however, as 36 states (three-fourths of the 48 states) were needed to ratify the amendment.
- How effective do you think the “Prison Special” tactic was in marshaling public support?
- Why did demonstrators shift their focus away from President Wilson and the Democratic politicians to Republicans in 1919?
- Why was it so difficult to gain Senate approval of the suffrage amendment?
- Which states do you think were most likely to support passage of the amendment? Which states were least likely to agree?
Within days of Senate passage, Wisconsin became the first state to ratify the Susan B. Anthony Amendment. As each state voted for ratification, women sewed a star in the NWP Ratification Flag. Suffrage activists who had worked for years were invited to witness governors signing the amendment after it passed their state’s legislature.
When the amendment had not been ratified by 36 states at the time of the June 1920 conventions of the two political parties, the NWF sent delegations to both, lobbying states that had not yet ratified the amendment and asking the parties to insert a plank into their platforms supporting suffrage. The Democrats agreed to the suffrage plank, but the Republicans did not, and the NWP picketed the convention.
The struggle finally came down to Tennessee. Alice Paul and a delegation from the NWP consulted with Governor Cox on the chances of passage by the Tennessee legislature in the upcoming ratification vote. Upon receiving word that Tennessee had voted to ratify, Paul unfurled the ratification flag with 36 stars from the balcony of the National Woman’s Party in Washington.
Post-1920: The Equal Rights Amendment
Alice Paul and the leadership of the NWP believed that suffrage was only one step in acquiring full equality for women. After the passage of the 19th Amendment, they began to focus on a national campaign to secure equal rights for women. In 1921, a delegation of 50 prominent party members called upon President Warren Harding to ask his aid in securing passage of an Equal Rights Bill in the next Congress. In 1922, the NWP succeeded in winning passage of the Cable Act, which allowed women to retain their U.S. citizenship after marrying a citizen of another country. In December 1923, Alice Paul drafted the Equal Rights Amendment, which the NWP called the Lucretia Mott Amendment. Year after year, the proposed amendment was introduced in each new session of Congress. It was not until 1972 that both houses of Congress passed the Equal Rights Amendment and sent it to the states for ratification. The amendment failed to be ratified by three-fourths of the states.
- Why do you think the NWP proposed passage of the Equal Rights Amendment? Do you think such an amendment was needed? Conduct research to find evidence supporting your answer.
- Read the “Historical Overview of the National Woman’s Party.” How would you summarize the role of the NWP in U.S. history? Create a gallery or slide show of photos that help explain the organization’s significance.
Chronological Thinking: Interpreting Timelines
Studying timelines, which show events in the order in which they occurred, can be a good way to identify changes over time. Study the “Brief Timeline of the National Woman’s Party, 1912-1997” and look for ways in which the tactics of the suffragists changed over time. Write an essay on the changes that you note. Choose photographs from the collection to illustrate the essay.
Historical Comprehension: Analyzing Photographs
Search the collection using terms such as parades, picketing, watchfire, and prison special for documentary photographs of the various tactics employed by the NWP. How effective are the photographs in explaining this period in history?
Remember that a photograph is a document created by an individual and therefore reflects that person’s views. For example, photographers may show point of view by focusing on a particular subject, by taking the photograph from a perspective that diminishes or enhances the stature of the subject, or by taking a photograph that shows the subject in an unflattering light.
What questions do you think need to be asked about photographs when assessing their historical accuracy? Make a list of these questions. Then search the Teachers Page to find a photo analysis guide, and compare your questions with the questions in that guide. Did you omit any important questions? Did the author of the guide omit any important questions? Revise your list to reflect what you learned by looking at the guide.
Now use your list of questions to analyze a picture, such as the one shown below. How does using a structured approach to analyzing a photograph help you better understand that photograph?
Historical Analysis and Interpretation: Comparing Differing Views
The National Woman’s Party was an offshoot of the National American Woman Suffrage Association. The two groups broke because of their differing ideas about strategies for winning the vote. Read the two essays provided with the collection, “Historical Overview of the national Woman’s Party” and “Tactics and Techniques of the National Woman’s Party Suffrage Campaign.”
- List the different strategies used by the National American Woman Suffrage Association (NAWSA) and the National Woman’s Party (NWP).
- Explain why the tactics advocated by Alice Paul disturbed the leadership of the NAWSA.
- Select one photograph from the collection that depicts an NWP strategy that NAWSA members would not approve of and one photograph that depicts an NWP strategy that NAWSA members would approve. Write two sets of captions for the photographs: one set from the perspective of a member of the NWP and the other from the perspective of a NAWSA member.
Historical Research: Researching Ratification of the 19th Amendment
Once the 19th Amendment was passed by Congress, it had to be ratified by 36 states in order to become part of the Constitution. Battles played out in many states, none more dramatic than in Tennessee, which became the 36th state to ratify the 19th Amendment in August 1920.
Research the struggle for ratification of the 19th Amendment in Tennessee.
- What lobbying methods did the people on both sides of the suffrage question use in Tennessee?
- What role did Harry Burn, the youngest member of the Tennessee legislature, play in the ratification debate?
- What tactics did the anti-suffrage movement employ to block final ratification?
Historical Research: Comparing Equal Rights Amendments
After passage of the 19th Amendment, the National Woman’s Party began
working for passage of an Equal Rights bill:
The bill would give women full equality in the government service, give married women citizenship in their own right and make women of the District of Columbia eligible to serve on juries, equal guardianship rights, and equal rights of inheritance and contract.
From “Women Ask President for Equal Rights Legislation” (Women Ask President for Equal Rights Legislation).
Research the Equal Rights Amendment (ERA) submitted to the states for ratification in 1972.
- How did the contemporary ERA differ from the 1920 bill? What events in the intervening 50 years might have shaped the 1972 amendment?
- What arguments were presented in favor of passage of the ERA in the 1970s? Opposed to passage?
- Why do you think the ERA failed to achieve the 38 states necessary for ratification?
Historical Issues-Analysis and Decision Making: Asking Ethical Questions
When activists decide what actions to take in seeking change, they must consider ethics, questions about what actions are morally right. Different approaches to ethical questions exist, each based on a different definition of ethical behavior.
- Rights-based approaches define an ethical action as doing one’s duty and supporting ethical principles, such as justice, equality, and the rule of law.
- Results-based approaches define an ethical action as one where the benefits outweigh the costs.
- Reputation-based approaches define an ethical action as one consistent with good character.
- Relationship-based approaches define an ethical action as one that helps build a healthy community.
Evaluate the course of action taken by the NWP in securing the passage of the 19th Amendment, focusing particularly on parades, picketing, and hunger strikes. According to the four ethical approaches described briefly above, were these actions ethical? Are some ethical according to one approach and not another? In which approaches would the effectiveness of a strategy weigh into ethical decision-making? What strategies would you have recommended to Alice Paul and Lucy Burns in 1913 based on your ethical analysis?
Arts & Humanities
Composing and Cropping Photographs
Photographs provide a visual record of events, people, and places. However, decisions made by the photographer affect that record . First, the photographer decides what to photograph and how to compose the picture. Composing the picture means deciding how the photograph will look, a decision that is actually many smaller decisions taken together.
One decision affecting composition is where the director is located when taking the picture: close to the subject, to the right, to the left, on the ground, from above, etc. The photographer also decides where in the picture to place the subject. Many photographers believe a photo is more interesting if the subject is not in the center of the picture. Instead, they imagine a tic-tac-toe grid placed over the image and try to place the subject at one of the points where lines intersect. This is called the Rule of Thirds. According to this rule, if there is a horizon in the picture, whether an actual horizon where land meets sky or an artificial horizon created by a strong horizontal line such as a road, it should be located closer to one of the horizontal lines of the grid than to the center of the picture.
Another aspect of composing the photo is framing, deciding what details should be included in the photograph. Framing includes deciding how much background or foreground to show in the photograph and determining how close to get to the subject. Another aspect of framing is deciding whether to make the shot horizontal or vertical (landscape or portrait).
When a photograph appears in a publication, the editor may crop the photograph. That means the editor may decide to change the framing by cutting out some portions of the photograph. The editor may cut out part of the foreground because there isn’t room for the entire picture, to make it more visually pleasing. The editor may cut out something to keep the viewer’s focus on other elements of the picture. Composition and cropping can both have powerful effects on the meaning a viewer takes from a photograph.
As an example, look at the photograph below.
- What do you notice about the composition and framing of this picture?
- What is the subject of the picture and where is it placed?
- Is there a horizon? Where is it placed?
- Why do you think the photographer chose to include the other two photographers in the frame of this picture? How might the meaning of the image be changed if the photographers were not shown?
Next, look at the picture below. The notes provided with the picture say that a cropped version of the photo appeared in The Suffragist in June 1916. Read the “Notes” on the photograph provided in the collection so that you have all the background available.
- Does this photograph follow the Rule of Thirds? Explain your answer.
- Do you see any problems with the framing of this picture? Why might the picture be framed in this way? (Remember that photographic technology did not allow zooming at the time these pictures were taken.)
- Imagine that you were the editor of The Suffragist. How would you crop the photo? Would your reasons for cropping be aesthetic (having to do with the visual appeal of the image) or substantive (having to do with the message conveyed by the photo)? Explain your answer.
Note the two horizontal white lines on the photo, as well as the vertical line on the right side of the picture. Try cropping the picture along those lines, either in hard copy or by saving the picture and opening it in a graphics program. Evaluate the effectiveness of this cropping, especially in terms of composition.
Browse the collection. Find one photograph that you think is composed especially well. Print out the picture and annotate the features of the composition that you think are done skillfully. Also print out a photograph that you think is composed poorly. Annotate the features of the composition that you think could be improved.
Many of the photographs in the Women of Protest collection are portraits of women involved in the suffrage movement. A portrait is a painted or photographic likeness of a person. Some portraits show only the subject’s face; others show part or all of the subject’s body. Some are very formally posed, while others are more informal, showing the subject in a natural setting. A good portrait not only captures the person’s appearance but also conveys something about the subject’s character and personality. The photographer can convey character and personality through lighting, the subject’s pose, props, what the subject wears, backgrounds and where the subject’s gaze is directed.
Below are links to a number of portraits from the Women of Protest collection. These portraits represent various poses, different backgrounds, and varying degrees of formality and informality.
- “Mrs. [Miss] Julia Obear”
- “Elizabeth Glendower Evans”
- “Nell Mercer”
- “Dr. Mary Parsons”
- “Judge Mary A. [Mary Margaret] Bartelme”
- “Sue S. White”
- “Lucy Burns”
- “Dr. Cora Smith King”
Study these portraits or another group of portraits that you select from the collection. Examine the portraits carefully before reading the captions. Consider how the subjects are posed, where they are looking, which features are most dominant, and the expressions on their faces. Study the backgrounds, what the subjects are wearing, and any other objects shown in the pictures. Then read the captions and answer the following questions.
- What, if anything, can you determine from examining the facial features and expressions in the portraits you studied?
- What do you notice about the lighting in the photographs? How does the lighting influence your response to the pictures?
- What do you notice about the ways in which the subjects are posed? What do you think the photographer was trying to suggest about the character of the subjects by photographing them in profile (facing the side)? Facing the camera but looking away from it? Facing the camera and looking into it?
- Do any objects or details in the background suggest something about the subject’s character?
- How do the captions tend to influence the reader’s opinion of the individuals? What clues in the captions may indicate a bias?
- Which portrait do you think does the best job of conveying the subject’s character and personality? Why? Write a caption for that portrait explaining what you believe it shows about the subject’s character and personality.
Creating Photo Essays
George Harris of Harris and Ewing took a number of photos in the Women of Protest collection. (Search using Harris and Ewing as the keyword for a list of photographs taken by Harris.) Harris set up shop in Washington, D.C., in 1905 and became well-known three years later for a photo essay “Anatomy of a Smile,” which showed William Howard Taft receiving the news that he had been nominated for the Presidency by the Republican Party.
A photo essay is a collection of photographs selected to tell a story or convey an idea with the minimum of words. A photo essay can be made up of just a few photographs or it can be long enough to comprise a book. The individual photos in a photo essay can be captioned or photos can be grouped with a small amount of text accompanying each group of photos.
Browse through the Women of Protest collection. What stories could be told using the photos from the collection? What themes could be developed visually using the photos? Some examples might be the story of suffragists in jail or the story of the women pioneer statue; themes that could be developed include courage or protest methods. You could even develop a photo essay on a less serious topic, such as hats.
Pick a story or theme for a photo essay. Select six to ten photos to include in the photo essay. Arrange them in a way that you think would be effective in conveying the story or theme. Create captions or text to accompany the photos, but remember that the photos should do most of the “speaking.” Give your photo essay a title that will provoke curiosity.
What stories or themes could this photograph help you develop?
To stimulate support for the campaign for the Equal Rights Amendment, the Student Council of the National Woman’s Party held an Equal Rights Essay Contest. Novelist and short story writer Fannie Hurst was one of the judges of the entries. If you were asked to judge an essay contest, what would you look for in a winning essay? Create a checklist that judges in an essay contest could use in evaluating the submissions. As you write the checklist, think about the characteristics of effective writing.
Next, write a persuasive essay that could have been submitted in the national contest in 1932. Use the checklist to ensure that your essay is of high quality. Trade essays with a classmate and use the checklist to evaluate the essay.
Writing a Biographical Sketch
A biographical sketch is a brief account of a person’s life; not as detailed or lengthy as a biography, a biographical sketch may highlight a few aspects of a person’s life that are especially telling. Like a good biography, a good biographical sketch makes the subject come to life, allowing the reader to see the subject as a three-dimensional character. Profiles of several leaders of the National Woman’s Party are provided in an essay accompanying the Women of Protest collection.
Conduct research and write a biographical sketch of Alice Paul, emphasizing her efforts to secure passage of the 19th Amendment and assessing her leadership qualities. Search the collection for photographs to include with the biographical sketch.
- What traits of Paul’s character do you consider most notable?
- How important were Paul’s contributions to the achievement of woman suffrage?
In conjunction with the massive suffrage parade in Washington on the eve of Woodrow Wilson’s first inauguration in 1913, women dressed in Greek togas performed a “Suffragette Tableau” as “Liberty and Her Attendants” in front of the Treasury Building. A tableau is a staged activity in which participants physically construct a scene or series of scenes from literature or history or create “frozen pictures” representing a theme or idea. Body placement, facial expressions, costumes, and props may be used to convey meaning. Participants may hold their positions for as long as 20 minutes. Tableaux were popular in the 19th century, but began to lose popularity in the early years of the 20th century.
In 1923, to mark the 75th anniversary of the Seneca Falls Convention, the National Woman’s Party called for a celebration of equal rights. As part of the diamond jubilee celebration, members turned to a newer entertainment form, the modern “Dance Drama” with participants representing justice, truth, tillers of the soil, and warriors.
- What purpose did such pageants as the liberty tableau and the dance drama serve?
- In what ways did these pageants reflect on the efforts to improve the status of women in America?
- If you were going to create a tableau about women’s rights in the 21st century, what scene would you depict? Explain your choice.
- Imagine that you are the board of directors of an organization working for women’s rights today. What kind of entertainment or dramatic genre (e.g., music video, rap song, situation comedy) would you use to make the public aware of your efforts? Write a brief speech explaining your choice and persuading others that it will be effective. | Women of Protest: Photographs from the Records of the National Woman's Party contains photographs documenting the activities of this militant organization in the woman’s suffrage movement. Included are a time line, images of parades and other protest activities and images of women imprisoned for their activities in support of the suffrage movement.
These online exhibits provide context and additio | {
"score": 3,
"cc": false,
"url": "http://www.loc.gov/teachers/classroommaterials/connections/women-protest/file.html",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
What is the difference between Alligators,
crocodiles and caymans?
Alligators and crocodiles are in the Order Crocodilae, but in different
families. Caymans are included in the alligator family. A good way to tell
them apart is by their noses. Alligators and caymans have a "U" shaped nose,
whereas Crocs have "V" shaped nose. The teeth also show a
difference...alligators show their front teeth when their mouths are closed
and crocs show both upper and lower teeth when their mouths are closed.
Crocs have a lingual salt gland on their tongue, an area that can secrete
excess salt out of their body. This makes them more adapted to live in
saltwater environments where alligators and caymans prefer freshwater. Both
have little black bumps on them called DPRs (dermal pressure receptors).
These bumps can detect small pressure changes in the water helping the
animal to find and capture its prey. Alligators and caymans only have these
on their lower jaw while crocs have them all over their body. Since
alligators and caymans are so closely related, they both have bony plates
called scutes under their skin which helps to reinforce and strengthen it.
The alligator does not have these on it's stomache whereas the cayman does.
I hope this answers your question!
Click here to return to the Zoology Archives
Update: June 2012 | What is the difference between Alligators,
crocodiles and caymans?
Alligators and crocodiles are in the Order Crocodilae, but in different
families. Caymans are included in the alligator family. A good way to tell
them apart is by their noses. Alligators and caymans have a "U" shaped nose,
whereas Crocs have "V" shaped nose. The teeth also show a
difference...alligators show their front teeth when | {
"score": 3,
"cc": false,
"url": "http://www.newton.dep.anl.gov/askasci/zoo00/zoo00814.htm",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
First-In-The-Nation Presidential Primary
By Hugh Gregg
Hugh, Gregg. "New Hampshire’s First-In-The-Nation Presidential Primary", State of New Hampshire Manual for the General Court, (Department of State) No.55, 1997.
Recognized Political Parties
Presidential primary ballots are prepared exclusively for designated political parties and all candidates listed on them must be members of those parties. For a "political organizations" to qualify as a recognized political party, and to participate in a presidential primary, it must first have received at least 3% of the total number of votes cast for the Office of Governor at the preceding state general election.
In the presidential primaries from 1952 through 1988 only the Republican and Democratic parties qualified. The Libertarian Party also became eligible for a place on the ballot in 1992 and 1996. | First-In-The-Nation Presidential Primary
By Hugh Gregg
Hugh, Gregg. "New Hampshire’s First-In-The-Nation Presidential Primary", State of New Hampshire Manual for the General Court, (Department of State) No.55, 1997.
Recognized Political Parties
Presidential primary ballots are prepared exclusively for designated political parties and all candidates listed on them must be members of those parties. | {
"score": 2,
"cc": false,
"url": "http://www.nh.gov/nhinfo/recognized.html",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
Your location is outside the National Library of Australia. Resources you can access:
Indigenous Studies Program, The University of Melbourne: The Agreements, Treaties and Negotiated Settlements (ATNS) project is an ARC Linkage project examining treaty and agreement-making with Indigenous Australians and the nature of the cultural, social and legal rights encompassed by past, present and potential agreements and treaties. The project also examines the process of implementation and the wider factors that promote long term sustainability of agreement outcomes. The ATNS database is an online gateway which links together current information, historical detail and published material relating to agreements made between Indigenous people and others in Australia and overseas. The ATNS database is designed for the use of Indigenous and other community organisations, researchers, government and industry bodies.
Gale: This collection includes more than 6000 pages chiefly from the Nixon and Ford administrations. The bulk of the materials are "back channel" cables between the U.S. ambassadors in Saigon and the President's national security advisers regarding the situation in South Vietnam or the peace negotiations. These consist of talking points for meetings with South Vietnamese officials, intelligence reports, drafts of peace agreements, and military status reports. Subjects include the Diem coup, the Paris peace negotiations, the fall of South Vietnam, and other U.S. / South Vietnam relations topics. Available for document delivery to Australian libraries.
Department of Foreign Affairs and Trade: This database is a resource for researching treaties to which Australia is a signatory, or where Australia has taken other treaty action.
OECD: OECD iLibrary (full text coverage beginning 1997) is the online library of the Organisation for Economic Co-operation and Development, and comprises monographs, periodicals, and statistical databases. Subjects include agriculture and food; education and skills; emerging economics; employment; energy; enterprise, industry and trade; environment and sustainable development; finance and investment; general economics and future studies; goverance; international development; nuclear energy; science and information technology; social issues and migration; statistics sources and methods; taxation; territorial economy; transition economics; and transport. Major book and periodicals available in full-text include OECD Factbook, Education at a Glance, OECD Economic Outlook and OECD Economic Surveys. Avaialble for document delivery to Australian libraries.
The ODS covers all types of official United Nations documentation originating from duty stations worldwide, including selective documents of the regional commissions: Economic and Social Commission for Western Asia (ESCWA), Economic and Social Commission for Asia and the Pacific (ESCAP), Economic Commission for Latin America and the Caribbean (ECLAC) and Economic Commission for Europe (ECE). Comprehensive coverage starts in 1993. Older United Nations documents are added to the system on a daily basis. Selective coverage of General Assembly and Security Council documentation currently reaches back to 1985. The ODS also provides access to the resolutions of the General Assembly, Security Council, Economic and Social Council and the Trusteeship Council from 1946 onwards.
United Nations: A single entry point for accessing all United Nations statistical services. Includes links to country data services. Covers a wide range of themes including Agriculture, Crime, Education, Employment, Energy, Environment, Health, HIV/AIDS, Human Development, Industry, Information and Communication Technology, National Accounts, Population, Refugees, Tourism, Trade, and the Millennium Development Goals indicators.
United Nations: Catalogue of the United Nations docuemnts and publications indexed by the UN Dag Hammarskjold Library and the Library of the UN Office at Geneva. Coverage is from 1979 onwards, however older documents are being added to the catalogue on a regular basis as a a result of retrospective conversion.
United Nations: Texts of bilateral and multilateral treaties and international agreements. Also details the status of treaties eg which member states signed, ratified or lodged declarations, reservations or objections etc.
University of Michigan: An electronic collection of treaty citations, based on the print 'World Treaty Index' (1984) by Dr Peter Rohn. Contains references to over 70,000 treaties including the United Nations Treaty Series and League of Nations treaties as well as national treaties. The database aimes to provide complete coverage for all known agreements in the 20th Century.
We don't seem to have written any guides for this topic. Try another topic, or see this list of all guides. | Your location is outside the National Library of Australia. Resources you can access:
Indigenous Studies Program, The University of Melbourne: The Agreements, Treaties and Negotiated Settlements (ATNS) project is an ARC Linkage project examining treaty and agreement-making with Indigenous Australians and the nature of the cultural, social and legal rights encompassed by past, present and potential | {
"score": 2,
"cc": false,
"url": "http://www.nla.gov.au/app/eresources/browse/140/?rows=10&start=0",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
IOSL Juvenile Department Mission
The Juvenile Division of the Independent Order of St. Luke was founded in 1895. A distinguished committee gathered at the Norfolk Convention that year to draft " laws, rules and regulations". In 1896, Mrs. Walker was nominated Grand Deputy Matron, a title she carried for life. She viewed the Juvenile Division as critical to the success of the Independent Order of St. Luke and social change.
Maggie L. Walker National Historic Site, MAWA 99.383 | IOSL Juvenile Department Mission
The Juvenile Division of the Independent Order of St. Luke was founded in 1895. A distinguished committee gathered at the Norfolk Convention that year to draft " laws, rules and regulations". In 1896, Mrs. Walker was nominated Grand Deputy Matron, a title she carried for life. She viewed the Juvenile Division as critical to the success of the Independent Order of S | {
"score": 2,
"cc": false,
"url": "http://www.nps.gov/history/museum/exhibits/Maggie_Walker/exb/Social%20Activism/A%20IOSL/MAWA99-383a.html",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
A large body of numerical software is freely available 24 hours a day via an electronic service called Netlib. In addition to LAPACK and LINPACK, there are dozens of other libraries, technical reports on various parallel computers and software, test data, facilities to automatically translate Fortran programs to C, bibliographies, names and addresses of scientists and mathematicians, and so on. One can communicate with Netlib in one of two ways, by email or (much more easily) via an X-window interface called Xnetlib. Using email, one sends messages of the form 'send subroutine_name from library_name' or 'send index for library_name' to the address 'email@example.com' or 'firstname.lastname@example.org'. The message will be automatically read and the corresponding subroutine mailed back. Xnetlib (which can be obtained and installed by sending the message 'send xnetlib.shar from xnetlib' to email@example.com) is an X-window interface which lets one point at and click on subroutines, which are then automatically transferred back into the user's directory. There are also index search features to help find the appropriate subroutine.
To get started using netlib, send the one-line message 'send index' to firstname.lastname@example.org. A description of the overall library should be sent to you within minutes (providing all the intervening networks as well as netlib server are up).
Here is a brief summary of the contents of netlib. See the index netlib sends you for more details.
Table 3: Netlib Contents (part 1).
Table 4: Netlib Contents (continued).
Table 5: Netlib Contents (continued). | A large body of numerical software is freely available 24 hours a day via an electronic service called Netlib. In addition to LAPACK and LINPACK, there are dozens of other libraries, technical reports on various parallel computers and software, test data, facilities to automatically translate Fortran programs to C, bibliographies, names and addresses of scientists and mathematicians, and so on. On | {
"score": 2,
"cc": false,
"url": "http://www.phy.ornl.gov/csep/CSEP/LA/NODE23.html",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
The Round Rock Public Library will offer a book discussion and cooking demonstration with Food and Fables France author Brian Beveridge from 10 a.m. to noon Saturday, May 2.
Local author Brian Beveridge will share how attending the L'institut Paul Bocuse cooking school in Lyon, France became not only a life adventure, but also resulted in his new book Food and Fables France. The journey of how the book was created may be of special interest to those who have always wanted to quit corporate life to travel the world.
In addition to sharing stories about the trials and tribulations writing the book, guests will enjoy a short cooking demonstration featuring dishes from the book. There will be an opportunity to taste food from the book and you could win a door prize! Additional time will be available to visit with the author or the exhibits showcasing various food, wine or cultural topics. Groups such as Cook Here and Now and Alliance Française d’Austin will have information and representatives at this event. A book signing and door prizes will follow the presentation.
There is no charge to attend, but registration is required and will begin on April 1.
Please call 218-7000 or visit the Round Rock Public Library to register.
Cook Here and Now
Cook Here and Now organizes community cooking events with local, seasonal, sustainable ingredients. The mission is to support the local farmers and purveyors in our area by coming together to cook as a group, using ingredients that are available locally and seasonally, grown organically.
Alliance Française d’Austin
Alliance Française d’Austin is a non-profit organization whose mission is to encourage and develop knowledge of the French language and French and Francophone cultures, and to foster cultural, intellectual and artistic exchanges between the USA and France and French-speaking countries. | The Round Rock Public Library will offer a book discussion and cooking demonstration with Food and Fables France author Brian Beveridge from 10 a.m. to noon Saturday, May 2.
Local author Brian Beveridge will share how attending the L'institut Paul Bocuse cooking school in Lyon, France became not only a life adventure, but also resulted in his new book Food and Fables France. The journey of how the | {
"score": 2,
"cc": false,
"url": "http://www.roundrocktexas.gov/home/index.asp?page=9&Calendar_type=1&recordid=9993",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
Miniature, Shear Stress Measurement System for Marine Applications
Agency / Branch:
DOD / NAVY
A miniature shear stress measurement system will be developed for marine hydrodynamic applications. Tao Systems will design and fabricate a miniature waterproofed sensor array with at least 32 sensor elements. The sensor will be mounted on a representativewater-tunnel model which has well-known shear stress distribution and location of flow separation. The instrumented model will be tested in Tao Systems' in-house water tunnel with a maximum rated speed of 15 knots. Well-established analytical expressionsfor shear stress distribution as a function of the location of the sensor will be used to calibrate sensors. This calibration will be verified at other flow conditions. We will also artificially change the ambient temperature of the flow field to verifythe calibration. Real-time detection of flow separation will be simultaneously demonstrated in this experiment. The design of marine vehicles relies on a knowledge of the normal and tengential forces and moments exerted by the fluid on the vehicle duringoperation. The ability to measure shear stress simultaneously at many points, and thus drag, and to detect separation regions on a maneuvering vehicle provides needed data comparison with computational fluid dynamics (CFD) analyses and for the developmentand assessment of current and future designs. There is a large market for both military and commercial applications of the solicited system.
Small Business Information at Submission:
Garimella R. Sarma
Director, R & D
Tao Of Systems Integration, Inc.
471 McLaws Circle, Suite 1 Williamsburg, VA 23185
Number of Employees: | Miniature, Shear Stress Measurement System for Marine Applications
Agency / Branch:
DOD / NAVY
A miniature shear stress measurement system will be developed for marine hydrodynamic applications. Tao Systems will design and fabricate a miniature waterproofed sensor array with at least 32 sensor elements. The sensor will be mounted on a representativewater-tunnel model which has well-known shear str | {
"score": 2,
"cc": false,
"url": "http://www.sbir.gov/sbirsearch/detail/326424",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
As the nation works to tackle some of its toughest challenges and expand opportunity for all Americans, volunteers are resolute in their commitment to their neighbors and communities, with 62.8 million adults serving almost 8.1 billion hours in local and national organizations in 2010. This is just one finding from the Corporation for National and Community Service's Volunteering in America 2011 report.
Download the full infographic image (930 KB JPG)
The Volunteering in America report is a partnership between the Corporation for National and Community Service, the U.S. Census Bureau, and the Bureau for Labor Statistics to collect volunteering data annually through the Current Population Survey's (CPS) Supplement on Volunteering.
The report includes information for all 50 states, Washington, DC, and 198 cities, including 51 large cities, 75 mid-size cities, and 72 additional cities, based on Metropolitan Statistical Areas. For state profiles and other data, visit: VolunteeringInAmerica.gov.
Follow us on the following social networks, to ensure that you are always up to date!
Additional opportunities to serve include: | As the nation works to tackle some of its toughest challenges and expand opportunity for all Americans, volunteers are resolute in their commitment to their neighbors and communities, with 62.8 million adults serving almost 8.1 billion hours in local and national organizations in 2010. This is just one finding from the Corporation for National and Community Service's Volunteering in America 2011 r | {
"score": 2,
"cc": false,
"url": "http://www.serve.gov/stories_detail.asp?tbl_servestories_id=627",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
Life, Family and Marriage
Senator Pat Toomey is prolife and believes that all children should be welcomed into the world and protected by its laws.
While reasonable people may differ on the question of abortion rights, Sen. Toomey believes we should all be able to agree on policies that encourage adoption over abortion, that avoid taxpayer funding of abortions, and that allow parental involvement in decisions that involve minors. Sen. Toomey supports policies that further these important goals, including the No Taxpayer Funding for Abortion Act (S. 906), of which he is a co-sponsor.
Sen. Toomey also believes the tradition of marriage is ancient and sacred and should continue to be defined as between a man and a woman. | Life, Family and Marriage
Senator Pat Toomey is prolife and believes that all children should be welcomed into the world and protected by its laws.
