text
stringlengths 198
622k
| id
stringlengths 47
47
| dump
stringclasses 95
values | url
stringlengths 14
7.09k
| file_path
stringlengths 110
155
| language
stringclasses 1
value | language_score
float64 0.65
1
| token_count
int64 47
136k
| score
float64 2.52
5.09
| int_score
int64 3
5
|
---|---|---|---|---|---|---|---|---|---|
If you’ve ever wondered whether your ancestors served as a medieval soldier in the Hundred Years War, a newly launched website from historians at the universities of Southampton and Reading may have the answer.
The names of over 3,500 French soldiers linked to the Battle of Agincourt (1415) have been added to www.medievalsoldier.org
They join the quarter of a million names already available for English armies who fought in a number of campaigns, including Agincourt– forming what’s believed to be the largest database of medieval people in the world. This latest stage of the Soldier in Later Medieval England project has been supported by the charity Agincourt 600 and by both universities.
Professor Anne Curry, project Director and Dean of Humanities at the University of Southampton, says: “It is fitting that this new resource has been made available following the major 600th anniversary commemorations of Agincourt in 2015, in which our university played a key role. The Medieval Soldier website has already proved an invaluable resource for genealogists and people interested in social, political and military history. This new data will help us to reach out to new users and shed fresh light on the Hundred Years War.”
Of the thousands of French soldiers added to the new website, 550 were killed on the battlefield. Research by Southampton’s Dr Rémy Ambühl has also shown that over 300 were taken prisoner and held for ransom.
Professor Adrian Bell, fellow project Director and Head of the ICMA Centre, Henley Business School at the University of Reading, comments: “Our newly developed interface interrogates sources found in many different archive repositories in England and France. Without our site, searching for this information would require many visits to the National Archives of both England and France, the British Library and Bibliothèque nationale and all of the Archives Départementales in Normandy.”
The Medieval Solider website was first launched in 2009, resulting from a three year research project funded by the Arts and Humanities Research Council (AHRC).
Names of soldiers were sourced from archive collections of muster rolls used to audit pay during military campaigns and from evidence of letters of protection, which soldiers bought from the Chancery to prevent legal actions while they were absent from home.
Now refreshed and given a new search interface by Russian postdoctoral fellow Dr Aleksandr Lobanov, the website brings together three separate databases to make them searchable as a single resource.
In addition to the names of the French soldiers recently added, the database now also contains details of geographical origins of soldiers and locations of their service – enabling the local life of the medieval soldier to be illuminated more fully. People can search by surname, rank, or year of service.
For example, Professor Bell was pleased to find 58 ‘Bells’ on the database, including a John Bell from Chatham serving in Calais in 1414 and again with the royal household on the Agincourt campaign.
The site provides biographies of all English captains of 1415 and further insights into the Battle of Agincourt, which was commemorated extensively in the UK and France last year. | <urn:uuid:79fc0ffa-654c-4f3a-83e2-21e091365bca> | CC-MAIN-2021-10 | https://www.fawleyonline.org.uk/ancestor-fight-hundred-years-war/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178363217.42/warc/CC-MAIN-20210302034236-20210302064236-00085.warc.gz | en | 0.953873 | 650 | 2.65625 | 3 |
Clinical History: A 29 year-old professional football player was injured while trying to make a catch. (1a) Sagittal T2-weighted, (1b) fat-suppressed axial proton density-weighted, and (1c) fat-suppressed coronal proton density-weighted images are provided. What are the findings” What is your diagnosis?
Grade II tear of the biceps femoris muscle (hamstring tear).
Hamstring tears are among the most commonly encountered injuries in athletes. Because of the tendency for hamstring tears to heal slowly and to recur, these injuries are a significant cause of lost playing time. The diagnosis of hamstring injury is usually suspected clinically, but because the hamstrings span two joints, tears can occur at multiple levels. MRI readily identifies the location and severity of the injury. In conjunction with the physical findings, this information helps guide a more comprehensive and effective rehabilitation program.
Anatomy and Function
The hamstrings are comprised of the semimembranosus, semitendinosus, and the biceps femoris muscles. The biceps femoris and semitendinosus arise from a common tendon along the posteromedial aspect of the ischial tuberosity. The muscle belly of the semitendinosus is the most cepahalad muscle of the hamstring complex. The biceps femoris also has a second ‘short” head that arises from the approximate mid-shaft level of the femur, at the lateral aspect of the linea aspera. The semimembranosus arises from the posterolateral aspect of the ischial tuberosity, anterior to the common origin of the biceps femoris and semitendinosus, and has the longest proximal tendon segment (5a-9a). The main distal attachment of the biceps femoris tendon is at the fibular head. The semimembranosus tendon attaches to the posteromedial tibia in several locations, with the primary insertion occurring along the posterior aspect of the tibial epiphysis. The semitendinosus continues to the anteromedial aspect of the proximal tibia, joining the gracilis and sartorius to insert as the pes anserine complex. The hamstrings act to flex the knee and extend the hip. Their primary function appears to be deceleration of the extended knee prior to foot strike and to assist hip extension after foot strike.
Injury Mechanism and Physical Examination
With the exception of the short head of the biceps femoris, the hamstrings span two joints, increasing their susceptibility to injury. Hamstring musculotendinous strains and tears typically occur during running, as excessive strain forces occur during eccentric contraction of the hamstrings. This type of injury is seen in sports such as football, track, and soccer that require rapid acceleration while running. The same mechanism of injury may also cause an avulsion injury. Avulsions of bone or tendon can also be the result of severe stretching of the hamstrings due to forceful hip flexion with the knee in extension. Waterskiing and ice skating are sports that may lead to this type of injury.1
The typical presentation of a hamstring strain or tear is the acute onset of pain during rapid acceleration or stretching. An audible pop often accompanies the injury. In more severe injuries, ecchymoses and swelling may be visible, and a palpable defect may be felt. Pain is elicited with passive extension of the knee with the hip flexed to 90 degrees and also with resisted knee flexion. Because of the proximity of the sciatic nerve, temporary sciatica or even a sciatic neuropathy may be encountered. The athlete’s functional impairment can range from minor discomfort and tightness to a complete loss of strength.
MRI reliably depicts the location and extent of hamstring injuries. Fluid sensitive sequences such as Proton-density and T2-weighted fat-suppressed sequences or STIR sequences depict tendon tears and avulsions as fluid-signal filled defects at the site of disruption. Adjacent hemorrhage and edema are readily apparent. The multiplanar capabilities of MRI enable a detailed depiction of the muscles or tendons involved.
Avulsions at the bone-tendon interface may occur with or without fracture avulsions from the ischial tuberosity. Bony avulsions are most common in adolescents with incomplete fusion of the ischial tuberosity apophysis (10a,11a). These injuries are typically treated conservatively if there is less than 2 cm distraction at the fracture. Because cortical avulsions can be difficult to discern on MRI, plain films are important in the detection of this pattern of injury.
Tendon avulsions without bony avulsions are felt to represent an indication for surgical repair in the competitive athlete (K,L). Avulsion injuries most commonly involve the entire proximal hamstring complex, but can occasionally be limited to either the semimembranosus or common biceps femoris-semitendinosus tendon.
Because of the close proximity of the sciatic nerve to the proximal hamstring complex, injuries resulting in large hematomas (12a,13a) or excessive callus and displaced bone (14a,15a) may lead to sciatic compression and neuropathy.
The tendons of the hamstrings essentially span the full length of the muscles, and musculotendinous injuries can occur at any level along the muscle tendon interface. Proximal injuries (above the level of the short biceps femoris) appear to be slightly more common. The biceps femoris muscle is the most commonly injured hamstring component, either as an isolated injury or as the primary component of a multiple muscle injury. Multiple hamstring muscle injuries are more common than the isolated form.2
MRI is useful in grading the extent of disruption in muscular strain injuries. Grade I injuries are considered a mild injury with limited muscle fiber disruption. On MRI the injured muscle demonstrates a mild feathery pattern of intramuscular edema confined to the muscle (16a). Grade II injuries are more severe, representing partial tears at the musculotendinous junction without retraction, and may be accompanied by hematoma at the site of the tear. Extension of hemorrhage and edema beyond the muscle margin may be present and suggests a more extensive injury with disruption of the muscle sheath (2a,3a,4a). Grade III injuries represent a complete disruption of the musculotendinous junction. Retraction and laxity of the musculotendinous elements are seen. MRI is helpful in determining the extent of retraction in these injuries, an important feature for surgical planning.
The treatment options for hamstring injury depend on the location and severity of the injury. Tendon avulsions are an indication for surgical repair. Minimally displaced bony avulsions are treated conservatively, allowing 6-12 weeks for healing. For most musculotendinous strain injuries, a conservative approach to treatment will allow healing and full functional recovery. Certain findings on MRI are associated with a longer recuperation time. These include a greater than 50% cross-sectional muscle involvement, injury to the biceps femoris, and injuries that involve a long length of muscle fibers.3,4 Grade III musculotendinous ruptures often require surgery.
Focused preventative conditioning and strengthening are important in preventing both initial injuries and recurrence. During rehabilitation, factors that are felt to contribute to hamstring injury should be addressed, including poor flexibility, quadriceps-hamstring imbalance, and poor running mechanics.
Hamstring injuries are a quite common athletic injury. Though the diagnosis of hamstring injury is usually clinically suspected, the ability of MRI to accurately depict the location and extent of injury can greatly influence treatment and rehabilitation plans in these patients.
1 Bencardino JT and Mellado JM. Hamstring Injuries of the Hip In: Magnetic Resonance Imaging Clinics of North America. Rosenberg ZS ed. Magn Reson Imaging Clin N Am 13(2005);677-690.
2 De Smet AA, Best TM. MRI imaging of the distribution and location of acute hamstring injuries in athletes. AJR 2000;174:393-9.
3 Slavotinek JP, Verral GM, Fon GT. Hamstring injury in athletes: using MR imaging measurements to compare extent of muscle injury with amount of time lost from competition. AJR 2002;179:1621-8.
4 Connell DA, Schneider-Kolsky ME, Hoving JL, et al. Longitudinal study comparing sonographic and MRI assessments of acute and healing hamstring injuries. AJR 2004;183:975-84. | <urn:uuid:5e8fac33-5a99-4090-9a09-8cf9f5c07812> | CC-MAIN-2015-22 | http://radsource.us/hamstring-tears/ | s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207924919.42/warc/CC-MAIN-20150521113204-00107-ip-10-180-206-219.ec2.internal.warc.gz | en | 0.891983 | 1,808 | 2.625 | 3 |
Reports of bed bug infestations are becoming more frequent across the country so much that now professionals are recognizing that the bugs can be associated with a mental health problem.
Mike Jenson, Director of Health and Safety at Indiana University said, through his job working for the department’s Public Health sector, he’s become something of a bed bug expert.
“People get so worried and obsessed about having them crawling all over them while they’re sleeping that they actually have severe psychological problems because of that,” Jenson said.
There’s no actual danger associated with bed bugs. They don’t carry human pathogens and can’t make their victims sick. But Jenson said about 50-percent of Americans are allergic to bed bugs, meaning if they’re bitten they’ll see a raised and itchy red bump, much like a mosquito bite. But more than that, Jenson said, bedbugs are making some people paranoid.
“So from purely a physical health perspective there’s not a worry there. The worry is that there is a stigma associated with them. They make people very uncomfortable,” Jenson said. “They creep people out a lot.”
In fact, they’re making people so concerned that officials at the Monroe County Health Department have developed a system to help them track the bugs. Health Department Administrator Penny Caudill says the department asks for zip codes only from individuals, businesses, or pest control professionals who she hopes will report any infestation with which they come in contact. The goal is to track the areas that are affected the most in an effort to find ways to help those people—generally Caudill said she intends for that help to come in the form education about bed bug identification and getting rid the problem. Caudill said the idea behind the Website is to provide a single location for those with a bed bug issue to report the occurrence. She said before individuals were reporting bed bug instances to the health department, local schools and Indiana University…and there was no way to know if the same bed bug sightings were being reported multiple times.
“I would actually hope that the number that are reported from pest control companies are similar to the numbers that we’re seeing in residences and that the zip codes are matching. You know that if pest control companies are telling us that this area is where they’re going to most often that the that the instances that residents or business are reporting would fall in line,” Caudill said
Health department officials aren’t the only ones taking steps to attack the bed bug problem. Businesspeople like Furniture Exchange owner Steve Birch said he’s made some changes too. Birch sells both new and used furniture at his store, but due to the increase of bedbugs ,he’s stopped selling used beds.
“You know, for a long time we did and that was a big part of our business for a long time and we hated to quit doing that, but on the advise of the exterminators who have seen this problem in other buildings we felt like it was something we should quit doing. I guess if we brought one mattress in with bed bugs it could infest the whole store and cost tens of thousand of dollars to cure,” Birch said.
But Jenson said bed bugs don’t just travel on beds.
“You shouldn’t pick up furniture that’s sitting at the side of the road. I know of at least one local infestation that happened because of a couch that someone picked up at the side of the road that ended up having bed bugs in it and they got all over that residence,” Jenson said.
Jenson said bed bugs can even hitch a ride on people.
“I’ve definitely heard stories of people who are walking along and actually shedding bed bugs as they go.”
Birch said he carefully inspects every piece of used furniture he collects before bringing it into his store and points out that in all his 13 years of business he’s never seen a bed bug. But he laughed at the idea that a bed bug might be transferred from a potential customer’s sweater as he or she checks out the floor items, essentially making every couch—new or used—a potential threat.
But in the case of bedbugs, Jenson said it’s best to be proactive. He said avoid any place you think might be infested with bed bugs. Always check your hotel room, or even the bed at a friend’s house, looking in the seams around the mattress and cracks near the headboard for any sign of an infestation. Assume one bed bug means a bunch of bed bugs as Jenson says all it takes is one bug with fertilized eggs and a food source (you) to build a family. Letting the problem go longer, he said, will just mean a bigger hassle and a bigger cost to clean it up . And finally, Jenson said, there are a few steps a person can take if they think they’ve been in an infested area to keep the bugs from getting in their home.
“If they’ve been in a place where they suspect there might have been a bed bug, or a bed bug problem they can immediately when they come home strip down and throw all their clothes in the dryer for 30 minutes and that will kill any bed bugs that might have gotten on their clothing,” Jenson said.
Typically, if bug bugs and their eggs are heated to about 150 degrees that’s enough to kill them. But in order to get any kind of treatment for your home, whether it’s a heat treatment or more lengthy chemical treatment, Jenson said the only solution is to get help from a professional who has had previous experience in bed bug eradication. | <urn:uuid:21b0c4f1-748b-4afe-913f-f3053ca412a1> | CC-MAIN-2015-06 | http://indianapublicmedia.org/news/bed-bugs-mental-health-concern-12538/ | s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422121961657.12/warc/CC-MAIN-20150124175241-00227-ip-10-180-212-252.ec2.internal.warc.gz | en | 0.970001 | 1,221 | 2.5625 | 3 |
The American diplomat and historian George F. Kennan is most remembered for authoring the “Long Telegram” from Moscow in February 1946, which examined the historical and ideological bases of Soviet foreign policy. It is one of the seminal documents of the early Cold War years, and it helped shape the U.S. doctrinal response to Soviet actions throughout much of the Cold War, known as “containment.”
Four years later on August 21, 1950, when Kennan was a counselor to the State Department, he wrote a less well-known and less influential paper about conditions in the Far East, which recommended specific policy approaches for that part of the world that could reasonably be described as “retrenchment.”
The genesis of the memo was a request by John Foster Dulles for Kennan to comment on the Department’s latest draft of the Japanese peace treaty. Dulles, who later became President Dwight Eisenhower’s secretary of state, was working on the treaty for the Truman Administration. Kennan, as he previously did with the Long Telegram from Moscow with regard to America’s policy toward Europe, used this opportunity to present his views on America’s broader Far East policy.
The paper was addressed to Secretary of State Dean Acheson, who had succeeded George Marshall in that post. Kennan began the paper by describing U.S. policy in the Far East as “little promising” and “fraught with danger.”
U.S. objectives in Korea, he wrote, were not clear or realistic and were based on “emotional, moralistic attitudes” which “unless corrected, can easily carry us toward real conflict with the Russians and inhibit us from making a realistic agreement about that area.” According to Kennan, the United States was right to enter the war, but “it is not essential to us to see an anti-Soviet Korean regime extended to all of Korea.” He even suggested that the United States could “tolerate for a certain period of time a Korea nominally independent but amenable to Soviet influence.”
“It is beyond our capabilities,” Kennan explained, “to keep Korea permanently out of the Soviet orbit.” He continued: “A period of Russian domination, while undesirable, is preferable to continued U.S. involvement in that unhappy area.” U.S. interests would be better served, he continued, if Japan instead of Russia eventually dominated Korea.
Kennan urged the secretary to reign in General Douglas MacArthur, who, he wrote, had “wide and relatively uncontrolled latitude… in determining our policy in the north Asian and western Pacific areas.” Kennan had previously met with MacArthur in Japan and came away unimpressed with the general’s overall approach to Japan and the Far East.
The current U.S. approach to the “rival Chinese regimes” (the People’s Republic on the mainland and the Nationalists on Taiwan), Kennan wrote, is likely to cause difficulties with other countries in the region and some of our European allies. It would also “strengthen Peiping [Beijing]-Moscow solidarity rather than weaken it,” he warned. The United States, he advised, should not prevent the PRC’s admission to the United Nations.
Kennan also advised that the United States should not support France in Indochina. The French position there, he opined, was “hopeless.” The French should withdraw from Indochina, he wrote, “even at the probable cost of an eventual deal between Viet-Nam and Viet-Minh, and the spreading over the whole country of Viet-Minh authority.” It was a conflict, he explained, “which neither they nor we, nor both of us together, can win.”
The “most important single factor in Asia,” Kennan wrote, was Japan. Yet even here Kennan recommended U.S. military retrenchment. The United States, he wrote, should withdraw its forces from that country and negotiate with the Russians to neutralize and demilitarize Japan, while simultaneously agreeing with Russia to end the war in Korea and turning Korea over to UN control.
Kennan wrote this paper as he was leaving his position in the State Department. Since the Long Telegram from Moscow and his leadership of the Policy Planning Staff, Kennan’s influence had waned. He had publicly decried what he called the “militarization” of the containment policy he recommended in 1946 and 1947. He had opposed the formation of NATO and the development of the hydrogen bomb. His advocacy of “retrenchment” in the Far East, therefore, was consistent with the evolution of his strategic thought.
While some of Kennan’s recommendations in his Far East paper were insightful and prescient, especially regarding the eventual outcome for France and the United States in Indochina, had his policy approaches been followed generally, Japan, Taiwan, and South Korea may not have developed into free and economically thriving democracies.
Kennan’s paper can be read in full here.
Francis P. Sempa is the author of Geopolitics: From the Cold War to the 21st Century and America’s Global Role: Essays and Reviews on National Security, Geopolitics and War. His writings appear in The Diplomat, Joint Force Quarterly, the University Bookman and other publications. He is an attorney, an adjunct professor of political science at Wilkes University, and a contributing editor to American Diplomacy. | <urn:uuid:598acc25-3317-4b62-be5d-265350963303> | CC-MAIN-2021-49 | https://thediplomat.com/2017/12/george-kennans-other-long-telegram-about-the-far-east/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358189.36/warc/CC-MAIN-20211127133237-20211127163237-00549.warc.gz | en | 0.974613 | 1,172 | 3.421875 | 3 |
UPDATE!: In 2019, with the electronic engineering expertise of Julius Madey and the hard work of intern Molly Fava in the field and in the lab, we created our first 24-hour sound maps. These were made using 20 DIY programmable field recorders built by Mr. Madey (and hence affectionately referred to as the "Jules1 units"). These units recorded for two minutes during each hour. Our hope is to use this technique to both connect the public with another aspect of the natural world around them and to describe and compare Orthopteran habits in various local landscapes such as differing farm systems.