While reasonable people may differ on the question of abortion rights, Sen. Toomey believes we should all be able to agree on policies that encourage adoption over abortion, that avoid taxpayer funding of abortions, and that allow parental involvement | {
"score": 2,
"cc": false,
"url": "http://www.toomey.senate.gov/?p=issue&id=33",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
History in Custody
The U.S. Marshals Service Takes Possession
of North Carolina's Copy of the Bill of Rights
At times, the
U.S. Marshals Service is entrusted with objects of national and historic
importance. Agency personnel transported numerous artifacts of national
importance during our Bicentennial exhibit, including Belle Starr's
saddle and Geronimo's Arrest Warrant. The U.S. Marshals' Office of Asset
Forfeiture had custody of Muhammad Ali's World Boxing Championship
Rings. In the past year, the agency's involvement in the secure
transport of important historical documents have increased. The Northern
District of Illinois ensured the safe transfer of rare letters from
President Abraham Lincoln and John Wilkes Booth from the National
Archives to the Newberry Library in Chicago. The U.S. Marshals are given
a unique opportunity to safeguard national treasures and have flawlessly
committed themselves. There is no greater example of this commitment
than the recent seizure of North Carolina's copy of the Bill of Rights.
U.S. Marshal Charles Reavis of the Eastern District of North Carolina
applied for a Application and Affidavit For Seizure Warrant to U.S.
District Judge Terrence W. Boyle on March 13, 2003. Under a violation of
Title 23 of the United States Code, Section 15, Marshal Reavis was to
retrieve some stolen items. However, this was not any typical seizure.
The property was one of the rarest documents in American history: North
Carolina's copy of the Bill of Rights, only one of fourteen handwritten
original documents that define the first ten amendments to the U.S.
Constitution. The document was identified by specific markings on the
back of the parchment. According to the Charlotte Observer, three
secretaries wrote the fourteen copies of the historic document on a
large pages measuring 34 by 28 inches. Once finished, George Washington
sent out a copy to each of the original thirteen colonies and one to
Congress. Also seized were two related letters from George Washington to
North Carolina Governor Samuel Johnson. According to the affidavit
accompanying the warrant, the handwritten document was being sold by a
New York collector through an auction gallery. Both Federal and North
Carolina officials were determined to retrieve it - and Judge Boyle
agreed -the document belonged to the people of North Carolina.
The astounding story of the missing copy of the Bill of Rights started
in April 1865. General William Tecumseh Sherman's men marched through
North Carolina battling General Joseph Johnston's Confederate army. When
Johnston's men fell back beyond the state capitol of Raleigh, Sherman's
men quickly moved in. An unnamed Ohio soldier posted at the North
Carolina Office of the Secretary of State in Raleigh took the valuable
parchment home at the close of the Civil War. Similar confiscations by
souvenir-seeking soldiers took place throughout the final months of the
conflict, but few were of this national magnitude. The soldier returned
to his home in Ohio and sold it the following year for five dollars to a
gentleman named Charles A. Shotwell. In 1876, North Carolina officials
traveled to Indianapolis, Indiana as they believed the copy of the Bill
of Rights found its way there. They returned empty-handed. In 1897,
state officials discovered that Shotwell had possession of the document.
He refused to return it, and nothing more was heard until 1925.
"It was like a kidnapping," Marshal Reavis said.
For fifty-nine years, Charles Shotwell preserved the document in his
home. When the old gentleman finally decided to part with it, a
colleague named Charles I. Reid contacted the North Carolina Historical
Commission to offer it for sale. No monetary amount was discussed in
the March 25, 1925 letter. The possessor wished "any reasonable
honorarium." However, it was clear that North Carolinian officials felt
it was stolen property subject to return, and the offer was rejected.
One state official remarked that the missing document represented a
"memorial of individual theft" from the people of North Carolina.
The North Carolina copy of the Bill of Rights resurfaced again in 1995
when a Washington, D.C. attorney, representing several unnamed
individuals, contacted the North Carolina Department of Cultural
Resources. The individuals claimed the document had a worth between 3
and 10 million dollars. As tempting the offer may have been, state
officials could not use North Carolina tax dollars to buy it. The
Charlotte Observer reported that New York collector Wayne E. Pratt
contacted a Philadelphia museum and tried to sell the copy to them. The
collector asked for four million dollars, and the offer was relayed to
Pennsylvania Governor Ed Rendell. In turn, North Carolina Governor Mike
Easley was notified.
Working through U.S. Attorney Roy Cooper, state officials decided to
seize the document through a federal sting operation. The copies were
examined by the First Federal Congress Project in Washington, D.C., a
part of the George Washington University, and found to be authentic. The
collector signed official contracts at the Philadelphia museum. During
this process, it was found Mr. Pratt offered the documents to North
Carolina in 1995. Once the document returned to North Carolina, it was
entrusted to the custody of Marshal Reavis. In the subsequent Civil
Action No. 5:03-CV-204-BO, "Verified Statement of Interest of State of
North Carolina," it was determined that "North Carolina had no knowledge
of and did not consent to any acts subjecting the property to forfeiture
and is therefore an innocent owner ... . Marshal Reavis and his
deputies in the Eastern District of North Carolina are proud to be
entrusted with an object of such historic importance.
"To be holding a piece of the fabric of the formation of this country
... and to be charged with the protection of it ... it's sacred." | History in Custody
The U.S. Marshals Service Takes Possession
of North Carolina's Copy of the Bill of Rights
At times, the
U.S. Marshals Service is entrusted with objects of national and historic
importance. Agency personnel transported numerous artifacts of national
importance during our Bicentennial exhibit, including Belle Starr's
saddle and Geronimo's Arrest Warrant. The U.S. Marshals' Office | {
"score": 3,
"cc": false,
"url": "http://www.usmarshals.gov/history/north_carolina_bill_of_rights.htm",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
Classical Drama and Society
SECTION 4: ROMAN DRAMA
Chapter 14: Roman Comedy, Part 2 (Terence)
I. Introduction: Roman Comedy after Plautus
Following Plautus' death in the mid-180's BCE, Caecilius Statius emerged as the pre-eminent playwright of Roman Comedy. Though much admired in his day and long after, not even one work of his survives whole and intact. Yet even so, it's evident from the surviving fragments of his plays and other data that his comedy was less boisterous than Plautus'. That Caecilius Statius stayed closer to the tone and structure of his Hellenistic models is clear not only from the fragments of his plays but also the fact that their titles are mostly in Greek, not Latin, in some cases corresponding directly with the titles of the Menandrean originals he was adapting.
This does not mean, of course, that Caecilius Statius wrote in Greek; rather, it suggests that he inclined away from the Romanizing tendencies of his immediate predecessors Naevius and Plautus whose plays almost invariably have Latin titles, often not even translations of the original Greek title. (note) In other words, Roman Hellenism was clearly on the rise in the 170's BCE, and undoubtedly that was in no small part because of Caecilius' efforts. But his death in 168 BCE opened the door for new voices to enter the Roman stage, and onto these boards trod one of the greatest the Romans would ever produce, Publius Terentius Afer, known today as Terence.
Little is known about Terence's life, not even the years of his birth and death. Still, we can make good guesses at both. Ancient sources report he died young and, since his last play was produced in 160 BCE, he was probably born at some point between 195 and 185. Thus, he died most likely soon after his final drama debuted, probably in the early 150's. (note)
With that, he would never have known Plautus, though there are other reasons
these two are not likely to have met—they traveled in very different social
circles—however, if the story is not a fiction, Terence as a young man Terence met Caecilius
Statius. (note) Other
data, however, which are often cited in textbooks as facts about Terence's life,
such as that he was originally a slave from North Africa and later freed, seem
on closer inspection suspect, at best "secondary"
evidence." About his drama and career as a playwright, on the
other hand, we are much better informed.
II. Terence's Drama
Several remarkable things stand out about Terence's work. First and foremost, all the plays he ever wrote survive complete. Along with that have come significant details about them: the years in which they premiered and thus the order in which he composed them, who produced them and at what festival, from which Greek originals Terence worked, and even the musician who arranged the music. So, for instance, we know that Terence's consummate masterpiece, Adelphoe ("The Brothers"), was staged at the celebrations surrounding the funeral of Aemilius Paullus in 160 BCE. All this information makes it possible to track Terence's career as we can no other ancient playwright's, even a celebrity on the order of Sophocles.
Nor does any other ancient dramatist's entire corpus survive. Indeed, few other classical authors writing in any genre have their entire body of work preserved, and then only luminaries like Vergil. (note) Thus, in many ways Terence stands alone among ancient dramatists. His work is uniquely well-documented, and the reason must be, at least in part, the high regard in which he was held from his own time on.
So, for instance, the Romans living in the next century (100-1 BCE) saw Terence's writing style as the model of their own—Julius Caesar himself composed a treatise on Terence's sermo purus ("clean dialogue"; note)—and well over a millennium later professors in the Renaissance used his drama as a teaching tool. Even a tenth-century nun named Hrotswitha (or Hrotsvit), a canoness living in a cloister in northern Germany just after the Viking invasions, read Terence's dramas with a pleasure that made her uneasy, and so she remodeled them to suit the ethic of the chaste Christian life and glorious virginity she and her sisters in their abbey exemplified.
As a result, we have over six-hundred Terence manuscripts, some of great antiquity and accuracy, dating from many different periods of the Middle Ages and Renaissance. Compared to Plautus whose plays survived medieval times on the slenderest of threads, the existence of so many copies of Terence's work is a remarkable tribute to his endurance as an artist. (note) All in all, it is hard to find any age in which Terence's work has not been praised and imitated and his name not widely known, except our own, of course. On whom that will reflect more—Terence or us?—only the future can say.
As another item of note, scholia accompany all Terence's plays. Like those appended to Aristophanes' work, these critical commentaries explicate a wide range of subjects, everything from Terence's meter to his word choice to the original Greek underlying the Latin. Harboring many valuable, albeit not always accurate, morsels of data, the Terence scholia date back to the time of—and, no doubt, the hand of, as well—Aelius Donatus, one of St. Jerome's teachers. Though living in the 300's CE, as far from Terence as we are from da Vinci, Donatus clearly had access to sources of data now lost about this early Roman playwright and, more important, sound judgment in analyzing literature. These scholia attest to a widespread and enduring interest in Terence's work, a general admiration lasting well beyond his lifetime.
III. The Prologues of Terence's Plays
But most remarkable of all—and, without doubt, the best evidence for Terence's drama and its theatrical context—is information which comes from his own hand, the prologues appended to the front of his dramas. Except for Aristophanes' parabases, the text of every ancient play extant is expressed not with its author himself as the spokesman outright but through the persona of a stage character. This makes it hard, often impossible, to unravel the dramatist from the drama. So, for instance, as strong and clear as Euripides' personal opinions may seem after one reads his plays, not one syllable of any script he wrote is preserved as his own words. Instead, everything we know about the man named Euripides must be deduced through the veil of his drama, or from what others had to say about him.
Terence's prologues, however, address the audience directly and discuss, not the plot of the upcoming play the way Greek dramatists often did, but details of the play's production and the workings of Roman theatre. Thus, unique documents attesting to the nature of Roman Comedy—and Republican drama and society in general—these prologues open our eyes to the world beyond, behind and beneath the play, hinting, for instance, at what rehearsals were like, how productions were funded and the jealousy that could rage between rival playwrights. But, best of all, we hear what Terence has to say about his work and his life in his own words.
And as expected, his truth is clearly not the truth, the whole truth, that is. Like any public figure who feels compelled to defend his actions and choices, Terence dodges questions, skirts issues, flatters his producers, kisses up to the public, points to his own genius and, generally, acts like a politician at a press conference, not a patient on truth serum. But like so many invented histories, his catty retorts hint at larger realities and, as it turns out, speak volumes about the artist and his age. Also, because there is no known precedent for these prologues, they may even have been a feature of playwriting Terence himself invented. If so, it is one of the few aspects of drama the Romans may claim as their own, and claim proudly.
As such, the prologues are worth a closer look. Here is the prologue to Terence's Andria ("The Woman from Andros") notable, if for nothing else, as the first words he ever wrote for public performance, since Andria was his first play to be produced on stage:
Our poet, when first he set his mind to writing,
Thought he was doing only one job:
Pleasing the people with the plays he wrote.
But, no! He found out quite differently
That he'd have to spend his time writing prologues
That don't discuss the plot but answer
The abuses of a malevolent decrepit poet.
As to what they cite as his crime, listen to this!
Menander wrote an Andria and a Perinthia.
If you've seen one, you've seen them both—
They're not at all dissimilar in plot; in fact,
They differ only in words and style.
What fits into Andria from Perinthia
Our poet admits he "translated" for his own purposes.
And this is what some people call a crime, and furthermore
Add it isn't right to "contaminate" a play. But
They show by this thinking they aren't thinking.
When they accuse him, they accuse Naevius, Plautus,
Ennius, too, whom our poet considers his guardians
And whose "carelessness" he'd rather imitate
Than those people's murky punctiliousness.
And so I warn them to quiet down and stop
Their slander, or they'll taste their own medicine!
So, you, be good, judge fairly and listen to the case,
So you can see whether there's any hope left
That the comedies he will re-master after this
You ought to sit and watch, or drive off stage before ever seeing them.
This prologue reveals that Terence felt for some reason compelled to justify the freedoms he had taken in rendering into Latin Menander's original, also entitled Andria. Though the young playwright leaves his accuser unnamed—for rhetorical purposes, it is often wise not to name your detractor but call him something like "that man"—Donatus tells us that it was Luscius Lanuvinus, a second-rate comic dramatist. In some public way, this "malevolent decrepit poet" had taken exception to Terence's practice of combining two Greek plays and making one Roman one. The reason this constitutes malfeasance is not clear—the plays were, after all, written by the same author which begs the question: what sort of criminal abuse is it to mix Menander with himself?—but then we must remember that we are hearing only Terence's side of the case.
To judge from the plaintiff's language, Luscius Lanuvinus has contemptuously referred to this process as contaminatio ("pollution," literally "a touching together"), a charge that has sparked Terence's defensive response. But why does Lanuvinus decry contaminatio? Did the Romans generally recognize, as some scholars have suggested, that there were a limited number of originals on which to base Roman plays? Did this lead to a rule of some sort about not using more than one Greek play in constructing a Roman copy?
If so, there is little other evidence to this effect, or that Lanuvinus' charges stuck. Terence went on producing plays and, so far as we can tell, "contaminated" everyone of them. Perhaps, then, it was just a matter of good taste, an area of life in which the young rarely listen to their elders.
Nevertheless, the charge of contaminatio did not go away quickly. Terence had to address this issue again in later prologues, such as that appended to Adelphoe ("The Brothers"), the last play he wrote and, without doubt, his consummate masterwork:
After our poet discerned his efforts
Were being criticized by bigots, and rivals
Were carping at the play we're about to perform,
. . . <a line or two is missing here> . . .
As witness for himself he will appear. You will be the judges,
Whether this ought to called a fair play, or foul.
They Died As One is a comedy by Diphilus.
Plautus turned it into Till Death Us Part! (note)
In the Greek play there's a youth who steals a pimp's
Girl in the first scene—this, Plautus omitted entirely—
And this, our poet has now borrowed for himself
In his Adelphoe, translated word for word and now relayed to you.
It's the play we're going to play, all brand new! Consider, then,
If you think this is burglary, or a scene that's been
Rescued, one that was just overlooked accidently.
And as to what those malefactors say, that well-born men
Assist our poet and write with him continually,
He accepts the compliment—and no small compliment it is!—since he pleases
Those who please everyone of you and the Roman people,
For every man in his time has enjoyed a bit of their favor
In war, in peace, in prosperity, without incurring envy.
So, don't expect to hear the plot of the play here.
The old men who come on first will reveal it, some of it,
The action will unveil the rest. So, see to it now that
Your fairness enhances the writer's will to write.
Terence's final play production—that is, the last to have been staged during his lifetime as far as we know—was not Adelphoe, however, but a revival of an earlier flop, Hecyra ("The Mother-in-law"). No fewer than two previous attempts to stage this play had, in fact, failed before the production to which the prologue below was added. The reason for this drama's earlier failures, as explained below, was that noisy and bored spectators had disrupted the theatre so badly the actors could not continue performing—it is a very "talky" play!—so Terence and his producer, the famous actor Lucius Ambivius Turpio, tried a third time to stage the drama. Note that Turpio himself served as the speaker of the prologue, though presumably Terence wrote the words:
As advocate I come before you, in the guise of a prologue.
Allow me to convince you that an old man may have
The same right I once had as a younger man.
In those days I gave old age to new plays, ones driven from the boards,
Making sure the drama did not disappear with the poet.
I produced new plays by Caecilius Statius—
In some of them was booed, in others stood my ground—
For I knew that fortune in the theatre is especially fickle,
So I held on uncertainly to a certain task:
I began to repeat the same plays and help this same man produce
New plays. I worked hard so he wouldn't be discouraged.
I made sure they were seen, and when they were well-known,
They became a success. Thus, I gave this poet back his place
Almost cut off because of his enemies' libel
From his genius, his work and his own theatrical talents.
But if I had scorned his writings at that time
And had chosen to spend my energy disparaging him
So he'd end up with more time for playing than play-making,
I could have dissuaded him easily. He'd have written no more.
Now, as to what I seek, listen and for my sake be fair!
I bring before you Hecyra, again! I have never gotten through
This play in peace. Some misfortune looms over it.
And that misfortune your perspicacity
Will finally put to rest, if you agree to, of course.
When I first tried to put this play on, news of a boxing match,
A gathering of friends, some shouting, women's voices
Made me exit from the stage before my cue.
I decided to try my old habits on a new play,
Make another go of it. I put it on again.
Act One goes well. But in the meantime a rumor circulates
That gladiators will be fighting. A mob flocks in.
There's pushing and shoving, screaming and fights over seats.
In the meantime I could hardly keep my place.
But today there is no mob, only peace and quiet.
The time for me to act has finally come, for you to take
The opportunity to dignify this dramatic festival with us.
Don't let your name be used to give a chance for stardom
To only a few. See that your influence
Fosters and furthers my own influence.
Allow me to beg of you: this man who has entrusted
His genius to my tutelage, his person to your good faith,
Let him not be sieged by detractors who demean him derisively.
For my sake, hear his case and lend him silence,
So others may write and I can bring to the stage
New plays henceforth, what I've paid good money for.
From these prologues it is clear that in Terence's mind the foremost issues concerning Roman drama circulate around the production of the play and the nature of adapting Greek drama into Latin. Also evident here is the hierarchy of Roman theatre, where a dominus like Turpio truly dominates and playwrights-in-need like Terence and Caecilius must enlist his aid in a crisis.
But from our remove, what looms larger is the issue of the Romans' cultural appropriation of Greek drama, and there one thing stands out: Menander in the long run won the battle among Greek comic playwrights and finally emerged "the star of New Comedy." To wit, four of Terence's comedies (Andria, Heautontimoroumenos, Eunuchus, Adelphoe) are adaptations of Menander's work, and the remaining two (Hecyra, Phormio) come from Greek originals written by a later Menandrean imitator, Apollodorus of Carystus.
As the dust kicked up by Alexander and his cronies slowly settled, one thing at least began clear: Philemon, Diphilus and Menander's other rivals and predecessors were left sitting off stage for the most part. That is, when all the politics and pomp of the Dionysia finally died away and Greek culture became the world's possession, that quiet type of comedy championed by the master of character depiction took home the award for best drama of all time, leaving his rowdier and, to be frank, often funnier compatriots off stage. Humor, or so it seems history is telling us, is in the long run not the point of comedy; ironically, it's irony.
A. Terence and Menander
And indeed irony lies at the heart of Terence's drama. His focus, like Menander's, rests mainly on drawing realistic and gently humorous—often hardly comical at all—portraits of stereotypical characters deployed in flexible and deceptively simple-sounding language. Throughout his scant six comedies are found many excellent examples of the subtle personality types Terence favored, "subtle" meaning "Menandrean." Indeed, there is reason to suppose they are actually Menander's own creations, copied faithfully out of the Greek.
Among the more memorable is the lovesick braggart soldier Thraso ("Bold") of The Eunuch, a man hopelessly smitten with affection for the beautiful prostitute Thais. Though he tries to stick up for himself, and at one point even attacks her house with an army—granted, a corps of cooks, the only force he could serve up in short order!—at the conclusion of the play Thraso capitulates to her completely and, just to be in her ravishing presence, agrees to pay handsomely for the privilege of watching her lie in the arms of his rival. A soldier maybe, a braggart definitely, but mostly just a man, this bold loser is, in fact, a sad weakling far more controlled than controlling. Though there is an actual eunuch in the play—and, of course, a false one since this is a comedy—the real eunuch in Terence's Eunuch is the pitiful warrior Thraso, the quintessential symbol of a capon's bravado.
An even more pitiful creation is the kind and indulgent father Micio of Terence's Adelphoe ("The Brothers"). Actually the uncle of his stepson Aeschinus, Micio has served as the boy's "father" for nearly all his young nephew's life. Micio and his brother Demea, Aeschinus' genetic father, have had a running battle for many years about the right way to bring up children, with leniency or strictness. Gentle Micio, the champion of tender love, has taken many blows to the ego—and the wallet!—because of Aeschinus' outrageous behavior ever since the boy embarked upon puberty, but his adoptive father's abiding love has always found a way to bring them back together.
In the course of the play, however, Aeschinus challenges his stepfather's patience to the very limit of endurance—he roughs up a pimp, steals a prostitute, and fathers a child by the poor girl next-door—yet in the end Micio, as always, capitulates and repairs the damage incurred through his beloved child's indiscretions. Finally, at the conclusion of the play, this fool for the love of his son has served up not only patience and money but his house and home and, though he balks at first when Aeschinus pleads with him to marry, is persuaded to give up even his prized bachelorhood, too. The thought underlying this play—what indeed runs beneath all of Terence's drama—seems to be that the love of whatever and in whatever form is, at the same time, the finest attribute of humanity and also what makes utter idiots of us all. It is hard to imagine a more Menandrean sentiment.
IV. Conclusion: What's So Roman about Roman Comedy?
In fact, there is little in Terence that does not scream Menander. But if there is anything substantively new in the Roman playwright's work—besides the forensic prologue which is really more innovative for what it omits (exposition of the plot) than what it includes—it is dramatic suspense. By not revealing the general parameters of the story to follow, Terence creates tension among his viewers who are now on an intellectual par with the characters. This is contrary to every Menander play known, indeed all of Greek drama since the Classical Age, and sets Terence's art in a new mode characteristic of virtually all stage works written after antiquity. In this essential respect, modern theatre begins with him.
To understand how and why Terence did this requires that one look back at Menander and the reasons his plays always reveal the outcome of the plot to the audience. While giving away the end at the very outset of a play may seem to us today like spoiling the story because we are acculturated to anticipate surprises and unforeseen plot twists, to the ancient Greeks the converse was true. Suckled as Menander's audience was on classical tragedy where the outcome of a dramatic plot is almost always a foregone conclusion—in Euripides, admittedly, it is sometimes the only foregone conclusion—the Hellenistic crowd had come to expect to know right from the outset how a play would turn out. That made watching a tragedy more like being a god than a human, an Olympian sitting above the turmoil of mortal life or a scientist observing an experimental animal pinned and squirming in the laboratory dish below. All in all, Greek tragedy is clearly designed to make the viewer feel superior to the hero on stage, in the same way that the majority of the audience loomed over the stage action physically.
Given an audience inured to being seated well above the characters on stage, post-classical comic poets in Greece had little choice but to dispose their drama from this same vantage point. So in telling his viewers the end of the story, often through a philosophical abstraction such as Luck or Ignorance—gods that looked to post-classical Greece more divine, or at least more immediate, than Homer's all-powerful humanoids—Menander put those watching his plays in the flattering position of feeling like divinities gazing down upon the tragi-comedy of human life unfolding below. It's important to remember, also, that Menander's audience in Hellenistic Athens may well have needed this sort of boost to the ego. The world outside their theatre was doing a very poor job of making them feel divine.
But unlike Menander, Terence had no such history or pressure weighing down on him and his society. The Romans were booming in his day and therefore needed a pat on the back far less than their Hellenic counterparts. If the theatre in Rome did not make the viewers feel divine, so what? His strong and confident audience could take it—even tolerate being fooled by a plot twist or two—without feeling their intelligence slighted. It was only a play, after all, just some Greek riddle not worth too much time or mental exertion, certainly nothing to hang your ego on.
It was part and parcel of the Romans' general attitude toward drama, that theatre was not a refuge from anything but a day's work. To seek complexity in the arts at all was, to many of them, wasted effort where amusement and diversion should rule. Thus, no complex "three-actor rule" for the Romans, no stereotypical characters whose behavior is subtly predictable, no long, philosophical heart-to-hearts between fathers and sons—the Roman stage was a place for boisterous joy, for singing loud and long that life is good. And so it was!
And so irony reigns again, but in this case the irony that the Romans' "Aristophanic" zest is what sets their drama apart from the Greeks'. Whether or not the idea originated with them, it is now the heritage of Rome that plays ought at heart be just plain fun: no serious contemplation of life, no subtle analysis of character, no big political message, just a day at a festival—even if it's a funeral! And if amidst all the jokes and physical humor Terence or Plautus happened to inject some serious art and education into their drama, it seems unlikely any Romans minded, as long as the players primarily played. After all, in Latin ludus means both "play" and "a play."
|Terms, Places, People and Things to Know
Apollodorus of Carystus
This work is licensed under a Creative Commons Attribution-No Derivative Works 3.0 United States License. | Classical Drama and Society
SECTION 4: ROMAN DRAMA
Chapter 14: Roman Comedy, Part 2 (Terence)
I. Introduction: Roman Comedy after Plautus
Following Plautus' death in the mid-180's BCE, Caecilius Statius emerged as the pre-eminent playwright of Roman Comedy. Though much admired in his day and long after, not even one work of his survives whole and intact. Yet even so, it's evident from the survivin | {
"score": 3,
"cc": true,
"url": "http://www.usu.edu/markdamen/ClasDram/chapters/143terence.htm",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
The use of chemicals has increased dramatically due to the economic development in various sectors including industry, agriculture and transport. As a consequence, children are exposed to a large number of chemicals of both natural and man-made origin. Exposure occurs through the air they breathe, the water they drink or bathe in, the food they eat, and the soil they touch (or ingest as toddlers). They are exposed virtually wherever they are: at home, in the school, on the playground, and during transport.
Chemicals may have immediate, acute effects, as well as chronic effects, often resulting from long-term exposures. About 47 000 persons die every year as a result of such poisoning. Many of these poisonings occur in children and adolescents, are unintentional (“accidental”), and can be prevented if chemicals were appropriately stored and handled. Chronic, low-level exposure to various chemicals may result in a number of adverse outcomes, including damage to the nervous and immune systems, impairment of reproductive function and development, cancer, and organ-specific damage.
Sound management of chemicals, particularly heavy metals, pesticides and persistent organic pollutants (POPs), is a prerequisite for the protection of children’s health. Due to the magnitude of their health impact on children, the initial focus for action should be placed on the so-called “intellectual robbers” : lead, mercury and polychlorinated biphenyl, as well as on pesticides, but this by no means implies that other chemicals should be ignored. | The use of chemicals has increased dramatically due to the economic development in various sectors including industry, agriculture and transport. As a consequence, children are exposed to a large number of chemicals of both natural and man-made origin. Exposure occurs through the air they breathe, the water they drink or bathe in, the food they eat, and the soil they touch (or ingest as toddlers). | {
"score": 4,
"cc": false,
"url": "http://www.who.int/ceh/risks/cehchemicals/en/index.html",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
After a person has been
infected through exposure to the smallpox virus, a symptom-free period follows. This is called the incubation period. It is normally 12 days in length
but may be as short as 7 days or as long as 17 days.
The illness begins with fever. The patient feels sick and has symptoms such
as head-ache and severe backache.
A rash appears after 2 to 4 days and progresses through characteristic
stages of papules, vesicles, pustules and finally scabs. The scabs fall off at the end of
the 3rd or 4th week. | After a person has been
infected through exposure to the smallpox virus, a symptom-free period follows. This is called the incubation period. It is normally 12 days in length
but may be as short as 7 days or as long as 17 days.
The illness begins with fever. The patient feels sick and has symptoms such
as head-ache and severe backache.
A rash appears after 2 to 4 days and progresses through charac | {
"score": 3,
"cc": false,
"url": "http://www.who.int/emc/diseases/smallpox/slideset/pages/spox_003.htm",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
The waste hierarchy
There are many ways of disposing of waste. The waste hierarchy lists these methods in a sliding scale, from the most environmentally friendly option to the least:
Prevention (Reduce) – the best option, this focuses on reducing waste being produced in the first place
Reuse – for example, using old food containers as lunch boxes or old plastic bags as bin liners
Recycle – taking materials from old products to make something new, like making car parts from old metal drinks cans
Energy recovery – creating energy from waste, for example by burning it to produce electricity
Disposal – the worst option, this often involves burying rubbish in landfill where it produces methane, a greenhouse gas
What can you do?
There are lots of ways that you can help to reduce waste where possible and, where waste is created, dispose of it responsibly. Here are a few examples:
- Get a sturdy shopping bag, or re-use supermarket carrier bags to avoid having to use new plastic carrier bags.
- Don't use cling film or kitchen foil to store food. Put it in reusable boxes with lids or re use margarine tubs and other containers.
- Buy loose rather than prepacked fruit and vegetables - but remember to only buy what you can use.
- Love food, hate waste. Learn how to save yourself £50 every month by making the most of leftover food. Visit the Love Food Hate Waste website (External link) where there are lots of tasty recipes as well as hints and tips on how to store food and buy responsibly to avoid food waste.
- Register to get your bills and bank statements sent to you online, rather than on printed statements.
- Nappies - about 800,000 tonnes of nappies are disposed of every year, costing local authorities millions. Real nappies now use Velcro fastenings - there are no pins required, and many areas have a nappy laundering service. Contact the Real Nappy Campaign (External link) for advice.
- Make the most of your kerbside recycling services The council offers kerbside collections of many items, such as paper, garden waste, plastic bottles and containers, glass bottles and jars and metal cans and foil.
- Don't bin garden waste. If you have a green bin, you can use that for fortnightly collection of garden materials (please don't include food or plastics). Alternatively, you can compost at home with a specially priced home composter. Ring 0844 571 4444 (local rate number) to order or request one online at our partner's website, Get Composting (External link).
- Don't forget that aerosols can be recycled too - they account for 4% of all metals used in the UK each year. Aerosols can be recycled in your Brown bin at home or just drop empty aerosols into any can bank.
- For waste that cannot be recycled at home, check to see if your local Household Waste Recycling Centre (HWRC) can take it instead. | The waste hierarchy
There are many ways of disposing of waste. The waste hierarchy lists these methods in a sliding scale, from the most environmentally friendly option to the least:
Prevention (Reduce) – the best option, this focuses on reducing waste being produced in the first place
Reuse – for example, using old food containers as lunch boxes or old plastic bags as bin liners
Recycle – taking | {
"score": 4,
"cc": false,
"url": "http://www.wigan.gov.uk/Services/Environment/WasteRecycling/RecyclingWastePreventionAdvice.htm?NRMODE=Published&NRNODEGUID=%7B8D73724C-6D64-408F-BF74-55B646E4DD34%7D&NRORIGINALURL=%2FServices%2FEnvironment%2FWasteRecycling%2FRecyclingWastePreventionAdvice.htm&NRCACHEHINT=NoModifyGuest&TextSize=XL",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
Matthew Lemke, Orion Avionics, Power and Wiring Manager
This profile is the first in a series to introduce the people behind the development of Orion in advance of the spacecraft’s move from the Michoud Assembly Facility in New Orleans to Kennedy Space Center in Florida for outfitting before its first space-bound test, planned for 2014. Exploration Flight Test-1 is an essential step that will allow engineers to acquire critical re-entry flight performance data and demonstrate early integration capabilities to prepare Orion for deep space exploration.
Q: What is your contribution to EFT-1?
A: I am responsible for most everything that generates or uses electrons on the Orion spacecraft. That includes things like solar arrays, batteries, computers, displays, sensors, radios, antennas … Lockheed-Martin and their industry team do all of the hard work. I just make sure they have information they need to be successful and help set priorities.
Why is that contribution important?
It sometimes takes someone who is a step removed from the detailed engineering to ask questions like, “why?” “Is that really necessary?” “How could we modify the requirements to get the same capability for a lower cost?”
What do you find most fulfilling or like best about your job?
Getting to work on such a variety of hardware and working with the companies that are providing that hardware. Lockheed-Martin, Honeywell, Ball, and the many others, have amazing people and amazing capabilities.
What’s the most interesting part of what you do here at JSC?
The part of my job I find the most interesting is the opportunity to learn new things. In the last few months I have learned about expendable launch vehicles, pyrotechnic devices, the Van Allen radiation belt, lightning protection towers, flammability of electronics in high oxygen environments … In past years I have worked on spacesuit radios, laser inspection systems, inflatable space vehicles, regenerative life support, and robotic planetary rovers. What other place could offer this kind of variety?
What’s your best NASA memory so far?
My best NASA memory was getting to do some last minute crew training in the crew compartment, on the launch pad, just days before the launch of the Wake Shield Facility.
When you’re not at the office, what do you like to do?
I enjoy construction and remodeling projects. Building things gives me a great sense of personal accomplishment when I can point to something and say, “I did that!”
What were your career goals as a teenager?
I always thought I would be a scientist and invent new things.
Was there someone in your life that influenced you to take this career path, or studies in school?
No one in particular. My parents always emphasized reading and learning and I had some great teachers in high school that encouraged me to pursue a technical education. | Matthew Lemke, Orion Avionics, Power and Wiring Manager
This profile is the first in a series to introduce the people behind the development of Orion in advance of the spacecraft’s move from the Michoud Assembly Facility in New Orleans to Kennedy Space Center in Florida for outfitting before its first space-bound test, planned for 2014. Exploration Flight Test-1 is an essential step that will allo | {
"score": 2,
"cc": false,
"url": "http://www1.nasa.gov/centers/johnson/home/lemke_profile.html",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
If you’re pregnant or might get pregnant, you can begin taking care of your child long before birth. Drinking alcohol during pregnancy can have permanent negative health effects on your developing child. In this podcast, Claire Marchetta discusses the importance of avoiding alcohol use during pregnancy. Created: 7/26/2012 by MMWR.
Date Released: 7/26/2012. Series Name: A Cup of Health with CDC.
A CUP OF HEALTH WITH CDC
Avoiding Alcohol During Pregnancy
Alcohol Use Among Women of Childbearing Age — United States, 2006–2010
Recorded: July 24, 2012; posted: July 26, 2012
[Announcer] This program is presented by the Centers for Disease Control and Prevention.
[Dr. Gaynes] Welcome to A Cup of Health with CDC, a weekly feature of the MMWR, the Morbidity and Mortality Weekly Report. I'm your host, Dr. Robert Gaynes.
If you’re pregnant or might get pregnant, you can begin taking care of your child long before birth. Drinking alcohol during pregnancy can have permanent negative health effects on your developing child.
Claire Marchetta is a researcher with CDC’s National Center on Birth Defects and Developmental Disabilities. She’s joining us today to discuss the importance of avoiding alcohol use during pregnancy. Welcome to the show, Claire.
[Ms. Marchetta] Thanks, Bob. I’m happy to be here.
[Dr. Gaynes] Claire, what kinds of problems can alcohol use during pregnancy cause for newborns?
[Ms. Marchetta] Well, drinking alcohol during pregnancy can cause several problems, and these can include physical problems, such as delayed growth or problems with the heart, kidneys, or bones. And it can also lead to learning and behavior problems, such as lower IQ and hyperactivity. And collectively, these problems are known as fetal alcohol spectrum disorders, or FASDs.
[Dr. Gaynes] Are these conditions reversible or treatable?
[Ms. Marchetta] No Bob; unfortunately, they’re not. The baby’s brain is developing throughout pregnancy, so once brain damage occurs, it is permanent. However, there are interventions that can help the child live a more normal life. And the good news is that these types of problems are 100 percent preventable.
[Dr. Gaynes] So what is a safe level of alcohol consumption for pregnant women?
[Ms. Marchetta] Well, I want to be very clear and say that there is no known safe level of alcohol consumption during pregnancy.
[Dr. Gaynes] At what point before getting pregnant should a woman consider abstaining from alcohol use?
[Ms. Marchetta] Well Bob, an important thing to know is that half of all pregnancies are unplanned, so women who are trying to get pregnant or who might get pregnant, meaning those who are not using birth control at all or not using birth control consistently or as directed by their doctor, should not drink. And this is because women could be pregnant for several weeks and not know, and so drinking any alcohol could be very dangerous to their child.
[Dr. Gaynes] Where can listeners get more information about alcohol consumption during pregnancy?
[Ms. Marchetta] Listeners can visit our website and that is at www.cdc.gov/fasd.
[Dr. Gaynes] Thanks, Claire. I’ve been talking today with CDC’s Claire Marchetta about the importance of avoiding alcohol use during pregnancy.
Remember, there is no known safe level of alcohol consumption during pregnancy. If you’re pregnant or might get pregnant, don’t drink.
Until next time, be well. This is Dr. Robert Gaynes for A Cup of Health with CDC.
[Announcer] For the most accurate health information, visit www.cdc.gov or call 1-800-CDC-INFO. | If you’re pregnant or might get pregnant, you can begin taking care of your child long before birth. Drinking alcohol during pregnancy can have permanent negative health effects on your developing child. In this podcast, Claire Marchetta discusses the importance of avoiding alcohol use during pregnancy. Created: 7/26/2012 by MMWR.
Date Released: 7/26/2012. Series Name: A Cup of Health with CDC.
A | {
"score": 3,
"cc": false,
"url": "http://www2c.cdc.gov/podcasts/player.asp?f=8624677",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
BLOOMINGTON – Speaking to a local food summit at the Illinois Farm Bureau today, the state’s leading fresh food advocate Lt. Governor Sheila Simon released “promising” figures that show more low-income residents are accessing fresh food at farmers markets.
The amount of food stamp benefits known as LINK redeemed at Illinois farmers markets and from direct marketing farmers jumped to $41,146 from $11,146, a 269 percent increase between 2009 and 2010, Simon said. She attributed the growth, in part, to wider access.
Last year, 35 Illinois farmers markets and direct marketing farmers were certified to accept state-issued LINK debit cards, Simon said citing data collected by the U.S. Department of Agriculture. Currently, 49 Illinois farmers markets and direct marketing farmers accept LINK cards across 21 counties, including two in Bloomington-Normal.
“We are seeing a promising trend: more farmers markets accepting LINK and more food stamp benefits being used to buy locally produced, fresh food,” Simon said. “But with over 300 farmers markets and direct marketing farmers in Illinois, there is room to thrive. I am committed to helping expand LINK usage at farmers markets to improve the health and economy of our state.”
Lt. Governor Simon’s pledge comes nearly one year after Governor Pat Quinn signed into law the Farmers’ Market Technology Improvement Program Act, which created a fund to help Illinois farmers markets conduct outreach to SNAP recipients and purchase the equipment necessary to accept LINK cards. Simon said no revenue was ever dedicated to the fund, a problem she hopes to address as chairperson of the Governor’s Rural Affairs Council.
Chicago non-profit Experimental Station estimates the average start-up cost of equipping farmers’ markets to accept LINK is $2,500. That cost covers, outreach to SNAP recipients, purchase of a wireless EBT machine to accept LINK, and the servicing charges associated with the machines.
“While many farmers markets could afford this investment, there are others that need assistance. Working with other state agencies and both private and public organizations, it is my goal to find grant dollars that will have a huge multiplier effect on our state economy,” Simon said.
The Lt. Governor said a more sustainable food system has huge economic potential. Every dollar that is spent on local foods in Illinois has a total economic impact of $1.34, while every dollar spent on imported food returns only 20 cents to Illinois’ economy.
But despite Illinois agricultural resources, $46 billion of the $48 billion spent annually by Illinois residents on food is imported and travels an average distance of 1,500 miles. Growing, raising, and processing food in Illinois is an opportunity for emerging and existing farmers.
The Illinois Farm Bureau’s first Local Food Connections Summit brought together a diverse set of stakeholders including various government agencies, nonprofits, and agriculture associations. The summit served as a platform to facilitate the sharing of ideas and resources among these key stakeholders.
“While there are several individuals and organizations working on local food initiatives, it is important for us to synergize in order to minimize duplication, minimize cost, and get more accomplished,” said Cynthia Haskins, Manager of Business Development and Compliance for Illinois Farm Bureau. “Working together will mean greater opportunities for market access for farmers across Illinois. The Farm Bureau is working to make sure we build bridges that link our members with stakeholders and we look forward to working with Lt. Governor Simon on making that a reality.” | BLOOMINGTON – Speaking to a local food summit at the Illinois Farm Bureau today, the state’s leading fresh food advocate Lt. Governor Sheila Simon released “promising” figures that show more low-income residents are accessing fresh food at farmers markets.
The amount of food stamp benefits known as LINK redeemed at Illinois farmers markets and from direct marketing farmers jumped to $41,146 from $ | {
"score": 2,
"cc": false,
"url": "http://www3.illinois.gov/PressReleases/ShowPressRelease.cfm?SubjectID=1&RecNum=9544",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
INTERNATIONAL MERCHANDISE TRADE
EXPORTS AND IMPORTS
On a recorded trade basis, the value of South Australia's exports in December 2009 was $673m; an increase of 2.5% over November 2009 ($657m) but 24.3% lower than the value recorded in December 2008 ($889m).
In December 2008, the export of motor vehicles (15.8%), wine (14.6%) and wheat (11.0%) accounted for approximately 40% of all South Australian exports. In December 2009 the export of wine (15.8%), meat (8.1%) and various metals including lead (6.4%), iron ore (6.2%) and copper (5.0%) were the most significant commodities exported. The contribution of wheat and motor vehicles had fallen to 4.1% and 1.5% respectively.
The value of Australian merchandise exports for December 2009 was $16,323m; 21.7% lower than the corresponding month of the previous year ($20,858m).
The value of South Australian merchandise imports fell 9.4% to $581m in December 2009. In the last three months of 2009 the value of imports ($1,762m) was 9.8% lower than the value recorded in the corresponding quarter of the previous year ($1,954m).
The value of Australian merchandise imports for December 2009 was $17,662m; a slight increase (0.6%) over the previous month but 12.3% lower than the value recorded in December of the previous year ($20,142m).
VALUE OF INTERNATIONAL MERCHANDISE EXPORTS AND IMPORTS (a),
on a recorded trade basis, South Australia
This page last updated 29 March 2010 | INTERNATIONAL MERCHANDISE TRADE
EXPORTS AND IMPORTS
On a recorded trade basis, the value of South Australia's exports in December 2009 was $673m; an increase of 2.5% over November 2009 ($657m) but 24.3% lower than the value recorded in December 2008 ($889m).
In December 2008, the export of motor vehicles (15.8%), wine (14.6%) and wheat (11.0%) accounted for approximately 40% of all South Australia | {
"score": 2,
"cc": false,
"url": "http://abs.gov.au/ausstats/abs@.nsf/Previousproducts/1345.4Main%20Features13Feb%202010?opendocument&tabname=Summary&prodno=1345.4&issue=Feb%202010&num=&view=",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
This item is available under a Creative Commons License for non-commercial use only
2.3 MECHANICAL ENGINEERING
There is a growing demand for the use of renewable energy technologies to generate electricity due to concerns over climate change. The oceans provide a huge potential resource of energy. Energy extraction using marine current energy devices (MCEDs) offers a sustainable alternative to conventional sources and a predictable alternative to other renewable energy technologies. A MCED utilises the kinetic energy of the tides as opposed to the potential energy which is utilised by a tidal barrage. Over the past decade MCEDs have become an increasingly popular method of energy extraction. However, marine current energy technology is still not economically viable on a large scale due to its current stage of development. Ireland has an excellent marine current energy resource as it is an island nation and experiences excellent marine current flows. This paper reviews marine current energy devices, including a detailed up-to-date description of the current status of development. Issues such as network integration, economics, and environmental implications are addressed as well as the application and costs of MCEDs in Ireland.
O'Rourke, F., Boyle, F., Reynolds, A.: Marine current energy devices: Current status and possible future applications in Ireland. Renewable and Sustainable Energy Reviews, 2010. 14(3): p. 1026-1036. | This item is available under a Creative Commons License for non-commercial use only
2.3 MECHANICAL ENGINEERING
There is a growing demand for the use of renewable energy technologies to generate electricity due to concerns over climate change. The oceans provide a huge potential resource of energy. Energy extraction using marine current energy devices (MCEDs) offers a sustainable alternative to con | {
"score": 3,
"cc": true,
"url": "http://arrow.dit.ie/engschmecart/21/",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": true
} |
WILSON, James, a Delegate from Pennsylvania; born in Carskerdo, near St. Andrews,
Scotland, September 14, 1742; attended the Universities of St. Andrews,
Glasgow, and Edinburgh; immigrated to the United States in 1765; resided in New
York City until 1766, when he moved to Philadelphia, Pa.; tutor in the College
of Philadelphia (now the University of Pennsylvania); studied law; was admitted
to the bar in 1767; practiced in Reading and Carlisle, Pa., and for a short
time, during Howes occupation of Philadelphia, in Annapolis, Md.; also engaged
in literary pursuits; member of the Provincial Convention of Pennsylvania in
1774; Member of the Continental Congress 1775-1777, 1783, and 1785-1786; chosen
colonel of the Fourth Battalion of Associators in 1775; advocate general for
France in America and guided that countrys legal relations to the
Confederation; member of the board of war; brigadier general of the State
militia; a signer of the Declaration of Independence; a delegate from
Pennsylvania to the Federal Convention in 1787 and a delegate to the State
ratification convention; settled in Philadelphia in 1778 and resumed the
practice of law; Associate Justice of the United States Supreme Court
1789-1798; first professor of law in the College of Philadelphia in 1790 and in
the University of Pennsylvania when they were united in 1791; died in Edenton,
N.C., August 21, 1798; interment in the Johnston burial ground on the Hayes
plantation near Edenton, N.C.; reinterment in Christ Churchyard, Philadelphia,
Pa., in 1906.
BibliographySmith, Charles Page.
James Wilson, Founding Father, 1742-1798. Chapel Hill:
University of North Carolina Press, 1956. | WILSON, James, a Delegate from Pennsylvania; born in Carskerdo, near St. Andrews,
Scotland, September 14, 1742; attended the Universities of St. Andrews,
Glasgow, and Edinburgh; immigrated to the United States in 1765; resided in New
York City until 1766, when he moved to Philadelphia, Pa.; tutor in the College
of Philadelphia (now the University of Pennsylvania); studied law; was admitted
to the | {
"score": 2,
"cc": false,
"url": "http://bioguide.congress.gov/scripts/biodisplay.pl?index=W000591",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
Search America's historic newspapers pages from - or use the U.S. Newspaper Directory to find information about American newspapers published between 1690-present. Chronicling America is sponsored jointly by the National Endowment for the Humanities external link and the Library of Congress. Learn more
title: 'The Day book. (Chicago, Ill.) 1911-1917, February 06, 1914, NOON EDITION, Image 19',
meta: 'News about Chronicling America - RSS Feed',
Image provided by: University of Illinois at Urbana-Champaign Library, Urbana, IL
All ways to connect
Inspector General |
External Link Disclaimer |
P m-M uiiiWMl
had been accustomed to going home
There came up, however, trouble
among the sluice workers. It arose'
over the refusal of Dunbar to pay
them a certain rebate agreed on.
They refused to work. He claimed
that they had violated their contract
and were not entitled to the money.
These men claimed they were" being
robbed and quit the job, but hung
around making some ugly threats.
On this 'account Bert arid Mark
consented to remain nights near the
plant, and quite comfortably estab
lished themselves in a little building
that had been used to store dyna
mite in the early stages of the con
struction work. They would go to
town alternate evenings and did their
One afternoon Bert was returning
from- the village when he heard a
yell for help. He was amazed to trace
it to the side of the rough road, ap
parently beneath its surface. Final
ly he discovered an old man who had
fallen into an unused pit. He helped
him out, scared and bruised.
"Where's the. eggs!" gasped the
rescued one, looking wildly about.
"The eggs?" repeated Bert vaguely.
"Yes. I was carrying a basket with
forty dozen of them in it. Automo
bile came along. Stepped aside to
get out of the way of it and fell into
that hole. As I did so the basket
swung clear of my hand. I'm a poul
try farmer down the road. Suppose
all that hen fruit just smashed to
Bert made a search. It was a queer
thing, but he discovered the basket
safely nestled in among a lot of hazel
brush and not an egg cracked or
The old farmer was delighted. He
found out who Bert was.
"Say," he observed, "I'll send you
down a basket of the nicest, freshest
eggs you ever saw tomorrow."
The man kept his promise and
there was a rare, breakfast feast. Bert
and Mark had ggs boiled, fried and
poached. Bert was the cook that
morning, and after the meal set the
basket containing an egg supply for
a week ahead on a sheltered shelf on
the shaded end of the house outside.
It was about two hours later that
Bert and Mark, superintending some
work at the dam, were startled by
the sound of a violent commotion.
They noticed a little way up the road
an automobile containing half a
dozen young ladies. It was one that
Dunbar frequently hired from a local
garage. Then at a distance they
noted Dunbar himself.
He had evidently driven up to the
plant, had gone into the office and
coming out had been confronted by
a party of the dissatisfied workmen.
About a-dozen of these were chasing
"Lynch him!" . ;-
"Where's"' the money 'you stole
from us?" . f
,?String him up!" '
These and other vicious and
furious shouts followed-the fugitive.
He ran for his life, his face ashen
pale and terrified. He dodged behind
the little cabin where Bert and Mark
slept nights. As he came -into "view
again an amazing spectacle was re
vealed. Swat! through the air sped a
white oval missile. It struck the
glossy silk hat of the runtter and car
ried it into a mud puddle. Swat!
two more of the missiles landed on
his back, giving out a slimy ooze of
white and yellow. Then a perfect
fusilade, and as Dunbar turned to dis
cern the distance of his foes two more
projectiles landed on his face.
With a shriek of fear the fugitive
made for the near woods. He had to
pass the waiting automobile. He was
a bedraggled, forlorn specimen, a tar
get for the basket of eggs his pur
suers had discovered given "to Bert
by the farmer.
The rioters halted near the ma
chine as their prey escaped them, and
then the fair admirers of Tracy Dun
bar knew what kind of a man he was. | Search America's historic newspapers pages from - or use the U.S. Newspaper Directory to find information about American newspapers published between 1690-present. Chronicling America is sponsored jointly by the National Endowment for the Humanities external link and the Library of Congress. Learn more
title: 'The Day book. (Chicago, Ill.) 1911-1917, February 06, 1914, NOON EDITION, Image 19',
met | {
"score": 2,
"cc": false,
"url": "http://chroniclingamerica.loc.gov/lccn/sn83045487/1914-02-06/ed-1/seq-19/",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
Disease Team Therapy Planning I
We propose to assemble a multidisciplinary team of scientists and clinicians in pursuit of human iPS cell-based therapy for cerebral palsy. Cerebral palsy is a group of neurological diseases which produce chronic motor disability in children. This group demonstrates easily identifiable clinical findings, and much of their injury is to oligodendrocyte progenitors, the myelinating cells in the brain, in the cerebral white matter. Although oligodendrocyte progenitors are the cerebral white matter cells that are preferentially damaged in periventricular leukomalacia in premature infants leading to cerebral palsy, stem cell-derived oligodendrocyte progenitors have not been tested for their efficacy in preclinical trials. The primary goal here is to facilitate the exploration of a method of integrating and organizing high quality basic, translational and clinical stem cell research in a team setting, and to prepare research and management plans that can lead to clinical trials. A stem cell-based approach is very attractive for cerebral palsy, perhaps representing the best hope for medical breakthroughs that will reduce human suffering from this devastating disease. We will establish preclinical proof-of-concept in animal models that we have established, determine whether histology and neuromotor behavior are correlated on the same animals, and seek to image and track the grafted cells using MRI-detectable markers. We will foster coordination and collaboration among members of the Disease Team. The planning process will involve all team participants in addressing the objectives and translational potential of the research. The team will include multiple components and members with the relevant expertise: derivation of oligodendroglia, animal modeling, transplantation and immunology, project management, safety and toxicology, process development, quality control and assurance, regulation of biomedical products, and the preparation for clinical trials. Given the compelling evidence supporting the feasibility of the proposed concept and the underlying scientific approach, this planning award will allow us to put together the expertise, resources, services and technologies from different areas to move the research forward all the way to clinical trials. Taking an innovative disease team approach has the potential to advance therapies into the clinic more rapidly.
Statement of Benefit to California:
This proposal will use recent insights into the development of oligodendrocytes from the laboratories to improve production of oligodendrocyte progenitors from human iPS cells, and test whether these cells can improve the clinical outcome after transplantation in established animal model of periventricular leukomalacia leading to cerebral palsy. This effort represents the first step to translating the basic fundamental understanding of oligodendrocyte development into viable therapies for a serious human disease that is major burden on the citizens of California and worldwide. In addition, the proposed research will also benefit Californian in many other ways. It will result in development of novel technologies that will be broadly applicable to study stem cells and development of stem cell-based therapies, will help boost stem cell-based biotechnology industry in California, and will help position us and other Californian scientists at the forefront of stem cell research and medicine. It will increase experience and knowledge of stem cells among residents of California. It will contribute to the California education and health care systems by training undergraduate, graduate and postdoctoral students into highly skilled stem cell biologists. This project involves cooperation between multiple laboratories with complementary expertise. The interaction will facilitate skill exchange and staff training in cutting edge multidisciplinary approaches.
EXECUTIVE SUMMARY Project Synopsis This Planning Award proposal focuses on an induced pluripotent stem cell (iPSC)-derived cell therapy for periventricular leukomalacia (PVL) leading to cerebral palsy. PVL is a leading cause of cerebral palsy and is characterized by damage to cerebral white matter, which consists of cells called oligodendrocytes that produce myelin. The applicant proposes to develop allogeneic iPSC-derived oligodendrocyte progenitor cells as a cell replacement therapy for PVL leading to cerebral palsy. For the Research Award, the applicant proposes to complete IND-enabling preclinical studies and submit an Investigational New Drug (IND) application to the Food and Drug Administration (FDA) and conduct a Phase I/IIa clinical trial following approval of the IND. Significance and Impact - The potential impact of this particular proposal is unclear, given the early stage of development of the therapeutic candidate and the lack of feasibility of the draft project plan. - There is unmet medical need in the proposed patient population and development of a stem cell therapy for PVL leading to cerebral palsy could be impactful if successfully developed, as there are currently no effective, restorative therapies for these patients. Project Rationale and Feasibility - The applicant does not present sufficient proof-of-concept efficacy data with the proposed development candidate to support first-in-human clinical trials. - The rationale for using allogeneic iPSCs is unclear. Allogeneic iPSCs are not necessarily preferable to autologous iPSCs and could require patient immunosuppression, something not discussed in the proposal. Reviewers suggested that the applicant consider developing autologous iPSCs, as the lesions associated with PVL are not particularly time-sensitive, so the additional time required for autologous cell production should not be an issue. - The feasibility of completing the proposed preclinical and clinical studies in four years is doubtful, given the lack of proof-of-concept data, the lack of a definitive route of administration, and the poorly defined clinical trial parameters. - The proposed Phase I/IIa trial is vaguely outlined, with few details provided on the proposed patient population, specifically the targeted age of intervention or efficacy endpoints. It was noted that neurocognitive decline is a questionable inclusion criterion, as it is generally not seen in these patients. - No details are provided on methods for assessing biodistribution or cell tracking. - The rationale for pursuing cell-based therapies for PVL leading to cerebral palsy is strong, and reviewers encouraged development of this approach. Principal Investigator (PI) and Planning Leader - The PI is involved primarily in preclinical research and does not have experience translating this research to the clinic or running a human clinical trial. - While reviewers recognized that a major purpose of the Planning Award is to enable assembly of a strong team, they noted that the input of experts in neuroimaging and clinical trial methodology would have strengthened the proposal. - No Planning Leader is listed in the application.
- PROGRAMMATIC REVIEW
- This application was brought up for discussion during the programmatic portion of the review. Reviewers acknowledged the programmatic value of funding research into cell therapies for cerebral palsy but decided that this proposal is at a stage more appropriate for an Early Translational RFA. No motion was made.
- Andrew Balber | Disease Team Therapy Planning I
We propose to assemble a multidisciplinary team of scientists and clinicians in pursuit of human iPS cell-based therapy for cerebral palsy. Cerebral palsy is a group of neurological diseases which produce chronic motor disability in children. This group demonstrates easily identifiable clinical findings, and much of their injury is to oligodendrocyte progenitors, th | {
"score": 2,
"cc": false,
"url": "http://cirm.ca.gov/node/9517/review",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
Vaccine Therapy in Treating Patients With Metastatic Melanoma
RATIONALE: Vaccines may make the body build an immune response to kill tumor cells.
PURPOSE: Phase II trial to study the effectiveness of vaccine therapy in treating patients who have metastatic melanoma that has not responded to previous therapy.
Biological: MART-1 antigen
Biological: gp100 antigen
Biological: incomplete Freund's adjuvant
|Study Design:||Masking: Open Label
Primary Purpose: Treatment
|Official Title:||Immunization of Patients With Metastatic Melanoma Using a Class II Restricted Peptide From the GP100 Antigen and Class I Restricted Peptides From the GP100 and MART-1 Antigens|
|Study Start Date:||October 1999|
- Determine the clinical response to immunization using gp100:44-59 antigen peptide plus gp100:209-217 (210M) and MART-1:26-35 (27L) antigen peptides in patients with metastatic melanoma who are HLA-DRB1*0401 and HLA-A0201 positive.
- Determine the clinical response to immunization using gp100:44-59 antigen peptide alone in patients with metastatic melanoma who are HLA-DRB1*0401 positive but HLA-A0201 negative.
- Determine the immunologic response in patients treated with these regimens as measured by changes in T-cell precursors from before to after treatment.
- Evaluate the toxicity profiles of these regimens in these patients.
OUTLINE: Patients are assigned to one of three immunization groups based on HLA-A0201 status and prior gp100:209-217 (210M) antigen peptide immunization:
- Group 1 (HLA-A0201 positive and no prior gp100:209-217 [210M] antigen peptide): Patients receive gp100:44-59 and gp100:209-217 (210M) antigen peptides emulsified together in Montanide ISA-51 (ISA-51) subcutaneously (SC) and gp100:44-59 and MART-1:26-35 (27L) antigen peptides emulsified together in ISA-51 SC.
- Group 2 (HLA-A0201 positive and prior gp100:209-217 [210M] antigen peptide): Patients receive treatment as in group 1.
- Group 3 (HLA-A0201 negative and no prior gp100:209-217 [210M] antigen peptide): Patients receive gp100:44-59 antigen peptide emulsified in ISA-51 SC alone.
- All groups: Treatment repeats every 3 weeks for 4 doses in the absence of disease progression or unacceptable toxicity. Patients with complete response after 4 doses receive a maximum of 2 additional doses. Patients with stable disease or minor, mixed, or partial response after 4 doses receive a maximum of 12 additional doses. Patients with no response after 4 doses receive immunization with the same peptides and interleukin-2 IV over 15 minutes every 8 hours for a maximum of 12 doses beginning 1 day after each immunization.
Patients are followed at 3-4 weeks.
PROJECTED ACCRUAL: A total of 45-75 patients (15-25 per immunization group) will be accrued for this study within 2 years.
|United States, Maryland|
|Warren Grant Magnuson Clinical Center - NCI Clinical Studies Support|
|Bethesda, Maryland, United States, 20892-1182|
|Study Chair:||Steven A. Rosenberg, MD, PhD||NCI - Surgery Branch| | Vaccine Therapy in Treating Patients With Metastatic Melanoma
RATIONALE: Vaccines may make the body build an immune response to kill tumor cells.
PURPOSE: Phase II trial to study the effectiveness of vaccine therapy in treating patients who have metastatic melanoma that has not responded to previous therapy.
Biological: MART-1 antigen
Biological: gp100 antigen
Biological: incomplete Freund's adjuv | {
"score": 2,
"cc": false,
"url": "http://clinicaltrials.gov/ct2/show/NCT00019994",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
Painful Breastfeeding and Bacterial or Yeast Infection
The aim of this study is to investigate the prevalence of yeast and bacteria in women with breastfeeding pain and to identify signs and symptoms.
|Study Design:||Observational Model: Case Control
Time Perspective: Prospective
|Official Title:||The Prevalence of Yeast and Bacteria in Women With Painful Breastfeeding and the Diagnostic Value of Signs and Symptoms|
- Bacteria [ Time Frame: Baseline (at admission) ] [ Designated as safety issue: Yes ]Occurrence of bacteria: yes/no
- Yeast [ Time Frame: Baseline (at admission) ] [ Designated as safety issue: Yes ]Occurence of yeast: yes/no
- Pain [ Time Frame: Baseline (at admission) ] [ Designated as safety issue: Yes ]VAS
- Signs [ Time Frame: Baseline (at admission) ] [ Designated as safety issue: Yes ]Nipple areola: cracks, red/pink, flaky, shiny, blurred, swollen, itching, smarting
- Bacteria at follow-up [ Time Frame: 2 weeks after baseline ] [ Designated as safety issue: Yes ]Occurence of bacteria: yes/no
- Yeast at follow-up [ Time Frame: 2 weeks after baseline ] [ Designated as safety issue: Yes ]Occurence of yeast: yes/no
|Study Start Date:||December 2006|
|Study Completion Date:||December 2009|
|Primary Completion Date:||December 2009 (Final data collection date for primary outcome measure)|
1. Deep pain group
1. Deep pain group; Pain in the breast
2. Superficial pain group
Pain on the nipple and/or aereola
3. Control group
No pain or other breastfeeding problems
Painful breastfeeding is one of the most common reasons for early weaning. Persistent pain associated with breastfeeding can sometimes be difficult to diagnose and is a source of frustration for the breastfeeding women as well as for healthcare providers.