Below are videos that Molly made to illustrate our results:
We hope you enjoy these. The text below describes our methods before the creation of the Jules1. While we have updated our approach, the general logic remains the same.
Sound maps are an approach we use to look at the habitats of some of our singing insects. In late summer, the fields, hedgerows and even forests can be alive with various drones, trills, chirps and rasps. Many (although not all - cicadas also join the concert) are made by what entomologists call "Orthopterans", that is katydids, ground crickets, tree crickets (such as the one below), grasshoppers and the like.
Our quest was to walk into a late-summer landscape and try to tease out the sounds of individual species and map the areas where they were calling most loudly. This page briefly introduces our technique and illustrates some of the results. Dylan Cipkowski, our field tech, took pictures (like the one above) and helped to make many of the sound maps.
As the above image illustrates, we establish a recording grid on each property we want to map. We walk that grid with a hand-held recorder, stopping at each point to make a brief recording and note the waypoint. We then go through the resulting sound files using Raven, a call analysis program made by Cornell, and begin identifying the sounds made by various insects.
The above is a so-called sonogram which shows the intensity of sound at various frequencies over time. The lighter the shading, the more powerful the sound. In this case, we've outlined a trill at roughly 6000 Hz, probably the work of a species of tree cricket.
We then looked at our sound files and, using the software, measured the intensity of sound at our chosen frequency at each point. This produced the data illustrated below, where the annotations are the sound's power in decibels.
Finally, we took this grid of numbers and asked our mapping program to pretend that these represented altitudes and to make a topomap of this area. However, we made that topomap with colors rather than lines and, in this case, redder zonse indicated louder areas, and blue zones, quieter areas (for this example, we looked at a call in the nieghborhood of 4000 Hz).
These maps help us see the patterns of insect occurrence. For example, the creature mapped above seemed to favor the treed areas. We made similar maps looking at various calling insects on several orchards we studied. These are shown below using a slightly different color scheme, although red is still loud and blue is still quiet. We've also included excerpts from some of our field recordings (edited to remove other sounds).
Want to hear what we think was a Fast-calling Tree Cricket? Listen to this:
Want to hear what we think was a Four-spotted Tree Cricket? Listen to this:
Want to hear what we think was an Allard's Ground Cricket? Listen to this:
Want to hear what we think was a Fall Field Cricket? Listen to this:
Want to hear what we think was a Robust Conehead (gotta love that name!)? Listen to this:
Our plan is to continue our work by replacing our walked grids with a grid of DIY remote recorders, each programmed to record a snippet of sound at regular, synchronized intervals. We're hoping this will allow us to create multiple maps across the day and night, images we'll try to assemble into animated sound maps. Stay tuned. | <urn:uuid:95705a54-b058-4c7f-bec4-0a7d43abf10b> | CC-MAIN-2019-51 | http://hvfarmscape.org/sound-maps | s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540519149.79/warc/CC-MAIN-20191209145254-20191209173254-00125.warc.gz | en | 0.95806 | 870 | 3.390625 | 3 |
May 1, 1998
Fifty years ago the State of Israel established itself with a formal declaration of sovereignty -- followed by a bitter struggle to save itself from destruction at the hands of its Arab neighbors. The years since have been distinguished by phenomenal agricultural, economic, and cultural development, but also marred by hatred and brutality. "Together in hope, together with pride," proclaims the formal slogan of the anniversary celebration. That Israel has much to be proud of is undeniable -- it has become a regional military superpower with an open, democratic society and an extraordinarily high standard of living. But despite its great strides in many areas, what many Israelis want most -- harmony in the region and at home -- has so far been unattainable. Through the years a number of contributors to The Atlantic Monthly have reported on various aspects of the spiritual-national project that is Israel. What most of these pieces emphatically convey is the depth of meaning that Israel holds for its citizens, and the depth of their commitment to its well-being.
In "A Jewish Palestine" (July, 1919), H. Sacher explained the scriptural and historical basis of the Zionist impulse. "'With him who dwells outside Palestine it is as though God were not with him,'" he quoted from rabbinical works. "'To live in the land of Israel outweighs all the commands of the Torah.'" All of Judaism, Sacher claimed, is tied together by the "triple thread of God, the Jewish people, and the Jewish land."
Rabbi Milton Steinberg, in "The Creed of an American Zionist" (February, 1945), argued for the formation of a Jewish commonwealth in Palestine. In the wake of the Holocaust, he asserted, the revitalization of Hebraic culture would require a safe haven "where the homeless Jews of the world shall have found rest; where the Jewish spirit shall have been reborn; whence shall flow to the Jewries of the Dispersion inspiration and the stuffs on which it feeds."
From Atlantic Unbound:|
Books & Authors: "A Century of Zionism" (November, 1996)
In an Atlantic Unbound interview, Geoffrey Wheatcroft discusses The Controversy of Zion, winner of The National Jewish Book Award, and takes stock of Theodor Herzl's "mad idea."
A compendium of historical and cultural information about Israel presented by the Israeli Ministry of Foreign Affairs, featuring selected documents from the fifteen volume Israel's Foreign Relations.
This site presents information on Holocaust survivors who built the State of Israel in 1948, Americans who came to fight for the country's independence, articles from the Encyclopaedia Judaica, and an interactive poll on Israel's future.
In "Israel: Young Blood and Old" (October, 1949), the American artist George
Biddle recounted his visit to Israel a year after its official establishment.
What impressed him the most was the sense of mission and spiritual purpose that
animated its citizens: "The real excitement has been to watch in its early
germination a social and moral experiment in government.... Often I think, too,
of the same mental eagerness, democratic simplicity, pride, and prophetic sense
of fulfilling a world mission that shine through the writings of Americans at
the birth of our country."
David Ben-Gurion, Israel's first prime minister, explained, in "The Kingdom of the Spirit" (November, 1961), that far more than a mere "national and political unit," Israel would become a spiritual arena in which "a new way toward freedom, peace, justice, quality, and the advancement and redemption of humanity will be pointed out to the world."
Jon Kimche's "Israel in 1965" (November, 1961) speculated about what Israel's national and international status would be in four years. He pointed out that prime minister Ben-Gurion had emphasized from the outset that Israel is an ongoing project, and that its citizens must not become complacent lest they find themselves unprepared to address some new adversity.
In "Israel and the Arabs: The Myths that Block Peace" (January, 1969), political scientist Charles Yost argued for the feasibility of Arab-Israeli peace. He suggested that if each side could only be persuaded to relinquish its cherished myths -- the sense each had, for example, of its own innate superiority and divine right to control the Holy Land -- then the conflict could be approached as a purely political, logistical matter, and a workable compromise could be devised. Should the two sides stubbornly refuse to listen to reason, he argued, then outside intervention on the part of the United Nations would be required to work out a compromise.
New adversities have arisen with regularity throughout Israel's brief history -- not surprising for a nation surrounded by enemies in a politically unstable region. However, in "Lions in Winter" (January, 1993), Ze'ev Schiff and Ehud Ya'ari suggested that three Middle Eastern leaders might finally be capable of achieving a workable compromise. "Whether or not . . . negotiations will end the long and brutal Israeli-Arab conflict essentially rests in the hands of just three people: Israeli Prime Minister Yitzhak Rabin, Syrian President Hafez al-Assad, and Chairman of the Palestine Liberation Organization ... Yasser Arafat."
Copyright © 1998 by The Atlantic Monthly Company. All rights reserved. | <urn:uuid:fbb7644e-7921-46d8-80e6-15dbd872f130> | CC-MAIN-2018-26 | https://www.theatlantic.com/past/docs/unbound/flashbks/israel50.htm | s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267859904.56/warc/CC-MAIN-20180617232711-20180618012711-00056.warc.gz | en | 0.943359 | 1,086 | 2.5625 | 3 |
Despite their fearsome reputation, wasps aren't all bad. Many wasps help control pests in gardens and orchards, and many also serve, whether purposely or by accident, as pollinators. Some of the more beneficial wasps, like the mason wasp, look similar to less friendly wasps like the bald-faced hornet. Fortunately, the mason wasp (not to be confused with the mason bee) can be identified by color, behavior and nest.
Mason Wasp Description
"Mason wasp" refers to a group of closely related wasps belonging to the Eumeninae subfamily of the Vespidae family. This subfamily contains both mason wasps and potter wasps.
Mason wasps are large and mostly black, ranging from slightly over 1/2 inch to almost 3/4 inches long for the females and just under 1/2 inch to slightly over 1/2 inch for males. Like all wasps, mason wasps have little or no hair, unlike bees. The four-toothed mason wasp is black with a wide white band at the upper end of its abdomen, and the bald-faced hornet is a black wasp with white stripes at the stinger end of the abdomen. Four-toothed mason wasps and red and black mason wasps have a spot on their faces, unlike bald-faced hornets. As the name suggests, red and black mason wasps are black with reddish markings, although the males also have white or yellowish spots on their faces.
Sciencing Video Vault
Mason Wasp Habits
Mason wasps are solitary wasps, unlike bald-faced hornets. Mason wasps use cracks and holes in wood and abandoned beetle burrows for their nests. Wasps in brick walls most likely will be mason wasps because some will dig into the mortar between the bricks. Some mason wasps build burrows in the ground, and some repurpose mud dauber nests.
Adult mason wasps feed on nectar but more commonly will be seen attacking relatively hairless caterpillars like cutworms and corn earworms. Mason wasps hunt caterpillars, keeping a supply in the nest and feeding these paralyzed insects to their larvae.
Interestingly, female mason wasps can control the gender of their offspring. Gender also plays a role in where the eggs are placed in the nest. Male larvae hatch sooner than female larvae, so some mason wasps lay a female egg on a caterpillar that she leaves in a far chamber of the nest that is sealed with a mud-like material, and then lay a male egg on another caterpillar in the next chamber, which she also then seals. Some mason wasps lay only one egg per nest while other mason wasps lay a series of eggs in the nest, although each egg has its own chamber. The four-toothed mason wasp creates a series of chambers; the first chamber contains the egg, the second is empty (this is called an intercalary cell), the next is filled with caterpillars as a sort of food storage area and finally there is another empty chamber.
Masonry Wasp or Masonry Bee?
Mason wasps might be mistakenly called masonry wasps. This confusion arises due to the similarly named mason or masonry bee. Like mason wasps, mason bees prefer to live in holes in wood and abandoned beetle burrows but also may be found in old mortar between bricks. At least one species of mason bee, however, nests in snail shells.
Mason bees differ from mason wasps in size, appearance and food preference. Mason bees generally are smaller, with only the largest mason bees reaching the smaller dimensions of mason wasps. Mason bee colors range from metallic blue or green to, less commonly, brown or black. Unlike mason wasps, mason bees are solid-colored and do not have stripes. Like other bees, mason bees have hairs to hold pollen as they move from flower to flower. Mason bees serve as important pollinators, especially in orchards. Mason bee larvae feed on bee bread made from pollen.
Mason Wasp Hazards
As wasps go, mason wasps are relatively benign. They may sting if disturbed, like most other bees and wasps, but as solitary or semi-social wasps they sting as individuals. Social wasps like yellowjackets and bald-faced hornets attack in large numbers, especially if their nest is threatened or disturbed. The sting of any wasp can be deadly to people allergic to the venom, but most people will simply find the sting temporarily painful.
If large clusters of mason wasps (or mason bees, for that matter) nest in brick walls, their digging damages the mortar between the bricks. This damage, if extensive, could compromise the structural strength of the wall. | <urn:uuid:2b5310ef-c6ba-4a7e-8640-3e4f0678069e> | CC-MAIN-2018-47 | https://sciencing.com/identify-mason-wasps-5630426.html | s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039742978.60/warc/CC-MAIN-20181116045735-20181116071735-00357.warc.gz | en | 0.955334 | 1,026 | 3.265625 | 3 |
Are Whites Still "Fleeing"? Racial Patterns and Enrollment Shifts in Urban Public Schools, 1987-1996
NBER Working Paper No. 7290
The effect of interracial contact in public schools on the enrollment of whites has been an important concern in assessments of desegregation since the 1970s. It has been feared that 'white flight' -- meaning exit from or avoidance of racially mixed public schools -- could undermine the racial contact that desegregation policy seeks to enhance. This study examines this question using recent data. It also expands coverage from large urban districts to entire metropolitan areas, paying attention to the spatial context within which enrollment decisions are made. To do so, it examines data for 1987 and 1996 on racial composition and enrollment in all schools and school districts in 238 metropolitan areas. The study finds that white losses appear to be spurred both by interracial contact in districts where their children attend school and by the opportunities available in metropolitan areas for reducing that contact. Implications for metropolitan segregation are examined.
Document Object Identifier (DOI): 10.3386/w7290
Published: Clotfelter, Charles T. "Are Whites Still Fleeing? Racial Patterns And Enrollment Shifts In Urban Public Schools, 1987-1996," Journal of Policy Analysis and Management, 2001, v20(2,Spring), 199-221.
Users who downloaded this paper also downloaded these: | <urn:uuid:de8c844e-8ca7-4e52-9da8-365b2c8a2ef1> | CC-MAIN-2017-04 | http://www.nber.org/papers/w7290 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279169.4/warc/CC-MAIN-20170116095119-00077-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.929256 | 286 | 3 | 3 |
By: Jeffrey P. Emanuel
Even casual readers of the Hebrew Bible are familiar with the Philistines, portrayed as the Israelites’ perpetual antagonists from the time of the Judges to the postexilic period, when Zechariah prophesied an end to the “pride of the Philistines” (Zech. 9:6). Mentioned nearly 300 times in the Bible, the Philistines are accused of virtually every quality, trait, and action that Israelites found unsettlingly or abhorrent, including paganism, idol worship, lack of circumcision, and consuming unclean animals.
Some of the accusations were true; others almost certainly were not. But the Bible’s demonization was so thorough that “Philistine” is still used to this day to refer to an uncultured individual or population. But how well does the Bible’s depiction dovetail with historical and archaeological evidence? The answer begins by considering Philistine religion, as described in the Bible and understood from excavations of four of their major cities, with an emphasis on the critical period of the Early Iron Age (roughly 1200-1000 BCE).
The transition from the Late Bronze Age to the Early Iron Age after 1200 BCE was a time of major changes around the Eastern Mediterranean. The Mycenaean palaces and Hittite empire collapsed, major cities like Ugarit, a key port on the coast of Syria, were destroyed, migratory peoples were on the move, and Egypt began its decline from the unified New Kingdom into the fragmented Third Intermediate Period, when it would be ruled by dynasties from Libya and Nubia. The Philistines, like the Israelites of the biblical narrative, were among the groups on the move, arriving in Canaan in the late second millennium BCE and establishing their “pentapolis,” or five major cities of Ashdod, Ashkelon, Gaza, Ekron, and Gath (Josh. 13:2-3).
The Philistines are synonymous with the Peleset, one of the groups who appear in Egyptian records as invaders by land and sea at the end of the Late Bronze Age. Egypt’s interactions with these “Sea Peoples” are vividly depicted on the walls at Medinet Habu, the mortuary temple of the pharaoh Ramesses III, who ruled ca. 1185 to 1153 BCE. Two imposing reliefs show battles on land and at sea between Egyptian forces and various groups of “Sea Peoples.” The sea battle, perhaps the first ever depicted, is notable for its portrayal of Sea Peoples vessels as Mycenaean-style galleys, and for the appearance of new maritime technology (loose-footed sail, brailed rig, and crow’s nest) on both sides’ ships. The land battle depicts ox-carts, women, and children alongside the invading warriors, suggesting a migratory movement, which is in keeping with the archaeological understanding of the Philistines as immigrants to the southern Levant. Medinet Habu also provides the first documentary evidence for the Philistines as a group, who are mentioned in three separate inscriptions.
Not long after these events, they seem to have settled on the southern coastal plain of Canaan, founding their pentapolis and living in what archaeologist Lawrence Stager, the excavator of Ashkelon, described as “a diverse community of warriors, farmers, sailors, merchants, rulers, shamans, priests, artisans, and architects.” Four of the five major Philistine cities have been excavated, with only Gaza remaining inaccessible under the heavily populated modern city. There are enough differences between each to suggest that the people we refer to with the term “Philistines” were by not culturally homogenous. But similarities create a template of Aegean and Cypriot (“Cypro-Aegean”) traits for Philistine sites, and for some customs and material culture. This includes cult-related objects and architecture.
The biblical description of Philistine religion seems straightforward. Their chief god in the Early Iron Age was Dagon, and his sacrificial cult was practiced at temples in at least two Philistine cities, Gaza and Ashdod. The former was home to the last act of Samson, who brought down the building by collapsing its supporting pillars (Judg. 16:26-30), while the latter was home to a battle between the captured Ark of the Covenant and the divine image of Dagon (1 Sam. 5:1-8). The Philistines were also credited with worshiping “Ashtaroth” (I Sam. 31:10), while later, in the 9th century BCE, a divinatory cult of Ba’al-Zebub was present at Ekron (2 Kings 1:2-16).
Digging into the biblical narrative both raises new questions and shines a light on the Bible’s pejorative discussion of Philistine culture, including religious practices. Ba’al-Zebub (“lord of flies”), for example, is almost certainly a corruption of Ba’al-Zebul (“Ba’al the prince”). Dagon, on the other hand, despite being presented as a deity exclusively associated with the Philistines, has no place in a southern Canaanite pantheon – let alone in one maintained by Cypro-Aegean immigrants.
Dagon, in his linguistically earlier form Dagan, was an established deity in Syria and Mesopotamia by the late third millennium BCE. By the Late Bronze Age, his influence had spread as far west as Ugarit, where he was an equivalent of El, father of Ba’al. However, by the later years of the second millennium BCE his influence had waned significantly, and there is no clear evidence outside the Bible to connect Dagon to the southern Levant at all!
The most convincing argument for Dagon in the Philistine pantheon was made by the late historian Itamar Singer, who suggested the Philistines encountered Dagan along their route to the southern Levant and integrated him into their pantheon as an equivalent of the Great Mother Goddess, perhaps Cretan Rhea or Anatolian Kybele, whose gender they altered to conform to this new identity. While there is still no material or written extrabiblical evidence for Dagon’s presence in Canaan, Singer’s theory may be supported by the recent discovery of an Early Iron Age kingdom of Palistin centered on Tell Ta’yinat in the Plain of Antioch. If this polity and its people are associated with the Philistines, then we have a possible connection between Dagan’s Bronze Age territory and the southern coastal plain. However, until extrabiblical evidence is found for the presence of Dagon in Philistine cult, this hypothesis remains untested.
The Bible itself displays confusion about the Philistine pantheon. Judges 10:6, for example, reads, “The Israelites again did what was offensive to the LORD. They served the Baalim and the Ashtaroth…and the gods of the Philistines.” This verse, an extended version of a common Deuteronomistic theme of forsaking Yahweh and falling into worship of the Canaanite deities Ba’al, Asherah, and Astarte (Judg. 2:11–13, 3:7, 8:33; 1 Sam. 12:10), can be read as evidence that “the Baalim and the Ashtaroth” were associated with Canaanites but not with Philistines, whose gods were separate and distinctive from their contemporaries.
Just who these “gods of the Philistines” were, into whose worship the Israelites strayed, is never made clear, despite specific references to Dagon in other Deuteronomistic narratives. However, a Philistine connection to Ashtaroth is specifically mentioned in 1 Sam. 31:10, as Saul’s weapons were placed in this temple after his death. Thus the Bible depicts the West Semitic pantheon, and Canaanite religion as a whole, as being as attractive to Philistines as it was to the continually relapsing Israelites.
The material evidence for early Philistine cult is less straightforward than the Bible’s description. It consists primarily of handmade figurines and other Aegean–Canaanite style items such as lion-headed cups and incised scapulae in the Cypriot tradition, as well as a small number of altars and buildings. Figurines, the most common Iron I find, are divided into two types: “Philistine Psi” and “Ashdoda.” As archaeologist Michael Press, an authority on Philistine figurines, has noted, both both represent females, and are frequently decorated in geometric fashion similar to Philistine ceramics, whose form and decoration is derived from Aegean and Cypriot styles. The former takes its name from the figurine’s form (upraised arms give the appearance of the Greek letter Psi) and seems to be a direct continuation of the Mycenaean Psi.
Ashdoda, on the other hand, is uniquely Philistine. Named for the city of Ashdod, where the most complete example has been found, this figurine represents a seated woman, featuring a polos headdress and appliqued breasts, whose body has been fused with her chair. As Press has shown, both experienced a surge in popularity in the 11th century; however, the Mycenaean-derived Philistine Psi is found in 12th century contexts, while the uniquely-Philistine Ashdoda, with its combination of Aegean and Cypriot elements, does not appear before around 1100 BCE. Both forms went out of use by the end of the beginning of the first millennium. Ashdoda in particular has been seen as evidence that the Philistines worshiped a Great Mother Goddess, but since most Ashdoda figurines – including the complete example – have been found in pits and rubble piles, rather than on floors or identifiable contexts, Ashdoda’s nature, like her cult, remains unclear.
Few Early Iron Age Philistine temples have been found. However, a temple with two pillars, similar to that described in the Samson saga (although not large enough to hold 3,000 people on its roof!), was found at Tell Qasile, a city likely founded by the Philistines in the late 12th century. A slightly smaller structure, used from the 12th century into the early Iron II, was found at Gath (modern Tell es-Safi), suggesting that the two-column design was a regular feature of Philistine cultic architecture. At Ashkelon, a lime-plastered, four-horned installation in the center of a multi-roomed structure may be a Philistine horned altar. At Ashdod, a large building whose wide central hall featured two columns and an Aegean-style hearth is either a cultic structure or an upscale private dwelling. Just south of this was another building with a unique apsidal southern end that has been connected to the cult of Ashdoda because of its proximity the complete figurine’s findspot.
Our difficulty interpreting the archaeological evidence is compounded by the question of just how representative they are of Early Iron Age Philistine cult. A similar situation is found in one of the Philistines’ possible points of origin: Mycenaean Greece. Archaeological picture from the Aegean –primarily iconography and figurines – suggests a small, exclusively-female Mycenaean pantheon, possibly dominated by the Great Mother Goddess, much like our current picture of the Philistines’ Ashdoda-centric cult. But the Mycenaean evidence contains something absent from early Philistine culture: Linear B texts from Mycenaean Greece and Crete, which meticulously record the palaces’ involvement in Bronze Age cult. They reveal dozens of deities, including familiar names like Zeus, Hera, Poseidon, Dionysos, and more. The records from Knossos, for example, include at least 34 male and female deities. The mixed pantheon in the written evidence directly contradicts the all-female terracotta figurines and other iconography that make up our archaeological evidence.
Without texts to complement archaeological evidence, a great deal about Philistine religion will remain unknown. Identifying the deity represented by Ashdoda, and its implications both for the Philistine cult of Dagon and for the reconstruction of the early Philistine pantheon as a whole, all the more problematic.
The biblical writers can name the Philistines’ chief deity, but uninscribed material remains cannot. Further, the human element in narrative – innate biases, ulterior motives, and purposes that may have been clear to the intended audience but are lost on us – can make it unreliable as a source of information about a specific culture. This is doubly true when, like the Bible’s portrayal of the Philistines, such descriptions are dripping with polemic.
Of course, “archaeological silence” is not firm ground from which to make an argument. Without contemporary written evidence we will continue to have significant gaps in our understanding of early Philistine cult. Hopefully, in the not too distant future, new evidence will help remedy that situation.
Jeffrey P. Emanuel is CHS Fellow in Aegean Archaeology & Prehistory and Associate Director of Academic Technology at Harvard University.
All content provided on this blog is for informational purposes only. The American Schools of Oriental Research (ASOR) makes no representations as to the accuracy or completeness of any information on this blog or found by following any link on this blog. ASOR will not be liable for any errors or omissions in this information. ASOR will not be liable for any losses, injuries, or damages from the display or use of this information. The opinions expressed by Bloggers and those providing comments are theirs alone, and do not reflect the opinions of ASOR or any employee thereof.
For Further Reading
Jeffrey P. Emanuel. 2016. “Dagon Our God: Iron I Philistine Religion in Text and Archaeology.” Journal of Ancient Near Eastern Religions 16: 22-66.
Michael D. Press. 2012. “(Pytho)Gaia in Myth and Legend: The Goddess of the Ekron Inscription Revisited.” Bulletin of the American Schools of Oriental Research 365: 1–25.
Michael D. Press. 2012. Ashkelon 4: The Iron Age Figurines of Ashkelon and Philistia. Winona Lake: Eisenbrauns
Itamar Singer. 1992. “Towards the Image of Dagon the God of the Philistines.” Syria 69: 431–450.
Lawrence E. Stager. 1991. Ashkelon Discovered: From Canaanites and Philistines to Romans and Moslems. Washington, DC: Biblical Archaeology Society. | <urn:uuid:bae02653-35fe-4cfa-ba46-d5e5dd465154> | CC-MAIN-2017-47 | http://asorblog.org/early-philistine-religion-in-text-and-archaeology/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806832.87/warc/CC-MAIN-20171123123458-20171123143458-00718.warc.gz | en | 0.952167 | 3,164 | 3.765625 | 4 |
Together with the social psychologist Katharina Dinhof I visited the inhabitants of Hong Kong in their bedrooms and questioned them on the topic of light pollution and its effects on their sleeping habits.
The city is enveloped in a pink-orange haze that downright suppresses the darkness of the night. Hong Kong’s urban night sky is 100 to 1000 times brighter than the international brightness standard between 8.30 and 11:00PM, according to the Hong Kong Night Sky Brightness Monitoring Network. Hong Kong‘s night sky has been proven to be one of the brightest in the world and this is not without consequences. Light pollution has an impact not only on flora and fauna, but also on Hong Kong residents, especially on their sleep quality and well-being. Artificial light in the evening hours influences our internal clock, which in turn regulates organic processes such as hormone production and cell regulation. A disturbance of the day-night rhythm is associated with various physiological and psychological disorders, including depression, insomnia and cardiovascular diseases. Especially the blue, cold light from LED street lights suppresses the production of the hormone melatonin, which according to some studies, is “a compound that adjusts our biological clock and is known for its antioxidant and anti-cancerous properties.” To emphasize this effect I deliberately tinted the photos in harsh blue colors.
In total we conducted 6 interviews and additionally one researcher and lecturer at the Department of Physics at Hong Kong University.
By David Schermann | <urn:uuid:62dc685c-c46c-4f68-b818-a6ed20ed6f0f> | CC-MAIN-2022-05 | https://edgeofhumanity.com/2018/09/25/hk/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304915.53/warc/CC-MAIN-20220126041016-20220126071016-00451.warc.gz | en | 0.934231 | 304 | 2.875 | 3 |
Today as we celebrate the 230th anniversary of adopting the Constitution of 3 May by the last King of Poland and Grand Duke of Lithuania Stanisław August Poniatowski, it is worth mentioning that it is the May Constitution that introduced, among other things, the principle of the tripartite separation of power, and reformed the existing political system ensuring more equal treatment of all nationalities within the Commonwealth. The Constitution also expressed the nation’s will to defend Poland’s independence following its first partition by Austria, Prussia and Russia in 1772.
The Constitution of 3 May along with its complementary Reciprocal Guarantee of Two Nations adopted by the Great Sejm on 20 October 1791 also confirmed a closer union between the Polish and Lithuanian nations. The act ensured, among other things, equal 1 to 1 representation at the Commonwealth’s shared state bodies for Poles and Lithuanians. We can proudly say that the leaders of the two nations and states, despite all differences, were able to work together effectively at a crucial moment for their existence. Such example has been inspiring cooperation and friendship between Warsaw and Vilnius to date.
Unfortunately, the ambitious reform plans which had meant to be implemented based on the new constitution were shattered by the Russians’ armed intervention in 1792. As a legal act, the Constitution of 3 May formally ceased to be in force in November 1793 by virtue of the resolution by the Sejm that was summoned under the dictate of Russia and Prussia in Grodno. On the same year, the two states partitioned Poland for the second time.
Finally, the Polish-Lithuanian state disappeared from Europe’s map for over 120 years after the 3rd Partition in 1795 conducted by Austria, Prussia and Russia. This act, violating all principles of international law, was erased only after the World War I, when Poland and Lithuania regained independence as two sovereign states.
When Poland regained its independence, the anniversary of adopting the 3 May Constitution was celebrated as a national holiday since 1919. Under German and Soviet occupation as well as under the rule of communist authorities in Poland, when the 3 May Day holiday was banned, most Poles continued to observe it. In a sovereign Republic of Poland we have been celebrating May 3 National Holiday again since 1990.
The Constitution of 3 May and the Reciprocal Guarantee of Two Nations of 20 October 1791 are one of crucial elements of Polish-Lithuanian heritage. Their adoption was fundamental for today’s cooperation of our countries within the EU and NATO.
Apart from their common history, nowadays Poland and Lithuania work together to carry out numerous energy and transport projects which serve the entire Europe. The two countries also join efforts to strengthen global security, particularly in the region.
Recollecting their common heritage of the Polish-Lithuanian Commonwealth, our two countries support their neighbours: Ukraine that attempts to protect its sovereignty and territorial integrity in the face of Russian aggression and occupation, and the people of Belarus who deserve freedom and democracy in an independent state. | <urn:uuid:5630a110-564d-4931-88ed-0011fc38467f> | CC-MAIN-2022-21 | https://instytutpolski.pl/kyiv/en/2021/05/03/230th-anniversary-of-the-constitution-of-3-may/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662534669.47/warc/CC-MAIN-20220520191810-20220520221810-00234.warc.gz | en | 0.966375 | 627 | 3.65625 | 4 |
A Dotted Line Comes Full Circle for Professor Teenie Matlock
When Teenie Matlock was a child in nearby Mariposa, she listened to deer-hunting stories told by her paternal grandfather, who was part Sierra Miwok. She remembers him drawing symbols in the dirt as he spoke. For example, a dotted line represented a trail or route, and an x represented a person or animal. To his young granddaughter, the symbols didn't seem to correspond to the concepts he was describing.
Matlock has traveled her own dotted line in life so far, and it has come full circle in more ways than one. As a child family members jokingly called her the ear because of her constant monitoring of what people around her were doing or saying. Now she recognizes it as a strong interest in how people think and communicate. After studying linguistics and psychology at Fresno State, UC San Diego and UC Santa Cruz, plus a postdoctoral position at Stanford, she has returned to the region as a UC Merced founding professor to help start a program in cognitive science.
Her research focuses on how people mentally represent and understand spatial language, exploring how speech is integrated with perception, imagery and physical action. With the added perspective of her years of study in cognitive science, she says her grandfather's storytelling methods make more sense.
People frequently do physical actions, like pointing or gesturing, while they are giving directions or describing how something looks, she says. These actions allow the speaker to offload computation and provide more accurate description of a scene.
Matlock describes cognitive science as the interdisciplinary study of thinking. It combines various methods to understand the way people think, remember, perceive and communicate. Cognitive scientists have degrees in fields as diverse as psychology, neuroscience, computer science, linguistics, anthropology or philosophy. UC Merced will create an interdisciplinary cognitive science program bringing in elements from fields like these, starting with a strong emphasis on language and high-level cognition.
We're shooting high to bring in world-class cognitive researchers and first-rate Ph.D. students, Matlock explains. Because the vision of UC Merced is interdisciplinary, cognitive science is a perfect fit. | <urn:uuid:99b7720d-f5bd-4b6a-8268-266ca2e20fff> | CC-MAIN-2013-48 | http://www.ucmerced.edu/news/dotted-line-comes-full-circle-professor-teenie-matlock | s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163949658/warc/CC-MAIN-20131204133229-00060-ip-10-33-133-15.ec2.internal.warc.gz | en | 0.959531 | 444 | 3.015625 | 3 |
How Weather Station is Revolutionizing Agricultural Practices
Weather stations are an essential tool for modern agriculture, providing farmers with real-time data about weather conditions such as temperature, humidity, rainfall, wind speed, and solar radiation. This data allows farmers to make informed decisions about planting, irrigation, fertilization, and other inputs, improving crop yields and reducing waste.
Here are some of the ways that weather stations are revolutionizing agricultural practices:
Weather station data is an integral part of precision farming, a data-driven approach to agriculture that uses technology to optimize every aspect of crop cultivation. By integrating weather station data with other technologies such as GPS, drones, and machine learning algorithms, farmers can monitor crop growth and adjust inputs with a high degree of precision.
Optimal Timing of Inputs
Weather station data allows farmers to time their inputs such as planting, irrigation, and fertilization with greater precision. For example, farmers can use rainfall data from weather stations to adjust irrigation schedules, reducing water usage and increasing efficiency.
By monitoring temperature and humidity levels, farmers can also ensure that crops are planted and harvested at optimal times, resulting in improved yields and quality.
Improved Pest and Disease Management
Weather station data is also crucial for managing pests and diseases. By monitoring weather conditions, farmers can predict when pests and diseases are likely to appear and take preventive action before they become a problem. For example, farmers can use weather station data to time their pesticide applications, reducing the amount of chemicals needed and minimizing environmental impact.
Reduced Environmental Impact
Weather stations are also helping to reduce the environmental impact of agriculture. By providing farmers with real-time data about weather conditions, farmers can reduce water usage, fertilizer runoff, and other negative environmental impacts.
Weather stations are also essential for crop insurance. Weather station data allows insurance companies to assess risk and develop policies that protect farmers against crop losses due to adverse weather conditions.
In conclusion, weather stations are revolutionizing agricultural practices by providing farmers with real-time data about weather conditions and other environmental factors that impact crop growth. With this data, farmers can make informed decisions about inputs such as planting, irrigation, and fertilization, improving yields and reducing waste. As the technology continues to evolve, the potential benefits of weather stations for agriculture will only continue to increase, allowing farmers to meet the challenges of a changing climate while protecting natural resources. | <urn:uuid:5df86a31-fc8f-41be-a537-69f54e7d6498> | CC-MAIN-2023-40 | https://jxiotet.com/news/2518.html | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506399.24/warc/CC-MAIN-20230922102329-20230922132329-00308.warc.gz | en | 0.923361 | 488 | 3.6875 | 4 |
One Year, One Month, One Day
How far have you delayed?
Few are deprived, few are naïve.
The gift of education is only in the hands of great.
“Education is the most powerful weapon which you can use to change the world” – Nelson Mandela
The world is competitive, and in this growing competitive environment, it is must for all to have a good education. We need education so that we’re able to understand the society that we live in, to learn about our surroundings better.
Modern time, American educational philosopher, John Dewey, argued that the main purpose of education is not so much to prepare students to live a useful life, but to teach them how to live pragmatically in their current environment. Also education is like an investment in human capital and hence, is one of the fundamental factor which helps in economic development. Education also brings equality among the people and helps in awareness among masses in various aspects. In short, education helps in self-development, economic development and social development.
In spite of the fact that education is the most important tool, today, education still remains a dream for millions of children around the world. According to surveys more than 72 million children are deprived of primary education and 769 million adults are illiterate and hence they have no awareness about how to improve their living conditions and of course of their children.
In developing country like India, where economy still has to rise, education remains the first investment for growth and development. To revive the economy and culture, education plays very important role.
The change I wish to see in the coming year is that every child in the world gets a fair education. No one remains in the dark in respect of acquiring education. Now the question arises, how to provide a fair education? The judiciary system plays an important role here by amendment of certain rules which includes the necessary education till a particular age or to provide free education at primary and secondary level, and to check whether the laws are been implemented and followed, especially in rural areas where literacy rate is very less. The worse part is that education is infidel with politics and is commercialized and hence been corrupted. If our education system goes unchecked and unguided by politicians, then this system is doomed. Therefore, the authority of education should be given to those people who have an inkling towards human perfection and shouldn’t be in the hands of politicians because they majorly belong to the higher class (barbarians) so they will only seek their self-interest.
“If you educate a man, you educate one person. If you educate a woman, you educate a nation.” Talking about the importance of girl education, which is effective because benefits are felt throughout the community when we educate a girl. If a woman is educated, she will be better able to educate her own children also she can influence her own members towards education and an educated housewife can be more effective in the growth of family, is more likely to prosper higher income.
Education shouldn’t remain just a mere dream now. This is the change I wish to see in this coming year. Educating every single child should be our moral right. | <urn:uuid:432c4965-2bcc-472b-8378-6964440a3ae2> | CC-MAIN-2019-13 | http://www.mediacenterimac.com/the-change-i-wish-to-see-in-the-world/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912201922.85/warc/CC-MAIN-20190319073140-20190319095140-00491.warc.gz | en | 0.967046 | 651 | 2.546875 | 3 |
THE POSEIDON SYSTEM FINDS WATER!
Do you need to find water for the irrigation of your lands? Do you want to dig a well but you don’t know if there is going to be water? The research of water resources is our strength. Our system verify the presence of aquifers. The results of our researches help professionals in charge by giving them the exact information about the well’s location.
Our motto? “IF THERE IS WATER UNDERGROUND, WE FIND IT!”
Water is a resource that’s becoming increasingly valuable.
The availability of water decrease each year, the locations with water crisis are growing in number, the prices are increasing.
15% of Italian population (almost 8 million people) is below the thresold of water requirements (50 daily liters per person) for 4 months (June – September).
If we take into account that 97% of Italian fresh waters is found in aquifers, finding new wells and aquifers is an essential factor, and it requires the advice of a geologist and various investigative activities on the land.
In the last decades, technology made possible the drilling at profound depths for the research of wells and aquifers, which is becoming vital for our needs.
Studies and developments of the POSEIDON System were the results of combining values of RESEARCH and TECHNOLOGY with the EASE of obtaining FIRM RESULTS in the shortest amount of time possible.
In this scheme the Magenta color represents the firmer layers of soil, the colors tending to blue represent the proximity of water.The graph represent the horizontal and vertical metric scale: at 70mt from our reference point, with a depth of 65/70 mt we can find the aquifer.
EASY, FAST but most importantly, A RELIABLE RESEARCH. | <urn:uuid:0ea91770-4630-44b1-8b05-e239db5046d8> | CC-MAIN-2020-05 | https://www.hydrohunter.com/en/find-water/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251688806.91/warc/CC-MAIN-20200126104828-20200126134828-00265.warc.gz | en | 0.927069 | 387 | 2.5625 | 3 |
FormoSat-7 contributing to better weather forecasting: NARLabs
Taipei, Sept. 4 (CNA) FormoSat-7, a constellation of satellites for space weather research, has made significant contributions to improving global numerical weather predictions, Taiwan's National Applied Research Laboratories (NARLabs) said Friday.
In a statement, NARLabs cited Sean Healy, a senior scientist at the European Centre for Medium-Range Weather Forecasts, as saying that data provided by FormoSat-7, also known as COSMIC-2, has greatly helped improve the accuracy of numerical weather forecasts at the center.
"In early 2020, radio occultation data helped reduce errors in 24-hour forecasts by about 4 percent. With the addition of COSMIC-2 and Spire Global data, radio occultation accounted for 13 or 14 percent of error reduction," Healy said during an Aug. 12 webinar titled "Spire Weather -- A Global Constellation Solution."