The diagnosis of candida infection in breastfeeding women is generally based on signs and symptoms identified in case reports and without any culture. Breastfeeding pain has been described as superficial or deep in some studies. This deep pain syndrome as caused by candida or bacteria has been questioned. A few studies have cultured breast milk from women with deep breast pain and found Candida albicans infections or bacterial infections usually caused by Staphylococcus aureus. There still remains controversy and lack of evidence for candidiasis affecting the lactating breast as well as bacteria causing the pain. Ensured diagnostic methods are important due to the resistant problem with both antibiotics and antifungals. Only one study has described five key symptoms associated with candida. It was shiny, flaky nipple/areola, burning pain on the nipple/areola, non-stabbing pain or stabbing pain in the breast.
The objective of this study was to investigate the prevalence of candida and bacteria in women with superficial or deep breastfeeding pain and to identify signs and symptoms linked to candida or bacteria in breast milk and nipple/areola. | Painful Breastfeeding and Bacterial or Yeast Infection
The aim of this study is to investigate the prevalence of yeast and bacteria in women with breastfeeding pain and to identify signs and symptoms.
|Study Design:||Observational Model: Case Control
Time Perspective: Prospective
|Official Title:||The Prevalence of Yeast and Bacteria in Women With Painful Breastfeeding and the Diagnostic Value of | {
"score": 2,
"cc": false,
"url": "http://clinicaltrials.gov/ct2/show/NCT01631461",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
Comparison of Markers of Kidney Function
Glomerular filtration rate (GFR) is the best known measurement of kidney function. Serum creatinine (blood test) is the most commonly used marker to predict GFR. It is a convenient, inexpensive test that involves a single blood draw with rapid results. However, creatinine has several limitations because its blood level is dependent on age, body mass, and sex. One of the gold standards for measuring GFR is plasma clearance of an IV injected agent, iohexol. It has been found to be safe and nontoxic in prior studies, but is not practical in the clinical setting due to the need for several timed blood draws. Recent studies have investigated the use of cystatin C as an alternative marker to predict GFR. Cystatin C also involves only a single blood draw, and has less confounding factors than creatinine since it is independent of age, body mass, and sex. Currently, it remains controversial whether cystatin C is a significantly better biomarker of estimated GFR than creatinine. To date, there has not been a large prospective cohort study to compare cystatin C and creatinine in pediatric kidney transplant patients who are on maintenance immunosuppression (anti-rejection drugs). Accurate measurement and early detection of deterioration of GFR is critical in the care of this patient population. The purpose of this study is to assess the accuracy of estimating GFR by using cystatin C versus creatinine clearance equations when compared to the surrogate gold standard of iohexol GFR in pediatric renal transplant patients.
Chronic Kidney Disease
|Study Design:||Observational Model: Cohort
Time Perspective: Prospective
|Official Title:||Comparison of Estimated GFR Using Cystatin C Versus Creatinine in Pediatric Renal Transplant Patients|
- The primary outcome measure is a comparison of determination of GFR through three methods: cystatin C (Gentian assay), creatinine (Schwartz and update Schwartz) and iohexol disappearance [ Time Frame: Participants will be followed for the duration of the Iohexol GFR measurement (approximately 8 hours) that will take place at the time of surveillance biopsy at either 6 months, 1 or 2 years post-transplant.. ] [ Designated as safety issue: No ]
|Study Start Date:||August 2011|
|Estimated Study Completion Date:||December 2012|
|Estimated Primary Completion Date:||December 2012 (Final data collection date for primary outcome measure)|
Pediatric post-kidney transplant
Patients having standard of care surviellance biopsies.
Study patients will come in for their surveillance biopsy done as standard of care post-transplant. They we be made NPO at midnight prior to the biopsy per routine. On arrival, they will have standard of care pre-biopsy bloods drawn along with baseline study labs including serum enzymatic creatinine (1mL of blood), cystatin C (1.5 mL of blood), and 1mL of blood collected pre-iohexol infusion. Two IV's will be started, one for iohexol administration and fluids, and the other for blood draws. Study patients will be started on 1x maintenance intravenous fluids. The patient will then have their standard of care protocol biopsy in the ultrasound suite. After the biopsy 5 mL Iohexol (Omnipaque 300) will be administered over 1-2 minutes, with epinephrine, solumedrol, and diphenhydramine on hand in the event of a reaction although this is very unlikely. The patient will be observed and vital signs will be taken 10 minutes post-infusion. After biopsy, maintenance fluids will be continued until completion of the study. Blood for determination of Iohexol levels (1mL) will be drawn at 10, 30, 120, and 300 minutes post iohexol infusion when patient is being observed post biopsy. At completion of the study at 300 minutes post iohexol infusion, serum creatinine (1mL of blood), cystatin C (1.5 mL of blood) will be drawn again. The total volume of blood drawn for the study will be 10mL.
Creatinine (enzymatic method) will be determined on the Olympus system, and Cystatin C (Gentian assay) will be determined on the AU400 Olympus System at the UCLA Department of Pathology and Laboratory Medicine Outreach Laboratory. Iohexol GFR will be determined at the University of Rochester Medical Center in Dr. Schwartz's laboratory. Kidney biopsies will be graded by updated Banff criteria, and reviewed by blinded pathologist.
|Contact: Eileen Tsai, M.D.||(310) firstname.lastname@example.org|
|Contact: Margaret Holloway, R.N.||(310) email@example.com|
|United States, California|
|University of California, Los Angeles||Not yet recruiting|
|Los Angeles, California, United States, 90095|
|Contact: Eileen Tsai, M.D. 310-206-8415 firstname.lastname@example.org|
|Principal Investigator: Eileen Tsai, M.D.|
|Sub-Investigator: John Nguyen, M.D.| | Comparison of Markers of Kidney Function
Glomerular filtration rate (GFR) is the best known measurement of kidney function. Serum creatinine (blood test) is the most commonly used marker to predict GFR. It is a convenient, inexpensive test that involves a single blood draw with rapid results. However, creatinine has several limitations because its blood level is dependent on age, body mass, and se | {
"score": 3,
"cc": false,
"url": "http://clinicaltrials.gov/ct2/show/study/NCT01403766?view=results",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
Mobile Measurement Station ready
As staff from all over the world get ready for the launch, a small team made up of Eliseo Balaguer and Energia engineers are making the final preparations for the Mobile Measurement Station (MMS) in Argentina.
The MMS in operation at Mar del Plata, Argentina
The MMS will track the Proton Upper Stage during its critical main engine burn over South America, 1 hour after launch.
To be ready for this coverage, the team organized a test involving the International Space Station. At 8:35 local time on 12 October, the MMS successfully tracked a carrier signal transmitted by a Soyuz vehicle docked to the ISS. The transmitter had been switched on earlier by the cosmonauts aboard the station.
||15th October (I)
Last Update: 09 Nov 2012 | Mobile Measurement Station ready
As staff from all over the world get ready for the launch, a small team made up of Eliseo Balaguer and Energia engineers are making the final preparations for the Mobile Measurement Station (MMS) in Argentina.
The MMS in operation at Mar del Plata, Argentina
The MMS will track the Proton Upper Stage during its critical main engine burn over South America, 1 hour af | {
"score": 2,
"cc": false,
"url": "http://clusterlaunch.esa.int/science-e/www/object/index.cfm?fobjectid=31644&fbodylongid=964",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
May 13, 2009
Browning and Rocky Mountain Elk Foundation Recall Knife Sheaths Due to Defect
The following product safety recall was voluntarily conducted by the firm in cooperation with the CPSC. Consumers should stop using recalled products immediately unless otherwise instructed. It is illegal to resell or attempt to resell a recalled consumer product.
Name of Product: Skinner Knife Sheaths
Units: About 10,000
Distributor: Browning, of Morgan, Utah and Rocky Mountain Elk Foundation, of Missoula, Mont.
Hazard: The knife can cut through the sheath because there is no blade guard in the sheath. This poses a laceration hazard to consumers.
Incidents/Injuries: None reported.
Description: The recall involves the Browning and Rocky Mountain Elk Foundation co-branded skinner knife sheath (model 322087). The sheath is black with the “Rocky Mountain Elk Foundation” logo stitched on the front. The packaging is black and yellow with “Browning” printed on the side and the model number printed above the UPC. No other Browning or Rocky Mountain Elk Foundation products are included in this recall.
Sold to: The sheath and knife were given away as a promotional item for new membership in the Rocky Mountain Elk Foundation from November 2008 through April 2009.
Manufactured in: China
Remedy: Consumers should stop using the sheath immediately and discard it. Consumers with the recalled sheath will be notified directly and will be sent a new one free of charge.
Consumer Contact: For additional information, contact Browning at (800) 637-0230 between 8 a.m. and 4 p.m. MT Monday through Friday or visit the firm’s Web site at www.browning.com (PDF)
The U.S. Consumer Product Safety Commission (CPSC) is still interested in receiving incident or injury reports that are either directly related to this product recall or involve a different hazard with the same product. Please tell us about your experience with the product on SaferProducts.gov
CPSC is charged with protecting the public from unreasonable risks of injury or death associated with the use of the thousands of consumer products under the agency's jurisdiction. Deaths, injuries and property damage from consumer product incidents cost the nation more than $900 billion annually. CPSC is committed to protecting consumers and families from products that pose a fire, electrical, chemical or mechanical hazard. CPSC's work to ensure the safety of consumer products - such as toys, cribs, power tools, cigarette lighters and household chemicals - contributed to a decline in the rate of deaths and injuries associated with consumer products over the past 30 years.
Federal law bars any person from selling products subject to a publicly-announced voluntary recall by a manufacturer or a mandatory recall ordered by the Commission.
To report a dangerous product or a product-related injury go online to www.SaferProducts.gov or call CPSC's Hotline at (800) 638-2772 or teletypewriter at (301) 595-7054 for the hearing impaired. Consumers can obtain news release and recall information at www.cpsc.gov, on Twitter @OnSafety or by subscribing to CPSC's free e-mail newsletters. | May 13, 2009
Browning and Rocky Mountain Elk Foundation Recall Knife Sheaths Due to Defect
The following product safety recall was voluntarily conducted by the firm in cooperation with the CPSC. Consumers should stop using recalled products immediately unless otherwise instructed. It is illegal to resell or attempt to resell a recalled consumer product.
Name of Product: Skinner Knife Sheaths
Units | {
"score": 2,
"cc": false,
"url": "http://cpsc.gov/Recalls/2009/Browning-and-Rocky-Mountain-Elk-Foundation-Recall-Knife-Sheaths-Due-to-Defect/",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
Democrats Call CAFTA Just One Example of Misplaced Priorities
Washington, DC - Today, leading pro-trade Senate Democrats joined together in opposition to the Central American Free Trade Agreement and the Bush administration’s failed trade policies. Assistant Democratic Leader Dick Durbin, Senator Debbie Stabenow, Senator Chuck Schumer and Senator John Kerry declared CAFTA a flawed agreement that symbolizes the Bush White House’s pattern of misplaced priorities and failure to develop an effective strategy to make trade keep America competitive.
“I have voted for free trade and I believe in free trade – provided it is fair trade that expands our economy and creates American jobs. But our President has put forward a trade strategy that offers only small short-term benefits, but in the long run hurts American manufacturers and farmers,” said Senator Durbin. “The Bush Administration refuses to stand up and enforce our existing trade laws when confronted with unfair trade practices against the United States. That needs to change, and we cannot continue to approve trade agreements that do not serve our long-term national interests. CAFTA is a flawed agreement that does not address basic labor standards which is why I will vote against that measure today. CAFTA is the wrong agreement at the wrong time.”
The Bush administration has failed to address the growing trade deficit, now on pace to exceed $700 billion in 2005. This record trade deficit has made America more reliant on foreign borrowing – weakening the American economy. At the same time, American workers continue to face the outsourcing of jobs overseas and the negative impact of China’s unfair trading practices with no action from this administration.
“CAFTA will ship jobs overseas and provide few export markets for American companies,” said Senator Stabenow. “Rather than entering into another free trade agreement with countries that don’t share our wage structure, labor standards, or environmental standards, we need start enforcing the agreements already in place.”
The Senators criticized the administration for putting forward a flawed trade agreement that takes a step backwards from current U.S. trade rules. By failing to require that trade partners meet basic internationally accepted standards, the president missed the opportunity to create an agreement that would benefit workers here and abroad. Without the needed investments for workers overseas and training assistance for workers here at home, CAFTA represents a misguided approach on trade.
“I have been a long-time supporter of free trade, but I believe it must be accompanied by strong enforcement mechanisms to ensure our trade agreements are followed, as well as a fair and open process for raising concerns and resolving violations. Despite strong bipartisan support for an amendment improving labor enforcement provisions, there is nothing in the final CAFTA language that addresses any labor enforcement concerns. In fact, while the committee favored extending Trade Adjustment Assistance to service workers in markup, the final agreement doesn’t extend TAA for service workers. We want to promote free trade AND fair trade. Without adding provisions for fair trade, the administration faces a rising tide of opposition to trade agreements,” said Senator Schumer.
“It’s no mystery why so many long-time leaders on trade oppose CAFTA. Rather than build on the success of the Jordan Free Trade Agreement which advanced labor and environmental standards, CAFTA breaks a ten year consensus on trade policy. Unlike previous Republican and Democratic administrations, the Bush administration negotiates trade deals that take us backward and refuses to enforce the trade agreements we already have,” said Senator Kerry. “Under CAFTA, workers don’t even have the same standing to end child labor that corporations have to end copyright theft. That’s an unfair double-standard that punishes American workers. Our trade agreements can and must do a better job empowering American workers to win in a globalized world, and helping to lift up people and economies across the globe to aid in stability and security. By that measure, this Administration’s trade policy is a total failure, and it’s up to us to set the right standard for free trade.” | Democrats Call CAFTA Just One Example of Misplaced Priorities
Washington, DC - Today, leading pro-trade Senate Democrats joined together in opposition to the Central American Free Trade Agreement and the Bush administration’s failed trade policies. Assistant Democratic Leader Dick Durbin, Senator Debbie Stabenow, Senator Chuck Schumer and Senator John Kerry declared CAFTA a flawed agreement that s | {
"score": 2,
"cc": false,
"url": "http://democrats.senate.gov/2005/06/30/pro-trade-democrats-blast-bush-trade-policy/",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
Rules for Capitalizing Scientific Terms and Geological Eras
1. Names of planets and their satellites, asteroids, stars, constellations, and groups of stars and other celestial objects are capitalized; however, the words sun, earth and moon are usually lowercased unless they occur with the other astronomical names.
Examples: Venus; Ganymede; Sirius; Pleiades the Milky Way: probes heading for the Moon and Mars
2. Genera in binomial (two-word) scientific names in zoology and botany are capitalized; names of species are not.
Examples: a cabbage butterfly (Pieris rapae); a common buttercup (Ranuculus acris); a robin (Turdus migratorius)
3. New Latin names of classes, families, and all groups above genera in zoology and botany are capitalized; however, their derivative adjectives and nouns are not.
Examples: Gastropoda but gastropod; Thallophyta but thallophyte
4. Geological eras, periods, epochs, strata, and names of prehistoric divisions are capitalized.
Examples: Silurian period; Pleistocene epoch; Age of Reptiles; Neolithic age | Rules for Capitalizing Scientific Terms and Geological Eras
1. Names of planets and their satellites, asteroids, stars, constellations, and groups of stars and other celestial objects are capitalized; however, the words sun, earth and moon are usually lowercased unless they occur with the other astronomical names.
Examples: Venus; Ganymede; Sirius; Pleiades the Milky Way: probes heading for the Mo | {
"score": 3,
"cc": false,
"url": "http://dese.mo.gov/divimprove/curriculum/ModelCurriculum/rolling_on_the_river/rules_for_capitalizing_scientif_terms.htm",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
|Caltrans > Please press the "Back" button on your browser to return to the previous page|
OHR - SAFETY ALERT MEMO 00-02
|DATE: June 29,
INCIDENT TYPE: Mower Accident, Serious Injury
LOCATION: District 4
TYPE OF WORK ACTIVITY: Mowing
THE ACCIDENT: At approximately 2:55 p.m. on June 8, 2000, a Caltrans Maintenance Worker was mowing a sloped embankment on an overpass on Northbound Hwy 101 near Healdsburg. A tractor-type mower with side and rear mounted flail mowers was being used. The Maintenance Worker was mowing a level area on top of a sloped embankment with the rear flail mower down and the side flail mower extended over the edge of the embankment. The embankment suddenly gave way and the mower rolled down the slope, pinning the employee under the mower. The employee was extricated and transported via helicopter to a local hospital with a severely broken arm. This employee is still undergoing medical treatment for complications from the injury.
CONCLUSIONS: The mower operator was qualified and experienced and had worked in this area for several years. The tractor was equipped with a Roll-Over Protective Structure (ROPS). It is not known if the seat belt was being used. The overpass where the mowing was taking place had been in service for many years. It had rained recently in the area, but it was not considered enough rain to undermine the embankment.
RECOMMENDATIONS Know and be familiar with the area you are mowing or operating equipment on. If you have any doubt about the ability of the ground to support the equipment, walk the area first to check the stability. Many pieces of equipment in our fleet are equipped with Roll-Over Protective Structures (ROPS). In order for a ROPS to provide protection it is necessary to wear a seat belt. Always wear the seat belt in any vehicle or equipment its there for your protection!
HEADQUARTERS OFFICE OF SAFETY AND HEALTH (916) 227-2640 | |Caltrans > Please press the "Back" button on your browser to return to the previous page|
OHR - SAFETY ALERT MEMO 00-02
|DATE: June 29,
INCIDENT TYPE: Mower Accident, Serious Injury
LOCATION: District 4
TYPE OF WORK ACTIVITY: Mowing
THE ACCIDENT: At approximately 2:55 p.m. on June 8, 2000, a Caltrans Maintenance Worker was mowing a sloped embankment on an overpass on Northbound Hwy 101 near Heald | {
"score": 2,
"cc": false,
"url": "http://dot.ca.gov/hq/opo/safety/safetyalerts/sa00-02.html",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
This tool runs a search of the Trends questions database. It is possible to look for data on specific countries or a group of countries. In addition to comparing the results of several countries for a specific question, it allows analysis of country trends . The data can be displayed as a graph, a pie chart, in an excel table or in columns.
Survey results can also be displayed on a map of the EU. The colour coding facilitates quick and easy comparisons between countries. | This tool runs a search of the Trends questions database. It is possible to look for data on specific countries or a group of countries. In addition to comparing the results of several countries for a specific question, it allows analysis of country trends . The data can be displayed as a graph, a pie chart, in an excel table or in columns.
Survey results can also be displayed on a map of the EU. | {
"score": 2,
"cc": false,
"url": "http://ec.europa.eu/public_opinion/cf/index_en.cfm",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
Countries and regions
As part of the EU’s response to the devastating floods that hit Pakistan, the European Parliament and the Council signed the measures giving emergency autonomous trade preferences for Pakistan on 25 October. This means that certain goods from Pakistan can enter the EU duty free or will be subject to certain ceilings (tariff rate quotas).
The measures enter into force in November 2012 following their publication in the EU's Official Journal and will be in place until 31 December 2013.
In addition to these special measures, Pakistan benefits from preferential access to the EU market under the Generalised Scheme of Preferences scheme.
- The EU being Pakistan's most important trading partner taking 21.2% of Pakistan's total exports.
- EU-Pakistan trade increased by almost 4.7% annually between 2007 and 2011.
- Pakistani exports to the EU are dominated by textiles and clothing as well as leather products. Textiles and clothing account for just under 75% of Pakistan's exports to the EU.
- Pakistan's imports from the EU mainly comprise mechanical and electrical machinery as well as chemical and pharmaceutical products.
EU-Pakistan "trade in goods" statistics
|Year||EU imports||EU exports||Balance|
EU and Pakistan
Pakistan in the world economy
- In recent years, Pakistan has increasingly integrated with the global economy, leading to average real GDP growth rates of 2.7% between 2008 and 2011. In parallel, Pakistan has increased its trade with the rest of the world.
- However, the wider picture shows that regulatory barriers continue to hold Pakistan back from developing its full trade potential.
- High costs of doing business, complex regulation and infrastructure bottlenecks all have a detrimental effect on trade and growth.
- Pakistan's trade regime and regulatory environment still remain comparatively restrictive.
The EU and Pakistan have set up a Sub-Group on Trade to promote the development of two-way trade.
The Sub-Group on Trade - set up under the auspices of the EU-Pakistan Joint Commission - is the forum for discussions on trade policy developments more broadly and also aims to tackle individual market access issues which hamper trade between the two parties.
The EU supports the integration of Pakistan with the global economy by granting Pakistan's exports to the EU reduced tariffs under the EU's Generalised Scheme of Preferences.
- As a result, more than 78% of Pakistan's exports enter the EU at preferential rates.
- Around 80% of the textiles and clothing articles imported to the EU from Pakistan enter the EU at a preferential tariff rate. Around a quarter of these imports are bed linen, table linen and toilet and kitchen linen.
- Textiles and clothing account for around 75% of Pakistan's exports to the EU. Pakistani exports to the EU have increased modestly in terms of value – despite the elimination of quotas, including on imports of Chinese textile and clothing products.
However, relying so heavily on one product category carries risks for Pakistan. Trade diversification programmes have been launched by the EU, to reduce the country's reliance on the textiles and clothing sector.
Trading with Pakistan
- Rules and requirements for trading with Pakistan
- The EU is present on the ground in Pakistan
- Trade relations are part of the EU's overall political and economic relations with Pakistan
- Pakistan is a member of the World Trade Organisation | Countries and regions
As part of the EU’s response to the devastating floods that hit Pakistan, the European Parliament and the Council signed the measures giving emergency autonomous trade preferences for Pakistan on 25 October. This means that certain goods from Pakistan can enter the EU duty free or will be subject to certain ceilings (tariff rate quotas).
The measures enter into force in Novem | {
"score": 2,
"cc": false,
"url": "http://ec.europa.eu/trade/policy/countries-and-regions/countries/pakistan/index_en.htm",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
Jawi Peranakan (Jawi, 1881: 28 March, 18 April, 25 April, 6 June, 13 June & 21 November)
Bintang Timor (Rumi, 1894: 2 & 3 July)
Lembaga Melayu (Jawi, 1914: 1 & 2 September)
Utusan Melayu (Rumi, 1939: 20 & 21 July)
National Library Board
Jawi Peranakan, published in Singapore, was one of the earliest Malay newspapers in the region. In 1914, the Malay edition of the Malaya Tribune was launched, Lembaga Melayu. Its first editor, Mohamed Eunos Abdullah, was a prominent Singapore Malay leader. He had previously been editor of Utusan Melayu, the Malay edition of the Singapore Free Press. Although Utusan Melayu ceased publication in 1921, it reappeared in 1939. Among its founders was Yusof bin Ishak, who later became Singapore’s first Yang di-Pertuan Negara (head of state) and then President of the Republic of Singapore.
The Peranakan community in Singapore also published its own newspaper, Bintang Timor, initiated by prominent Peranakan Chinese Sir Song Ong Siang. However, it ceased publication in 1895.
Akhbar-akhbar ini adalah terbitan terawal di Singapura. Diantaranya ialah Jawi Peranakan, Bintang Timor dan Lembaga Melayu yang diketuai Mohamed Eunos Abdullah. Perintis Utusan Melayu pula ialah Yusof bin Ishak yang kemudiannya menjadi Yang di-Pertuan Negara dan Presiden pertama Republik Singapura. | Jawi Peranakan (Jawi, 1881: 28 March, 18 April, 25 April, 6 June, 13 June & 21 November)
Bintang Timor (Rumi, 1894: 2 & 3 July)
Lembaga Melayu (Jawi, 1914: 1 & 2 September)
Utusan Melayu (Rumi, 1939: 20 & 21 July)
National Library Board
Jawi Peranakan, published in Singapore, was one of the earliest Malay newspapers in the region. In 1914, the Malay edition of the Malaya Tribune was launched, Lemb | {
"score": 3,
"cc": false,
"url": "http://exhibitions.nlb.gov.sg/aksara/4/gallery-4-p3.html",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
According to the Institute of International Education, Brazil is the fourteenth largest source of overseas students coming to the United States for education and training services. In 2011, there were 8,777 Brazilian students studying in the U.S. and the number of students has been gradually increasing since the 2005/2006 academic year. About 34.8% of Brazilian students participate in graduate programs and about 46.3% are enrolled in undergraduate programs. In 2010, Brazil was the sixth largest source of overseas students travelling to the U.S. for Intensive English Programs.
The consensus is that these numbers will increase over the next few years. In 2011, under the administration of President Dilma Rousseff, the government launched its most aggressive effort to address the most critical problem that faces the continued economic growth of the nation: the lack of a qualified workforce in the science and engineering fields. The Brazilian government hopes to have 100,000 Brazilians studying overseas for at least one year at the best science and technology programs by the end of 2015, both at the undergraduate and graduate levels.
For U.S. colleges and universities offering strong science and technology programs, the economic growth of the Brazilian middle class as well as the attention of the government on education initiatives to sustain this growth presents a rare opportunity for U.S. schools to increase their Brazilian student enrollment. On the other hand, the worldwide attention being paid to Brazil for the above reasons virtually guarantees that U.S. higher education institutions will face strong competition from higher education institutions worldwide.
Undergraduate and short term ESL programs are attractive for the majority of Brazilian students looking for study abroad opportunities. In 2010, a total of 2,252 students visited the U.S. for Intensive English Language Programs. While Brazil ranked the fourteenth largest source of overseas students coming to the United States for education and training services, it ranked sixth for sending students to the U.S. for Intensive English Programs, according to the Institute of International Education.
Both graduate and undergraduate programs continue to be of interest for Brazilians. The sciences, engineering, business and economics have been popular with Brazilian students traditionally. In addition, the Brazilian government agency administrating the “Science Brazil: TRADE Without Borders” Program has identified the following specific areas of interest that will be heavily promoted through the scholarship program.
Together with the economic stability and availability of credit, Brazilian families have been able to plan and make longer term financial commitments. The country is experiencing a boom in the purchase of homes, cars, and other durable goods. As the lower income portion of the market becomes more sophisticated and families become more aware of the importance of quality education, opportunities for educational service will grow. Foreign schools interested in recruiting in Brazil should come up with more creative ways of offering financing options as pricing, along with proficiency in English language skills, will continue to be the biggest challenge for students studying abroad.
The composition of states in Brazil vary widely in should be taken into account when planning recruitment efforts. Sao Paolo will have the largest applicant pool, and attracts the most talented students to its university campuses. The capital city of Brasilia has the highest GDP per capita in the country, at approximately $25,000 USD. This figure is over twice that of Sao Paolo’s, its closest competitor state. The state of Rio de Janeiro, the home of the semi state-owned energy giant Petrobras, is the country’s energy hub, attracting many engineering and science majors.
Science and Engineering
The education sector is one of President Dilma Rousseff’s highest priorities. Brazil, a country with continental dimensions, has many challenges in order to deliver a high standard of education for the population and for that reason the government of Brazil has been investing in a wide range of programs. The Brazilian government's new “Science Without Borders” Program will provide scholarships to undergraduate and graduate students from Brazil for one year of study at colleges and universities in the United States and other foreign countries. The program is administered by two federal government agencies. The Agency for the Improvement of Higher Education (CAPES) promotes and expands graduate and undergraduate education in the country. The Brazilian economy is currently experiencing a deficit of qualified graduates in certain technical and scientific areas. According to CAPES website, students in the above listed areas of study are especially encouraged to apply for the scholarships.
The National Council of Technological and Scientific Development (CNPq) under the Ministry of Science and Technology is designed to promote scientific research throughout Brazil in order to increase Brazil’s competitiveness in scientific and technological advancements. Their role includes providing research scholarships for graduate students and professors looking to study outside of Brazil.
Candidates for the Sciences Without Borders program are nominated by their Brazilian university and approved to participate by the Brazilian agencies responsible for the implementation of the program, CAPES and CNPq. CAPES and CNPq, through partnerships with educational organizations and universities, negotiate placement, tuition, and fees for the students and researchers. The final decision to accept a student in the Science without Borders Program is made by the participating host institution.
The Brazilian government has partnered with the Institute of International Education (IIE) to administer the program for U.S. educational institutions. Accredited American colleges and universities interested in hosting students through the Science Without Borders program should register with IIE at: http://www.iie.org/en/Programs/Brazil-Science-Without-Borders.
The economic newspaper, Valor, recently published information on the profile of the Brazilian who studies overseas for business programs. The trend points to a younger demographic of MBA candidates, with over 60% of applicants under the age of 30. In 2011, over 55% of these students travelled overseas with their spouse and 77% surveyed intend to return to Brazil to seek employment opportunities. This statistic is vastly different from the Brazilian MBA student six years ago that primarily sought degrees in the United States with intentions to find employment there. With the growth of the Brazilian economy, many MBA students are also choosing to do summer internships back in Brazil. Unlike the expectation of their American counterpart, these MBA candidates expect that their salaries will be over $140,000 when they graduate and return to work in Brazil.
English Language Programs
Brazil recognizes the need to improve English language skills across the country. The country is set to host the World Cup during the summer of 2014 in 12 cities across the country. However, the majority of the population, including those employed in the tourism sector, lack basic English language skills. There are many programs both at the federal and local level, designed to start addressing this deficiency. For example, CAPES recently launched a program providing scholarships for Intensive English language training in the U.K. for certified Brazilian teachers of English. The State of Bahia is sponsoring free English classes for taxi drivers. Private English language schools throughout the larger cities are abundant. Still, the challenge for many students applying for study abroad programs is their lack of English language skills. Institutions that can address this issue by providing conditional acceptance tied to English language training may have a competitive advantage.
Since 2007, the Education Ministry is investing in the PROINFO, a program to promote technology as an important tool to teach. The program includes installations of technological labs in the public schools, laptops for teachers and students, digital boards, projectors and tablets. The budget will also be used to invest in classroom infrastructure and training for teachers. In 2012, the government will continue to invest in the technological program including purchasing tablets for teachers, computers for technological laboratories at schools and universities, smart and digital boards, projectors and other technologies.
Brazil’s book purchasing program is also receiving increased attention. Currently, school books are purchased every three years although the procurement process starts three years before the actual purchase. In 2011, the government bought 137 million books at a total of R$ 1.2 billion (U$ 720 million). The book purchasing program is divided into three categories, books used in libraries, books for students, and books for teachers to use as reference materials.
The government is also investing in technical courses for high schools students and adults. In 2011, the government invested 1.8 billion (U$ 1 billion). These numbers are expected to increase in 2012. The intention is to help 600,000 students pursue careers after leaving school. This money is invested in classroom infrastructure, teachers, equipment, books and others. Companies and educational institutions interested in participating in these programs should consider partnering with local companies or universities.
Education Fairs are one of the most efficient means to recruit Brazilian students. Brazil has quite a few education fairs that run throughout the year. In September 2012, for the first time ever, the United States Departments of State and Commerce will host a joint trade mission to Brazil. The trade mission will be held in Brasilia, Sao Paulo and Rio de Janeiro. Accredited universities interested in joining the trade mission should visit the Education USA office in Brazil or: http://export.gov/industry/education/eg_main_045847.asp. | According to the Institute of International Education, Brazil is the fourteenth largest source of overseas students coming to the United States for education and training services. In 2011, there were 8,777 Brazilian students studying in the U.S. and the number of students has been gradually increasing since the 2005/2006 academic year. About 34.8% of Brazilian students participate in graduate pro | {
"score": 2,
"cc": false,
"url": "http://export.gov/industry/education/eg_main_033721.asp",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
||Saturday Sep 01, 2012
||12:00 PM - 05:00 PM
||Programme Zone in Jurong Regional Library
No registration is required.
Carnival of Heroes and Heroines
There are heroes and heroines in comics, folktales, legends and everyday life. They come in all shapes and forms. Meet them at the Carnival, a celebration of reading by READ! Singapore.
[WORKSHOP HIGHLIGHTS]: No registration is required for the workshops. Seats are available on a first-come-first-served basis. Limited to 20 families, with children aged 9 – 12.
WORKSHOP #1 Design and Draw: Heroes and Heroines from 1.00 pm – 3.00 pm
What would the hero and heroine of your dreams look like? Learn to design and draw them at this session.
WORKSHOP #2 Create your own iBook from 3.00 pm – 5.00 pm
Use an iPad to create your own iBook! Write a heroes-themed story; use an iPad to put in photos and sounds to create a multimedia iBook.
AN ALL AFTERNOON OF FUN ACTIVITIES!
Complete all the booth activities, and get to dress up as superheroes for the free photography shoot! Here’s a snapshot of some of the exciting activities!
Quest is back! Bring your Quest cards to trade and meet other Quest fans.
#2 LEGO® Superheroes and Rory’s Story Cubes by Duck Learning and LEGO® Education
Design your own superhero with LEGO bricks, and use Rory’s Story Cubes to storyboard a heroes-themed stop-motion film with iPads through the application LEGO® Super Heroes Movie Maker.
#3 Kancil and Sang Buaya – Retold by Mercu Learning Point
Learn about how Kancil outsmarts the crocodile, Sang Buaya when he drinks from the river every day.
About The LEGO Group: The LEGO Group was founded in 1932 by Ole Kirk Kristiansen. The company has passed from father to son and is now owned by Kjeld Kirk Kristiansen, a grandchild of the founder. The name 'LEGO' is an abbreviation of the two Danish words "leg godt", meaning "play well". The LEGO® brick is our most important product. This is why we are proud to have been named twice – “Toy of the Century”. Our products have undergone extensive development over the years – but the foundation remains the traditional LEGO brick. Visit www.lego.com for more information.
About Duck Learning: Duck Learning is an education consultancy which believes in helping students realise and develop their full potential in order to become socially responsible leaders of the future. Duck Learning is the exclusive distributor of LEGO® Education in Singapore. Visit Duck Learning at www.ducklearning.com
About LEGO Education: LEGO® Education has been creating solutions for kindergartens and classrooms for 30 years, working with child development specialists and teaching professionals to build a rich understanding of what it takes to provide truly effective learning experiences. Visit LEGO Education Singapore at http://lego.ducklearning.com
About Rory’s Story Cubes: The Rory’s Story Cubes was invented by Rory O’Connor. Rory’s Story Cubes are a remarkably simple and effective means for inspiring creative thinking and problem solving in all of us. Simply toss all the dice, examine each of the nine face-up images and let them guide your imagination through a story that begins with “Once upon a time…”.The secret is not to think too deeply. The story will reveal itself through the cubes and in so doing, will unleash creativity, freedom of expression and frequently, an insight to how to solve a seemingly intractable personal or business problem. Rory’s Story Cubes are exclusively distributed by Duck Learning in Singapore & Malaysia. Learn more about Rory’s Story Cubes at http://www.storycubes.com
About MERCU Learning Point: MERCU Learning Point is an education provider that offers a comprehensive range of programmes and services to the general public, corporate, grassroots organisations and other VWOs. Set up in 1999, MERCU has an extensive network of early childhood centres (known as Kidz Meadow Kindergarten and Childcare Centres), student care and learning centres. | ||Saturday Sep 01, 2012
||12:00 PM - 05:00 PM
||Programme Zone in Jurong Regional Library
No registration is required.
Carnival of Heroes and Heroines
There are heroes and heroines in comics, folktales, legends and everyday life. They come in all shapes and forms. Meet them at the Carnival, a celebration of reading by READ! Singapore.
[WORKSHOP HIGHLIGHTS]: No registration is required for the work | {
"score": 2,
"cc": false,
"url": "http://golibrary.nlb.gov.sg/Programmes/Bounce/43328/Carnival_of_Heroes_and_Heroines_.aspx",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
To link to this article, copy this persistent link:
(Aug 11, 2009) Two editors in the West African nation of Niger have been in custody at the main police station in the capital city of Niamey since August 1, 2009. The detentions follow reporting in their weekly newspapers on corruption charges involving the national human rights agency. The two men, Abdoulay Tiémogo, editor of LE CANARD DÉCHAÎNÉ, and Ali Soumana, of LE COURRIER, were arrested due to complaints filed by Niger's National Commission on Human Rights and Fundamental Freedoms and by Justice Minister Garba Lompo, who had formerly been the head of the Commission. Tiémogo's publication had accused Lompo of misusing money allocated for a study of slavery in the country, a charge Lompo has denied. The second newspaper had alleged that the Commission misused CFA350 million (about US$760,000) intended for supervision of a referendum scheduled for August 4, on a constitutional amendment that would eliminate term limits. That charge has also been denied. (Press Release, Committee to Protect Journalists, Niger: Two Journalists Detained Ahead of Referendum (Aug. 3, 2009), available at http://allafrica.com/stories/200908040803.html; Niger: Constitutional Law - Referendum Scheduled for New Constitution, GLOBAL LEGAL MONITOR, June 12, 2009, available at http://www.loc.gov/lawweb/servlet/lloc_news?disp3_1348_text.)
The arrests have been described by Tom Rhodes of the Africa Program of the Committee to Protect Journalists (CPJ) as "part of a disturbing trend of harassment of independent journalists reporting on corruption in Niger." (Id.) CPJ, based in New York, describes itself as an "independent, nonprofit organization founded in 1981. … [to] promote press freedom worldwide by defending the rights of journalists to report the news without fear of reprisal." (Frequently Asked Questions, CPJ website, http://cpj.org/about/ (last visited Aug. 5, 2009).)
Earlier on August 1, the two editors and six other editors were questioned for a few hours by the police about the publication of a document concerning allegations that Niger's President's son received kickbacks on uranium mining profits. The editors were released without charge. (Press Release, supra; for information about other journalist arrests, see Niger: News Group Director Arrested, GLOBAL LEGAL MONITOR, Apr. 16, 2009, available at http://www.loc.gov/lawweb/servlet/lloc_news?disp3_1225_text.)
- Author: Constance Johnson More by this author
- Topic: Freedom of the press More on this topic
- Jurisdiction: Niger More about this jurisdiction
Search Legal News
Find legal news by topic, country, keyword, date, or author.
Global Legal Monitor RSS
Get the Global Legal Monitor delivered to your inbox. Sign up for RSS service.
The Global Legal Monitor is an online publication from the Law Library of Congress covering legal news and developments worldwide. It is updated frequently and draws on information from the Global Legal Information Network, official national legal publications, and reliable press sources. You can find previous news by searching the GLM.
Last updated: 08/11/2009 | To link to this article, copy this persistent link:
(Aug 11, 2009) Two editors in the West African nation of Niger have been in custody at the main police station in the capital city of Niamey since August 1, 2009. The detentions follow reporting in their weekly newspapers on corruption charges involving the national human rights agency. The two men, Abdoulay Tiémogo, editor of LE CANARD DÉCHAÎNÉ, | {
"score": 2,
"cc": false,
"url": "http://loc.gov/lawweb/servlet/lloc_news?disp3_l205401483_text",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
Governor Markell Opens Summit with State Leaders on Diversity in Government
(DOVER, Del.) – Governor Jack Markell opened a training event on Tuesday at Delaware State University which provided a venue for open discussion and learning about ways to better incorporate diversity into the State’s strategic workforce planning. Over 300 State leaders, including Cabinet secretaries, state agency heads, division directors and human resources professionals participated in the Equal Employment Opportunity Summit which was hosted by the Governor’s Council on Equal Employment Opportunity (GCEEO).
“There is real strength in diversity,” said Governor Markell. “Varied backgrounds give each the opportunity to bring something unique and valuable to the table to help. This Summit was primarily about promoting the understanding that to serve the people of Delaware the best we can, we must be a thoughtful, intentional and diverse state government.”
Both the morning and afternoon sessions were treated to a thought-provoking interactive presentation by Armers Moncure of Cook Ross, Inc. Mr. Moncure is a nationally-known expert on the topic of unconscious bias and a champion of “conscious change,” a strategy of awareness and skill building that leads to continuous improvement and enhanced performance. Through various individual and group activities, the attendees learned that unconscious bias is an issue when not addressed can effect hiring, promotion and other decisions managers make on a regular basis.
Remarks at the Summit were also given by Lt. Governor Matt Denn and Deputy Secretary of State James Collins, who was appointed GCEEO Chairman in 2009.
“The people of Delaware whom we serve are of diverse cultures and backgrounds. The most effective way for us to deliver services and shape policies is to reflect that diversity in government,” said Mr. Collins. “This ’I am Aware’ Summit is a great way to raise awareness and ensure we are culturally competent as we interact with a diverse workforce and make decisions on hiring and promotion.”
The GCEEO was established in 2009 under Executive Order Eight by Governor Markell to bolster a continuing commitment to equal opportunity hiring standards and best practices of human resources management in executive branch agencies. One of the directives of the Executive Order was that each State agency must maintain an Affirmative Action Plan putting forth specific, actionable steps to eliminate any unlawful discrimination in employment and to assure equal employment opportunities.
-Caption 1 (Top Right): GCEEO Chairman and Deputy Secretary of State James Collins
-Caption 2 (Middle Left): Keynote speaker Armers Moncure
-Caption 3: (Bottom Right): Summit Attendees | Governor Markell Opens Summit with State Leaders on Diversity in Government
(DOVER, Del.) – Governor Jack Markell opened a training event on Tuesday at Delaware State University which provided a venue for open discussion and learning about ways to better incorporate diversity into the State’s strategic workforce planning. Over 300 State leaders, including Cabinet secretaries, state agency heads, d | {
"score": 2,
"cc": false,
"url": "http://news.delaware.gov/2012/05/11/governor-markell-opens-summit-with-state-leaders-on-diversity-in-government/",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
Mission and Goals of the Nebraska Library Commission
The Nebraska Library Commission's statutory authority is set forth under Article 4, Chapter 51 of Reissue Revised Statutes of Nebraska. In addition to the powers granted in Chapter 51, state statutes provide that the Commission is the state
agency designated to receive federal library program funds appropriated for the Library Services and Technology Act.
The mission of the Nebraska Library Commission is statewide promotion, development, and coordination of library and information services. As the state library agency, the Commission is an advocate for the library and information service needs of all Nebraskans.
- Goal 1: All Nebraskans will have improved access to enhanced library and information services, provided and facilitated by qualified library personnel, boards, and supporters with the knowledge, skills, abilities and attitudes necessary to provide excellent library and information services.
- Goal 2: Nebraska libraries will have appropriate technology to access and deliver online library and information services.
Nebraska Library Commission
1200 N Street, Suite 120
Lincoln, NE 68508-2023
Phone: 402-471-2045 800-307-2665 (in Nebraska only) | Mission and Goals of the Nebraska Library Commission
The Nebraska Library Commission's statutory authority is set forth under Article 4, Chapter 51 of Reissue Revised Statutes of Nebraska. In addition to the powers granted in Chapter 51, state statutes provide that the Commission is the state
agency designated to receive federal library program funds appropriated for the Library Services and Techn | {
"score": 2,
"cc": false,
"url": "http://nlc.nebraska.gov/aboutus/missionandgoals.aspx",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
Version 2.6 of the Common Data Format (CDF) software has been released for beta testing on April 5, 1996. CDF 2.6 adds two new features to the suite of options: data compression and sparse records. Although a crude form of data compression, sparse records will enable a user to minimize space in a CDF data file by omitting the empty/blank records without modifying the binary structure of the data. The data compressions techniques/algorithms supported in CDF Version 2.6 will all be of the lossless type, therefore maintaining complete integrity of the data. At the time of the initial beta release, there were three compression techniques available via the CDF library: Run Length of Zero's, Huffman, and Adaptive Huffman. A second beta release was released on June 17, 1996, and supports two additional compression techniques: RICE and GNU Zip. The RICE algorithm was provided to CDF by Pen-Shu Yeh of Goddard Space Flight Center, Code 738. | Version 2.6 of the Common Data Format (CDF) software has been released for beta testing on April 5, 1996. CDF 2.6 adds two new features to the suite of options: data compression and sparse records. Although a crude form of data compression, sparse records will enable a user to minimize space in a CDF data file by omitting the empty/blank records without modifying the binary structure of the data. | {
"score": 2,
"cc": false,
"url": "http://nssdc.gsfc.nasa.gov/nssdc_news/sept96/04_g_goucher_0996.html",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
1997-044A (24909) SSTI-LEWIS 23 Aug 1997-041A (24895) Cosmos 2345 14 Aug 1997-043E (24907) IRIDIUM 22 21 Aug 1997-040A (24891) PAS 6 07 Aug 1997-043D (24906) IRIDIUM 23 21 Aug 1997-039B (24890) CHRISTA-SPAS 07 Aug 1997-043C (24905) IRIDIUM 24 21 Aug 1997-039A (24889) STS 85 07 Aug 1997-043B (24904) IRIDIUM 25 21 Aug 1997-038A (24886) Soyuz TM-26 05 Aug 1997-043A (24903) IRIDIUM 26 21 Aug 1997-037A (24883) ORBVIEW 2 01 Aug 1997-042A (24901) AGILA 2 19 Aug 1997-036A (24880) SUPERBIRD-C 28 Jul
The last full list appeared as a part of SPX 520. The list will reappear only after major updates to the list are available.
High precision (<20 cm) GPS constellation tracking data obtained from the network of about 80 dedicated global stations that are of interest to geodetic study may be obtained through the following services provided by the International Association of Geodesy (IGS)
FTP: igscb.jpl.nasa.gov [directory /igscb] WWW: http://igscb.jpl.nasa.gov/ E-mail: firstname.lastname@example.org
The standard format of the GPS situation appeared in SPX-518. It will not be repeated since an excellent source of trajectory- and science-related GPS information is at http://www.utexas.edu/depts/grg/gcraft/notes/gps/gps.html#DODSystem It provides many links to GPS related databases.
The latest member of the GPS fleet is NAVSTAR 43 (1997-035A), launched on 23 July 1997.
All GLONASS spacecraft are in the general COSMOS series. The COSMOS numbers (nnnn) invoked by USSPACECOM have often differed from the numbers (NNNN) associated in Russia; when different, the USSPACECOM COSMOS numbers are shown in parentheses. The corresponding GLONASS numbers are Russian numbers, followed by the numbers in parentheses that are sometimes attributed to them outside Russia.
The operating frequencies in MHz are computed from the channel number K. Frequencies (MHz) = 1602.0 + 0.5625K and L2 = 1246.0 + 0.4375K.
The standard format of the GLONASS situation appeared in SPX-515. It will not be repeated in view of the excellent updated source at: http://www.rssi.ru/SFCSIC/glonass.html maintained by the Coordinational Scientific Information Center (CSIC),Russian Space Forces.
Designations Common Name 1997 1997-039A (24889) STS 85 Landed on 19 Aug 1997-041B (24895) R/B PROTON-K 16 Aug 1997-039B (24890) CHRISTA-SPAS 2 Retrieved by STS 85 16 Aug 1997-025A (24717) SOYUZ TM-25 15 Aug 1997-038B (24887) R/B SOYUZ-U 08 Aug
The Japanese radio astronomy spacecraft, HALCA, has mapped the galactic nucleus of 1156-295 at an angular resolution of 0.0017 seconds of arc, in collaboration with two ground-based antennas in Japan. The network of interferometers at a wavelength of 18 cm had the spacing equal to the apogee of HELCA (21,700 km).
NSSDC/WDC-A-R&S is an archival center for science data from many spacecraft.
Some data are on line for electronic access. Please contact the NSSDC Request Coordination
Code 633, NASA/GSFC, Greenbelt, Maryland 20771, U.S.A., for specific
Information on the current
status of the instruments on board from the investigators will be most
welcomed. Precomputed trajectory files
and orbital parameters of many magnetospheric and heliospheric science-payload
spacecraft may be FTP'ed from NSSDC's ANON_DIR:[000000.ACTIVE] and its
several subdirectories. (See About the SPACEWARN Bulletin
for access method; a file in the ACTIVE directory named AAREADME.DOC, outlines the contents.)
It can also be accessed via the WWW at:
This URL also enables executing several codes related to the orbits
of many geocentric science payload spacecraft. The codes related to
the heliospheric spacecraft trjectories can be executed through:
Magnetospheric, Planetary, and Astronomical science data from many spacecraft
may be accessed through links from the URL:
Questions/comments about the content of these pages should be directed to:
The World Warning Agency for Satellites, email@example.com
National Space Science Data Center, Mail Code 633
NASA Goddard Space Flight Center, Greenbelt, MD 20771 | 1997-044A (24909) SSTI-LEWIS 23 Aug 1997-041A (24895) Cosmos 2345 14 Aug 1997-043E (24907) IRIDIUM 22 21 Aug 1997-040A (24891) PAS 6 07 Aug 1997-043D (24906) IRIDIUM 23 21 Aug 1997-039B (24890) CHRISTA-SPAS 07 Aug 1997-043C (24905) IRIDIUM 24 21 Aug 1997-039A (24889) STS 85 07 Aug 1997-043B (24904) IRIDIUM 25 21 Aug 1997-038A (24886) Soyuz TM-26 05 Aug 1997-043A (24903) IRIDIUM 26 21 Aug 1997-037A | {
"score": 2,
"cc": false,
"url": "http://nssdc.gsfc.nasa.gov/spacewarn/spx526.html",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
The safety of patients undergoing surgery can be dramatically improved through use of checklists, as demonstrated in recent landmark studies. While existing checklists mainly focus on the perioperative period, other studies have found wide variations in postoperative mortality rates across hospitals. This variation is, in part, thought to be due to failure to rescue—delays in recognition and treatment of complications such as septic shock (overwhelming infections). This analysis of more than 6 million inpatient surgeries identified risk factors for the development of postoperative sepsis, including procedure-specific, patient-specific, and hospital-specific factors. A comprehensive surgical care pathway has been shown to decrease both complications and postoperative mortality. | The safety of patients undergoing surgery can be dramatically improved through use of checklists, as demonstrated in recent landmark studies. While existing checklists mainly focus on the perioperative period, other studies have found wide variations in postoperative mortality rates across hospitals. This variation is, in part, thought to be due to failure to rescue—delays in recognition and treat | {
"score": 3,
"cc": false,
"url": "http://psnet.ahrq.gov/resource.aspx?resourceID=20149",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
Becoming a Family
Making the adjustment to family life with your first child can be both a joy and a struggle.
Read these invaluable "Ten Tips for Parents on Creating a Nurturing Environment."
First 5 of California offers a free kit for new parents which will give new and expectant parents the tools they need to feel confident as they welcome a child into their lives. Newly updated, it is filled with information on nutrition, safety, quality child care, health, discipline and early learning. Parents and caregivers can also receive a free kit by calling (800) KIDS-025. A Spanish language version is also available. Call 1-800-50-Niños to order the kit in Spanish.
Can you guess what the "10 Things Every Child Needs for the Best Start in Life" are? Here's a hint: two are physical affection and a stable parent-child relationship. Take a look at what the rest are on the First 5 website.
Fathers will appreciate "10 Ways to Be the Best Dad," adapted by First 5 from childhood.org.
PBS Parents offers something for everyone- including a child development tracker, issues and advice, food and fitness, your role as your child's first teacher, and even birthday parties! | Becoming a Family
Making the adjustment to family life with your first child can be both a joy and a struggle.
Read these invaluable "Ten Tips for Parents on Creating a Nurturing Environment."
First 5 of California offers a free kit for new parents which will give new and expectant parents the tools they need to feel confident as they welcome a child into their lives. Newly updated, it is filled w | {
"score": 2,
"cc": false,
"url": "http://santaclaraca.gov/index.aspx?page=1700",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
Date: 16 Oct 1972
This is a Mariner 9 view of Elysium Mons taken on 16 October 1972, at 11:37 a.m. PST. North is up, illumination is from the right. This mosaic of images has been reproduced in a simple cylindrical projection at a scale of 75 m/pixel.
Last Update: 8 Feb 2013 (AMB) | Date: 16 Oct 1972
This is a Mariner 9 view of Elysium Mons taken on 16 October 1972, at 11:37 a.m. PST. North is up, illumination is from the right. This mosaic of images has been reproduced in a simple cylindrical projection at a scale of 75 m/pixel.
Last Update: 8 Feb 2013 (AMB) | {
"score": 2,
"cc": false,
"url": "http://solarsystem.nasa.gov/multimedia/display.cfm?Category=Planets&IM_ID=15826",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
Concentration of employment in higher education in metropolitan areas
February 13, 2009
In a comparison of 2006 data for the Nation and the country’s largest metropolitan areas, Boston has the highest industry concentration, or location quotient, of employment in private colleges and universities.
The Boston area ranked first, with a location quotient of 3.63. The Boston area location quotient indicates that the concentration of employment in private colleges and universities in the Boston area was approximately three-and-a-half times as great as that of the U.S. as a whole.
No other major metropolitan area came close to matching the Boston area’s concentration of employment in higher education. The major metropolitan area that had the second-highest industry quotient of employment in colleges and universities was Philadelphia-Camden-Wilmington, with a concentration of about two-and-a-half times that of the nation.
Location quotient analysis is used here to quantify the concentration of employment in the "private colleges and universities" industry at the national, State, and metropolitan area levels. The national location quotient for an industry is always 1.0.
These data are from the Quarterly Census of Employment and Wages. To learn more about higher education employment in the Boston area, see "The Prominence of Colleges and Universities in the Boston Metropolitan Area," (PDF) by Denis M. McSweeney and Walter J. Marshall, Regional Report, BLS Summary 09-01.
Bureau of Labor Statistics, U.S. Department of Labor, The Editor's Desk, Concentration of employment in higher education in metropolitan areas on the Internet at http://www.bls.gov/opub/ted/2009/feb/wk2/art05.htm (visited May 18, 2013).
Spotlight on Statistics: Productivity
This edition of Spotlight on Statistics examines labor productivity trends from 2000 through 2010 for selected industries and sectors within the nonfarm business sector of the U.S. economy. Read more » | Concentration of employment in higher education in metropolitan areas
February 13, 2009
In a comparison of 2006 data for the Nation and the country’s largest metropolitan areas, Boston has the highest industry concentration, or location quotient, of employment in private colleges and universities.
The Boston area ranked first, with a location quotient of 3.63. The Boston area location quotient ind | {
"score": 2,
"cc": false,
"url": "http://stats.bls.gov/opub/ted/2009/feb/wk2/art05.htm",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
A selection of images representing communities.
The Secretary of State has the power to 'call-in' planning applications for determination rather than letting the local authority decide (for example, if they conflict with national policies on important matters). The decision on whether to call-in a planning application for determination by the Secretary of State is made having regard to published policy.
Planning appeals can also be 'recovered' for decision by Ministers for similar reasons. As with applications, the decision for an appeal to be 'recovered' is made having regard to published policy.
The decision of the Secretary of State on whether to grant planning permission following an appeal or the call-in of an application is informed by the report of an Inspector who nearly always holds a public inquiry into the proposal. Such decisions are 'quasi-judicial', and therefore particular care is needed in taking them. However, similar considerations also arise in the exercise of discretionary powers on planning matters, such as in deciding whether or not to call in a planning application or recover an appeal. | A selection of images representing communities.
The Secretary of State has the power to 'call-in' planning applications for determination rather than letting the local authority decide (for example, if they conflict with national policies on important matters). The decision on whether to call-in a planning application for determination by the Secretary of State is made having regard to published p | {
"score": 2,
"cc": false,
"url": "http://webarchive.nationalarchives.gov.uk/20110109132009/http:/www.communities.gov.uk/planningandbuilding/decisionsplanning/",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
- SERVING PEOPLE -
WORLAND - Controlling Russian olive and tamarisk trees, working with school and youth groups, and securing more than $1 million of grants for a variety of private land conservation projects are among the citations earning Amy Anderson the Wyoming Association of Conservation Districts Outstanding Technician Award for 2011.
Anderson has been the Wyoming Game and Fish Department's habitat extension biologist in Worland since August 2007.
"Through her diligent work with private landowners, there have been over 6,500 acres mechanically or chemically treated for Russian olive and tamarisk in the Big Horn Basin," said Tori Dietz, Washakie County Conservation District director.
Dietz, who nominated Anderson for the award, added the Roberts, Mont., native's planning and coordination skills have made the removal of the exotic, moisture draining trees and the replanting of native cottonwood and willow possible. She has also played an important role in several successful riparian restoration projects in the Big Horn Basin.
Anderson earned a bachelor's degree in wildlife management from Montana State University. Prior to her position of working with landowners to improve wildlife habitat in the Big Horn Basin, she worked as a soil conservationist for the Natural Resources Conservation Service in North Dakota and as a wildlife technician for both the Bureau of Land Management in Buffalo and the Montana Fish, Wildlife and Parks.
"Amy is the complete package of education, experience, integrity, passion, and personality for the on-the-ground duties of an extension biologist in Wyoming," said Bill Gerhart, assistant supervisor of the Game and Fish's Terrestrial Habitat Program.
"Amy's enthusiasm for her profession is so contagious, everyone she comes in contact with wants to become involved," Dietz added.
Anderson was also honored as the "Conservation Partner of the Year" in 2009 by the Washakie County Conservation District and served with the Peace Corps in Uganda and Zambia from July 1998 to December 2004.
In addition to Worland, the Game and Fish also has extension habitat biologists stationed in Gillette and Douglas. These positions are cooperatively funded and supported by the Natural Resources Conservation Service and provide a crucial link between the Game and Fish, private landowners, and conservation districts.
(Contact: Jeff Obrecht (307) 777-4532) | - SERVING PEOPLE -
WORLAND - Controlling Russian olive and tamarisk trees, working with school and youth groups, and securing more than $1 million of grants for a variety of private land conservation projects are among the citations earning Amy Anderson the Wyoming Association of Conservation Districts Outstanding Technician Award for 2011.
Anderson has been the Wyoming Game and Fish Department's | {
"score": 2,
"cc": false,
"url": "http://wgfd.wyo.gov/wtest/news-1000551.aspx",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
TOPICS - RECOMMENDED FOR EXCLUSION
The review of all current topics may enable incorporation of appropriate new and revised topics on the Census to meet emerging needs. This will assist in optimising data relevance, whilst also considering the decreasing need for any current topics. As a result of this review, it is expected that some topics may be removed from the Census and that others may be included on a 10-yearly cycle.
The following topics are under consideration for exclusion from the 2016 Census.
Click on the topic below for more details or see Supporting Information on Topics.
Community Development Employment Program (CDEP)
This topic collects information about participation in the CDEP. It does not provide a national measure of participation in the program as data are only collected from selected discrete Aboriginal and Torres Strait Islander communities. The ABS considers that the significant changes to the structure of the program since 2009 limit the comparability of the Census time series and utility of this data.
Information about employment type is used to understand the characteristics of the workforce and the extent of self-employment. Following a review of labour statistics standards, the employment type and status in employment classifications are being combined into a single output classification and the information will continue to be available from status in employment output (pending a decision on its priority). There will be no changes required to Census questions.
Number of children ever born
This topic is used for population projections and the assessment of changes in Australian fertility patterns. The ABS recommends that this topic returns to being collected on a 10-yearly cycle and consequently proposes that it not be included in the 2016 Census.
Number of motor vehicles garaged
Data on the number and distribution of vehicles have been used to assess parking and public transport requirements. However, the ABS understands that this topic has limited current use as a transport indicator and data from the Motor Vehicle Census may meet user requirements.
This page last updated 5 November 2012 | TOPICS - RECOMMENDED FOR EXCLUSION
The review of all current topics may enable incorporation of appropriate new and revised topics on the Census to meet emerging needs. This will assist in optimising data relevance, whilst also considering the decreasing need for any current topics. As a result of this review, it is expected that some topics may be removed from the Census and that others may be in | {
"score": 2,
"cc": false,
"url": "http://www.abs.gov.au/AUSSTATS/abs@.nsf/Latestproducts/2007.0Main%20Features122016?opendocument&tabname=Summary&prodno=2007.0&issue=2016&num=&view=",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
Australian Bureau of Statistics
1345.4 - SA Stats, May 2011
Previous ISSUE Released at 11:30 AM (CANBERRA TIME) 31/05/2011
|Page tools: Print Page Print All RSS Search this Product|
In original terms, for the year to March 2011 the total number of dwelling units approved in South Australia fell by 4.0%. Decreases were recorded in four of the seven Statistical Divisions (SD) with the largest decreases seen in the Northern SD (down 30.0%) and the South East SD (down 22.4%).
These decreases in dwelling unit approvals in the year to March 2011 were moderated by increases in the Murray Lands SD (up 39.4%) and the Yorke and Lower North SD (up 21.1%).
Map of South Australia's Statistical Divisions (PDF 3.083MB)
Please refer to source publications for impact of floods on data and collections.
The trend estimates should be interpreted with caution as the underlying behaviour of building approvals may be affected by initiatives within the Government stimulus package, which included the "Building the Education Revolution" (BER) program and the Social Housing Initiative as well as other developments associated with global economic conditions. From June 2009 to February 2010 BER impacts were quantified and removed from the trend estimates because of its short term nature. From March 2010 these impacts are no longer removed from the trend estimates as their effect has significantly declined. For more details on trend estimates, please see paragraphs 20 to 23 of the explanatory notes.
CONSTRUCTION WORK DONE
In the December quarter 2010, the total value of building work done (in trend terms)* in South Australia fell to $1,328.8m, a decrease of 1.5% over the September quarter 2010.
Between the December quarters 2007 and 2009, the trend* estimate for the value of engineering work done rose sharply ($660.4m to $1,223.6m). Since this time, the value of engineering work has fallen to $1,052.6m in the December quarter 2010; 2.5% below the September quarter.
The upsurge in engineering construction between the December quarters 2007 and 2009 was the focus of the feature article presented in the April 2010 issue of SA Stats.
*INTRODUCTION OF NEW BASE YEAR
A new base year, 2008-09, has been introduced into the chain volume estimates which has resulted in revisions to growth rates in subsequent periods. In addition, the chain volume estimates have been re-referenced to 2008-09, thereby preserving additivity in the quarters after the reference year. Re-referencing affects the levels of, but not the movements in, chain volume estimates.
These documents will be presented in a new window.