Also since March of this year, meteorologists have been seeing dramatic reductions in the amount of data provided by atmospheric sensors mounted on commercial aircraft, after the global airline industry came to a grinding halt due to the COVID-19 pandemic.
To help offset the loss of data captured by commercial aircraft, the European research institute began assimilating GNSS radio occultation (GNSS-RO) measurements from the FormoSat-7 mission on March 25, according to a newsletter published by ECMWF in April.
Lin Chun-liang (林俊良), director-general of the National Space Organization (NSPO), said that since it began providing data on the Global Telecommunication System in March, FormoSat-7 has been able to provide at least 4,000 radio occultation measurements per day.
Radio occultation involves the sending of signals from one satellite to another and then measuring how those signals are distorted to determine meteorological conditions in the Earth's atmosphere and ionosphere.
Even if the satellite encounters an abnormality, Lin said his team is able to resolve problems quickly in order to maintain the transmission of stable data.
A joint project between Taiwan and the United States, FormoSat-7 is a constellation of six satellites launched in June 2019 that provides data for meteorology, ionosphere, climatology, and space weather research.
Foreign minister attends inauguration of Palau president01/21/2021 11:14 PM
Taiwanese duo cruise into quarterfinals at Thai badminton open01/21/2021 09:56 PM
Taipei records second-highest temperature ever in January01/21/2021 09:43 PM
Taiwanese badminton ace reaches quarterfinals at Toyota Thailand Open01/21/2021 08:51 PM
Supreme Court upholds sentence for ex-Air Force officer guilty of rape01/21/2021 08:44 PM | <urn:uuid:c847dd12-acf4-4f10-a34f-7169456198a8> | CC-MAIN-2021-04 | https://focustaiwan.tw/sci-tech/202009040015 | s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703528672.38/warc/CC-MAIN-20210121225305-20210122015305-00100.warc.gz | en | 0.917767 | 603 | 2.765625 | 3 |
Singh // is a common title, middle name, or surname used in South Asia, mainly in India and Nepal(Thakuri sub cast people), used originally by the Hindu Kshatriyas (warriors and kings). It is derived from the Sanskrit word सिंह Simha meaning Lion. It is used as a surname or middle name by Hindu communities like the Marathas, Rajputs, Jats, Yadavs and Ahirs among others, and Sikhs. Generally this surname is found in males.
By the sixteenth century, "Singh" had become a popular surname among the Maratha and Rajput warriors. It was adopted into Sikhism in 1699 as per the instructions of Guru Gobind Singh; the use of Singh as a last name is mandatory for all baptized male Sikhs since 1699, regardless of their geographical or cultural binding. Some Brahmins like Bhumihar Brahmins (see Kingdom of Kashi and Royal House of Benares) and Maithil Brahmins (see History of Mithila) also use this surname. The general editor of the book People of India (Bihar and Jharkhand), published by Anthropological Survey of India (ASI), and noted academician-bureaucrat, the late Kumar Suresh Singh, said that the surname "Singh", which used to denote connection with power and authority, was used in Bihar by Brahmin zamindars, like the surname "Khan" in Muslims. "Singh" has gradually emerged as a hereditary title to be used as a middle name, highlighting connections to a warrior status or occupation. The surname has also been widely adopted by other groups of India like Yadavs and Jats. However, this is not an exclusive usage, and many Hindu groups including Scheduled Castes and Vaishya have adopted this title without any significant warrior status or ties.
- In Hindi (Devanagari script), the name is written सिंह ("siṅh", IPA: [sɪŋɦə]) always pronounced सिंघ ("singh", IPA: [sɪŋɡʱə]). Other variants include Simha, Sinha, and Singhal
- In Marathi, the name is written and pronounced as सिंह (Sinh).
- In Punjabi (Gurmukhi script), the name is written as ਸਿੰਘ and pronounced as Singh.
- In Gujarati, it is spelled as સિંહ (Sinh). Another variant is Sinhji, the form of Singh used in Gujarat, where the 'g' is dropped and the suffix of respect 'ji' is added.
- In Malayalam, simham (സിംഹം) means lion in English
- In Tamil, the word for lion is Singham, Singhan, Sing or Singhe written as சிங்க, also derived from Sanskrit (see Singapore)
- In Sinhalese, the name is written as සිංහ and pronounced as Sinha.
- The term Sinhalese referring to peoples of Sri Lanka, meaning "Lion Blooded" (Sinha = lion, le = blood) may be construed as having origin in the word 'Singh'. The Sinhalese people are said to be descended from Prince Vijaya (a king who is fabled to have descended from a lion)
- In Burmese, it is spelled သီဟ (thiha), derived from the Pali variant siha.
- Chinese is said to have also derived the word for lion from Buddhist missionaries from India.
- In Thailand, Singha, written as Thai: สิงห์ with final syllable marked as silent, refers to a mythical lion; the zodiac sign of Leo; a popular brand of beer, Singha; and is frequently used as a place name (for instance, Ban Singh Tha). Singhakhom Thai: สิงหาคม, in which the /ha/ is pronounced, is the Thai solar calendar month of August. Sing Toe Thai: สิงโต, which omits /ha/ entirely and adds Thai for big or grown up, refers to the lion. All except "Toe" are of Sanskrit origin
- A common surname of Bihar, "Sinha" also may have had origins in the word "Singh."
- In Indonesia, Singa or Singha, means Lion
- Singapore is derived from the Malay word Singapura (Sanskrit: सिंहपुर, lit. Lion City).
The first ruler of the Solanki/Chalukya clan who bore the title Simha ruled around 500 CE. The Vengi branch of the Chalukyas continued using Simha as a last name till the 11th century. The Rajputs started using Singh in preference to the classical epithet of "Varman". Among the Rajputs, the use of the word Simha came into vogue among the Paramaras of Malwa in 10th century CE, among the Guhilots and the Guhilot of Narwar in the 12th century CE, and the Rathores of Marwar after the 17th century.
In the 18th century, the non-Rajput martial tribes, including the Brahmins, the Kayasthas and the Baniyas of what are now Uttar Pradesh and Bihar, also started using the title Singh in imitation of the Rajputs. In the 19th century, even the Bengal court peons of the lower castes also adopted the title Singh.
The adherents of Sikh faith adopted Singh as a surname in 1699, as per the wish of Guru Gobind Singh, the tenth Sikh Guru. In the Spring of 1699, on the day of Baisakhi, Guru Gobind Singh Ji (originally named Guru Gobind Rai Ji), made it mandatory for all Sikh males to append the name suffix Singh after their name and "Kaur" for Women.
Singh/Sinh is used by Sikhs, Bhumihar Brahmins, Maithil Brahmins and Kshatriya communities such as Jats, Marathas, Gurjars, Rajputs, etc. as either a middle name or a surname. e.g., Kotwal Dhan Singh Gurjar, Chaudhary Charan Singh, Maharaja Bhim Singh Rana, Prahlad Singh Patel etc. At times, the Marathi Brahmins also use Sinh or Singh as a suffix to their first names, e.g. Udaysinh Peshwa, the scion of the Peshwa Dynasty.
The last name "Singh" is in fact used by a wider population from Bihar Jharkhand Punjab to Uttar Pradesh and from Kashmir down into Rajasthan, Madhya Pradesh, and Maharastra to Uttarakhand as well as the far eastern states of Manipur, Assam, Tripura, Sikkim, and even Bhutan, spanning the entire subcontinent and even reaching Southeast Asia, where in Thailand, as the Chakri Dynasty strove to empower Siam after the fall of the Ayutthaya Kingdom, Singh Singhaseni (1777–1849) was a prominent general, and Chao ("Lord") Racha Wong Singh governed Yasothon, 1815–1823. The name is also found in use among West Indians of Indian origin namely in places of Guyana, Trinidad, and Surinam, as well as people of Indian origin found in Mauritius and Fiji Island.
Singh is often used the traditional way, as previously described, by having it as the middle name after the first name and followed by the clan/family name by many communities, groups and peoples. For example, Yogendra Singh Yadav, Prahlad Singh Patel, Bhupinder Singh Hooda, Mahendra Singh Dhoni, and Bhairon Singh Shekhawat. Sikh examples include Gurmukh Singh Saini,Kirori Singh Bainsala, Jassa Singh Ahluwalia, Jassa Singh Ramgarhia, ((S.Logmansingh ))((Shivarajsingh )) and Hari Singh Nalwa. Thus Singh can be used as a middle name before the individual's surname (last name), a common practice among many groups in India, e.g., Jassa Singh Ahluwalia (1: First name, 2: Singh, 3: Family lineage name). Many adherents of Sikh faith across the world, some of which may come from many other races, countries, cultures and groups use the name "Singh" as a middle name with last name as Khalsa, e.g., Avtar Singh Khalsa (1: First Name, 2: Singh, 3: Belonging to Khalsa spiritual family). Another practise among Sikhs is to use village/town/city/country lineage after middle name Singh to avoid using the caste lineage, e.g., Parkash Singh Badal (1: First Name, 2: Singh, 3: Village/town/country lineage).
Similar to how the Maratha men and women used the titles Rao (for men), Baisaheb (for women) or Raje (both men/women) as their middle name, earlier, a common practice among the Rajput men was to have Singh as their last name, while Rajput women had the last name Kumari (Princess) which is derived from Kanwar (Prince). However, many Rajput women have Singh in their name as well. Several times during history Rajputs migrated out of Rajputana; many of those who settled in other parts of India have since come to use Singh as their last name even though they belong to separate Rajput gotras and clans. This happened over several generations due to the local population preferring to popularly call them just Singh in the new places. This was usually enough to denote that they belonged to the Kshatriya varna and were Hindu Rajput warriors by caste.
Immigration issues: Common surname
A section of around a million adherents of Sikhism that live abroad in Western countries only keep Singh or Kaur as their last name. This has caused legal problems in immigration procedures especially in Canada with Canadian High Commission in New Delhi, India for a decade stating in letters to its Sikh clients "the names Kaur and Singh do not qualify for the purpose of immigration to Canada" people with these common Sikh surnames have to change their last names before coming to Canada.
The ban was denounced by the Sikh community, after which the Citizenship and Immigration Canada announced it was dropping the policy, calling the whole thing a misunderstanding based on a "poorly worded" letter.
- Asiatic Lion
- Narsingh or Narasimha, a half-man (Nar) and half-lion (Singh) incarnation of Vishnu in Hindu religion.
- Maratha Empire
- Maratha Light Infantry
- Rajput Regiment (Indian Army)
- Raymond Thomas Smith (1996). The matrifocal family: power, pluralism, and politics. Routledge. p. 118. ISBN 0-415-91214-8, ISBN 978-0-415-91214-3.
- Feuerstein, Georg (2002) . The Yoga Tradition: Its History, Literature, Philosophy and Practice. Motilal Banarsidass/Hohm. p. 444. ISBN 81-208-1923-3. OCLC 39013819.
- Prakash Chander (1 January 2003). India: Past & Present. APH Publishing. pp. 120–. ISBN 978-81-7648-455-8. Retrieved 11 January 2013.
- "Using surnames to conceal identity". The Times of India. 2009-02-21. Retrieved 2013-01-18.
- The Oxford Pocket Dictionary of Current English 2008 defines Singh as: "Singh / sing/ • n. a title or surname adopted by certain warrior castes of northern India, esp. by male members of the Sikh Khalsa". From The Oxford Pocket Dictionary of Current English 2008, originally published by Oxford University Press 2008 Singh encyclopedia.com; Also see: Oxford University Press, India
- Dahiya, Bhim Singh (1980). Jats, the Ancient Rulers: A Clan Study. New Delhi: Sterling. p. 5. OCLC 7086749.
- Vanita, Ruth (2005). Gandhi's Tiger and Sita's Smile: Essays on Gender, Sexuality and Culture. New Delhi: Yoda Press. p. 37. ISBN 978-81-902272-5-4. OCLC 70008421.
- Qanungo, Kalika Ranjan (1960). Studies in Rajput History. Delhi: S. Chand. pp. 138–140. OCLC 1326190.
- A History of the Sikh People (1469-1988) by Dr. Gopal Singh ISBN 81-7023-139-6
- Khushwant Singh, A History of the Sikhs, Volume I
- Kolff, Dirk H.A., The Rajput of Ancient and Medieval North India: A Warrior-Ascetic; Folk, Faith and Feudalism, edited by NK Singh and Rajendra Joshi, Institute of Rajasthan Studies, Jaipur, India. Rawat Publications, Jaipur and New Delhi. ISBN 81-7033-273-7
- Joshi, Rajendra, Feudal Bonds; Folk, Faith and Feudalism, edited by NK Singh and Rajendra Joshi, Institute of Rajasthan Studies, Jaipur, India. Rawat Publications, Jaipur and New Delhi. ISBN 81-7033-273-7
- 'Singh' ban denounced | <urn:uuid:abdf2bcf-82a2-4ac5-b04f-e2143d21c284> | CC-MAIN-2013-48 | http://en.wikipedia.org/wiki/Singh | s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163053174/warc/CC-MAIN-20131204131733-00060-ip-10-33-133-15.ec2.internal.warc.gz | en | 0.900256 | 3,008 | 3.578125 | 4 |
Key Stage 3 Curriculum
During Key Stage 3 students study a wide range of subjects. Our aim is to build on the work completed during their primary education and to support their continued progress through both Key Stage 3 and then onto Key Stage 4.
English, Maths and Science (Year 7 & 8 combined Science, Year 9 – Biology, Chemistry and Physics)
Geography, History, Philosophy and Religious Studies
Dance, Drama, Music and Art
PSHCE (Personal, Social, Health & Careers Education)
Students are assessed against National Curriculum assessment levels and their progress tracked throughout each academic year against end of year and end of Key Stage minimum targets. There is an increased focus on literacy development throughout the academy and in some cases specific literacy lessons are delivered to secure existing literacy levels but more importantly to increase student capability in this area.
Each day all students are required to read for 15 minutes a book of their choice. The START (Stop Teaching And Read Together) programme aims to encourage reading for pleasure and impact on students’ capabilities across the curriculum.
Subject Learning Programmes are published each half term on the UCAN website to allow all parents/carers to see and understand what their child is learning during that half term.
During Year 9 students will opt for their Key Stage 4 courses. A structured programme is in place to ensure that students with the support of their parents and academy staff make choices that are most appropriate to their aspirations.
Our curriculum provision is reviewed each academic year to ensure it continues to meet the needs of our students.
For futher information on the curriculum we provide please contact the school directly. | <urn:uuid:a29e1797-d3c1-46b1-8583-737e1b4b8c37> | CC-MAIN-2017-17 | http://ucanorthwich.org/Content/Curriculum/Default.aspx?Section=242 | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917125719.13/warc/CC-MAIN-20170423031205-00023-ip-10-145-167-34.ec2.internal.warc.gz | en | 0.952265 | 336 | 2.875 | 3 |
I should very much like to know where in the whole of the New Testament the author finds this violent, unnatural, and immoral proposition. Christ did not have the same kind of regard for one person as for another. We are specifically told that there were certain persons whom He especially loved. It is most improbable that He thought of other nations as He thought of His own. The sight of His national city moved Him to tears, and the highest compliment he paid was, ‘Behold an Israelite indeed.’ The author has simply confused two entirely different things. Christ commanded us to have love for all men, but even if we had equal love for all men, to speak of having the same love for all men is merely bewildering nonsense. If we love a man at all, the impression he produces on us must be vitally different to the impression produced by another man whom we love. To speak of having the same kind of regard for both is about as sensible as asking a man whether he prefers chrysanthemums or billiards. Christ did not love humanity; He never said He loved humanity; He loved men. Neither He nor anyone else can love humanity; it is like loving a gigantic centipede. And the reason Tolstoians can even endure to think of an equally distributed affection is that their love of humanity is a logical love, a love into which they are coerced by their own theories, a love which would be an insult to a tom-cat.
G.K.Chesterton, Varied Types
The love of humanity is the root of all kinds of evil. It was the love of humanity on the part of the Committee of Public Safety that brought down the Bastille and set up Madame la Guillotine in Paris. It was the love of humanity on the part of the Black Republicans and the abolitionists that killed hundreds of thousands of Americans and blacks in order to “rescue” and “free” blacks. It was the love of humanity on the part of Bolsheviks that brought us the Holodomor and the gulag archipelago. The love of humanity has given us tens of millions of dead humans and has brought despotism and tyranny of untold magnitude.
Secondly, Chesterton teaches here the principle of love according to concentric circles. It is natural, Chesterton teaches us, to first love family, and then from there to love others according to the fifth-commandment proximity in which they stand to us. Jesus did it Himself. He revealed it when He took care of his own mother when hanging on the cross. He did not take care of all the mothers of the world. He likewise revealed His priority of love for His own when He referred to the non-Israelite Syrophoenician woman as a “dog,” in comparison to His people, whom He called “the children.” He revealed His priority of love for His own when He proclaimed that He was sent only to the lost sheep of Israel. He revealed His priority of love for His own when Jerusalem’s refusal of Him brought Him to tears as He contemplated the judgment that would be visited upon them for their rejection.
It is true that the love of Christ spilled over unto the Gentile world, but His love was first prioritized upon His people. This is just as our love should be. The love of Christ in us should spill over to those outside our Kith and Kin who are of the faith, but that love first properly begins with our love of Kith and Kin of the faith.
The love of humanity is a love that is abstract, and because it is abstract, it seldom touches concrete people. When people love humanity in the abstract, they abort concrete babies in order to love the abstracted concept of troubled women they have concocted in their twisted minds. When people love humanity in the abstract, they pass legislation to destroy concrete people whom they see as standing in the way of their twisted love for abstracted people. Stalin loved the Soviet people, and so he murdered millions of Ukrainians who resisted his collectivization. Concrete people were put in gulags for opposing abstract love.
The love of humanity also leads to a beehive and anthill social order, as the love of an abstracted humanity brings with it the insistence that all humanity must be the same. The love of all equally, when translated into social policy, brings the destruction of all distinctions among concrete individuals that make up abstracted humanity. “I love all people equally” soon becomes “all the people I love equally must be the same.” The love of abstracted humanity is an idea that has terrible consequences.
The love of humanity is going to get us all killed. | <urn:uuid:511a12fe-6223-45d0-9c4d-25138cadd2d8> | CC-MAIN-2020-50 | http://faithandheritage.com/2012/07/chesterton-mcatee-on-loving-humanity/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141171126.6/warc/CC-MAIN-20201124053841-20201124083841-00115.warc.gz | en | 0.971878 | 970 | 2.515625 | 3 |
EVANSTON, Ill. --- After the anthrax attacks in the United States in 2001 the threat of a larger and more deadly bioterrorism attack -- perhaps from smallpox, plague or tularemia -- became very real. But the ability to detect such biological agents and rapidly contain an attack is still being developed.
In a significant finding, researchers at Northwestern University’s Center for Quantum Devices have demonstrated solar-blind avalanche photodiodes (APDs) that hold promise for universal biological agent detection. Once optimized, these sensitive detectors could be combined with the ultraviolet light-emitting diodes (LEDs) already pioneered by the Center for Quantum Devices to create an inexpensive detection system capable of identifying the unique spectral fingerprints of a biological agent attack.
The Northwestern team, led by center director Manijeh Razeghi, became the first to demonstrate 280 nanometer APDs. These devices, based on aluminum gallium nitride (AlGaN) compound semiconductors, have a photocurrent gain of more than 700.
The tiny-sized APDs should be capable of efficient detection of light with near single photon precision. Previously, photomultiplier tubes (PMTs) were the only available technology in the short wavelength UV portion of the spectrum capable of this sensitivity. These fragile vacuum tube devices are expensive and bulky, hindering true systems miniaturization.