This page last updated 27 June 2011 | Australian Bureau of Statistics
1345.4 - SA Stats, May 2011
Previous ISSUE Released at 11:30 AM (CANBERRA TIME) 31/05/2011
|Page tools: Print Page Print All RSS Search this Product|
In original terms, for the year to March 2011 the total number of dwelling units approved in South Australia fell by 4.0%. Decreases were recorded in four of the seven Statistical Divisions (SD) with the largest decrea | {
"score": 2,
"cc": false,
"url": "http://www.abs.gov.au/AUSSTATS/abs@.nsf/Previousproducts/1345.4Main%20Features10May%202011?opendocument&tabname=Summary&prodno=1345.4&issue=May%202011&num=&view=",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
4. Studying Australian Plants
4.1 Centre for Plant Biodiversity Research
Aim: In partnership with CSIRO, contribute to the successful management
of the Centre for Plant Biodiversity Research to enable it to conduct botanical
and related research as a basis for the understanding, conservation, use and
sustainable management of Australian plants.
The CPBR was formed in November 1993 as a joint venture between the Director
of National Parks and CSIRO. The initial agreement to operate the Centre was
reviewed in 1999 and extended until April 2010. The purpose of the CPBR is to
provide a single institution and national focus for Commonwealth study of botanical
diversity. Major aspects of the agreement between the Gardens and the CPBR are
at Appendix 7.
The CPBR is composed of the Botany Section of the Gardens, the Australian Flora
Resources and Management Program of CSIRO Plant Industry, and a portion of staff
time from the Australian Biological Resources Study (Environment Australia).
Importantly for the Gardens, the CPBR manages the Australian National Herbarium
(ANH), the combined herbaria of the Gardens and the CSIRO.
Close links are maintained between the ANH and the Gardens so that the scientific
value of the living and photograph collections and information about them continues
to be enhanced and identification of the living specimens provided. Reciprocally,
the Gardens living and photograph collections are used to enhance CPBR studies
and the dissemination of scientific information.
The Gardens and CPBR work closely on all aspects of data management and in
determining priorities for collections development activities and fieldwork.
The CPBR manages a regional Public Reference Herbarium (covering the area south
of Wollongong to the Victorian border and west to around Wagga - including naturalised
exotic species and environmental weeds) and the Plant Enquiry Service for the
general public and acts as an adviser on scientific matters.
The CPBR is governed by a Board comprising representatives from Environment
Australia and CSIRO Plant Industry, with an independent external chair. Day-to-day
management and running of the CPBR is through an Executive Committee of both
Gardens and CSIRO staff, including the CPBR Director, the leaders of CPBR programs,
a representative from the Australian Biological Resources Study and the ANBG
CPBR activities are financed by annual recurrent contributions from the parent
organisations and the CPBR actively seeks external funding for research and
other projects. Staff from the Gardens Botany Section are seconded to
the CPBR and remain subject to the terms and conditions of employment of Environment
In this Plan, emphasis has been placed on those research activities within
CPBR which have the greatest input from staff of the Gardens.
- The Director of National Parks will contribute to the management of CPBR
through representation on the Board and its Executive in accordance with the
- In accordance with the agreement, the Director of National Parks will contribute
staff, financial resources and botanical resources to CPBR to conduct research
on the taxonomy, systematics, nomenclature, and the evolutionary and conservation
biology of Australian plants, and to manage the Australian National Herbarium.
- The CPBR will effectively meet the needs of its parent bodies, the Director
of National Parks and CSIRO (Plant Industry) and will encourage collaboration
between its programs and those of the Gardens.
- The Director of National Parks will be represented at meetings of the Board
of the CPBR, and relevant senior staff of the Gardens will be part of the
Executive managing the day-to-day operations of CPBR.
- The CPBR will be managed and operated as a collaborative venture with contributions
of staff and other resources provided by the Director of National Parks and
CSIRO on an annual basis.
- The CPBR will provide scientific authority, including reliable and verifiable
scientific names, for the Gardens living collections, the Photograph Collection,
and the interpretation functions of the Gardens.
- CPBR staff will contribute to the management of the Public Reference Herbarium
primarily by carrying out collections for species not currently represented
in the herbarium and keeping names of plants in the collection up-to-date
with an aim to complete 90% regional coverage.
4.2 Development, Management and Curation of the Herbarium Collection
Aim: Within the CPBR, to maintain a herbarium to the highest curatorial
standards and to further develop a taxonomically and geographically representative
scientific collection of preserved samples of Australian and related floras.
The Australian National Herbarium is a national sample of Australias
plant biodiversity, housing around 1.3 million specimens.
It provides an extensive source of scientific data for plant systematics research
and documentation, analyses of changes in distribution patterns due to climate
and land use practices, and also functions as a reference base for the Flora
of Australia project.
The herbarium houses vouchers for the Gardens, holds historical collections
of heritage value and provides information and identification services. Specialist
collections of international importance include:
- the worlds most comprehensive collection of eucalypts;
- an extensive collection of the flora of northern Australia and New Guinea
deriving from past CSIRO involvement in this area;
- Australias largest collection of mosses, lichens and liverworts;
- a specialist tropical rainforest collection of 100 000 specimens housed
in Atherton, Queensland; and
- comprehensive collections of Melaleuca and Callistemon; Orchidaceae;
Sapindaceae; Lauraceae; Portulacaceae; and some sections of Poaceae, Rutaceae,
Proteaceae, and Fabaceae.
The collections of the herbarium combine those of the CSIRO and ANBG. Physical
amalgamation of these commenced in 1995 and is substantially complete, although
full curation of the collections may take another eight to ten years to finalise.
Material is incorporated with high levels of accuracy in identification, nomenclature
and data validation. Plant groups under active research and groups of strategic
importance to herbarium clients are given the highest priority in herbarium
The combined collection (see Table 1) is housed at three geographically separate
sites. The cryptogams (mosses, lichens, liverworts, hornworts, fungi, algae
and ferns) and gymnosperms are located on the Gardens site and the angiosperms
(flowering plants) are located on the Canberra (Black Mountain) CSIRO site.
The Atherton site in north Queensland houses mainly rainforest species, with
few specimens originating from the Gardens.
Australian National Herbarium Collection (Canberra) October
Note: A type specimen is the original specimen to which a
scientific name is applied at the time of publication. It is the permanent archival
standard for a scientific name.
Total no of Type Specimens.
1 265 252
The materials used in the preparation of specimens at the CPBR are of archival
quality: they are designed to last for many centuries without physical or chemical
breakdown. The buildings are secure, protected against fire, and have controlled
environments. Specimens brought into the buildings are subject to quarantine
and decontamination procedures. Pest management procedures such as fumigation
and insect and fungal attack monitoring are conducted as required.
The Integrated Botanical Information System database links all the accession
components and makes this information available for research and management
purposes (refer also to Section 4.6). This data contributes to the national
knowledge base through the Australian Virtual Herbarium, a collaborative on-line
data resource for research and environmental decision making.
- The Australian National Herbarium will continue to maintain and develop
its broad representation of Australian and related plants, both taxonomically
- The collections will concentrate on all the major plant groups except algae
and micro-fungi, with the taxonomic focus of the collection being vascular
plants, the major groups of non-vascular plants and macro-fungi.
- The collections will be maintained to high archival standards, in secure
environment controlled buildings, and curated to contemporary taxonomic standards.
- Basic data from the collections and other resources of the Australian National
Herbarium will be made freely available through Australias Virtual Herbarium.
- Options will be pursued for increasing the space and improving the housing
of the collections, particularly through greater integration with the CPBR.
- The Australian National Herbarium will continue to maintain high curatorial
standards for the specimens in its care. The specimens will be stored and
handled according to modern standards of herbarium curatorial practice.
- The identity of specimens will be kept as current as possible, according
to the latest accepted taxonomic revisions. The associated collections of
spirit material, wood samples, floral dissections and other collection components
will continue to be maintained to the same standards as the main collection.
- An active field collection program will continue to collect taxa under-represented
in the collection, taxa of research interest, and taxa from areas that are
poorly known botanically. Collecting permits will be obtained from the authorities
concerned and reports on collecting activities will be provided to those authorities.
- Herbarium data will be managed in accordance with national and international
standards to facilitate its contribution to the Australian Virtual Herbarium.
- The Australian National Herbarium will continue to be involved in an active
specimen loans and exchange program with other recognised herbaria throughout
Australia and internationally. Specimen acquisition will also occur through
collection by staff members and through donations and exchanges. The database
will be maintained and populated with the data associated with the Australian
National Herbarium holdings, their location and their status. Additional resources
will be sought to accelerate databasing in association with the establishment
of the Australian Virtual Herbarium.
- The CPBR will provide botanical identification services to the Gardens.
- The Australian National Herbarium will provide a plant enquiry and identification
service. Charges as detailed in Appendix 6 will apply to this service for
professional or commercial individuals or organisations, unless there is a
demonstrable mutual benefit involved. These charges will be reviewed periodically.
- The Australian National Herbarium will house and maintain voucher specimens
of plants in the Gardens living collections, plants photographed for
the Photograph Collection (where applicable) and other botanical research
and survey projects. These specimens will be curated to the highest archival
standard and reliably identified according to the most recent and reliable
- The Australian National Herbarium will lend its specimens to other recognised
herbaria for taxonomic and systematic research in line with the access to
genetic resources policy outlined in Section 3.3. In return, it will borrow
specimens from other institutions to facilitate its own research and will
follow the agreed loan conventions of herbaria.
- Duplicate specimens will be deposited in herbaria which are located in the
State or country of origin, herbaria which are actively working on or with
interests in the taxa, herbaria with a regional interest in the collecting
site, and selected major overseas herbaria.
- A Disaster Management and Recovery Plan will be completed and implemented.
- There will be integration of specimen and information processing activities
which will include documenting collections management procedures. Staff will
be trained in these procedures.
- Residual data capture for the Australian Plant Name Index will continue
and there will be significant progress with synonymy including the integration
with, and contributions to, the International Plant Name Index.
- Increased efficiency will be achieved on electronic data capture using portable
computers and database technology during fieldwork.
- The Director will pursue tax deductibility for donation of botanical specimens.
4.3 Biogeographic and Evolutionary Research
Aim: To contribute, through the CPBR, to a greater understanding of Australian
plants and their biogeographic and evolutionary origins.
One of the major objectives of the CPBR is to contribute to understanding of
the relationships and origins of continental and offshore Australian plants.
This is reflected in the composition of the collections and in the research
priorities. In addition to a focus on Australian taxa, the Australian National
Herbarium aims to achieve a good representation of plants from surrounding countries
and from continents that were previously part of the larger Gondwana land mass.
Specimens from more distant countries are also included in the collections if
they are closely related to the Australian taxa. The Herbarium also includes
specimens from a wide range of exotic species growing in Australia.
The needs of botanical research programs and the regional themes of the Gardens
living collections have directed priorities for field collecting of vascular
plants to a large extent. Additional collecting trips for vascular plants have
been undertaken specifically to complete gaps in the Herbarium collection. Collection
of non-vascular plants has been more wide ranging because these plants do not
feature prominently in the living collections.
- Maintain the geographic focus of CPBR collections and research activity
upon continental Australia and Australian territories.
- Areas of known or suspected botanical significance or with high numbers
of endemic or rare and endangered taxa will continue to be of high research
and collecting priority.
- The CPBR will continue to collect, manage and study plant specimens from
all regions of Australia.
- Fieldwork will concentrate on areas known to be under-surveyed botanically
or on areas with a problematic flora. Intensive fieldwork will also be undertaken
at known and expected localities for rare or threatened plant taxa.
- Field trips will be coordinated between the CPBR and Gardens.
- Collections and research activity will extend to the southwest Pacific,
southeast Asia and the Gondwanan land masses to the extent necessary to elucidate
the origins and relationships of Australian plants (see also Section 3.1).
4.4 Plant Systematics Research
Aim: To contribute, through the CPBR, to a greater understanding and knowledge
about the systematics, evolution, taxonomy, distribution and conservation biology
of major groups of Australian native plants and their relatives.
The main input by the Gardens to research at the CPBR is through the expansion
of knowledge on plant systematics. Advances in technology have made new areas,
such as molecular biology, increasingly important in plant systematics. To take
advantage of these tools, staff undertake collaborative projects with other
Major systematic projects carried out by staff in the CPBR involve systematic
and phylogenetic studies in Orchidaceae, Myrtaceae, (particularly Eucalyptus,
Melaleuca, Syzygium and Leptospermum), Caryophyllales (Amaranthaceae,
Caryophyllaceae, Portulacaceae), Asteraceae, Fabaceae, Malvaceae, Lauraceae,
Araliaceae, Proteaceae (especially Grevillea), Zamiaceae, Pteridophytes,
Bryophytes, and lichens.
Wherever possible, the taxonomic research effort of the CPBR is compatible
with the long-term requirements of the Australian Biological Resources Studys
Flora of Australia project, a multi-volume series documenting all Australian
The CPBR is also involved in the development of interactive computer-based
identification tools such as EUCLID and Australian Tropical Rain Forest Plants.
- The Gardens input into research and collections foci of the CPBR will
continue to be the morphology, taxonomy, systematics, evolutionary biology
and conservation of the Australian and related floras.
- In the immediate future the major focus of taxonomic and systematic research
at CPBR will be the Orchidaceae, Myrtaceae, Asteraceae and Fabaceae.
- Ancillary research programs will examine the taxonomy and systematics of
Grevillea, Astrotricha, Leptospermum, selected tropical
plant families, and some families within the mosses, liverworts and lichens
and the objectives of the Flora of Australia project.
- Gardens staff at the CPBR will continue to study the morphology of living
and preserved plant specimens to increase understanding of their taxonomy
and systematics, making use of the Australian National Herbarium, the laboratories,
the living collections and field studies. Biochemical studies, anatomical
studies, and plant biology and breeding studies will augment this work.
- The systematic research programs of the CPBR will be applied to elucidate
the classification, origin and phylogeny of the families Orchidaceae, Myrtaceae,
Asteraceae and the legumes, the genera Grevillea, Astrotricha,
and Leptospermum, and some cryptogam groups.
- Staff will prepare scientific and popular accounts of their investigations;
a major focus of publication and the research effort will continue to be the
priorities of the Flora of Australia project. Major contributions to
the Flora of Australia on Orchidaceae will be made.
- Pending the securing of external funding, production of multimedia interactive
keys to important and complex plant groups will be completed. They will focus
on family keys, Orchidaceae, Grevillea, Eucalyptus, and Fabaceae.
- Consideration will be given to expanding the cryptogam research program
to cover new areas of taxonomic expertise.
4.5 Visiting Scientists, Volunteers and Intern Programs
Aim: To contribute to a greater understanding of Australian plants by encouraging
the study of, and contribution to, the botanical collections by bona fide individuals.
Visiting Scientists and Scientific Associates
The Gardens and the CPBR encourage use of the collections and facilities by
staff from other organisations and by bona fide individuals who are studying
Australias plants. The quality of the collections is enhanced through
study and annotation by active and qualified researchers.
Researchers who are staff from other organisations, and who are formally acknowledged
by the Gardens and CPBR as Visiting Scientists, are accorded specific access
The Gardens and CPBR also maintain a Scientific Associate program. These people
may be either enthusiastic amateurs or professional botanists who spend much
of their time in the field searching for particular taxa of interest. They also
include retired staff or other professionals who spend time at the Gardens or
CPBR working on various projects.
Herbarium Volunteer Program
Herbarium Volunteers play an important part in the working life of the Australian
National Herbarium, allowing trained staff more time for curatorial activities.
Volunteers are selected from members of the public eager to assist with the
preparation of the collections and they are provided with training in specimen
mounting techniques. Herbarium staff provide supervision, guidance and training.
Volunteers work at both the Gardens and CSIRO sites. Volunteers mount about
10 000 specimens each year.
Student Botanical Intern program
The collections of the Australian National Herbarium and the large body of
professional and technical expertise held by the staff of the Gardens and CPBR
provide a useful training environment for tertiary students of botany. With
this in mind, the CPBR offers a Student Botanical Internship Program with its
major focus on the Australian National Herbarium. The Program provides some
formal instruction and an intensive period of work experience in a herbarium
and research environment. The Program operates during January and February of
each year and has the support of the universities, many of which recognise the
program for credit points for their students.
Canberra Institute of Technology students and work-experience students are
offered field placements in the Gardens living collection and the nursery.
The Gardens also offers horticulture apprentices work experience.
Research in Commonwealth Reserves (including the ANBG) that involves actions
affecting native species and or is carried on for commercial purposes is prohibited
by EPBC Act unless carried on in accordance with a management plan (s.354(1)(a)
and (f)). Scientific research generally in Commonwealth Reserves is prohibited
by the EPBC Regulations (r.12.10) unless carried on in accordance with a management
plan or a permit issued by the Director of National Parks, or if certain other
exceptions apply (regulation 12.06). Access to biological resources for research
purposes may also be subject to regulations made under s.301 of the Act.
- The Gardens and CPBR will maintain a Visiting Scientist and Scientific Associate
program in which accredited individuals are given access to the collections
and facilities to study and to collect plants for the living and herbarium
- The Australian National Herbarium will continue to maintain an active Herbarium
Volunteers Program, providing suitable volunteers with defined access to the
collections and facilities.
- Volunteers will be provided with a safe and ergonomically sound work environment
and they will be covered by the appropriate workers compensation insurance.
- The CPBR will continue to recruit suitably qualified and enthusiastic second
and third year tertiary students to the Student Botanical Intern Program.
- Visiting Scientists, Scientific Associates who spend time in the CPBR, ex-staff,
or other professionals, may, at the discretion of the CPBR management, be
provided with access to facilities to allow them to carry out their research.
- Scientific Associates will be trained in the techniques of botanical collecting
and instructed in the obligations imposed by permits for plant collecting.
Where this is acceptable to the permit-issuing bodies, associate collectors
will be provided with institutional collecting permits.
- Volunteers with appropriate technical abilities will be actively recruited
and provided with a range of tasks such as mounting or packaging specimens
and assisting in the processing of loans and exchanges.
- Staff of the CPBR will provide participants in the Student Botanical Internship
Program with formal instruction and supervision on the activities and tasks
of the Herbarium. Students will receive formal certification of their participation
in the scheme.
- Where necessary and considered by the Director of National Parks to be appropriate
in accordance with this Plan, permits may be issued under the EPBC Regulations
to carry out scientific research, including research that involves taking
- Research that involves access to biological resources will also be managed
in accordance with the Management Actions set out in Section 3.3 of this Plan.
4.6 Database Management
a) To manage and enhance an accurate and responsive integrated database
of botanical information and to provide information to the community, researchers
b) To facilitate and contribute to the establishment of Australias
Virtual Herbarium (AVH) as a community resource for research and environmental
The computer-based Integrated Botanical Information System (IBIS) is a relational
database that forms the link between the Herbarium collections, the living collections,
the photographic collection, and the bibliographic material held in the library
Significant databases for which the Gardens and the CPBR have responsibility,
brought together or integrated within IBIS, include the:
- Australian National Herbarium Specific Information Register;
- Gardens Living Collections database;
- Gardens Photograph Collection;
- Australian Plant Name Index;
- Census of Australian Vascular Plants; and
- Australian Weeds database.
The CPBR takes an active role in developing national and international standards
for botanical data exchange through its involvement in national projects such
as the Herbarium Information Systems Committee, Herbarium Information Standards
and Protocols for the Interchange of Data. The CPBR also participates in international
projects such as the Taxonomic Databases Working Group of the International
Union of Biological Sciences, the International Organisation for Plant Information
World Vascular Plant Checklist project, and the International Plant Names Project.
The CPBR is a prime contributor to the establishment of Australias Virtual
Herbarium, a project which will link the botanical databases of Australias
herbaria and facilitate access to, and use of, the data in them. A major component
of the establishment of the virtual herbarium is the input of data not held
in electronic form and the implementation of data exchange protocols currently
in development. The AVH will serve as a community resource of reliable botanical
information for botanists, land managers and the general public.
- Provision of appropriate access to plant biodiversity data for use by the
community, researchers and government will be a priority through the Gardens
and CPBR web servers and the Australian Virtual Herbarium.
- The Gardens and CPBR will jointly be responsible for, or for contributing
to, the coordination, maintenance and updating of important national botanic
databases developed by the Gardens, other relevant programs of Environment
Australia, and CSIRO.
- The CPBR will take an active role in the development of national and international
standards for botanical data exchange. The CPBR will employ best practice
in design and implementation of these standards and use them in projects such
as Australiaa Virtual Herbarium.
- Complete the database which captures the herbarium collection and, through
the CPBR, progressively computerise and integrate herbarium records into a
unified database management system. This data will contribute Australias
- The botanical databases of the Gardens will be amalgamated with those of
CSIRO Plant Industry and dynamic links will be maintained between the names
on the herbarium specimens and names applied to living plants in the Gardens
and photos of plants in the Photograph Collection.
- Contemporary standards of design and content such as Herbarium Information
Standards and Protocols for the Interchange of Data will be employed in all
database applications and the Gardens and CPBR will promote best-practice
in the management of herbarium data as part of their contribution to Australias
- The combined Australian Plant Name Index and Census of Australian Vascular
Plants data sets will be redesigned to link with other data sets, including
the Herbarium, living collections and photograph collections. This combined
data set will be the primary plant name authority file for all CPBR and Gardens
database applications and will be a foundation data-set for Australias
Virtual Herbarium. A user-friendly interface will be developed and incorporated.
- Selected images of botanical items and material relevant to the management
of the collection will be stored on the IBIS database and made accessible
on the CPBR network for use in projects such as Australias Virtual Herbarium.
- The CPBR will develop basic expertise in spatial information systems and
ensure that its applications and data adhere to contemporary spatial data
- An on-line geographic information system will be provided on the CPBR network
and website, both for management of the Gardens and CPBR, and for publication
of Gardens and CPBR information.
- There will be timely entry of new taxonomic and nomenclatural information
into the Australian Plant Name Index.
- There will be timely entry of herbarium specimen records following new accessions
from exchange and collection. Strategic groups of plants will be entered,
and the legacy of other collections not yet stored in the database will be
addressed as part of the contribution to Australias Virtual Herbarium.
- High level input will be provided to national and international fora on
the development of international standards for botanical data exchange to
reflect the needs of the botanical community.
- Support will be given to integrating the Australian Plant Names Index with
the International Plant Names Index, in collaboration with the Royal Botanic
Gardens, Kew, and the Harvard University Herbaria.
4.7 Networking and the World Wide Web
Aim: To maintain an efficient network of computing facilities for the Gardens
and CPBR and to provide general access to relevant botanical data, information
and appropriate information-processing tools.
The Gardens and CPBR employ state-of-the-art computing hardware to provide
an efficient internal CPBR network to take advantage of World Wide Web (Web)
facilities and to connect to other organisations as needed. Specialised hardware,
such as scanners and high quality printers for herbarium labels, is shared through
the network. The CPBR network also handles backup and archiving of file systems.
The Gardens and CPBR Web servers provide access to textual and graphic information
about the Gardens and the CPBR and information from CPBR databases. The Web
also provides connection to information produced by other botanical and environmental
institutions and links have been made to these resources as they have been published
on the Web. The Web is the primary vehicle for access to projects such as Australias
- The CPBR will employ contemporary information management technology to provide
efficient tools for the management and dissemination of botanical information.
- Access to the Web for the delivery and retrieval of data and information
will be a cornerstone of the information processing infrastructure of the
CPBR and the Gardens.
- Connection to external organisations will be maintained so users have access
to remote network services and facilities.
- Information in the form of documents and access to the database will be
published on the CPBR network and made available for scientific research and
- Appropriate security measures will continue to be taken to prevent unauthorised
access and to minimise malicious or unintentional damage to the CPBR network
and databases. The back-up strategy will ensure that data are recoverable
in the event of a catastrophic system failure.
- An upgrade and implementation program will be undertaken to ensure access
to the latest versions of licensed software and that such software is properly
installed and supported.
- Hardware will be upgraded in a timely manner to ensure that the Gardens
and the CPBR are not constrained by obsolete technology. In all cases, Government
Open Systems Interconnect Profile (GOSIP) and industry standards will be followed.
- The Gardens and CPBR Web site will be maintained in accordance with the
Commonwealth Government Online Strategy.
- Staff training and instruction in the use of new applications and equipment
will be provided when applications and equipment are installed, consistent
with and where possible within the framework of Environment Australias
information technology training programs. Training will take the form of computer-aided
instruction packages, formal training and on-the-job instruction and experience.
Self-instruction will be encouraged.
15 December, 2004
, webmaster, ANBG (firstname.lastname@example.org) | 4. Studying Australian Plants
4.1 Centre for Plant Biodiversity Research
Aim: In partnership with CSIRO, contribute to the successful management
of the Centre for Plant Biodiversity Research to enable it to conduct botanical
and related research as a basis for the understanding, conservation, use and
sustainable management of Australian plants.
The CPBR was formed in November 1993 as a joint ventu | {
"score": 2,
"cc": false,
"url": "http://www.anbg.gov.au/gardens/about/management/manplan/2002/08-chap4.html",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
Below is the List Serve Post you selected to display.
cc -- ARB 1990 Emissions Level Report Posted Posted: 16 Nov 2007 21:16:13
ARB staff has posted a Staff Report titled “California 1990 Greenhouse Gas Emissions Level and 2020 Emissions Limit”. The posted staff report discusses the development of the 1990 statewide emissions level, provides a summary of the key emissions sources, the methodologies used to calculate the emissions, and the sources of the data. http://www.arb.ca.gov/cc/ccei/inventory/1990_level.htm Staff will propose a 1990 statewide greenhouse gas emissions level and 2020 emissions limit of 427 million metric tonnes carbon dioxide equivalent (MMTCO2e) for consideration by the Board at the December 6th Board hearing. Comments or questions on this report or its supporting appendices should be directed to Webster Tasat, Manager of the Emission Inventory Analysis Section, at (916) 323-4950, firstname.lastname@example.org. | Below is the List Serve Post you selected to display.
cc -- ARB 1990 Emissions Level Report Posted Posted: 16 Nov 2007 21:16:13
ARB staff has posted a Staff Report titled “California 1990 Greenhouse Gas Emissions Level and 2020 Emissions Limit”. The posted staff report discusses the development of the 1990 statewide emissions level, provides a summary of the key emissions sources, the methodologie | {
"score": 2,
"cc": false,
"url": "http://www.arb.ca.gov/lispub/rss/displaypost.php?pno=900",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
Twice as Nice Breeding Versatile Vegetables
An experimental line of beautiful, tasty peppers. The purplish-blue fruit are immature; the red, mature.
Can you eat your peppers and have them too?
Yes, you can. At least, that’s the opinion of two Agricultural Research Service geneticists. Since 1991, John Stommel, of the ARS Vegetable Laboratory, and Robert Griesbach, of the ARS Floral and Nursery Plants Research Unit, both in Beltsville, Maryland, have bred peppers to please both the eye and the palate. These peppers have been developed through a cooperative research and development agreement with PanAmerican Seed Company and McCorkle Nurseries, Inc.
The eye-catching Black Pearl, released in 2005 and honored as a 2006 All-America Selections (AAS) winner, attests to their success in developing new cultivars with both aesthetic and culinary appeal. The award recognizes new flower and vegetable varieties that demonstrate “superior garden performance” in trials conducted throughout the country.
The All-America Selection winner Black Pearl is the latest cultivar to be developed and released by ARS scientists Rob Griesbach and John Stommel.
Black Pearl is a robust plant, adaptable to environments from New England to California, Stommel says. In addition, it resists attacks from many insects and fungi and is remarkably drought-tolerant.
The pepper is now on display at the U.S. National Arboretum in Washington, D.C., which is part of ARS. With moderately shiny, black leaves and glossy fruits that ripen from black to red, Black Pearl offers a temptation few pepper enthusiasts could resist—and the AAS judges aren’t the only people who think so. Since its release, more than 2 million seeds have been sold.
A potential new variety of pepper line displaying various colored foliage.
A Peck of Pretty Peppers
Black Pearl has company. Stommel and Griesbach look forward to releasing several new pepper cultivars in the future, including one with spreading black foliage and colorful upright peppers with a spicy flavor. Another is exceptionally tall—growing as high as 3 feet. A third, which produces fruit around Halloween, has black foliage and orange, pumpkin-shaped fruit.
Ornamental peppers are just one part of a growing industry. Nursery, landscape, and floral plants are big business, worth about $16 billion a year in this country alone, according to USDA’s Economic Research Service.
Geneticists Rob Griesbach (left) and John Stommel evaluate one of their multicolored experimental lines of peppers.
Breeding these culinary ornamental peppers has been a cross-laboratory effort. How did the breeders do it? The first step is to isolate individual traits and select the ones they want, Stommel says. Within the Capsicum genus, there is great variety among qualities—like the size, shape, and color of leaves and fruits.
Griesbach compares the process of pepper breeding to assembling a Mr. Potato Head doll. By selecting specific characteristics, breeders can make desirable combinations. Any new combination will create a novel pepper.
“Only your imagination is limiting,” he says.
Breeding a new cultivar takes 10 to 15 years and involves making crosses and submitting the resulting plants to rigorous tests. But creating tasty and attractive plants isn’t the only benefit of the ornamental pepper breeding program. This work also has applications for many plant genetics studies.
Orange, pumpkin-shaped fruit for seasonal applications such as Halloween.
Pigments Impart More Than Color
These peppers aren’t the first plants to come out of the Vegetable Laboratory with both aesthetic and culinary appeal. Earlier research produced tomatoes rich in the carotenoids lycopene and beta-carotene, red and orange pigments that give tomatoes their characteristic color. Lycopene and beta-carotene are antioxidants and have been linked to health-promoting benefits, so increasing tomatoes’ carotenoid content improves not only their color, but also their nutritional value.
What health benefits do culinary ornamental peppers have? And what can they teach us about other plants? Griesbach and Stommel are now exploring the biochemistry of the anthocyanin pigments responsible for the Black Pearl pepper’s deep-black color.
Standard-size bell pepper (left) and miniature bell pepper (right).
In addition to providing pigmentation, anthocyanins in plants have several tasks—including protecting them against strong ultraviolet (UV) sunlight that could damage their cellular DNA. Anthocyanins are located in the outer layers of plants, where increased exposure to UV light or ionizing radiation spurs chemical messenger molecules to speed up anthocyanin production. When consumed, these anthocyanin pigments function as antioxidants.
Griesbach and Stommel have created a system for nutritionists to efficiently evaluate the metabolism of anthocyanins in humans. With a better understanding of that metabolic fate, the scientists envision finding ways to increase the anthocyanin—and nutritional—content of other vegetable crops, not just peppers.
“We must figure out which anthocyanins are the best phytonutrients,” says Griesbach. “Once we know that, we can find and activate the genes involved in their production and move them into other plants.”
Tangerine Dream—a sweet, edible, ornamental pepper.
Initial results have proven positive. In 2005, in controlled-environment experiments inside a growth chamber, Griesbach, Stommel, and colleagues determined environmental conditions for varying anthocyanin production in Black Pearl. Although the plant can adapt to many environments, its growing season and anthocyanin production vary with the temperature and sunlight of its immediate surroundings.
Once the scientific duo gains knowledge of the metabolic pathways at a molecular level—which Griesbach estimates should come sometime in 2006—they’ll know how to increase the nutritional and anthocyanin content of different plant tissues.
“We plan on eventually creating more of these versatile crops,” says Stommel. “These will be plants that, like Black Pearl, not only look good, but can be eaten. These plants will serve as both ornamental and food crops—doubling their value.”
Postdoctoral research associate Gordon Lightburn loads pepper samples for anthocyanin gene analysis.
When more of the anthocyanin research is complete, ARS nutritionists Janet Novotny and Beverly Clevidence, of the Beltsville Human Nutrition Research Center, will be able to evaluate the biological activity of pepper phytonutrients in humans. This work will be useful for future breeding efforts and could allow scientists to produce plants with even higher nutrient content.—By Laura McGinnis and Alfredo Flores, Agricultural Research Service Information Staff.
This research is part of Plant Genetic Resources, Genomics, and Genetic Improvement, an ARS National Program (#301) described on the World Wide Web at www.nps.ars.usda.gov.
John Stommel is with the Vegetable Laboratory, 10300 Baltimore Ave., Beltsville, MD 20705-2350; phone (301) 504-5583, fax (301) 504-5555.
Robert J. Griesbach is in the Floral and Nursery Plants Research Unit, 10300 Baltimore Ave., Beltsville, MD 20705-2350; phone (301) 504-6574, fax (301) 504-5096.
"Twice as Nice Breeding Versatile Vegetables" was published in the September 2006 issue of Agricultural Research magazine. | Twice as Nice Breeding Versatile Vegetables
An experimental line of beautiful, tasty peppers. The purplish-blue fruit are immature; the red, mature.
Can you eat your peppers and have them too?
Yes, you can. At least, that’s the opinion of two Agricultural Research Service geneticists. Since 1991, John Stommel, of the ARS Vegetable Laboratory, and Robert Griesbach, of the ARS Floral and Nursery Pla | {
"score": 2,
"cc": false,
"url": "http://www.ars.usda.gov/is/AR/archive/sep06/veg0906.htm",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
RAAF Biographical Files from the Second World War
At the outbreak of the Second World War, there were some 450 Australians serving with the Royal Air Force (RAF) on short-term commissions. Once the Empire Air Training Scheme got underway, thousands more Australians arrived in Britain. Many of them were posted to Royal Air Force squadrons, even though they were members of the Royal Australian Air Force (RAAF).
As these Australians were serving with the RAF, many of the important records usually used to research someone’s service, such as squadron records, are held in Britain rather than Australia. This can make it difficult if you are based in Australia to trace an individual’s career using archival records.
Fortunately, in 1943 RAAF Overseas Headquarters began to compile biographical files of some of its personnel serving in Britain. Their purpose was to collect historical information on Australians serving in the RAAF, RAF and Royal Air Force Volunteer Reserve who achieved distinction, and they were to be used by the RAAF Historical Records Section. These records are now held at the Australian War Memorial in the archival series AWM65. The files include a basic survey that collects the airman's personal information and details of operations, decorations, previous service experience and sometimes details of squadrons and aircraft. The records can also include press releases and newspaper cuttings, debriefs, transcripts of interviews and any form of publicity such as Air Ministry or RAAF bulletins, scripts of BBC "Calling Australia" broadcasts and newspaper reports.
One particularly interesting file is about Charles Gordon Chaloner Olive (AWM65 4018). Gordon Olive was a civil engineering cadet in Brisbane when he joined the RAAF. He trained at Point Cook and took up a short service commission in the RAF in 1937. At the outbreak of the Second World War, Olive was a Flying Officer in 65 Squadron. He became one of the small number of Australian pilots who participated in both the evacuation at Dunkirk and, later, the Battle of Britain.Olive's file tells us many details we wouldn't usually find in other official records, such as his success as an athlete, breaking the RAF javelin record in 1939. Transcripts of radio interviews share his experiences as a fighter pilot in the Battle of Britain, and recount the respect he had for his fellow pilots, British, Dominion, and Polish alike. Olive won the Distinguished Flying Cross in September 1940. At the age of just 24, he became the first Commanding Officer of 456 Squadron, the RAAF’s only night fighter squadron in the Second World War. He rose to the rank of Acting Wing Commander, and rejoined the RAAF in 1943.
Olive used to tell his pilots the tale of a particularly memorable incident. Once when he bailed out, his parachute nearly failed to open. When he landed in a paddock, he was confronted by members of the land army and home guard, and had to convince them he was not German. That accomplished, he thought he'd made it, but the ambulance taking him back to the aerodrome overturned and, as the file notes:
"I scrambled out with a few more bruises, and was then picked up by a fire engine dashing to the spot where my Spitfire was burning itself out.
"The fire engine, too, ended up a minute later in the ditch.
"After that, I decided to walk."
And that is why the wing commander always tells his pilots that they are safer in the air.
Olive's biography, The Devil at 6 O'Clock: An Australian Ace in the Battle of Britain, was published in 2001. His biographical file and over 4,600 others can be viewed in the Memorial’s Research Centre.
References and Further Reading
- 'Olive, Charles Gordon Chaloner 39469', Australian War Memorial, AWM65 4018.
- 277457 Wing Commander Charles Gordon Chaloner Olive, DFC.
- John Herington, Air War Against Germany and Italy, 1939-1943, Australia in the War of 1939-1945, Series 3 (Air), vol. III (Canberra: Australian War Memorial, 1954).
- Dennis Newton, A Few of 'The Few': Australians and the Battle of Britain (Canberra: Australian War Memorial, 1990).
- Gordon Olive and Dennis Newton, The Devil at 6 O'Clock: An Australian Ace in the Battle of Britain (Loftus: Australian Military History Publications, 2001).
- Series note, AWM65.
- Alan Stephens, The Royal Australian Air Force, The Australian Centenary History of Defence, vol. II (Melbourne: Oxford University Press, 2001). | RAAF Biographical Files from the Second World War
At the outbreak of the Second World War, there were some 450 Australians serving with the Royal Air Force (RAF) on short-term commissions. Once the Empire Air Training Scheme got underway, thousands more Australians arrived in Britain. Many of them were posted to Royal Air Force squadrons, even though they were members of the Royal Australian Air F | {
"score": 3,
"cc": false,
"url": "http://www.awm.gov.au/blog/2010/09/17/raaf-biographical-files/",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
GENERAL INFORMATION: Quartz Peak Trail, in the 14,400-acre Sierra Estrella Wilderness, leads visitors from the floor of Rainbow Valley (elevation 1,550 feet) to the summit ridge of the Sierra Estrella at Quartz Peak (elevation 4,052 feet) in just 3 miles. Along the way, visitors are treated to a variety of Sonoran Desert plants and wildlife, scenic vistas, and evidence of the area's volcanic history. The views from the summit are spectacular--to the west is a dramatic panorama of rugged mountain ranges and desert plains, and to the east metropolitan Phoenix unfolds over the valley of the lower Salt River.
Quartz Peak Trail is extremely steep and difficult to follow in places. This is a hike for experienced and well-conditioned hikers only! The trail begins at Quartz Peak Trailhead by following a closed four-wheel-drive track approximately 1/4 mile. Look to the left as you walk up the old road and see a narrow trail ascending the ridge to the north (see map below). The trail is poorly marked in places and does not extend to the summit--the final 1/4 mile to Quartz Peak is a scramble over boulder and talus slopes that requires careful footing. Quartz Peak is a point on the spine of the Sierra Estrella capped with an outcrop of white quartz.
ACCESS: Quartz Peak is accessed from Rainbow Valley and Riggs Roads in Rainbow Valley, approximately 25 miles southwest of Phoenix. See the map below for mileages and directions.
FACILITIES: A restroom and picnic table are located at the trailhead.
MAPS: Quartz Peak Trail is not mapped, but the route is covered by USGS 7.5-minute topographic map "Montezuma Peak, Ariz." The Sierra Estrella Wilderness is covered by the USGS 7.5-minute topographic maps "Mobile, NE Ariz." and "Montezuma Peak, Ariz."
- Quartz Peak Trail receives very little use and the terrain is extremely rugged and remote. Always tell a friend or relative where you are going and when you plan to return.
- Drinking water is not provided at Table Top Trailhead, so bring plenty.
- The Sierra Estrella and surrounding area is prone to heavy rains and flash floods. Do not attempt to cross flooded washes.
- You may encounter rattlesnakes or other poisonous creatures; watch for them and be careful where you put your hands and feet. Do not harass reptiles - most bites result from people playing with, collecting or attempting to kill them.
- Fires are not allowed in the Sierra Estrella Wilderness.
- Due to the extremely rugged nature of the Sierra Estrella, horses and packstock are not allowed on Quartz Peak Trail.
Lower Sonoran Field Office
21605 N. 7th Avenue
Phoenix, AZ 85027-2929
Phone: (623) 580-5500
Fax: (623) 580-5580
Field Manager: Ed Kender, Acting
Hours: 7:30 a.m. – 4:15 p.m., M-F | GENERAL INFORMATION: Quartz Peak Trail, in the 14,400-acre Sierra Estrella Wilderness, leads visitors from the floor of Rainbow Valley (elevation 1,550 feet) to the summit ridge of the Sierra Estrella at Quartz Peak (elevation 4,052 feet) in just 3 miles. Along the way, visitors are treated to a variety of Sonoran Desert plants and wildlife, scenic vistas, and evidence of the area's volcanic histo | {
"score": 2,
"cc": false,
"url": "http://www.blm.gov/az/st/en/prog/recreation/hiking/quartz.html",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
It was around Veterans Day last year when Ken Iaciofano began to drink heavier than usual. The 22-year-old Iraq Veteran was known to be a drinker but it had gotten worse in the fall, culminating in a drunk driving accident that injured several people, including himself. To the prosecutors and court system in Cumberland, Rhode Island, he must have seemed like a trouble making alcoholic. To his lifelong friends from the Army, he was the funny guy everyone called ‘Ice’ for short. But when he found himself hours away from his nearest battle buddy and facing prison time for his drunk driving, he turned to the bottle for help. On the weekend of Veterans Day, it was just him and a bottle of vodka. His odd decision to take a bath under the influence was the last he would make. At some point he slipped under the water, and his grandmother found him in the tub, drowned. One of the nicest guys from my infantry company survived a deployment to Iraq only to die in his own bathroom. His friends would later say they didn’t know he was suffering that badly.
Every November 11, the country takes the time to honor Veterans who have served the country in uniform. The day is often confused with Memorial Day, when the nation remembers those killed while in the service. Veterans Day is reserved to remember all those who have served, both living and deceased. Through their service, Vets often possess a strong sense of history and legacy of the military. Many understand they aren’t the first, and certainly not the last, to put on the uniform. They carry on tradition and pass it off to those who come after. Unfortunately, they pass along damaging stigmas as well. The hardest one to fight undoubtedly is that only the weak are stricken with Post Traumatic Stress.
“Must you carry the bloody horror of combat in your heart forever?”
– Homer, “The Odyssey”
Combat trauma is as ancient as combat itself, but many don’t view it that way. Even before Odysseus sailed from Troy with the burden of battle on his mind, the horrors of war have exacted a toll on the men and women who have fought them. Just as Veterans continue the legacy of service and sacrifice, post traumatic stress will be carried through the ages as an immovable aspect of the battlefield, just as real and damaging as tanks and artillery. Recent studies have even suggested that the brain undergoes physical changes after experiencing traumatic stress. The danger is real and serious, but stereotypes and mischaracterizations plague the military and discourage service members from getting the help they need both as service members and Veterans.
What can be done to fight the stigma? The answer has eluded doctors, physicians and Veterans ever since PTS and PTSD were considered bona fide injuries after Vietnam. Luckily, awareness of post traumatic stress has risen dramatically over the past several years. Wartorn: 1861-2010, a documentary about PTSD from the Civil War to the wars in Iraq and Afghanistan, debuts today on HBO. Before its release, it was screened at the Pentagon where a Defense Department and VA-led panel discussed ideas to address the suicide crisis affecting the military and Veteran communities. Chief among them: communities must embrace and look after warriors when they come home. Recognizing the signs of PTS and PTSD could save a life in crisis. Many Veterans simply don’t know what resources are available to help. VA’s Suicide Prevention line can be reached at 1-800-273-TALK (8255), and a live chat can be accessed at the Veterans Suicide Prevention site. Both are manned 24/7.
The population of female Veterans continues to grow. The consequences for unprecedented roles for women in combat mean unique and challenging PTSD and suicide prevention needs. Programs and services are available for women at VA, as well as resources to address Military Sexual Trauma.
Veterans Day honors both the living and the dead, but those who come home from war have earned a happy and full life. To join the ranks of the proud who served the nation is the best way to honor the fallen who didn’t make it back. But the military and Veteran communities shouldn’t share the burden to watch out for signs of PTS and PTSD. Families, friends, coworkers and neighbors must do their part to recognize the signs and help Veterans get the care they need. I can’t think of a better way to say “Thank you for your service.”
No one can say for certain if Ice was in an emotional crisis during the last moments of his life, but it is clear he was in need of help. The nation is dishonored whenever a combat Veteran loses his life after surviving war, so it is up to each and every one of us to do our part to ensure every Veterans Day is met with cherished memories of service instead of hopelessness. Whenever you see a Veteran, just don’t say “Thank you,” but ask that ever important question, “How are you doing?” Have that 1-800 number handy. You could be saving a life.
John S Y Lee/Flickr | It was around Veterans Day last year when Ken Iaciofano began to drink heavier than usual. The 22-year-old Iraq Veteran was known to be a drinker but it had gotten worse in the fall, culminating in a drunk driving accident that injured several people, including himself. To the prosecutors and court system in Cumberland, Rhode Island, he must have seemed like a trouble making alcoholic. To his life | {
"score": 3,
"cc": false,
"url": "http://www.blogs.va.gov/VAntage/459/battle-in-their-hearts/",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
Laws, Regulations & Annotations
Property Taxes Law Guide – Revision 2013
Property Tax Annotations
770.0000 STATE BOARD OF EQUALIZATION
770.0011 Assessment Practices Survey. The State Board of Equalization is not required to disclose other than to an assessee information consisting of appraisal data concerning individual properties selected for appraisal in an assessment standards survey.
The State Board of Equalization is required to disclose parcel numbers of individual properties selected for appraisal in an assessment standards survey unless it can demonstrate that on the facts of the particular case the public interest served by not identifying the parcels clearly outweighs the public interest served by disclosure. OAG 10/8/1993 (No. 93/201, Vol. 76, p. 219). | Laws, Regulations & Annotations
Property Taxes Law Guide – Revision 2013
Property Tax Annotations
770.0000 STATE BOARD OF EQUALIZATION
770.0011 Assessment Practices Survey. The State Board of Equalization is not required to disclose other than to an assessee information consisting of appraisal data concerning individual properties selected for appraisal in an assessment standards survey.
The State | {
"score": 2,
"cc": false,
"url": "http://www.boe.ca.gov/lawguides/property/current/ptlg/annt/770-0011.html",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
Courts are very formal. If you want to make good impression in court the following points may be helpful:
Try to be neat and tidy in your dress and appearance.
Don't put your hands in your pockets, it is best to keep them by your side.
Don't eat or chew gum in court.
If you want to say something to the Magistrates but feel nervous about speaking in court, write down what you want to say and hand your note to the solicitor or the court clerk.
Do not be afraid to ask if you do not understand anything. It can be explained to you. If you or your parent/guardian or other adult attending with you do not speak or understand English well, ask for an interpreter.
Admitting / denying the charge(s)
When you first go into court the clerk will read out the offences with which you are charged. You will then be asked whether you wish to plead 'guilty' or 'not guilty'.
You can then do one of three things:
You can ask for a delay (an adjournment) to give you time to talk to a solicitor about your case. If you are unsure about what to do or if you have not spoken to a solicitor, it is best to ask for an adjournment.
You can deny the offence (plead 'not guilty'). The case will then be adjourned to a later date for a 'Pre trial review' or a full trial when witnesses can be called by both yourself and the CPS.
You can admit the offence (plead 'guilty'). You should not do this unless you have first discussed it with a solicitor. If you plead guilty you may be dealt with there and then. Sometimes the case will be put off until a later date to allow the court to find out more about you. | Courts are very formal. If you want to make good impression in court the following points may be helpful:
Try to be neat and tidy in your dress and appearance.
Don't put your hands in your pockets, it is best to keep them by your side.
Don't eat or chew gum in court.
If you want to say something to the Magistrates but feel nervous about speaking in court, write down what you want to say and hand y | {
"score": 2,
"cc": false,
"url": "http://www.bury.gov.uk/index.aspx?articleid=2296",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
International Classification of Diseases,
Tenth Revision (ICD-10)
The International Classification of Diseases (ICD) is designed to promote international comparability in the collection, processing, classification, and presentation of mortality statistics. This includes providing a format for reporting causes of death on the death certificate. The reported conditions are then translated into medical codes through use of the classification structure and the selection and modification rules contained in the applicable revision of the ICD, published by the World Health Organization (WHO). These coding rules improve the usefulness of mortality statistics by giving preference to certain categories, by consolidating conditions, and by systematically selecting a single cause of death from a reported sequence of conditions. The single selected cause for tabulation is called the underlying cause of death, and the other reported causes are the nonunderlying causes of death. The combination of underlying and nonunderlying causes is the multiple causes of death.
The ICD has been revised periodically to incorporate changes in the medical field. The Tenth Revision (ICD-10) differs from the Ninth Revision (ICD-9) in several ways although the overall content is similar: First, ICD-10 is printed in a three-volume set compared with ICD-9's two-volume set. Second, ICD-10 has alphanumeric categories rather than numeric categories. Third, some chapters have been rearranged, some titles have changed, and conditions have been regrouped. Fourth, ICD-10 has almost twice as many categories as ICD-9. Fifth, some fairly minor changes have been made in the coding rules for mortality.
There is related information, including links to an online version of ICD-10, at the World Health Organization's site.
Both hardcopy and electronic versions of the three-volume set of ICD-10 are available. The contact in the U.S. is:
STYLUS PUBLISHING, LLC
22883 Quicksilver Drive
P.O. Box 605
Herndon, VA 20172-605
United States of America
The ICD-10 consists of:
- tabular lists containing cause-of-death titles and codes
- inclusion and exclusion terms for cause-of-death titles
- an alphabetical index to diseases and nature of injury, external causes of injury, table of drugs and chemicals (Volume 3), and
- description, guidelines, and coding rules (Volume 2).
The process of converting from ICD-9 to ICD-10 affects many aspects of the mortality data system including revision of instruction manuals, medical software, and analyses. The most detailed listing of underlying causes of death used in the United States, the Each Cause List (ICD-10), is available on the CDC/FTP server.
- International Classification of Diseases - 10th Revision (ICD-10 brochure) [PDF - 209 KB]
- A Guide to State Implementation of ICD-10 for Mortality, Part I
- A Guide to State Implementation of ICD-10 for Mortality, Part II: Applying Comparability Ratios [PDF - 374 KB]
- Data tables
- Special Analysis Tables of 1979-98 Data Using an 113 Cause List
- History of the Statistical Classification of Diseases and Causes of Death [PDF - 2 MB]. 71 pp.
A related classification, the International Classification of Diseases, Clinical Modification (ICD-10-CM), is intended as a replacement for ICD-9-CM, Volumes 1 and 2 (diagnosis). | International Classification of Diseases,
Tenth Revision (ICD-10)
The International Classification of Diseases (ICD) is designed to promote international comparability in the collection, processing, classification, and presentation of mortality statistics. This includes providing a format for reporting causes of death on the death certificate. The reported conditions are then translated into medic | {
"score": 3,
"cc": false,
"url": "http://www.cdc.gov/nchs/icd/icd10.htm",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
Etiology, Epidemiology and Prognostics of Acute Kidney Injury (AKI)
Recruitment status was Recruiting
- To investigate the etiology, epidemiology and prognostic factors of acute kidney injury.
- To find out risk factors that relate with the prognosis of acute kidney injury,focusing on inflammation, oxidative stress and nutritional status.
- To study on the relationship between gene polymorphism and prognosis of acute kidney injury.
|Study Design:||Observational Model: Cohort
Time Perspective: Prospective
|Official Title:||The Study of Etiology, Epidemiology and Prognostic Factors of Acute Kidney Injury|
- renal function survival rate days in the hospital days in the ICU [ Time Frame: discharg from hospital, 28days,90days ] [ Designated as safety issue: Yes ]
Biospecimen Retention: Samples Without DNA
1ml whole blood and 1ml serum will obtained within 24 hour after AKI for hematological and biochemistry analyze.
|Study Start Date:||April 2009|
|Estimated Study Completion Date:||August 2012|
|Estimated Primary Completion Date:||December 2011 (Final data collection date for primary outcome measure)|
to investigate the relationship between preexisting malnutrition and adverse outcomes in patients with AKI
- Several nutritional assessment methods such as anthropometric, clinical and biochemical evaluations have been used; however, no single indicator is considered to be a "gold standard."
- to evaluate the association of serum nutritional variables and prognosis of acute kidney injury
- Given the different half-lives of serum nutritional markers, we hypothesized that the utility of serum nutritional variables as prognostic predictors may differ in early death (<7 days) and late death (>7 days, <28 days) patients.
|Contact: Feng Ding, email@example.com|
|Shanghai, China, 200040|
|Contact: Feng Ding, professor 86-02152888135 firstname.lastname@example.org|
|Principal Investigator:||Feng Ding, professor||Huashan Hospital| | Etiology, Epidemiology and Prognostics of Acute Kidney Injury (AKI)
Recruitment status was Recruiting
- To investigate the etiology, epidemiology and prognostic factors of acute kidney injury.
- To find out risk factors that relate with the prognosis of acute kidney injury,focusing on inflammation, oxidative stress and nutritional status.
- To study on the relationship between gene polymorphism an | {
"score": 2,
"cc": false,
"url": "http://www.clinicaltrials.gov/ct2/show/NCT00953992",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
Hon. Alcee L. Hastings, Chairman
Hon. Benjamin L. Cardin, Co-Chairman
For Immediate Release
April 24, 2008
U.S. HELSINKI COMMISSION CALLS FOR GREATER ATTENTION TO THE PLIGHT OF MIGRANT WOMEN
(Washington, D.C.) Earlier today, Congressman Alcee L. Hastings (D-FL), Chairman of the Commission on Security and Cooperation in Europe (U.S. Helsinki Commission) held a hearing with Helsinki Commissioner Congresswoman Hilda L. Solis (D-CA), entitled “Crossing Borders, Keeping Connected: Women, Migration and Development in the OSCE Region.” The hearing focused on the impact of women migrants on family and society and the economic contributions to their home countries through remittances. Participating in the hearing was Commissioner Congressman Mike McIntyre (D-NC) and Congresswomen Gwen Moore (D-WI), Doris Matsui (D-CA), Lois Capps (D-CA), Eddie Bernice Johnson (D-TX), and Diane Watson (D-CA). All the Members agreed that Congress must do more to shed light on the challenges as well as the benefits of women migrants.
Expert testimony was received from Dr. Susan Martin, Director of the Institute for Study of International Migration at Georgetown University and Dr. Manuel Orozco with the Remittances and Development program at Inter-American Dialogue.
Chairman Hastings noted during the hearing, “The plight of women migrants is a hometown issue for most of us. In my home state of Florida, we have some of the highest concentrations of farm workers. More than one-quarter of all farm workers in the United States are women, yet their salaries are only two-thirds that of their male counterparts even while they are exposed to some of the most dangerous working conditions and are regularly subjected to sexual harassment, assault, and rape.”
Congresswoman Solis, who is also Special Representative on Migration of the Organization for Security and Cooperation in Europe (OSCE) Parliamentary Assembly stressed that, “Migrant workers provide critical funds for family members in their home country through remittances. The social remittances of migrant women, such as ideas, skills, and attitudes, can also boost socio-economic development and promote human rights and gender equality. Financial remittances could have an even greater role in poverty reduction and development if women did not face wage, employment, credit and property discrimination.”
On May 9, Congresswoman Solis will chair a hearing in her district entitled, “Los Angeles: The Regional Impacts and Opportunities of Migration.” The hearing will focus on the transitional experiences and accomplishments of migrant communities in Los Angeles. In particular, it will examine Los Angeles as a case study within the international context of global migration. Chairman Hastings and other members of Congress will join Congresswoman Solis at the hearing in Los Angeles.
The Commission on Security and Cooperation in Europe, also known as the Helsinki Commission, is a U.S. Government agency that monitors progress in the implementation of the provisions of the 1975 Helsinki Accords. The Commission consists of nine members from the United States Senate, nine from the House of Representatives, and one member each from the Departments of State, Defense and Commerce.
Media Contact: Lale Mamaux
# # #
Migration, Refugees and Displaced Persons | Hon. Alcee L. Hastings, Chairman
Hon. Benjamin L. Cardin, Co-Chairman
For Immediate Release
April 24, 2008
U.S. HELSINKI COMMISSION CALLS FOR GREATER ATTENTION TO THE PLIGHT OF MIGRANT WOMEN
(Washington, D.C.) Earlier today, Congressman Alcee L. Hastings (D-FL), Chairman of the Commission on Security and Cooperation in Europe (U.S. Helsinki Commission) held a hearing with Helsinki Commissioner Con | {
"score": 2,
"cc": false,
"url": "http://www.csce.gov/index.cfm?FuseAction=ContentRecords.ViewDetail&ContentRecord_id=657&ContentType=P&ContentRecordType=P&UserGroup_id=59®ion_id=59&year=0&month=0&Subaction=ByDate&CFID=12188023&CFTOKEN=65836901",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
The PVM Team has developed a port of PVM 3.4 to WIN32 platforms. Win32 includes Windows95, Windows 98, and Windows NT Server/Workstation 4.0.
The software allows clustering computers running Win32 or Win NT 4.0 with Unix workstations and/even MPP's together into one parallel virtual machine.
After several beta releases compliant to pvm3.3.x, the PVM port to Win32 is now integrated into PVM 3.4 ! You will find it on netlib as well as in Markus Fischer's download area. People are encouraged to use the InstallShield version but the source is also available if they wish to recompile. A binary distribution for Alpha's running NT is also available.
The package has been tested even on Quad Boards with 4 Pentium Pro's running Windows NT 4.0 Server.
The PVM 3.4 beta 6 and beta 7 versions come with an InstallShield version
where a wizard lets you decide where to install the package, which compilers
you would like being supported and where some temporary files are ALLOWED
to be stored !
(this was causing major problems on restricted NT boxes for example)
Here are additional sources of information:
General information on PVM can be found at http://www.epm.ornl.gov/pvm | The PVM Team has developed a port of PVM 3.4 to WIN32 platforms. Win32 includes Windows95, Windows 98, and Windows NT Server/Workstation 4.0.
The software allows clustering computers running Win32 or Win NT 4.0 with Unix workstations and/even MPP's together into one parallel virtual machine.
After several beta releases compliant to pvm3.3.x, the PVM port to Win32 is now integrated into PVM 3.4 ! Y | {
"score": 2,
"cc": false,
"url": "http://www.csm.ornl.gov/pvm/NTport.html",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
America's Children and Youth
The lack of affordable, accessible, and
high-quality child care, school-age care,
and teen programs has a negative effect on
current and future educational attainment
and employment for
parents and children, the nation's economy and
family income, and physical and emotional environments in
which people live.
NIFA provides resources and program leadership
to the Cooperative Extension System (CES)
that enhances a nationwide response to challenges
facing American children, youth, and families.
CES, through the “Extension ‘CARES'...For
America's Children and Youth National Initiative,” is
focusing new and existing resources in working
toward a vision that all children and youth
are in safe, healthy, caring, and enriching
environments when away from their parents.
Improve early childhood, school-age, and
teen programs by linking the teaching, research,
education, technology, and 4-H youth development
expertise of USDA with the 105 land-grant
universities and the county and regional
extension offices in local communities across
Increase the quality, affordability, accessibility,
availability, and sustainability of child care,
school-age care, and teen out-of-school programs
through federal, state, and local partnerships
that tap the expertise and assets of local
The Sub-goals Include:
- Improve program staff and home-based
providers' ability to offer high-quality
care, education, and developmental experiences
for children and youth.
- Improve the quality of child care, school-age
care, and teen out-of-school settings.
- Improve families' abilities to better
support their children in out-of-home programs.
- Improve community and state supports
Back to Child Care & After-School Programs Home Page | America's Children and Youth
The lack of affordable, accessible, and
high-quality child care, school-age care,
and teen programs has a negative effect on
current and future educational attainment
and employment for
parents and children, the nation's economy and
family income, and physical and emotional environments in
which people live.
NIFA provides resources and program leadership
to the Coopera | {
"score": 3,
"cc": false,
"url": "http://www.csrees.usda.gov/nea/family/in_focus/childcare_if_cares.html",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
The Sangerfield River flows for roughly 18 miles from its origin just east of Sangerfield (Oneida County) through Madison County to just south of Earlville (Chenango County) where it combines with the Chenango River. Through most of its length, it is a slow meandering river that is suitable for canoeing. The Sangerfield River has some rich history as it flows through Ninemile Swamp (Madison County) which was a favorite hide out for the notorious Loomis Gang.
Public Access Sites
2.6 miles north of Sherburne on Route 12B. Hand launch. Parking for 6 cars.
General Fishing Information
The main gamefish found in the river are brown trout, northern pike, walleye and black bass. Other fish that can be caught in the river are bluegill, rock bass, brown bullhead and common carp. Most anglers target the brown trout in early spring shortly after they are stocked in the section between Poolville and Hubbardsville. Northern pike, walleye, black bass and the occasional brown trout are found downstream of Poolville. Northern pike fishing is also good above Hubbardsville, in the Ninemile Swamp area, which is best fished by canoe.
The Madison County section is stocked with approximately 2,300 year-old brown trout and 250 two year-old brown trout.
Special regulations exist for trout so please review the Special Regulations by County section of your regulation guide. | The Sangerfield River flows for roughly 18 miles from its origin just east of Sangerfield (Oneida County) through Madison County to just south of Earlville (Chenango County) where it combines with the Chenango River. Through most of its length, it is a slow meandering river that is suitable for canoeing. The Sangerfield River has some rich history as it flows through Ninemile Swamp (Madison County | {
"score": 2,
"cc": false,
"url": "http://www.dec.ny.gov/outdoor/66157.html",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
For Release: Wednesday, August 22, 2012
DEC Announces Honeoye Library's Fishing Pole Lending Program
The Honeoye Public Library is the latest library to join the New York State Department of Environmental Conservation's fishing pole lending program, DEC Regional Director Paul D'Amato announced today. The intent is to give families and youth opportunities to discover nature through fishing.
"Thanks to the tremendous efforts and support of the Honeoye Library, the Honeoye Fish and Game Club and library volunteer John Gahan, this project will provide opportunities for young people and families to learn how to fish," said Paul D'Amato. "This is a perfect example of leveraging limited resources in a cooperative effort to better benefit the youth and citizens of the state."
This program sponsored by DEC allows Honeoye library patrons to sign out one of eight fishing poles and informational materials for up to three weeks. It is the fifth library fishing pole program in the region.