The APD technology may see further use in the deployment of systems for secure battlefield communication. Wavelengths around 280 nanometers are referred to as the solar-blind region; in this region, the UV light is filtered out by the ozone layer providing for a naturally low background signal. Solar-blind APDs are intrinsically able to take advantage of this low background level, while PMTs must use external filters to become solar-blind. This makes secure battlefield communication possible utilizing a combination of compact, inexpensive UV LEDs and UV APDs both developed at the Center for Quantum Devices.
The technology for the realization of solar-blind APDs is based on wide bandgap AlGaN compound semiconductors. To date, no semiconductor-based solar-blind APDs have been reported. This is due to numerous difficulties pertaining to the crystal growth of AlGaN compound semiconductors.
The major obstacle in demonstrating high performance solar-blind APDs is the high number of crystalline defects present in the AlGaN semiconductor material. However, researchers at the Center for Quantum Devices have been able to realize high-quality AlGaN so as to demonstrate avalanche gain in the solar-blind region.
Northwestern’s results were presented recently by Razeghi at the APD workshop organized by Henryk Temkin, a new program manager at the Defense Advanced Research Projects Agency (DARPA). | <urn:uuid:0f364267-4f95-47b5-a831-dcd025307a35> | CC-MAIN-2015-27 | http://www.northwestern.edu/newscenter/stories/2005/10/bioterrorism.html | s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375095404.78/warc/CC-MAIN-20150627031815-00249-ip-10-179-60-89.ec2.internal.warc.gz | en | 0.923247 | 569 | 2.921875 | 3 |
Multi User License - $2,800
This chainsaw operates by rapidly rotating a chain of saw blades, also known as toothed, around a handle to slice across hardwood inside a rapid, smooth movement. The dimensions of chainsaw blades/teeth and guidance rods might vary substantially across models.
The smallest guide bar, for instance, is 6 inches long, while the biggest might be 72 inches long. This same chains and guiding bars are referred to collectively as the chains system, which is driven by that of the engine/motor.
Depending on what type of power consumed, numerous chainsaws commence with the press of the button or perhaps the pulling of a rope. This beginning pathway provides power towards the engines, which in turn provides power to the crankshaft.
With a saw chain functions similarly to a bicycle chain is turned by rolling elements Those wheels are rotated by the power of the crankshaft. The link is spun from around shaft while the gear rollers rotate, providing enough resistance to cut across hardwood.
The string brake is standard on all current chainsaws, and it prevents the chain from rotating when a backlash happens (a quick push of the blade back toward the user whenever the chain’s tip scratches a heavy surface).
Its crankshaft rotates gears, which also are linked (through with a rotational clutches, as discussed below) to the one of the spur gear over which the chain is placed, and the loop spins round.
The chainsaw is a transportable electromechanical tool used to make teeth linked to a revolving chain that moves along a guide bar. It is used for tree falling, limping, bucking, trimming, cutting firebreaks in wildland fire control, and gathering firewood.
Because of the utility of chainsaws and their broad availability, the industry is well entrenched in both industrialized and developing economies. In recent times, the chainsaw industry has been driven by increased deforestation due to rapid urbanisation and rising commodity demand in developing markets.
The rising use of wood in furniture manufacture, pulp production, and home construction is likely to drive demand. Furthermore, the market is expected to increase significantly during the coming years due to rising demand from industries such as manufacturing
The important for motivation of professional and non-workers on implementing safety requirements to minimise injuries and accidents is propelling the industry forward. Manufacturers in the chainsaw industry are growing and developing innovative products in North America because to rising demand in this area.
Husqvarna, for example, offered a new product range that included two new 70cc saws, two revised 50cc saws, a gas-powered tree care saw, some new equipment needs, and expanded. Furthermore, the shifting customer preference away from traditional gasoline-powered chainsaws further towards eco-friendly options such as battery-powered and electrified chainsaws will push the economy even further.
The Global Chain Saw Market can be segmented into following categories for further analysis.
Chainsaws used to have a significant impact on the lumber and woodland sectors. It is primarily a mobile power tool used to make teeth mounted in an infinite row.
The essential components of a chainsaw are an extended metallic guide bar surrounded by a chain made of saw blades and a gasoline combustion engines. Whenever the piston goes in and out of the cylinder within the engines, it motivates a suspension system that rotates the crankshaft.
Each chain is a little like a bike chain, moving around gear wheels intended to turn metal chain with approximately 30 or so sharp teeth set at intervals around it. Gears attached to the one of the spur gear over which the chain is running and which are wrapped around the most significant benefit of utilizing a chainsaw has been its high speed.
It would be difficult to spend the entire day chopping your way through a woodland with a handsaw, but maybe you can probably accomplish these with a chainsaw.
Furthermore, ongoing technical developments in the chainsaw are expected to boost the target industry’s growth. The growing global population, along with expanding demand for chainsaw in agriculture products like as palm oil, soybeans, and wood products in emerging nations, has fueled the need to create arable land by clearing woods. As a result of rising degradation, the industry for portable chainsaws as a cordless drill for cutting wood is predicted to expand.
ECHO Incorporated announces the addition of three new chainsaws to its lineup: the CS-2511P, the world’s lightest chainsaw, the CS-7310P, ECHO’s most powerful saw ever marketed in North America, and the CS-4910, the lightest 50 cc chainsaw in its class.
The latest saws from ECHO Incorporated, a global leader in professional-grade, high-performance outdoor power equipment for commercial and household use, have more power and professional features than prior models while being lower in weight. Customers, like arborists and landscapers, can do their task more quickly and efficiently as a result of this.
The CS-2511P from ECHO is the world’s lightest gas-powered rear-handle chainsaw with the most power in its class. The Arborist’s Guide is ideal for arborists, farmers/ranchers, hunters, carvers, and homeowners. The ECHO CS-7310P is the most powerful chainsaw the firm has ever offered in North America. It has 13 percent more power than its predecessor, the CS-800P, and weighs 2 pounds less.
It incorporates all of the professional features that professionals want, as well as one of the greatest air cleaner systems in the business, making it a perfect saw for commercial arborists and loggers. The CS-4910 from ECHO is the lightest 50 cc chainsaw on the market, with 22 percent more power than the CS-490.
The CS- 4910 chainsaw is ideal for landscapers, farmers/ranchers, and large landowners/homeowners. It can do a range of activities, including tree felling, limbing, firewood cutting, storm clean up, pruning low-level branches, brush thinning, and fence post cutting.
The 18V X2 LXT (36V) Brushless Cordless 14″ and 16″ Top Handle Chain saws have been introduced by Makita U.S.A., Inc., the industry leader in innovation for cordless power tool technology and outdoor power equipment (models XCU08 and XCU09, respectively).
With the arrival of these two chainsaws, Makita has the most extensive selection of cordless chainsaws. Both chainsaws include an outer rotor brushless motor direct-drive technology manufactured by Makita that has the same power as a 30cc gas chain saw. Delivering 36V of power and performance are two 18V LXT Lithium-Ion Batteries.
To cut up to 25% more quickly than gas chain saws, all that power is harnessed. Cutting performance is enhanced by a variable speed trigger and high chain speed (0-3,940 FPM). The Torque Boost Mode gives the chain saw even more strength to chop through tough, large branches.
Due to the sheer increased development of new homes and structures, the real estate industry is expected to expand significantly. Furthermore, a surge in remodeling as well as retrofitting activities that need the use of drilling rigs, demolishing instruments, and chopping machinery is a key driver of the expansion among these techniques.
As a result of these advantages, the use of power tools is increasing throughout sectors. Heat guns, which are among the most common power equipment, have a wide range of applications in a variety of sectors.
STIHL is one of the leading developers of the power tools in the market. It has brought in the latest technology integrated within its product. The STIHL MS 500i chainsaw is the world’s first to use electronically regulated fuel injection.
The MS 500i is indeed accessible with heated controls. No-maintenance, wear-free heating strips may be fitted from the front and side grips if necessary. It is an exceptional starting with superb combustion characteristics independent of elevation as well as temperature changes, thanks to sensor-controlled fuel dosing.
There is also no beginning lever, therefore making launching very simple under all circumstances. Its engine design is new for chainsaws, as well as the ensuing clever lightweight design results inside the industry’s leading power-to-weight relationship.
Robert Bosch Inc. is also a global scale developer of the power tools for industrial and residential requirements. This tethered Universal Chain is 4.2 kg compact as well as anatomically constructed for optimal user convenience. A robust 1,800 W motor with a chain speed of 12 m/s enables quick cutting.
The small Bosch SDS system allows for tool-free chain post – tensioned and servicing. The automated chain maintenance system is easily refilled thanks to a big side-oriented oil tank with a conveniently connected cover.
A strong kickback brake guarantees a complete chain stoppage for security. That chainsaw is lightweight and simple to manoeuvre, making it excellent for cutting logs, branches, including tree limbs.
© Copyright 2017-2023. Mobility Foresights. All Rights Reserved. | <urn:uuid:22681e47-fb8a-4b97-9b94-8c1b75d88fbd> | CC-MAIN-2023-06 | https://mobilityforesights.com/product/chain-saw-market/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499911.86/warc/CC-MAIN-20230201045500-20230201075500-00420.warc.gz | en | 0.940864 | 1,945 | 3.375 | 3 |
The Secret of Great Reading Comprehension
“You’re the same today as you’ll be in five years except for the people you meet and the books you read.” — Charlie “Tremendous” Jones
What if you could glean more insights and actions from everything you read?
You can, but you need to know the secret of reading comprehension.
The secret of great reading comprehension is thinking.
Is that a no-brainer?
But the real key is how well you follow along and what you think about while reading that makes the difference.
It’s the difference between whether you waste your time or get the value, or at least, understand what you read.
If you have a challenge with paying attention or absorbing what you read, then the technique right here can help you change your game.
And given how much information we process on a daily basis, your results can add up fast.
In How To Study in College, by Walter Pauk shares some specific ways we can be better readers and improve our comprehension by using some simple practices.
See the Words, Give Thought to Ideas
We need a way to “think” about what we read. The challenge is our thoughts tend to wander.
“The secret of good reading comprehension is thinking. You must think the words you see and give thought to the ideas they generate. This sounds simple, but it isn’t. The problem is that they your thoughts tend to wander as you read. When you are thinking about something else, you cannot think about what you are reading.”
Think with the Author as You Read
One way to follow along is to “think with the author.”
“One way to keep your mind on your reading is to recognize and keep yourself aware of the organizational pattern that the author is using. Then you will think with the author as you read. For example, supposed you recognize that a paragraph is organized according to a chronological pattern. Then you would say to yourself, ‘Yes, I see what she’s doing. She’s describing their major events of the Great Depression as they happened, year by year.’ As you focused on the pattern your mind would stay on your reading and you would be thinking about it.”
7 Common Organizing Patterns
Lucky for us, Pauk shares a sample of some common patterns that authors use to organize their information.
- Time / Chronological Pattern. Events are presented in the chronological order in which they happened.
- Process Pattern. Steps or events are presented in an orderly sequence that leads to a desired situation or product.
- Place / Spatial Pattern. Items are presented or discussed on the basis of their locations or their arrangement relative to each other.
- Increasing-Importance Pattern. The most important or most dramatic item in a series is placed at the end.
- Decreasing-Importance Pattern. The most important or most dramatic item in a series is placed at the very beginning.
- Cause-Effect Pattern. This exceedingly important general pattern has such variations as the problem-cause-solution pattern and the problem-effect-solution pattern.
- Compare or Contrast Pattern. Writers compare things, events, or people when they emphasize similarities, and contrast them when they emphasize differences.
How can you turn this into action?
When you read, see if you can identify the organizing pattern that the author uses, and use that to follow along.
I think I learned early on to read books backwards because so many books use the “Increasing-Importance Pattern.” I would jump to the end, see if there was anything worth it, and then read more from there.
Interestingly, on the job, the pattern is reversed. people learn to lead with the most important point or conclusion first (at least the more effective people do.) One name for this approach is the Minto Pyramid Principle, where you lead with your recommendation or conclusion, and then follow with supporting detail, as necessary.
One of my favorite approaches to improving my reading comprehension is to ask, “How can I use this?” or “What’s the point?” or “So what?” By asking how can I use this, I challenge myself to really internalize what I read so that I can turn more insight into action.
You Might Also Like
Image by Liz Poage. | <urn:uuid:5a412875-4f98-41c6-bab1-2ef69ad6dd2a> | CC-MAIN-2015-22 | http://sourcesofinsight.com/the-secret-of-great-reading-comprehension/ | s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207924919.42/warc/CC-MAIN-20150521113204-00000-ip-10-180-206-219.ec2.internal.warc.gz | en | 0.947475 | 925 | 2.578125 | 3 |
Try writing the word wake. First use the circle-
and-stick letters. As you trace the letters, note how
often it's necessary to lift your pencil. The more times
a beginning writer has to lift a pencil, the harder it
becomes to make a legible letter. Now use the D'Nealian
letters. Note how few times you need to lift your pencil
and how smoothly the D'Nealian letters flow.
Circle-and-stick lower-case manuscript. 11
D'Nealian lower-case manuscript. 4 strokes. | <urn:uuid:b41731de-c69d-40bb-82ed-35d11bdf5489> | CC-MAIN-2014-41 | http://www.dnealian.com/compare.html | s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1412037663135.34/warc/CC-MAIN-20140930004103-00081-ip-10-234-18-248.ec2.internal.warc.gz | en | 0.83684 | 119 | 3.234375 | 3 |
Optimus Bio develops environmentally friendly products for the treatment of waste water, aquaculture and agriculture, using CSIR’s proprietary Bacillus database and production technology. “These products have been developed and manufactured locally, with indigenous biologicals, and are providing employment in the biotechnology industry,” says Dr. Lalloo.
Lalloo believes that the competitive nature of Optimus Bio’s products, coupled with an agile manufacturing approach in close collaboration with market partners, would place the company in a strong position to penetrate the markets they are targeting.
The green technology sphere in which Optimus Bio competes is aimed at ensuring food, health and water security solutions that are environmentally sustainable. Examples include special bacteria used in aquaculture that improve fish production and minimise negative environmental impact; improving the quality of life for those in rural areas by remediating neglected pit latrines or maintaining the bio-activity in currently used latrines or septic tank systems; assisting with sustainable agro industries by providing biological methods of pest control and plant growth and contributing towards the broader responsibilities brought by urban effluent load by providing biological products to sewage treatment plants and domestic eco-friendly detergents.
Lalloo stresses that there is wider responsibility behind the creation of Optimus Bio and its product range: “South Africa is facing a water shortage crisis. Inadequate sanitation and water treatment are major contributors to this situation. Both government and the private sector are seeking environmentally sustainable solutions to address this problem. Furthermore, relevant biomanufacturing products can support social and economic growth and job creation whilst assisting with better service delivery.” | <urn:uuid:35038144-3d1d-4432-ab87-7cda5bd5dc6f> | CC-MAIN-2017-13 | http://www.techtransfer.csir.co.za/2014/09/optimusbio-bacterial-fermentation-technology-for-a-greener-planet/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218191353.5/warc/CC-MAIN-20170322212951-00384-ip-10-233-31-227.ec2.internal.warc.gz | en | 0.932667 | 332 | 2.53125 | 3 |
Several techniques are commonly used to get brass instruments looking and sounding their best. If an instrument has fallen into any kind of disrepair, it is best to first disassemble the entire instrument — that is, take it apart piece by piece, according to Dana Hofer Brass Instrument Repair.Continue Reading
Often, instruments appear to be in worse shape than they actually are due to the poor sound or performance quality that they are emitting.
Sometimes instruments simply need a thorough cleaning. Typically, brass instrument repairmen — those who specialize in repairing and cleaning these large, big band instruments — will scrub the insides of the instrument clean until it shines, and then polish. They may also apply a silver application that helps remove any tarnish.
The approach tends to be different with piston and rotary instruments, as they have different parts. When reassembling a piston instrument, felts and corks are usually replaced. Alternatively, when reassembling a rotary instrument, new strings and bumpers are usually required to make the instrument sound better.
In both cases, valve realignment is important. While the instrument is taken apart and laying open on the table, it is easy to take a good look at its interior workings, and to access the valves and slides, which may be causing the majority of the auditory problems. Improperly oiled valves make for an unpleasant sound. Similarly, slides can be greased so they slide more smoothly.
In the case of a more serious disrepair, most repairmen will also be able to replace worn or broken parts, including valves, braces, key corks and springs.Learn more about Musical Instruments | <urn:uuid:fad0813f-90e5-4605-b8c6-8b3743fadafd> | CC-MAIN-2017-47 | https://www.reference.com/hobbies-games/used-repair-big-brass-band-instruments-138ff8bff633642d | s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806586.6/warc/CC-MAIN-20171122122605-20171122142605-00099.warc.gz | en | 0.940165 | 337 | 2.765625 | 3 |
Plants By Type
Fruit & Berry Plants
Posted by on
All About Fruit And Berry Bushes
Fruit trees and berry bushes are known to be more likely to yield in the early days of regular plant growing season, while other plants require less attention as they lie dormant. Dealing with garden plants, has become a popular hobby that many folks have adopted as part of their gardening activities; with the fulfillment achievement of pleasant reaps from the outcome. A Tree Nursery wholesaler is where you can find affordable fruit and berry plants.
Berry bushes, like blueberry bushes are best planted in early spring when the climate is cooler. These fruits tend to favor cool and moist surroundings therefore, once received around early spring, planting them immediately is recommended. If unable to plant them immediately, then it is best to keep them in a cool place or store them in a refrigerator. These bushes are very reliable and enduring; they can be very aggressive by sending up shoots when not needed. On the contrary, fall is a great time for planting garden plants; full-line nursery is normally a recommended place to find them as one would have better, and wider selection to choose from than at garden centers or box stores.
The advantage of dealing with fruit trees is that while other plants are dormant, and demanding less attention during late winter, it has been suggested that this would be the best planting process time, and indulging in all the attention for perfect future fruit crop results. Performing a soil test is crucial to avoid poor quality results. Maintaining and providing adequate moisture, ample fertilizer, and ample weed controller are important factors to endure. This may seem hardy however, taking advantage of the climate makes it that much easier.
As indicated earlier, the bushes are best planted in early spring. Soaking them in water for approximately 3 to 6 hours before planting is extremely beneficial. The width of the hole should enable ample spread of the roots that also need to be covered from sunlight. A weak liquid nitrogen fertilizer can be applied together with some water during the planting process. Mulching during the first year does keep the weeds down and can increase the crop yield.
Positive thinking about all the lovely treats and outcome that the fruit trees, garden plants, and the bushes can yield can offer a boost of encouragement and motivation. Many folks take up the activities as hobbies rather than a grueling task that has to be done and completed. | <urn:uuid:6feffd18-98b4-4eb0-97a0-a64cc6e34f37> | CC-MAIN-2016-50 | http://www.tnnursery.net/fruit-berry-plants/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698541696.67/warc/CC-MAIN-20161202170901-00057-ip-10-31-129-80.ec2.internal.warc.gz | en | 0.96833 | 493 | 2.625 | 3 |
FIT, noun [Latin peto, impeto, to assult, or to Eng. pet, and primarily to denote a rushing on or attach, or a start. See fit suitable.]
1. The invasion, exacerbation or paroxysm of a disease. We apply the word to the return of an ague, after intermission, as a cold fit We apply it to the first attack, or to the return of other diseases, as a fit of the gout or stone; and in general, to a disease however continued, as a fit of sickness.
2. A sudden and violent attack of disorder, in which the body is often convulsed, and sometimes senseless; as a fit of apoplexy or epilepsy; hysteric fits.
3. Any short return after intermission; a turn; a period or interval. He moves by fits and starts.
By fits my swelling grief appears.