"The Honeoye Fish and Game Club is a local club that promotes sportsman's activities and outdoor lifestyles," stated Sharon Mann, President of the Honeoye Fish and Game Club. "Our objective is to raise awareness about outdoor opportunities available in our community and to offer a safe and friendly environment for adults and today's youth to enjoy sportsman activities and healthy lifestyles. The Honeoye Fish and Game Club is committed to being involved in the community and working with organizations to make a positive impact and promote safe sportsman's activities and practices."
DEC used Federal funds from the Aquatic Resource Education Program of the Wallop Breaux Sport Fish Restoration Act to purchase the fishing equipment. The Sport Fish Restoration program is funded by revenues collected from fishing rods, reels, creels, lures, flies and artificial baits manufacturers. Manufacturers pay an excise tax on these items to the U.S. Treasury for the management of fishery resources, conservation and restoration.
Fishing poles will be lent to area residents who have a Honeoye Public Library card. All program participants must adhere to all appropriate fishing laws, including have a fishing license if you are 16 years old or older. Season, length and daily limits must also be followed.
"This is an awesome opportunity for the three organizations to partner together to promote fishing," said Honeoye Public Library Director Wendy Krouse. "Our customers have been eyeing the poles and asking about their availability. We're ready to go."
The library is located at 8708 Main Street in Honeoye. Library hours are:
Monday 2:30 p.m. to 8:30 p.m.
Tuesday 10:00 a.m. to 8:30 p.m.
Thursday 2:30 p.m. to 8:30 p.m.
Saturday 10:00 a.m. to 1:00 p.m. | For Release: Wednesday, August 22, 2012
DEC Announces Honeoye Library's Fishing Pole Lending Program
The Honeoye Public Library is the latest library to join the New York State Department of Environmental Conservation's fishing pole lending program, DEC Regional Director Paul D'Amato announced today. The intent is to give families and youth opportunities to discover nature through fishing.
"Thanks | {
"score": 2,
"cc": false,
"url": "http://www.dec.ny.gov/press/84411.html",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
Chapter 16 - Electronic Commerce
Article 16.1: Definitions16-
For the purposes of this Chapter:
(a) digital certificates are electronic documents or files that are issued or otherwise linked to a party to an electronic communication, transaction or contract for the purpose of establishing the party’s identity, authority or other attributes;
(b) electronic authentication means the process of establishing levels of confidence in the identity of a party to an electronic communication or transaction;
(c) electronic version of a document means a document in electronic format prescribed by a Party, including a document sent by facsimile transmission;
(d) personal data means information about an individual whose identity is apparent, or can reasonably be ascertained, from the information;
(e) trade administration documents means forms issued or controlled by a Party which must be completed by or for an importer or exporter in relation to the import or export of goods;
(f) party means a person who takes part in a transaction or contract; and
(g) electronic transmission means the transfer of digital products using any electromagnetic or photonic means.
Article 16.2: General Provisions
1. The Parties recognise the economic growth and opportunities provided by electronic commerce, and the importance of avoiding unnecessary barriers to its use and development consistent with this Agreement.
2. The aim of this Chapter is to promote electronic commerce between the Parties and the wider use of electronic commerce globally.
3. The Parties agree that, to the maximum extent possible, bilateral trade in electronic commerce shall be no more restricted than comparable non-electronic bilateral trade.
Article 16.3: Electronic Supply of Services
Nothing in this Chapter imposes obligations to allow the electronic supply of a service nor the electronic transmission of content associated with those services, except in accordance with the provisions of Chapter 9 (Cross-Border Trade in Services), Chapter 10 (Investment) or Chapter 12 (Financial Services), including the Annexes (Non-Conforming Measures).
Article 16.4: Customs Duties
Each Party shall not impose customs duties on electronic transmissions between the Parties.
Article 16.5: Domestic Electronic Transactions Frameworks
1. Each Party shall adopt or maintain measures regulating electronic transactions based on the following principles:
(a) a transaction including a contract shall not be denied legal effect, validity or enforceability solely on the grounds that it is in the form of an electronic communication; and
(b) laws should not discriminate arbitrarily between different forms of technology.
2. Nothing in paragraph 1 prevents the Parties from making exceptions in their domestic laws to the general principles outlined in that paragraph.
3. Each Party shall:
(a) minimise the regulatory burden on electronic commerce; and
(b) ensure that its measures regulating electronic commerce support industry-led development of electronic commerce.
Article 16.6: Electronic Authentication
1. The Parties recognise that electronic authentication represents an element that facilitates trade.
2. The Parties shall work towards the mutual recognition of digital certificates and electronic signatures at governmental level, based on internationally accepted standards.
3. Each Party shall adopt or maintain measures regulating electronic authentication that:
(a) permit parties who take part in a transaction or contract by electronic means to determine the appropriate authentication technologies and implementation models, and do not limit the recognition of such technologies and implementation models, unless there is a domestic or international legal requirement to the contrary; and
(b) permit parties who take part in a transaction or contract by electronic means to have the opportunity to prove in court that their electronic transactions comply with any legal requirement.
4. The Parties shall encourage the use of interoperable electronic authentication.
Article 16.7: Online Consumer Protection
1. Each Party shall, to the extent possible and in a manner considered appropriate, adopt or maintain measures which provide protection for consumers using electronic commerce that is at least equivalent to measures which provide protection for consumers of other forms of commerce.
2. Each Party shall adopt or maintain measures regulating consumer protection where:
(a) consumers who participate in electronic commerce should be afforded transparent and effective consumer protection that is not less than the level of protection afforded in other forms of commerce; and
(b) businesses engaged in electronic commerce should pay due regard to the interests of consumers and act in accordance with fair business, advertising and marketing practices.
3. Each Party shall encourage business to adopt the following fair business practices where business engages in electronic commerce with consumers:
(a) businesses should provide accurate, clear and easily accessible information about themselves, the goods or services offered, and about the terms, conditions and costs associated with a transaction to enable consumers to make an informed decision about whether to enter into the transaction;
(b) to avoid ambiguity concerning the consumer’s intent to make a purchase, the consumer should be able, before concluding the purchase, to identify precisely the goods or services he or she wishes to purchase; identify and correct any errors or modify the order; express an informed and deliberate consent to the purchase; and retain a complete and accurate record of the transaction;
(c) consumers should be provided with easy-to-use, secure payment mechanisms and information on the level of security such mechanisms afford.
Article 16.8: Online Personal Data Protection
Each Party shall adopt or maintain a domestic legal framework which ensures the protection of the personal data of the users of electronic commerce. In the development of personal data protection standards, each Party shall take into account the international standards and criteria of relevant international bodies.
Article 16.9: Paperless Trading
1. Each Party shall endeavor to accept electronic versions of trade administration documents used by the other Party as the legal equivalent of paper documents, except where:
(a) there is a domestic or international legal requirement to the contrary; or
(b) doing so would reduce the effectiveness of the trade administration process.
2. For greater certainty, the Parties confirm that Article 5.11 (Paperless Trading – Customs Administration Chapter) applies to paperless trading under this Chapter.
3. Each Party shall work towards developing a single window16- to government incorporating relevant international standards for the conduct of trade administration, recognising that each Party will have its own unique requirements and conditions.
Article 16.10: Consultations
1. The Parties will consult on electronic commerce matters arising under this Chapter including in relation to electronic signatures, data protection, online consumer protection and any other matters agreed by the Parties.
2. The consultations may be held via teleconference, videoconference, or through other means, as mutually determined by the Parties. | Chapter 16 - Electronic Commerce
Article 16.1: Definitions16-
For the purposes of this Chapter:
(a) digital certificates are electronic documents or files that are issued or otherwise linked to a party to an electronic communication, transaction or contract for the purpose of establishing the party’s identity, authority or other attributes;
(b) electronic authentication means the process of establ | {
"score": 3,
"cc": false,
"url": "http://www.dfat.gov.au/fta/aclfta/Australia-Chile-FTA-16.html",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
Designation of a low income credit union
A credit union organized under Article 11 of the New York Banking Law may be designated as a low income credit union as defined in item #5 below.
A credit union, including a credit union in formation, may make written application to the superintendent to be designated as a low income credit union. If the superintendent shall find, after investigation, that such credit union meets the definition of a low income credit union, as set forth below, he or she shall approve such designation.
Notwithstanding any other provision of Article XI of the Banking Law, a low income credit union may issue shares, share drafts and share certificates to nonmembers who or which may be natural persons, corporations, partnerships or other legal entities.
Except as provided herein, all provisions of the Banking Law shall be applicable to low income credit unions.
- The term "low income credit union" shall mean a credit union in which a majority of the members:
- make less than eighty percent of the average for all wage earners as established by the bureau of labor statistics of the United States Department of Labor or have annual household incomes that fall at or below eighty percent of the median household income for the nation as established by the United States Census Bureau; or
- are residents of a public housing project who qualify for such residency because of low income; or
- qualify to receive benefits from any program designed to assist the economically disadvantaged.
- A credit union's designation as a low income credit union may be removed by the superintendent if he or she shall find, after investigation, that such credit union no longer meets the definition of a low income credit union as set forth herein. Upon such a loss of designation, such credit union shall no longer be authorized to exercise the powers set forth herein, but shall remain subject to all of the other provisions of the Banking Law applicable to credit unions generally. | Designation of a low income credit union
A credit union organized under Article 11 of the New York Banking Law may be designated as a low income credit union as defined in item #5 below.
A credit union, including a credit union in formation, may make written application to the superintendent to be designated as a low income credit union. If the superintendent shall find, after investigation, that | {
"score": 2,
"cc": false,
"url": "http://www.dfs.ny.gov/banking/iac9.htm",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
New York State
Eric R. Dinallo Superintendent of Insurance 25 Beaver Street New York, N.Y. 10004
|ISSUED 03/31/2008||FOR IMMEDIATE RELEASE|
INSURANCE PROPOSAL PROTECTS CONSUMERS TRAVELING TO ISRAEL
Individuals planning travel to Israel and other international destinations cannot be denied life insurance under a proposal being advanced by a National Association of Insurance Commissioners’ (NAIC) committee chaired by New York Insurance Superintendent Eric Dinallo.
The proposal is contained in a recommendation approved Sunday by the NAIC’s Life Insurance and Annuities (A) Committee in Orlando. The full NAIC is expected to accept the recommendation, which the NAIC would then propose be enacted into law by the individual states.
“This proposal is aimed at protecting the rights of American citizens to travel freely without losing important life insurance protection,” Superintendent Dinallo said.
The proposal would permit insurance companies to deny or limit life insurance coverage in specific situations. These include travel to a destination under an alert or warning by the U.S. Centers for Disease Control and Prevention, or destinations where there is an ongoing armed conflict involving a foreign army.
Under existing New York Law, insurance companies cannot deny insurance coverage to consumers on the basis of past international travel. However, New York Law, like that of many other states, does not address future travel.
The issue arose in 2005 when U.S. Rep. Debbie Wasserman Schultz of Florida was denied additional insurance coverage when her insurance company learned that her future travel could include visiting Israel.
The NAIC is the organization of insurance regulators from the 50 states, the District of Columbia and the five U.S. territories. The NAIC provides a forum for the development of uniform insurance policy when uniformity is appropriate among the states.
Return to 2008 News Index | New York State
Eric R. Dinallo Superintendent of Insurance 25 Beaver Street New York, N.Y. 10004
|ISSUED 03/31/2008||FOR IMMEDIATE RELEASE|
INSURANCE PROPOSAL PROTECTS CONSUMERS TRAVELING TO ISRAEL
Individuals planning travel to Israel and other international destinations cannot be denied life insurance under a proposal being advanced by a National Association of Insurance Commissioners’ (NAIC) co | {
"score": 2,
"cc": false,
"url": "http://www.dfs.ny.gov/insurance/press/2008/p0803312.htm",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
U.S. Energy Information Administration - EIA - Independent Statistics and Analysis
Residual fuel oil: A general classification for the heavier oils, known as No. 5 and No. 6 fuel oils, that remain after the distillate fuel oils and lighter hydrocarbons are distilled away in refinery operations. It conforms to ASTM Specifications D 396 and D 975and Federal Specification VV-F-815C. No. 5, a residual fuel oil of medium viscosity, is also known as Navy Special and is defined in Military Specification MIL-F-859E, including Amendment 2 (NATO Symbol F-770). It is used in steam-powered vessels in government service and inshore powerplants. No. 6 fuel oil includes Bunker C fuel oil and is used for the production of electric power, space heating, vessel bunkering, and various industrial purposes. | U.S. Energy Information Administration - EIA - Independent Statistics and Analysis
Residual fuel oil: A general classification for the heavier oils, known as No. 5 and No. 6 fuel oils, that remain after the distillate fuel oils and lighter hydrocarbons are distilled away in refinery operations. It conforms to ASTM Specifications D 396 and D 975and Federal Specification VV-F-815C. No. 5, a residual | {
"score": 3,
"cc": false,
"url": "http://www.eia.gov/tools/glossary/index.cfm?id=residual%20fuel%20oil",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
Waste Site Cleanup & Reuse in New England
Salem Oil and Grease
During a site walk with the Mass. Department of Environmental Protection, the Salem fire marshal and the Salem fire chief at the Salem Oil and Grease site, emergency responders found numerous causes for concern. The site contained more than 40 vats and tanks of mostly oils, but also sulfuric acids and bases (potash ash, caustic soda). In addition, there were about 300 55-gallon drums of mostly oils, with about a tenth labeled as corrosives; three labs with hundreds of chemicals, and hundreds of containers with oils, paints and unidentified liquids. The business consists of two large buildings next to a canal that leads to the North River. It was apparent that drains probably exit into the canal. Outside one of the buildings were a number of drums and a large rusty and leaking tank. An investigation was requested. MassDEP took control of the cleanup.
Location: Salem, MA
Start date: 03/08/2010
End date: 03/08/2010
Contact: Claudia Deane (firstname.lastname@example.org) | Waste Site Cleanup & Reuse in New England
Salem Oil and Grease
During a site walk with the Mass. Department of Environmental Protection, the Salem fire marshal and the Salem fire chief at the Salem Oil and Grease site, emergency responders found numerous causes for concern. The site contained more than 40 vats and tanks of mostly oils, but also sulfuric acids and bases (potash ash, caustic soda). | {
"score": 2,
"cc": false,
"url": "http://www.epa.gov/region1/removal-sites/SalemOilGrease.html",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
Natural History - Reptiles and Amphibian Species
This list of reptile and amphibian species has been compiled by park staff from field observations, sightings, and lists of animals found in the region that could occur here. Please report any new sightings or observations on the web page message board. Additional information is available at the Virginia Herpetological Society.
Be sure to check out our new video player.
© FAIRFAX COUNTY PARK AUTHORITY
Contact Us: General (Office of Public Affairs) | Technical (Web Administrator) | Directed Inquiries (County Agencies)
Phone: County Main Number - 703-FAIRFAX (703-324-7329), TTY 711 | County Phone Listing | Natural History - Reptiles and Amphibian Species
This list of reptile and amphibian species has been compiled by park staff from field observations, sightings, and lists of animals found in the region that could occur here. Please report any new sightings or observations on the web page message board. Additional information is available at the Virginia Herpetological Society.
Be sure to check out | {
"score": 2,
"cc": false,
"url": "http://www.fairfaxcounty.gov/parks/ecl/reptiles_amphibians.htm",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
FCC Bureaus and Offices are authorized to issue a Special Temporary Authority (STA) for those subject-matter areas falling under their respective jurisdiction. An STA is the authority granted to a permittee or licensee to permit the operation of a communications facility for a limited period at a specified variance from the terms of the station or service authorization or requirements of the FCC rules applicable to a particular class of station or service. Bureaus and Offices may issue STAs for emergency situations, such as natural disasters, restoration of communications, or other short term operations and whereby the applicant has made a showing that, due to extraordinary circumstances, it cannot wait for the normal licensing process to conclude.
STAs are granted with a fixed expiration date, usually six months. STAs for testing purposes are generally limited to two weeks. STAs do not have grace periods and are valid only through their expiration date.
The Commission may grant extensions of STA for a period of 180 days, but the applicant must show that extraordinary circumstances warrant such an extension. Such requests should be filed electronically using FCC Form 601 Main Form with a purpose of Renewal/Modification.
All STAs are issued on a secondary non-interference basis. Because an STA is secondary, if the facilities operating under an STA cause interference, the applicant would be required to discontinue operation.
STA requests must be complete and cannot rely on pending applications. Lack of information or adequate justification may result in delays in processing the application or even denial.
Normally, the FCC will not grant STAs for operations that require Canadian coordination. The FCC coordinates with Canada most frequencies allocated to Land Mobile Services for use above Line A and East of Line C, as defined in Section 1.955 of the FCC's Rules.
- Licensees eligible in the Industrial/Business pool under Rule 90.35(a) (other than an applicant who seeks to provide commercial mobile radio service) utilizing an already authorized facility (FB4), may operate the station for a period of 180 days, under a temporary permit. The permit must be evidenced by a properly executed certification made on FCC Form 601, after filing an application for a station license together with evidence of frequency coordination, if required. The temporary operation of stations, other than mobile stations, within the Canadian coordination zone will be limited to stations with a maximum of 5 watts ERP and a maximum antenna height of 20 feet above average terrain. Note Section 1.931(b) (9).
- The following applications may operate the proposed station during the pendency of its application for a period of up to 180 days under a conditional permit: 1) applications for an itinerant station license, as defined under Rule 90.138; 2) a new private land mobile radio station license in the frequency bands below 470 MHz and in the one-way paging 929-930 MHz band (other than a commercial mobile radio service applicant); and 3) an application seeking to modify or acquire through assignment or transfer an existing station below 470 MHz or in the one-way paging 929-930 MHz band.
Conditional operations may commence upon the filing of a properly completed application that complies with Rule 90.127 if the application, when frequency coordination is required, is accompanied by evidence of frequency coordination in accordance with Rule 90.175. Operation under such a permit is evidenced by the properly executed Form 601 with certifications that satisfy the requirements of Rule 90.159(b). Rule 90.159(b) requires that a minimum of ten business days must pass between submission of an application to the Commission and the onset of operating under a conditional permit. Note Section 1.931(b)(11).
Forms & Fees
Applicants are strongly encouraged to file electronically via the Universal Licensing System (ULS). Applicants for Special Temporary Authority should apply on FCC Form 601 and appropriate schedules. All applications for STA must also include an attachment that justifies the need for an STA. For forms and information on fees, see Forms & Fees.
DO NOT SEND CASH. Payment of fees may be made by check, bank draft, money order, or credit card. Payment by credit card typically results in faster processing of an application. If paying by check, bank draft, or money order, your remittance must be in U.S. dollars and drawn on a U.S. financial institution.
No fee is required for governmental entities or non-profit applicants in the Special Emergency and Public Safety Radio Services. Non-profit eligibles must submit a current determination letter from the Internal Revenue Service documenting their non-profit status. An applicant filing electronically should submit this information as an attachment. For applicants filing manually, submit your fee exempt request to: FCC, 1270 Fairfield Road, Gettysburg, PA 17325-7245.
Applicants can manually file for an STA by completing a Form 601; however, applicants are strongly encouraged to file electronically via the Universal Licensing System (ULS). If assistance is needed in completing a form or for filing information, please call the FCC Hot-Line at 1-888-225-5322 and select option 2. Applicants who wish to file manually: submit your request, a completed FCC Form 159 (Remittance Advice), and the appropriate fee, if applicable, to:
Federal Communications Commission
Wireless Bureau Applications
P. O. Box 358130
Pittsburgh, PA 15251-5130
In emergency situations only, STA requests may be submitted by telephone: 1-888-225-5322 and select option 2; or telegram; or fax to (717) 338-2696; provided an application is filed within ten days of such a request. Emergency situations are defined under Section 1.915(b)(1) of the Commission's Rules. These situations involve danger to life or property or potential damage to equipment; a national emergency proclaimed by the President or declared by the Congress; during the continuance of any war in which the United States is engaged, when such action is necessary for the national defense or security or otherwise in furtherance of the war effort; or an emergency where the Commission finds that it would not be feasible to secure a renewal application from existing licensees or otherwise to follow normal licensing procedures.
No remittance advice should be sent to the FCC with emergency requests for STA. Applicants will be billed for the amount due and should remit payment to the address shown on the bill within 30 days of the date of the invoice. Timely payment will avoid the assessment of interest and penalty. | FCC Bureaus and Offices are authorized to issue a Special Temporary Authority (STA) for those subject-matter areas falling under their respective jurisdiction. An STA is the authority granted to a permittee or licensee to permit the operation of a communications facility for a limited period at a specified variance from the terms of the station or service authorization or requirements of the FCC r | {
"score": 2,
"cc": false,
"url": "http://www.fcc.gov/encyclopedia/special-temporary-authority",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
District of Columbia Government:
Management Reform Projects Not Effectively Monitored
T-AIMD-00-237, Jun 30, 2000
Pursuant to a congressional request, GAO discussed the District of Columbia's management reform initiatives.
GAO noted that: (1) over the past 3 fiscal years, the District government has proposed hundreds of management reform initiatives that were estimated to save millions of dollars as well as improve government services; (2) however, as of June 1, 2000, the District had only reported savings of about $1.5 million related to these initiatives and had not consistently tracked the status of these projects; (3) neither the District of Columbia Financial Responsibility a nd Management Assistance Authority nor the District could provide adequate details on the goals achieved for all of the projects that had been reported as completed or in various stages of completion; (4) the District does not have a systematic process to monitor these management reform projects and determine where savings or customer service improvements have been realized; and (5) the District cannot say for certain how funds designated for management reform have been spent or whether the key goals of these initiatives have been realized. | District of Columbia Government:
Management Reform Projects Not Effectively Monitored
T-AIMD-00-237, Jun 30, 2000
Pursuant to a congressional request, GAO discussed the District of Columbia's management reform initiatives.
GAO noted that: (1) over the past 3 fiscal years, the District government has proposed hundreds of management reform initiatives that were estimated to save millions of dollars | {
"score": 2,
"cc": false,
"url": "http://www.gao.gov/products/T-AIMD-00-237",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
|Ghanaians Need To Appreciate And Tolerate Each Other - Minister|
|Thursday, 24 May 2012 09:52|
Mr Alexander Asum-Ahensah, Minister for Chieftaincy and Culture, yesterday asked Ghanaians to appreciate and tolerate one another, regardless of their cultural differences.
"There cannot be development without peace, and there cannot be peace if we do not respect each other's culture," he stressed. The Minister made the request in Accra, when he launched activities to mark the "World Day for Cultural Diversity for Dialogue and Development," on the theme ‘Cultural Diversity for Dialogue and Development’.
He observed that although Ghana had more than 50 ethnic groups, the common values of these groups represented the national heritage of the country. "Each of these ethnic groups has unique cultural features and traditions that give identity, self respect and pride to the people."
He said that since Ghana gained its independence, "we have recognised the need to promote unity within this cultural diversity, and Ghana has enjoyed relative unity, stability and peace."
Mr Asum-Ahensah said the country's history, cultural values and institutions would continue to exercise a "deep" influence on its destiny, and play a key role in governance and national life.
"Indeed, our various cultures contain the elements that have sustained us as a people, and it is through same, that we would continue to thrive as a people," he said.
The Minister said with the approach of presidential elections, "we need to remember that our development must be anchored on the principle of self respect and the need to appreciate one another, which is typical of the country's cultural heritage".
"I do hope that this ideal becomes the universal guiding principle, accepted and practiced by every Ghanaian,” he noted.
Mrs Charity Amamoo, a representative from the Ghana National Commission for UNESCO said it was note-worthy, that every race and culture might have significant and unique contributions that could uplift the general fabric of the society.
She said Ghana's diverse culture with regard to local governance institutions, religion among other areas, "enjoins us to take advantage of this diversity to improve our lives and the responsibility to protect this rich diverse heritage that God has endowed us with".
As the UN agency with a mandate in culture, UNESCO, through its General Conference on November 2, 2001, adopted the Universal Declaration on Cultural Diversity, in the wake of the terrorist attacks of September 11.
The declaration reaffirmed the need for inter-cultural dialogue to stem segregation, and fundamentalism. The following year, 2002, was declared the United Nations Year for Cultural Heritage.
In the same year, the General Assembly of the United Nations, on December 20, declared May 21 as the World Day for Cultural Diversity for Dialogue and Development. | |Ghanaians Need To Appreciate And Tolerate Each Other - Minister|
|Thursday, 24 May 2012 09:52|
Mr Alexander Asum-Ahensah, Minister for Chieftaincy and Culture, yesterday asked Ghanaians to appreciate and tolerate one another, regardless of their cultural differences.
"There cannot be development without peace, and there cannot be peace if we do not respect each other's culture," he stressed. The | {
"score": 2,
"cc": false,
"url": "http://www.ghana.gov.gh/index.php/news/general-news/13154-ghanaians-need-to-appreciate-and-tolerate-each-other-minister-",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
|Sponsor||Rep. Luetkemeyer, Blaine|
|Date||July 9, 2012 (112th Congress, 2nd Session)|
|Staff Contact||Jon Hiler|
On Monday, July 9, 2012, the House is scheduled to consider H.R. 4367, a bill to amend the Electronic Fund Transfer Act to limit the fee disclosure requirement for an automatic teller machine to the screen of that machine, under a suspension of the rules requiring a two-thirds majority vote for approval. The bill was introduced on April 17, 2012, by Rep. Blaine Luetkemeyer (R-MO) and referred to the Committee on Financial Services. The committee held a mark-up session on June 27, 2012, and ordered the bill to be reported by voice vote.
H.R. 4367 would amend the Consumer Credit Protection Act—commonly known as the Electronic Fund Transfer Act (EFTA)—by eliminating the requirement that fee notices be affixed to, or displayed on, automated teller machines (ATMs).
The following is from the Financial Services Committee Report, H. Rept. 112-576:
“The EFTA and its implementing rule, Regulation E, require ATM operators to display notices in two separate places notifying consumers that they might be charged fees for withdrawing cash from the ATM. The EFTA and Regulation E require that one of these notices must be posted in a prominent and conspicuous location on or at the ATM. The second notice must appear on the screen of the ATM, or on a paper notice issued from the machine, after the transaction is initiated and before the consumer is irrevocably committed to completing the transaction.
“When the provision requiring physical ATM fee disclosures was enacted in 1999, consumers were less familiar with ATM technology. Some consumers may not have known that they might have to pay for using certain ATMs. Because ATM screens were smaller and had lower resolutions in 1999, Congress required ATM operators to display fee notices to consumers both on the ATM screen and in a prominent location on the machine itself. Today, ATMs are more prominent and better understood, screens are much larger, and they display sharper images. Also, unlike before, when many ATMs were not capable of providing the notice on the monitor, every ATM can notify consumers of possible fees today.
“But even though the EFTA's physical disclosure requirement has become obsolete, the requirement exposes banks, credit unions and retailers to frivolous lawsuits and unnecessary costs. Under the EFTA, a consumer who uses an ATM that does not have a fee notice physically attached may recover statutory damages of between $100 and $1,000 for each transaction. The law also permits class action lawsuits to recover up to half a million dollars.”
According to the cost estimate by the Congressional Budget Office (CBO), “The bill would require the Consumer Financial Protection Bureau (CFPB) and the Federal Reserve Board to revise certain disclosure regulations. Changes in the CFPB's workload are reflected as increases or decreases in its mandatory appropriations, while changes in the workload of the Federal Reserve Board are reflected in the budget as changes in revenues. Based on information from those agencies, CBO estimates that revising those regulations would not have a significant effect on their workload and any change in direct spending (for the CFPB) or revenues (for the Federal Reserve Board) would be insignificant. Implementing H.R. 4367 would not affect spending subject to appropriation.” | |Sponsor||Rep. Luetkemeyer, Blaine|
|Date||July 9, 2012 (112th Congress, 2nd Session)|
|Staff Contact||Jon Hiler|
On Monday, July 9, 2012, the House is scheduled to consider H.R. 4367, a bill to amend the Electronic Fund Transfer Act to limit the fee disclosure requirement for an automatic teller machine to the screen of that machine, under a suspension of the rules requiring a two-thirds majority | {
"score": 2,
"cc": false,
"url": "http://www.gop.gov/bill/112/2/hr4367",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
Site Map Search the Catalog Kids Zone Find a Library FAQ Sign Up Contact Us
Home > Music > Instructional Cassette Catalog
This catalog is an annotated guide to instructional music cassettes available as of July 2002. The books listed in this catalog may be borrowed by eligible individuals registered with the NLS Music Section. Link to our Sign Up page to learn more about eligibility and registration.
It is divided into eighteen sections whose titles generally indicate the contents of each section. Thus, "Appreciation" gathers together cassettes dealing with the appreciation of music. The "Courses" section contains cassette titles that bear on learning how to sing and play various instruments. And the "Opera" section has numerous cassettes on particular operas or facets of a composer's opera output.
In this Web access, the catalog is available as 18 individual lists. You can follow a link below. You can return to the links list from any part of the catalog by following the link, "Instructional Cassette Catalog", at the top of each list.
A large-print copy of this catalog may be ordered by contacting:Music Section
Library of Congress Home NLS Home Comments about NLS to firstname.lastname@example.org
About this site Comments about this site to the NLS Reference Section
Posted on 2010-10-04 | Site Map Search the Catalog Kids Zone Find a Library FAQ Sign Up Contact Us
Home > Music > Instructional Cassette Catalog
This catalog is an annotated guide to instructional music cassettes available as of July 2002. The books listed in this catalog may be borrowed by eligible individuals registered with the NLS Music Section. Link to our Sign Up page to learn more about eligibility and registrati | {
"score": 2,
"cc": false,
"url": "http://www.lcweb.loc.gov/nls/music/instructional/index.html",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |
Without the work of the conservation department many of the treasures of the Leeds Collections would not be accessible to the public. The conservators look after the physical welfare of objects and the historic sites.
Looking after the collections may mean remedial treatment when a fragile object is damaged or dirty, but equally important is the prevention any future damage or by monitoring procedures and environment during display, loan, storage or in transit. Understanding the materials, construction and historic context of the objects is also vital when deciding on how to care for and treat the objects kept in trust for the people of Leeds.
These specialised skills extend the lives of fragile, rare and sometimes highly valuable objects so everyone can see them in their best state of preservation now and in years to come.
Leeds Museums and Galleries employ full-time conservators to care for our collections. Many volunteers, interns, school and community groups help with conservation work; from medal cleaning projects and taxidermy projects to making specialist coat hangers for our delicate textiles collections.
Besides a conservation lab and workshop at Temple Newsam House there is also a state of the art studio at Leeds Museum Discovery Centre. These work spaces are equipped with an array of tools to aid the conservators in their work. This includes a steam cleaner used to remove stubborn dirt and a giant walk-in freezer used to kill pests or insects without the use of potentially harmful chemicals. | Without the work of the conservation department many of the treasures of the Leeds Collections would not be accessible to the public. The conservators look after the physical welfare of objects and the historic sites.
Looking after the collections may mean remedial treatment when a fragile object is damaged or dirty, but equally important is the prevention any future damage or by monitoring proced | {
"score": 3,
"cc": false,
"url": "http://www.leeds.gov.uk/museumsandgalleries/Pages/explore/Conservation.aspx",
"source": "fineweb-edu-score-2/CC-MAIN-2013-20",
"nc": false
} |