4. A temporary affection or attack; as a fit of melancholy, or of grief; a fit of pleasure.
5. Disorder; distemperature.
6. Anciently, a song, or part of a song; a strain; a canto.
FIT, adjective [This is from the root of Eng. pass; pat. In Latin competo, whence compatible, signifies properly to meet or to fall on, hence to suit or be fit from peto. This is probably the same word. The primary sense is to come to, to fall on, hence to meet, to extend to, to be close, to suit. To come or fall, is the primary sense of time or season.]
1. Suitable; convenient; meet; becoming.
Is it fit to say to a king, thou art wicked? Job 34:18.
Wives, submit yourselves to your husbands, as it is fit in the Lord. Colossians 3:18.
2. Qualified; as men of valor fit for war.
No man having put his hand to the plow, and looking back, is fit for the kingdom of God. Luke 9:62.
FIT, verb transitive
1. To adapt; to suit; to make suitable.
The carpenter - marketh it out like a line, he fitteth it with planes. Isaiah 44:1.
2. To accommodate a person with any thing; as, the tailor fits his customer with a coat. The original phrase is, he fits a coat to his customer. But the phrase implies also furnishing, providing a thing suitable for another.
3. To prepare; to put in order for; to furnish with things proper or necessary; as, to fit a ship for a long voyage. fit yourself for action or defense.
4. To qualify; to prepare; as, to fit a student for college.
To fit out, to furnish; to equip; to supply with necessaries or means; as, to fit out a privateer.
To fit up, to prepare; to furnish with things suitable; to make proper for the reception or use of any person; as, to fit up a house for a guest.
FIT, verb intransitive
1. To be proper or becoming.
Nor fits it to prolong the feast.
2. To suit or be suitable; to be adapted. His coat fits very well. But this is an elliptical phrase. | <urn:uuid:076a8a41-2753-40fc-bfc4-133314767d13> | CC-MAIN-2022-05 | http://webstersdictionary1828.com/Dictionary/fit | s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304570.90/warc/CC-MAIN-20220124124654-20220124154654-00015.warc.gz | en | 0.918825 | 711 | 2.6875 | 3 |
World AIDS Day 2017
What is World AIDS Day?
World AIDS Day takes place on the 1st December each year. It’s an opportunity for people worldwide to unite in the fight against HIV, to show support for people living with HIV, and to commemorate those who have died from an AIDS-related illness. Founded in 1988, World AIDS Day was the first ever global health day.
Why is World AIDS Day Important?
Over 46,985 people are living with HIV in the Philippines. Globally, there are an estimated 36.7 million people who have the virus. Despite the virus only being identified in 1984, more than 35 million people have died of HIV or AIDS, making it one of the most destructive pandemics in history. Today, scientific advances have been made in HIV treatment, there are laws to protect people living with HIV and we understand so much more about the condition. Despite this, each year in the Philippines around 1,400 people are diagnosed with HIV, people do not know the facts about how to protect themselves and others, and stigma and discrimination remain a reality for many people living with the condition. World AIDS Day is important because it reminds the public and government that HIV has not gone away – there is still a vital need to raise money, increase awareness, fight prejudice and improve education.
My Health, My Right (#myrighttohealth campaign)
This year’s World AIDS Day campaign will focus on the right to health. The campaign, focuses on the right to health and explores the challenges people around the world face in exercising their rights.
“All people, regardless of their age, gender, where they live or who they love, have the right to health,” said Michel Sidibé, Executive Director of UNAIDS. “No matter what their health needs are, everyone requires health solutions that are available and accessible, free from discrimination and of good quality.”
The right to health is the right of everyone to the enjoyment of the highest attainable standard of physical and mental health, as enshrined in the 1966 International Covenant on Economic, Social and Cultural Rights. This includes the right of everyone, including people living with and affected by HIV, to the prevention and treatment of ill health, to make decisions about one’s own health and to be treated with respect and dignity and without discrimination.
The #myrighttohealth campaign will provide information about the right to health and what impact it has on people’s lives. It will also aim to increase the visibility around the need to achieve the full realization of the right to health by everyone, everywhere.
What should I do on World AIDS Day?
World AIDS Day is an opportunity to show solidarity with the millions of people living with HIV worldwide. Most people do this by wearing an HIV awareness red ribbon on the day. You can also get tested for HIV and other STIs for free or share our videos to inspire someone get tested.. World AIDS Day is a great opportunity to raise money for LoveYourself/TestMNL, which will help to champion the rights of people living with HIV in the Philippines. Visit our fundraising page, or contact someone in the fundraising team for more information.
But what about after World AIDS Day?
World AIDS Day may be once a year, but you can still support people living with HIV all year round. Follow our Facebook page to stay up-to-date with new developments in HIV and Testing in the Philippines, and learn how you can get involved as a volunteer. You can also support our work by donating to LoveYourself/TestMNL. We rely on your support to continue championing the rights of people living with HIV. | <urn:uuid:f67f5029-7c2f-4492-8456-5f2af9ceb260> | CC-MAIN-2018-17 | https://www.testmnl.org/en/news/world-aids-day-2017 | s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945111.79/warc/CC-MAIN-20180421090739-20180421110739-00403.warc.gz | en | 0.961489 | 755 | 3.296875 | 3 |
Assisting Native Species on the Campus of Mundelein Seminary
When you visit the University of Saint Mary of the Lake/Mundelein Seminary, a beautiful mix of nature and human construction greet you. The wrought-iron and brick gate opens to a pathway lined with young trees, and if you look to your right, you might spot a small but important addition that is helping native species continue to take flight.
Over a dozen uniquely crafted birdhouses have dotted the landscape since 2012 – the careful creation of Roger Kratz, a Mundelein native who used to sneak on to campus as a kid, but now dedicates his time and talent to helping bluebirds, chickadees, and tree swallows thrive on that same land.
“I have always loved the seminary and appreciate how much pride their team takes in preserving the property,” Kratz said. “My background is health insurance, but I took a special interest in birds after talking with a friend who implemented and monitored birdhouses in the Lake County forest preserve. Installing and monitoring these birdhouses not only helps the native birds grow in number, but also enhances the beauty of a visitor’s experience.”
Saint Francis of Assisi is well-known for having a special place in his heart for all wild creatures, and would have found himself at home on campus. Indeed Mundelein Seminary is a place where many species of birds are spotted on a daily basis. Birds native to Illinois, like cardinals and bluejays, but also migrating travelers can be seen near the large campus lake. The rhythmic tapping of woodpeckers and distinct call of owls can be heard at various times of day, and birds of prey have even found a convenient lookout atop the steeple of the Chapel of the Immaculate Conception.
In 2017 Roger installed his newly designed and patented birdhouses on campus with unique features to help keep nests cool and safe from ants, raccoons, snakes, and wasps. Weekly monitoring is made possible with the addition of a recently designed smartphone slot that allows Kratz to take pictures of nesting progress without harming any inhabitants. A nest is built, eggs are laid, then hatched, and baby birds leave the nest in a matter of weeks. By keeping track of their progress, Kratz helps clear the houses to make way for new broods. In total, over 521 birds have been born inside of these installed birdhouses.
Each bird has distinct materials used in their nests, which help Kratz identify the inhabitants during his monitoring. Bluebirds favor pine needles, Chickadees use moss, and Swallows use feathers to top their nests. Invasive European house sparrows are dangerous to native birds, but their signature messy nests are cleared out of the houses so native birds can thrive. Weekly tracking data is available by following this link. The location of birdhouses can be found on this map.
The private campus welcomes visitors from 9:00 a.m. – 5:00 p.m. daily. On occasion, visitors have mistaken the birdhouses as collection boxes and pushed dollar bills inside. Those donations, while appreciated, are better left at the Welcome Center on campus or at usml.edu/give. | <urn:uuid:45ed1615-dcbd-4a5a-9d11-e944f4ae4fb3> | CC-MAIN-2020-40 | https://usml.edu/birdhouses-assist-native-bird-species-campus/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400279782.77/warc/CC-MAIN-20200927121105-20200927151105-00452.warc.gz | en | 0.96161 | 671 | 2.65625 | 3 |
Have you ever seen someone and thought to yourself how they became such an effective leader? Perhaps you are curious as to what it takes to have great leadership skills? Maybe you arrived here because you want to develop your own leadership abilities. No matter why, if you desire to read about effective tips about leadership then continue to the following article.
Allow ample opportunity for your employees to offer feedback and new ideas. Although group meetings are the ideal setting for exchange of information, some employees may not feel confident offering opinions in such a public forum. Work with employees individually as well. This will help you gain trust and get some honest feedback.
One of the most important aspects of any leader is the ability to create a sense of trust among their employees. Employees who trust their supervisor are willing to do more to help the company succeed than those who do not trust their supervisors. Always be truthful when dealing with employees.
Don’t make the mistake of ordering people around. That is not true leadership. The key to true leadership is to inspire those around you. You need to help them find their own voices, so that they can go on to lead others. The entire journey they take with you is about their ability to know themselves better.
Give people reasons to trust you. As a leader, it’s important that you are trusted. When that happens, people are more likely to follow you and to do what you ask of them. Make sure you keep your word, and say what you truly think. People will respect you, trust you and follow you.
Being a good leader doesn’t just mean that you lead others. You also need the skills to lead yourself. Leading yourself by staying motivated and focused can also set a great example for others. Make an effort to become a working part of your organization and not just delegate tasks to others.
Understand the business you are in. Unfortunately there are many leaders out there who don’t get their business totally. Whether that’s because they inherited the business or they just no longer care, it doesn’t matter. It reads the same to employees. How can you lead if others don’t trust that you have the knowledge to do so?
As a leader, or manager, your team is your greatest asset. And, they know the business better than anyone. Try carrying a journal, or notebook with you at all times. Use it to write down any information, ideas and problems you hear from the team. Then, each week, go over your notes, and see what you can do to implement good ideas, and solve any problems you may have encountered.
As you can see, leadership is something that needs to be developed the right way in order to effective. The article here presented you with the necessary skills to help you understand the process of becoming a leader. Anyone can lead, including you if you’re willing to do so. Use the tips here to get a leg up on becoming that true leader. | <urn:uuid:ccabc036-507d-4c46-80c1-c46384d646f8> | CC-MAIN-2019-39 | https://approvedsupplieraudit.org/tag/leadership | s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573439.64/warc/CC-MAIN-20190919040032-20190919062032-00523.warc.gz | en | 0.971482 | 610 | 2.625 | 3 |
What Is a Dystopian Narrative?
Dystopian narratives give us a picture of a less-than-ideal future. On the surface, the society in the narrative may seem to be a utopia -- a perfect place to live -- but the people in the future society typically are under propagandistic and totalitarian rule. A dystopian narrative also involves criticism of a current trend, society or political system.
The people in a dystopian society are controlled through some force or entity, whether it is corporation, bureaucracy, technology, philosophy or religious ideology. Dissent is not tolerated, and everyone is expected to conform to society's rules. Propaganda and fear are used to keep everyone in line. Most importantly, individuality, freedom and independent thought are severely limited. Despite these conditions, at least one character realizes something is wrong and takes action as a result. Dystopian narratives can be prose or film. Examples include "1984," "Brave New World," "The Handmaid’s Tale," "Fahrenheit 451" and "The Hunger Games" trilogy. | <urn:uuid:54fbe8d4-24a4-4328-9d8b-117501d16609> | CC-MAIN-2020-50 | https://classroom.synonym.com/dystopian-narrative-22187.html | s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141735600.89/warc/CC-MAIN-20201204101314-20201204131314-00046.warc.gz | en | 0.937584 | 218 | 3.1875 | 3 |
The research is important because it describes a promising new tool for tracing human gene connections, a task critical for understanding and treating cancer and other diseases. Results appeared this week in the online edition of the Proceedings of the National Academy of Sciences.
"Genes influence one another in many intricate ways," said Leon Cooper, professor of physics and neuroscience and director of the Institute for Brain and Neural Systems at Brown. "What we need is a map, or network, of these links. What we've identified in this project is a more effective method for making this map."
The research team ?which included scientists from the fields of biology, physics, statistics and computer science at Brown, Università di Bologna in Italy and Tel Aviv University in Israel ?set out to answer a question. When a deadly "oncoprotein" is switched on, what chain reaction of gene activity does it set off?
The protein, c-Myc, causes cells to multiply. If the protein is produced unchecked, it can cause breast, colon and other types of cancer. C-Myc contributes to more than 70,000 deaths in the United States each year.
Once the c-Myc switch is thrown, thousands of other genes start pumping out proteins or switching on other genes, which activates still more genes. One way to study this web of connections would be to set off the chain reaction and study it over time. To make that happen, Brown researchers came up with a clever experiment.
John Sedivy, a long-time c-Myc researcher and the director of Brown's Center for Genomics and Proteomics, developed rat cells that lacked the c-Myc gene. These cells were further modified to make a form of the c-Myc protein, which could be switched | <urn:uuid:b1ecaff4-e319-41b2-ba9a-111655155067> | CC-MAIN-2015-32 | http://www.bio-medicine.org/biology-news/Researchers-develop-promising-new-gene-network-analysis-method-928-1/ | s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042988250.59/warc/CC-MAIN-20150728002308-00253-ip-10-236-191-2.ec2.internal.warc.gz | en | 0.937735 | 364 | 3.59375 | 4 |
Wolves in Oregon
January 13, 2015, New wolf activity in southwest Cascades
ODFW has documented new wolf activity in the southwest Keno Unit (in the southwest Cascades on a mixture of public and private lands).
Evidence of at least one wolf has been collected twice over the last month. This area is in a part of the state where wolves are protected by both the state and federal Endangered Species Act.
Repeated sign of a wolf requires that the agency designate an Area of Known Wolf Activity (AKWA), and ODFW will complete that next week.
The area this new wolf is using lies within the already established AKWA for the Rogue Pack (OR7), but data on OR7 and the Rogue Pack shows no use of this area recently. The Rogue Pack AKWA will soon be adjusted to reflect its current use area.
Little is known of this new wolf (e.g., sex, age, origin, other wolves) and efforts to gather additional data will be made by both ODFW and US Fish and Wildlife Service.
December 17, 2014, New Area of Known Wolf Activity – Desolation Unit
A new Area of Known Wolf Activity (AKWA) has been designated by ODFW in the northern portion of the Desolation Unit (Grant and Umatilla County). On December 15, 2014 tracks of two wolves were documented by ODFW biologists in this new area. Irregular reports of wolf activity have been received over the past year in this general area of National Forest, and biologists documented two instances of a single wolf earlier in the year. However, AKWAs are created where and when wolves have become established, meaning repeated use of an area over a period of time by wolves and not simply dispersal of wolves.
At this time, ODFW has little data regarding the specifics of this new pair (i.e., sex, breeding status, and specific use area) and additional surveys will be required to get this information. | <urn:uuid:38b1b865-b7e4-4303-aa76-daf20ff0f053> | CC-MAIN-2017-13 | http://canislupus101.blogspot.com/2015/01/updates-for-wolf-activity-in-oregon.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189127.26/warc/CC-MAIN-20170322212949-00002-ip-10-233-31-227.ec2.internal.warc.gz | en | 0.953257 | 407 | 2.71875 | 3 |
This paper describes skating locomotion in a straight line based on continuous contact of rollers with the surface. Two skates traverse in and out while changing their orientation. Net traction force is generated because of no-slip conditions of rollers at the contact. The two skates are in continuous contact with the surface and therefore the balancing problem is circumvented. Different designs are developed and evaluated in order to replicate the desired motion. A heuristic-based architecture is developed to move the robot in a straight line. | <urn:uuid:2a35fdaa-e20c-47d3-b474-3794d7e20381> | CC-MAIN-2022-49 | https://asmedigitalcollection.asme.org/autonomousvehicles/article-abstract/1/2/021002/1098839/Design-and-Development-of-a-Mobile-Platform?redirectedFrom=PDF | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710933.89/warc/CC-MAIN-20221203143925-20221203173925-00731.warc.gz | en | 0.943312 | 105 | 2.765625 | 3 |
So, what is the Macrobiotic diet? Like all new diet trends, it is not really that new and is very loosely based on Japanese and Buddhist philosophies balancing the yin and yang elements of food. Needless to say, it is a reported hit with Madonna and Gwyenth Paltrow. Sounds very hippy and Hollywood, undoubtably the 2 most important elements for a diet fad…
Put simply the Macrobiotic diet focusses on unprocessed foods and the consumption of vegetables and grains as opposed to animal based food. Whilst not strictly vegan (some animal products such fish are allowed) it follows similar principles.
image via pinterest
A “typical” Macrobiotic diet includes:
– Wholegrains – often, eg: brown rice, millet, rye, spelt.
– Vegetables – with every meal, eg: Asian veg, broccoli, cauliflower, red cabbage.
– Beans – once a day eg: black soybeans, Azuki beans, chick peas
– Tofu and tempeh – regularly (organic and non GM of course)
– Fish – 2 to 3 a week
– Seeds and nuts – 1 to 2 cups a week
The Macrobiotic diet also advocates the consumption of only eating seasonal produce and portion controlled meals.
The Macrobiotic diet has a lot of good quality complex carbs, high fibre, low fat foods that make you feel fuller for longer and are full of easy to absorb nutrients. According to Macrobiotic practitioners these foods are in harmony with nature and therefore easier for your body to process and digest.
This diet also focusses on wellbeing rather than on body image and is designed to be part of a lifestyle rather than a quick fix.
Another pleasing element is the lack of reliance on processed, pre-prepared food with questionable nutritional benefits.
Macrobiotic diet does not include (or advises only sporadic inclusion at best) red meat, tropical fruit, chicken or dairy. They are considered too yin for the body resulting in stagnation of energy or the vital life force called chi. Excluding these foods however does make it difficult to absorb certain essential nutrients such as calcium, vitamin B12, D and iron to name a few.
This diet plan could not be considered balanced particularly to those with certain nutrient deficiencies. In addition, the strictness of the diet does make it difficult to sustain particularly as certain cooking modalities are prohibited or restricted such as roasting and microwave use.
It is best to consult a medical professional prior to undertaking any major diet changes as we are not all the same and what works for one may not work for the other.
As with everything, the changes you make should be focussed on health and should be sustainable. | <urn:uuid:508a6bfb-7ef7-47c1-b57d-f0d489e8a18c> | CC-MAIN-2021-21 | https://rescu.com.au/what-is-the-macrobiotic-diet/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991178.59/warc/CC-MAIN-20210516171301-20210516201301-00136.warc.gz | en | 0.94673 | 570 | 2.53125 | 3 |
From an outsider's perspective, the divisions in U.S. politics are subtle, even indistinguishable
ReutersWe live in a highly polarized age, where Americans have sorted themselves into two partisan tribes of left and right. It's strange, then, that the United States is probably the most ideologically united country in history.
Americans have a national ideology, and it's called liberalism. This doesn't mean we are left-wing, it means we believe in a set of principles rooted in the ideas of John Locke: democracy, limited government, republicanism, self-determination, the rule of law, equal opportunity, and free expression. To be American is not to claim a particular ethnicity, but to profess the liberal creed. The Declaration of Independence set out a promise of human rights and equality that many Americans assume is universally desired, and serves to unleash the potential of the human spirit.
For sure, we argue, sometimes violently, over the meaning of liberal principles and how to promote them. But remarkably few Americans question the basic assumptions. We are indoctrinated so profoundly that we don't even realize we are ideologues. Liberalism just seems like the natural order of things.
Imagine a room full of Communists who are furiously debating the meaning of Marxist ideas. Shouting and screaming, the Communists would see themselves as deeply divided. But to an outsider, things might look very different: This is a room full of ideologues who all share the same basic view of the world.
In the same vein, people in the United States are struck by what divides Americans. But foreign observers often see, instead, what unites Americans. In Democracy in America, Alexis de Tocqueville wrote that he knew "of no country where there is generally less independence of thought and real freedom of debate than in America. ... The majority has staked out a formidable fence around thought. Inside those limits a writer is free, but woe betide him if he dares to stray beyond them."
Are we really saying that Americans are ideological in the sense that the Soviet and Chinese Communists were ideological? Of course not -- that would be ridiculous. Americans are far more ideological. In other words, liberalism is deeper-rooted and more universally accepted in the United States than communism was across the seas.
The Soviet and Chinese Communists imposed a communist
ideology on top of pre-existing nationalist identities. During the 1980s and
1990s, it proved fairly easy for Russians and Chinese to abandon Communism and
embrace the free market.
But America's ideology is its identity, and would be incredibly difficult to cast off. Russians without Communism are still Russians. Americans without liberalism have no idea who they are.
America's ideological unity is just as important as any ideological division. As Louis Hartz wrote back in the 1950s: "it is a remarkable force: this fixed, dogmatic liberalism... It is the secret root from which have sprung many of the most puzzling of American cultural phenomena."
Liberal idealism forges the nation's sense of optimism.
Henry Kissinger observed that "for other nations, utopia is a blessed past
never to be recovered; for Americans it is just beyond the horizon."
At home, the liberal hegemony helps to explain the difficulty that socialists have faced getting a foothold in the United States.
Abroad, the ideology of liberalism transforms America's wars into crusades to spread our values, whether it's saving the world for democracy in World War I, fighting for the "Four Freedoms" in World War II, or building a beacon of liberty in the Middle East by invading Iraq.
Tea Partiers, union organizers, Republicans, Democrats, truthers, birthers -- Americans are a diverse lot. But everyone's looking at the stars. For Alexander Hamilton once said that liberal principles are inscribed in the heavens by the hand of God. We all agree that the celestial constellations should guide our national voyage, even while we vigorously debate the precise images formed by the stellar lights. | <urn:uuid:2031e65b-091b-4f33-8515-ef6e77733fc8> | CC-MAIN-2015-22 | http://www.theatlantic.com/national/archive/2011/08/why-are-americans-so-ideologically-united/243951/ | s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207925201.39/warc/CC-MAIN-20150521113205-00068-ip-10-180-206-219.ec2.internal.warc.gz | en | 0.954313 | 816 | 2.640625 | 3 |
TRUANCY AMONG SECONDARY SCHOOL STUDENTS IN EBONYI SOUTH EDUCATION ZONE
TRUANCY AMONG SECONDARY SCHOOL STUDENTS IN EBONYI SOUTH EDUCATION ZONE
The School is a social unit established by members of the society as a formal agency of education in which the young (students) attend to learn about themselves, other people, as well as the language, custom, attitude and the ways of doing things. To place an order for the Complete Project Material, pay N5,000 to GTBank (Guaranty Trust Bank) Account Name – Chudi-Oji Chukwuka Then text the name of the Project topic, email address and your names to 08060565721.
To place an order for the Complete Project Material, pay N5,000 to
GTBank (Guaranty Trust Bank)
Account Name – Chudi-Oji ChukwukaAccount No – 0044157183
Then text the name of the Project topic, email address and your names to 08060565721.
Staying in school is the first step to a good education and in order to achieve academic excellence, the students are mandated by the school laws to attend school daily but due to some factors (which work will unravel) most students absent themselves from formal school activities hence engaging in truancy. When this happens, every one loses; students lose the benefits of instruction, the society loses income and the community suffers from increase juvenile crime.
Historically, the origin of truancy can be traced to the Massachusetts compulsory Education Act of 1647 and its subsequent school Attendance Act of 1852, which forced parents to send their children for at least 12 weeks in a term (Michael, 2005).
To this Act, every school is by law required to notify any student who acquires five unexcused absence within a school year.
However, it is through this unexcused absence from school without legitimate or legal knowledge of parents, guardian or the school that truancy among students came into being. Conceptually, the term “Truancy” has been defined in various ways by different people and agencies such as counsellors, psychologist, sociologist, welfare Authorities and Educators in general.
Stoll (2002) defines truancy as “absence from school for no legitimate reason”. He went further to state that many students do skip either single class or even a full day school at least once during their academic career. This is because they may want to attend a special event, prepare for promotion night or simply take what is known in the world of work as a “Mental health day”. This Isolated incidence (truancy) is quite typical and likely to create problems which can lead to varied set of negative and even more dangerous consequences.
Peninsky (2000) wrote that when a child is a truant, it implies that he has been constantly absent from school for so many days, weeks or even moths. Truancy, he further explains is a deliberate absence from school for no medial or justifiable reason, with or without parental knowledge. Peninsky’s explanation of truancy agrees very well with the definition given in Collin’s English dictionary in which a truant is described as one’s absent from duty without leave especially children who absent themselves from school. In the same manner, Nwana (2004) explained truancy to include Intentionally absenting of oneself from school without permission, leaving without authorization and dodging of specific lesson periods.
Truancy on academic in secondary school is a situation in which students develop and show adverse attitude and behaviour to learning. They absent themselves from classes using unnecessary excuses such as in genuine sickness, fake suspension by the class teacher or school authority and involvement in sport activities. Truancy can equally occur in a boring and boredom classes, harsh teachers who are difficulty to approach and in an unconducive school environment (Osarenren, 1999)).
The causes of truancy among secondary school students have been attributed to lack of writing materials such as pen, pencil, exercise book, recommended text books, school uniform and midday meal (Obe, 1998).
The government is also another major cause of student truancy. This is attributed to the fact that Government do not pay teachers regularly and most of their allowance such as leave allowance, sport and science allowance etc are being withheld, most teachers find it difficulty to be committed and dedicated to their primary duties of teaching.
When this occurs and the students do not find their teacher in the class, the next plan of action is truancy. It is common these days to see students roaming about in streets during school hours. Such act has often been followed by incidence of aggressiveness and other terrible negative actions.
Some parents due to the nature of their jobs, show nonchalant attitudes to their wards and as such, they grow up to be corrupt and aggressive hence getting nothing and giving out nothing. Most parents do give too much money to their wards thus contributing to their truant behaviours.
Also, with the breakthrough in the Information Communication Technology (ICT) which led to the emergence of Internet system in the World Wide Web. The use of internet system, though very beneficial to students, especially in the areas of research work as it provides them with a medium of Interaction with renowned scholars and authors whom they wouldn’t have ordinarily met in their life time. Conversely, internet system have equally contribution much to the promotion of truancy among secondary school students. This is because most students especially those in secondary school do abandon their lessons to visit Internet cafes thereby spending much of their valuable time and resource only to visit pornographic sites and some other sex related sites which will in turn ruin their lives thereby increasing the rate of immoral behaviour among youths in our society (Shyam, 2006).
The introduction of Internet use had denied students the chance of thorough research work as ready-made materials are readily found on the Internet. This makes them to lack the in-depth knowledge about the object of inquiry hence resulting to “educated illiterates” (Pam Willenz, 2006).
All these have drastically reduce the level of students academic performance in both Internal and external examinations. Below is a review of students performance on six subjects in west Africa Examination Council between 2000 to 2003 in one of selected secondary school in Ebonyi South Educational zone(Onicha Technical College, Enuagu Onicha).
STATEMENT OF THE PROBLEM
The objective of secondary school education in Nigeria is to provide students with academic and vocational skills as well as moral ethics, but it is quite unfortunate that these objectives have not been fully achieved due to the high level of students involvement in truant behaviours. Due to this, this study aims at investigating truancy among secondary school students in Ebonyi South Educational zone.
PURPOSE OF THE STUDY
The main purpose of this study is to examine truancy among secondary school students in Ebonyi South Educational zone. The research will further look into the following specific purposes:
- To determine the causes of truancy among secondary school students.
- To ascertain the extent to which truancy affects students academic performance.
- To find out how truancy manifest among secondary school students.
- To determine the effect of truancy on the society.
SIGNIFICANCE OF THE STUDY
It is hoped that the result of this study will be useful to the followings:
- To school administrators; this study, will examine the various causes and consequences of truancy and state the ways of curbing it which will serve as a vital instrument for effective school administration.
- To parents; the study will equally give parents an insight on how and why their wards engage in truancy.
- The study will also be of immense value to Graduate and undergraduate students who are studying administration in the field of education as it will give them an insight on how to handle truant students.
- The Study will also help in the discovery of the fundamental aspects of truancy that is mostly found among students. With this, proper guidance and counseling will be giving to them to enable them make the best out of education.
To guide the proper conduct of this study, the following research questions were raised.
- What are the causes of truancy among students in secondary school?
- To what extend does truancy affect the academic performance of secondary school students?
- What are the ways through which truancy can manifest in students?
- What are the effect of truancy on the society?
SCOPE OF THE STUDY
This research is designed to cover Ebonyi South Educational zone of Ebonyi state. This study centres on truancy among secondary school students, it is mainly limited to public secondary school students in Ebonyi South Educational Zone of Ebonyi State.
REVIEW OF RELATED LITERATURE
The review of related literature is presented under the following sub-headings:
- Concept of truancy
- Types of Truancy.
- Truancy as a disciplinary problem in secondary schools.
- Causes of Truancy.
- Effects of Truancy
- Suggestions for reducing truancy
- Empirical studies.
- Summary of Review of Related Literature.
CONCEPT OF TRUANCY
The term truancy has been conceptualised by different authors in different ways. According to the International Dictionary of Education (2002), truancy is defined as a “deliberate absence from school without parental knowledge”. In the same manner, the New Western Comprehensive Dictionary Special Price Edition (2004), said that truancy is “when a student stays away without permission, anyone who absent himself from work or duty without good reasons, the knowledge of the authority” . The above definitions are in agreement that truancy occurs when a student absents himself from school without due permission either from parents or from the related authorities.
On its popular meaning Carter (2000) considers truancy as a:
deliberate absence from school on the part of the pupil without the knowledge and consent of parents; absence of the pupil from the school for which no reasonable or acceptable excuse is given (this latter concept broadens the definition considerably and makes it synonymous with unexcused absence.
Similarly Adeyemo (1999) defines truancy, as a delinquent act which occurs when “a child often stays away from the school without good reasons”.
These definitions indicated certain elements of truancy that must be stressed and in order to have a proper understanding of the concept. Carter’s definition carries the implication that the act of truancy is deliberate and that the reason for absence is invalid from the view points of parents and school authorities and not from that of the truant.
TYPES OF TRUANCY
There are three types of truancy which are as follows:
- Habitual Truancy
- Occasional Truancy
- Casual Truancy
This is the type of truancy that occurs when a student (truant) constantly and continually absent from school without the due knowledge or consent of his parents and school authorities. Habitual truants are mainly those students who miss numerous full days of school academic activities. Their frequency of absenteeism have become a regular behaviour or habit. It is important to note that students who are habitual truants have high chances of falling behind in their school work, decline in their academic performance and even lose their attachment or positive attitudes towards school (Ezeani, 2006).
This type of truancy occurs when a student does not constantly and continually absent himself from school. In this type of truancy, the student’s level of absenteeism from school without the permission of parents or school authority is irregular or not regular. For instance a child whom the mother refuse going to school and was kept at home to help care for siblings, and the child taken out of school for an out-of-season family holiday e.t.c are all instance of occasional truant (Ezeani, 2006).
This is the type of truancy which occurs when the students absence from school is by chance. This type of truancy or unexcused absence from school is not regular and constant but happens by chance. For instance students who remained lurking within sound of the school bell, so that they could attend those lessons, which interested them (Ezeani, 2006).
TRUANCY AS A DISCIPLINARY PROBLEM
In every human society, there are norms and values which are socially and morally accepted ways of doing things within a societal set up. But in a situation where a person’s behaviour contradicts the accepted societal ways of doing things then such a person is regarded as a law breaker, a deviant or delinquent (Bolarin, 1999).
In the present day Ebonyi State, truancy as a delinquent act is commonly indulged in by both adults and young people. Just as some able bodied adults who are gainfully employed roam about the streets and absent themselves from work for no genuine reason – So also do some school children roam about the streets thus absenting themselves from school or classes regularly without concrete reasons or permission from the related school authorities. However, the problem of truancy is the most common among the youths and this is regarded as a child lacking “discipline”.
Discipline as a concept is very important in the practice of education. A learner who lacks self-discipline can not learn effectively. Discipline in the words of Adesina (1998) is referred to as when students are taught to respect the school authorities, to observe the school laws, regulations and to maintain an established standard of behaviour.
Uka (2003) sees discipline in modern classroom management as the provision of a suitable environment for pupils to develop self-control, orderliness, good conduct, co-operation and the habit of getting the best out of themselves during and after school life. More so, both the English Reader’s Dictionary (2002) and the Oxford Advanced Learner’s Dictionary (2004) concurred that discipline is the training especially of the mind and character to produce self-control, habit of obedience e.t.c.
However, a child who lacks discipline is regarded as being indisciplined. Indiscipline is one of the serious social problems facing Nigerian schools in general and Ebonyi State in particular and the aspect of indiscipline that is of greatest concern in the present day school students is “truancy” (this concept has been clearly explained in the earlier part of this work).
At the National Conference on Discipline and Motivation in schools held in 1999, Abia, Jatau, Ojomo, Ibrahim, Shakaraom, and Oloko pointed out the following factors as causes of indiscipline in Nigeria schools; the home, prevailing situation in the society, the school physical facilities, teachers and school administrators, peer group, security agents, ineffective teaching, authoritarian methods of administration and policy makers. As regards the above causes of indiscipline, parents are required to speak seriously to their wards on the effects of indiscipline especially truancy and lateness.
In the words of Ehimmora (2001), he stressed that truancy is an age-old aspect of indiscipline which brings the school authority into disrepute and in addition ,the unofficial coming and going of children at others times other than normal school day, naturally brings about indiscipline and interrupts normal school routine.
On the reasons why secondary school students absent from school without permission from appropriate authorities, Tyerman (2005) suggest four reasons why truancy as an indiscipline act occurs;
- 1. As a result of illness – the child who is sick may be deliberately kept at home. Most parents having kept the children at home in good faith will not think it necessary to inform the school authority.
- 2. Parents withdrawal – In this case, a child is kept away from school by the parents for their own purpose, maybe to help them in household chores/business.
- 3. The child absents himself in his own volition – in this case, the child absented himself without the permission of parents or school.
- 4. School phobia – In this case a child seems to be afraid of going to school or leaving his home, yet his parents are anxious for him to attend school regularly.
In all, truancy as a disciplinary problem cannot be left unchecked because of the likely effect it could have on the future truants. Healy (2006) states rightly that truancy is the kindergarten of crime. If a school child finds that he can avoid going to school without any serious repercussion, he will sooner or latter believe that he can succeed in other offences. His idleness while playing truancy will set the scene for other crime such as stealing of money and goods. For the problem of truancy as an indiscipline act in schools to be solved, all the related institutions that are involved in child upbringing such as the family, church and school must play active roles.
CAUSES OF TRUANCY
The problem of secondary school truancy in recent times is so alarming and if the issue is not properly handled would greatly affect the effort of government in achieving the objectives of secondary education which so much resources has been spent on. On the causes of truancy, authors differ in their opinion as regards the factors that are responsible for truancy. Evidence from reviewed related literature has indicated that the following factors such as; poor home upbringing, school circumstances, psychological and personality factors, socio-economic situation of the students and societal demands, influence of peer group, social and government influence/factors are the major causes of truancy.
Tracing the causes of truancy back to home upbringing, Cronbach (1998) writes”… the truants came from unsatisfactory home situation, families on relief, broken home and the like”. In the same vein, Ezekwugo (2005) comments that training of children starts from home, and where this is properly done, the foundation laid at home, the school will not find it difficult to continue the education properly.
Furthermore, authors stress that in most cases, the seeds of truancy are laid at home. Odueze (2001), asserts that for education to be real and effective, “there should be sound co-operation between the home and the school.
This view is supported by English (1999) who wrote:
what children need most are parents who can control them. Many are over privileged by been permitted to do as they please. Children who demand too much of their parents, demand too much of the society. The adult should exert control over children and also to mean the orderly and obedient behaviour that this control is designed to secure.
Still relating home upbringing to students’ school behaviour, Shaw as reported by Odueze (2001) states:
Whilst few of us would doubt that the main influence on a child’s life is his home, that of school is a good second, the closer the co-operation between these two, the happier must be the child and the more successful his development in every aspect.
Although, he brings in the idea of punishment, Odueze emphasizes parents’ role in the treatment of a truant. He, in one breath asserts that “corporal punishment leads to truancy in school and therefore results in acts of indiscipline”. And in another breath he holds that punishment should be given to a child but by the parents. This last assertion suggests that the teacher and the parent operate together in the school and that the duty of the parent is to punish the truant while that of the teacher is to teach.
Carter (2000) Crobach (1998), English (1999), Odueze, (2001) and Ezekwugo (2005) indicated that the seed of truancy is laid at home. Poor home upbringing may manifest itself at school in the form of truancy. They emphasise the need for sound co-coperation between the home and the school for any serious and fruitful tackling of the problem of truancy.
In a study carried out by Ogunwe (2003), he pointed out how school factors could contribute to the problem of truancy. To him, some teachers have been found to be very hostile to the children put under their care. Some have been found not to have interest in teaching as a career, some were found not to be attending classes regularly thereby giving room for children to skip classes and develop the habit of truancy while some teachers have been found to be fond of punishing students for all offences they commit thereby scaring some of them from attending school regularly.
In another study carried out by Ehinmolo (2006) on “perception of classroom Teachers on causes of truancy and control among secondary school children”, the following findings on school factors as the causes of truancy were made:
a) Educational problem is a cause of truancy among secondary school children – the educational problem may range from the child not being able to read, write and spell properly to his not being able to assimilate and understand what is read.
b) Disinterest in certain school subjects as a cause of truancy – Students’ hatred for certain teachers can be a cause of truancy as the hatred will be brought about through the interaction of students and teachers in the classroom. Also un-stimulating or un-interesting lesson can cause truancy.
c) Distance from school and transportation problems are also causes of truancy among school children.
Still on school circumsance as a cause of truancy, Blair, Green and Jones (1999) observed in their book “Educational psychology that:
In the face of thwarting and distressing school situation, some pupils find that the easiest way out is to keep away from school and some of the children develop hysterical reactions, e.g. some children become ill on examination days.
In a similar manner Ezekugo (2005) points out that truancy may be due to the type of teacher posted to a school or the attitude of the teachers towards the students, poor teaching, poor organisation, poor attendance of teachers contribute highly to the truancy of students. She made reference to Simpson’s idea that a truant is one who is not happy with schoolwork either because of something is wrong with the school or with pupil himself and instead plans to do something else.
Izuogu (2002) in her own contribution to the causes of truancy holds that “poor preparation of lessons by teachers, use of abusive words on pupils, frequent use of punishment and too much demand of this or that from the pupils, can contribute to pupils staying away form school.
However, facts collected from related literature reviewed indicated that the general school condition has a hand in the cause of truancy.
PSYCHOLOGICAL AND PERSONALITY FACTORS
Hurlocks (2003) relates the cause of truancy to psychological factors writing about an adolescent who is making poor adjustment she writes:
The adolescent who is making poor adjustment at home, in school or with his peers usually engage in more misdemeanour than does the adolescent who is better adjusted. This is seen in the case of truancy, truants suffer from personality disorders due to poor home conditions, they gave poor work habits in the school and are retarded with the result that when they are in class with younger children with whom they have very little in common, they stay away from school in order to escape this frustration environment.
Her way of relating psychological and personality traits agrees well with the direction followed by the dictionary definition of the term. Frustration and even lack of self confidence mentioned by Hurlock could lead to truancy. Also self assertion could be related to truancy. Besides, improper and inappropriate adjustment both home and school circumstance can give rise to act of truancy.
SOCIO-ECONOMIC SITUATION OF THE STUDENTS
Mussen, Conger and Kegan (2000) stated that socio-economic problem and parent-child relationship could contribute to delinquent behaviour. Inconsistent administration of reward and punishment by parents teach their children the response values and benefits appropriate for their social class. Class training for the child ranges from the control of his manners to his educational and occupational goals.
In his list of causes of truancy, Adeyamo (1999) pointed out that lack of basic school materials to work with, makes pupils to run away from the school. He also writes that;
if a child has no exercise book, pen and reading books, he would not like to be punished by the teacher and as such he runs away from the school.
It may be said that the economic status of the parents may contribute to truancy. If the parents are unable to provide the students with the basic school needs, they may be forced to go out of the school to look for such needs. More so, from the related literature reviewed, it was discovered that even students in possession of surplus money still play truancy.
PEER GROUP INFLUENCE
The peer group and classmates have effects on the students’ truant behaviour. As the child frees himself from dependence and control of parents and other adults, he falls back on peer group, for direction and control.
To Nigerian Teachers (2004), members of peer group do put inside their personal feeling and follow the dictates of peer in order to remain in group. Due to this strong feelings and attachment, peer group has generally been viewed as the vehicle through which students learn truant act.
In his speech, Ubaezuonu (1998) said that a boy or a girl can easily mess up a dozen of others of his friends in the school. To him, when a child who is very good boy or girl enters secondary school at the formative age of between ten and fourteen years, when such a child must have been in the school for two to three terms, you start wondering whether it is still your ward. This to him is because he will turn out to be a completely changed child.
Dewey and Humber (2006) state that the need for a student to conform and be like by his peers may bring the student into conflict with his own family. This sensitive young persons is anxious to please his beloved ones and to maintain prestige in the eyes of his own generation this often lead the students into the act of abandoning everything he is supposed to be doing like attending classes and begin to work from place to place in search of where he will get money to be like his peer groups. When this happens, the student will never understand what is going on in the class because he is always absent from school.
EFFECTS OF TRUANCY
Having identified and explained some of the causes of truancy among secondary school students, the next of focus in this review of related literature is the effects of truancy on students.
According to Geo-Opah (2003) in his study on the Effects of delinquency on academic achievement. In this study, 168 secondary school students were used. He reported in his findings that, out of this 168 students, 50 were identified as truants and 118 as non- truants. 35 of the truants were poor in academic achievement while 15 were good academically, 32 were male truants and 18 were female, 16 of the truants were from low socio-economic background, 31were truants due to unfriendly environment in the school… Based on the statistical analysis of the data gathered, Geo-opah (2003) reported the following findings:
That truants are noted for poor academic performance. Both male and female commit acts leading to truancy nowadays, children from low-socio-economic background are more prone to truancy since they lack money and materials for schooling, children from broken homes commit acts leading to truancy than their counterparts form stable homes.
Writing on the effect of truancy in one of the leading Nigeria Dailies, Akorede of the University of Benin observes;
They become a social menace threatening law and order and channelling the equilibrium of the state. They are the core political mal contents becoming riotous and violent in their reaction to authority and their age-mates who have made some achievements (New Nigeria, 2001).
Dittimiya (2001) in his view on the effects of truancy maintains that truancy among students have greatly affected the development of human resources needed for social and economic transformation of the society. To him, truancy is a destructive and undeserving elements of progress, training or mode of life. It is an impediment to national development. Truancy allows students to pervert the whole aim of education, examination and public morality it does not encourage development rather it retards progress of the school and the entire society.
According to Durkhein (2000), Truancy is a gateway to serious violent and non-violent crime. To him, students truant act lead to stealing, fighting, drug addictions, destruction of property, sex scandal and armed robbery. Hence when a student is always absent from classes or school environment, what comes to his mind is evil. He plans how to destroy, how to get rich quick and becomes a millionaire.
In recent times, high percentage of the crime committed are by students of secondary schools. According to the related literature reviewed by the researchers, it was discovered that most crimes are committed during school period than holidays, this is because students who engage in truant behaviour are more busy with their parents and guardians during the holidays. The researcher also discovered that truants. Due to absence from school academic usually repeat classes and even when they are repeating, they do not feel better because they feel that they are too big for such a class. Though few of them (truants) manage to struggle through school and majority of them usually drop out of school if some form of interventions are not taken.
Their level of achievement is generally poor because their emphasis is not on academics. They even see school as a form of punishment and something they are doing not for their sake but to please their parents and guardians.
In all, the adverse effects of truancy manifest most when they drop out of school thereby constituting social nuisance as the male will take to armed robbery and the female prostitution, this therefore becomes a problem for the society.
SUGGESTIONS ON HOW TO REDUCE TRUANCY
Having known what truancy means, whom truants are, causes and effects of truancy, the next area of interest is the type of treatment that can be given to truants to make them change their negative attitude at school.
Research studies on ways of reducing truancy or on the treatment of truants in Nigeria school show that the most popular treatment given to truants in the school system is “Corporal Punishment”, which in most cases involves cutting of grass, scrubbing of floors, uprooting figs, sweeping of school compound, planting of flowers e.t.c. This approach however has been referred t as the traditional approach and non-functional (Obe, 1998).
For the problem of truancy to be reduced if not eliminate in our schools, all hands must be on deck and there must be total revolution in our ways of life and sense of values.
The homes, school and the society must relate closely and as well adopt a communicative approach, which should mostly involve both the parents and the truants along with their teachers.
More so, teachers should be good role models. Some teachers have been found to be habitual latecomers and truants. Such teachers are bad models for the students kept under their care. on the other hand, adult members of the society must endeavour to lead by example. Truants in the school must be assisted in all possible ways to develop the habits of self-control based on reasons rather than on force (Ezeani 2006).
Counselling can also be used in assisting truants to give up truancy. To this effect, when truants are identified, school counsellors should ensure that they counsel the students so far identified as truants. Parents should also try to provide some of the basic requirements their children need at school within their meagre resources, (Onyejiaku, 2004).
Due to the fact that truancy is a problem that not only affects the students, but also the students’ family, school and the entire society, Michael (2005) in his article titled “Manual to Combat Truancy”, suggested five primary elements of educational strategy to combat truancy, they include:
- 1. Involve Parents in all Truancy Prevention Activities: According to this element, parents play the fundamental role in the education of their children. No body else commands greater influence in getting young persons to go to school every day and recognising how a good education can define his future than the parents. For families and school to work together to solve problems like truancy there must be mutual trust and communication. Schools can also help by being “family-friendly” and encouraging teachers and parents to make regular contact before problems arise. Schools should help in training of teachers to work with parents, hiring or appointing a parent liaison and to arrange for parent meetings through which parents will have a voice in school decisions, by so doing the problem of school truancy will be reduced.
- 2. Establish on-going Truancy Prevention Programmes in School:
Research findings has reviewed that truancy is a symptom of a much larger problem. In order to curb this ugly incidence, schools should address underlying needs of each child to ensure that truancy is not a re-occurring behaviour. Also students’ basic educational needs such as conducive teaching and learning environment, adequate instructional materials and other academic facilities like library, laboratory and technical workshops e.t.c – should be provided for students so as to help attract their regular school attendance (Michael, 2005).
3. Ensure that Students Face Firm Sanctions for Truancy:
For effective reduction of truancy, schools must communicate to students and families that truancy will not be tolerated from any student and that any student found in this act must face severe and firm punishment from related school authorities.
4. Create Meaningful Incentives for Parental Responsibility:
This is also another suggested element on how truancy can be curtailed among students. Following this principle, the school should create incentive programme both for the parents and children. Positive incentives such as participation in publicly funded activities and cash awards to be given to any parent who plays positive role in truancy reduction among students. On the other hand negative sanctions like fines and imprisonment should be administered to parents who are naïve about their wards irregular attendance to schools, all this will help to promote parental responsibility towards the reduction of truancy (Michael, 2005).
5. Involvement of Law Enforcement Agency in Truancy Reduction>
In order to enforce regular school attendance policies, school officials should establish close linkage with law enforcement agents like police, probation officer, Juvenile and family court officials e.t.c to help prosecute any student caught playing truancy (Michael, 2005).
To crown it all, government should help the police department and court system to establish and run temporary detention centres where they can drop-off school truants. Also the government should as well embark on some other anti- truancy initiatives like Operation Sweep Students Truants in neighbourhoods. With these suggestions, truancy among secondary school students and even those in primary and tertiary institution will be reduced if not eradicated.
DISCUSSION, SUMMARY, RECOMMENDATION AND CONCLUSION
DISCUSSION OF FINDING
It is important to note that the discussion of the findings on truancy among secondary school students in Ebonyi South Educational Zone of Ebonyi State are done under the following sub-heading.
1. What are the Causes of Truancy Among Students in Secondary School?
2. To What Extent Does Truancy Affect the Academic Performance of Secondary School Students
3. What are the Ways through which Truancy can Manifest in Students?
4. What are the Effects of truancy on the Society?
1. What are the Causes of Truancy Among Students in Secondary School?
Table 1 with item a, b, c, and d dealt with research question 1. Based on the findings, it was discovered that truancy is caused mostly when the school authorities are not strict over the misbehaviours of students in Ebonyi South Educational Zone. In fact, the truth is that school authorities pay non-challant attitudes to students’ misbehaviour especially truancy in the zone.
From data analysed, it reveals that such factors like the inability of parents to provide their children with basic school needs and teachers negative attitude towards teaching, like absenteeism, laziness and indifference e.t.c are among the greatest cause of truancy among secondary school students. It was as a result of this that Ogumwemino (2002) sates that some teachers have been found not to have interest in teaching as a career, some are very hostile to children put under their care while some were found not to be attending classes regularly thus giving room for children to skip classes. For the above problem to be solved, teachers should change their negative attitudes to teaching and should see teaching as a professional job.
2. To What Extent Does Truancy Affect the Academic Performance of Secondary School Students.
From the findings of the research, it was discovered that constant failure in test, examination and poor performance in classroom activities with the mean scores of 4.26 and 4.11 respectively are the major effects of truancy on the academic achievement of students. On this effect, Dittimiya (2002) stressed that if the above effect of truancy is not solved, that it will greatly affect the development of our human resources needed for social and economic transformation of our society. To him, truancy is a destructive and under serving element to national developments and as such, it must be tackled squarely.
3. What are the Ways through which Truancy can Manifest in Students?
Table 3 with item a, b, c and d attempts to answer research question 3. According to the responses of the respondents it was revealed that constant absent from school, constant dodging of class lesson, inability of students to do class assignment home work and constant late coming to school are the most common ways truancy manifest in students. From the above table, item ‘a’ with highest mean score of 4.21 indicates that over 80% of students who engage in truancy are those who constantly absent themselves from school without due permission from related authorities either parents or school authorities.
4. What are the Effects of truancy on the Society?
Research question 4 is designed to elicit facts on effects of truancy on the society. While responding to the questions, the respondents maintain that the following are the adverse effects of truancy on the society which include: increased rate of academic failures; high rate of crimes like armed robbery; increased rate of unemployment in the society and high rate of touting. As regard the above effects, authors like Durkhein and Menniger (2005) stated that if the above effects are not properly handled, that it can lead to more serious crimes like high rate of day time burglary and vandalism, suicidal behaviours, drug addiction, human and drug trafficking and high risk sexual behaviour which will go a long way in retarding societal growth and development as its educational institutions which is the key to societal progress and development will suffer degradation due to high rate of academic failures in the society.
This study on Truancy among secondary school students in Ebonyi South Educational Zone: Myth and facts has been successfully carried out. The aim of this study was to determine the causes of truancy among secondary school students, identify the effects of truancy on the academic performance of students and to examine the ways through which truancy manifest among students in secondary schools.
In order to achieve the above aims four-research questions were posited to guide the proper conduct of the study. To obtain answers to these questions, a 16-item questionnaire was formulated based on the research questions and was administered to the sample area which were made up of five selected secondary schools from the zone with a total population of one hundred which were randomly selected.
Responses obtained through the questionnaire were analysed in clusters using mean and standard deviation. From the analysis of the data obtained, the following findings were made:
1. That the causes of truancy among students in secondary schools are when the school authorities are not strict over misbehaviour of students, inability of parents to provide their children with basic school needs and teachers’ negative attitudes towards teaching and students like absenteeism, hatred, unapproachable e.t.c.
2 That constant failure in test and examination and poor performance in classroom activities are the major effects of truancy on the academic performance of students. In all the findings still reveal that truant students are always below average in their academic performance/achievement.
3 On the ways truancy can manifest in students, respondents were in agreement that constant absent from school, inability of students to do class assignment and homework and constant dodging of lessons are the core ways though which truancy manifest among students.
4 On the effects of truancy on the society, the respondents responses reveal that increase rate of academic failures in the society, high rate of crimes like armed robbery, prostitution and increase rate of unemployment are the main effects of truancy on the society.
Based on the findings of the research, the researcher hereby makes the following recommendations:
- School authorities should reinforce in her mode of enforcing school rules and regulations as this will go a long way to reduce students misbehaviours in school
- Teachers should see themselves as role models and as well see teaching as their professional career by so doing their negative attitudes towards teaching and students will be reduced if not eliminated.
- Parents should be mandated by school authorities to provide their children with basic school needs, as this will reduce unnecessary outings among students.
- Students who perform poorly in examination and test should face firm punishment or sanctions duly supervised by the class teacher so that in subsequent test and examination they will work harder.
- Form masters and mistresses should ensure that their class register is marked twice every day as this will enable them dictate those who are not always present in the class.
- Government should help the police department to establish and run temporary detention centres where they can drop off truant students, also the government in conjunction with the police should as well embark on some other anti-truancy initiatives like operation sweep truant students in the neighbourhoods. By so doing truant students and potential ones will be afraid of engaging in truancy with this its likely adverse effects on the society will be eradicated automatically.
Truancy is one of the fundamental aspect of indiscipline that is more pronounced among secondary school students which has in one way or the other thwarted the aims and goals of secondary education in Nigeria in general and Ebonyi State in particular.
This study on truancy among secondary school students in Ebonyi South Education Zone: Myth and facts has succeed in profounding efficient recommendations which will be of immense help to reducing if not eradicating truancy in school hence helping in the attainment of secondary education goals and objectives if it is duly implemented.
TRUANCY AMONG SECONDARY SCHOOL STUDENTS IN EBONYI SOUTH EDUCATION ZONETo place an order for the Complete Project Material, pay N5,000 to GTBank (Guaranty Trust Bank) Account Name – Chudi-Oji Chukwuka Account No – 0044157183 Then text the name of the Project topic, email address and your names to 08060565721. | <urn:uuid:40b2b639-26e3-491a-9075-29270b16d491> | CC-MAIN-2014-23 | http://www.doublegist.com/truancy-secondary-school-students-ebonyi-south-education-zone/ | s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510270577.0/warc/CC-MAIN-20140728011750-00148-ip-10-146-231-18.ec2.internal.warc.gz | en | 0.963233 | 9,008 | 2.578125 | 3 |
Chicago scientists on Thursday announced the first birth of a baby who had undergone genetic testing as an embryo to screen for a disease that might not show up until adulthood, if at all.
The procedure, which marries the newest genetic testing and in-vitro fertilization, opens the door to the creation of babies who are free of genetic predispositions to late-onset disorders such as cancer and Alzheimer's disease as the Human Genome Project reveals the genes responsible.
It also raises a raft of ethical questions, suggesting to some that it is another step toward creating "designer babies" with preselected genetic qualities.
The announcement came at a news conference held at the Reproductive Genetics Institute, 2825 N. Clark St., best known for pioneering the technique called preimplantation genetic diagnosis, or PGD, which tests human embryos created in the lab before they are implanted in the womb.
Institute scientists worked with a New York couple (who asked not to be identified) plagued by the Li-Fraumeni syndrome, an inherited predisposition to many forms of cancer because of a mutation in a tumor-suppressing gene called P53.
"The family didn't want to pass on the gene to the next generation," said institute director Yury Verlinsky. "Now, families who already know they are at risk for late-onset genetic diseases can try to get pregnant without worrying if prenatal testing shows the fetus is carrying the same vulnerability."
Institute scientists stirred worldwide debate last year following the birth of Adam Nash, who had been selected from among 15 embryos created by his parents. Adam's embryo was selected because it was a good bone marrow match for his older sister, who suffered from a lethal anemia. Cells transplanted from Adam's umbilical cord saved his sister's life--the first reported case of genetic selection of an embryo to spare the life of an existing person.
For more than 10 years, the institute has specialized in testing embryos for genetic diseases that run in families, most caused by defects in single genes or chromosomal abnormalities. These disorders, including cystic fibrosis and sickle cell disease, are present at birth or shortly thereafter.
Thursday's announcement shows that researchers now are able to find genes that will predict whether someone will develop an illness later in life.
Father's gene targeted
In the new case, the carrier of the faulty gene was the 38-year-old father, who was first diagnosed with cancer at age 2 and then again at age 31. By testing 18 early-stage embryos from two in-vitro fertilization attempts, seven were found to have normal P53 genes. Two of those embryos were transferred back to the mother. The result was a successful pregnancy and a healthy baby boy who inherited no predisposition to cancer, the researchers said.
In a second case involving a different mutation of the same gene, no pregnancy resulted, Verlinsky said.
With the identification of the familial breast cancer genes and other cancer mutations, the diagnosis and prevention of the predisposition to inherit the disease have become growing concerns. Carriers of such mutations have a lifetime risk at high as 87 percent of developing cancer and may pass on the risk to their children.
Verlinsky said that prenatal testing--such as amniocentesis or chorionic villus sampling (or CVS, which he pioneered)--could detect such genetic vulnerabilities to cancer when the fetus is in the womb. However, he and others would not do that because of ethical concerns about aborting a fetus based on genetic predisposition alone.
"On the other hand, I would have no hesitation for selecting an early-stage embryo for implantation in the uterus that is free of predisposing genes. No hesitation at all," Verlinsky said.
Birth of test-tube babies
Also present Thursday was the father of in-vitro fertilization, retired Cambridge University physiologist Robert G. Edwards, who with his partner, the late gynecologist Patrick Steptoe, created the first test-tube baby, Louise Joy Brown, in 1978.
In 1980, the first U.S. birth clinic using the Edwards-Steptoe method of conception was announced in Virginia. Since then, Edwards has seen his work result in more than a million births worldwide.
Back in 1965, Edwards published his idea of diagnosing X-linked diseases (passed from mothers to sons) from cells taken from the earliest stages of human embryos. The establishment of in-vitro fertilization, as well as the successful development of molecular biological techniques, made it possible for scientists to perform the first successful preimplantation genetic diagnosis, PGD, in 1989.
"Preimplantation genetic diagnosis has grown slowly, but steadily, and I predict it will explode in the years to come," Edwards said.
Edwards published Verlinsky's paper describing preimplantation diagnosis for P53 tumor suppressor gene mutations in the refereed journal he edits, Reproductive BioMedicine Online. | <urn:uuid:1a9710b8-009c-44a6-87a2-cee3defe471a> | CC-MAIN-2016-40 | http://articles.chicagotribune.com/2001-06-08/news/0106080179_1_genetic-testing-reproductive-genetics-institute-designer-babies | s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738663202.87/warc/CC-MAIN-20160924173743-00255-ip-10-143-35-109.ec2.internal.warc.gz | en | 0.95924 | 1,026 | 2.6875 | 3 |
Arthur Keppel-Jones. Historian of an South African destiny half foretold, by Noel Garson.
The contributer of this article, Professor Noel Garson, was the head of the history department at the University of the Witwatersrand, Johannesburg: Historian and Professor Arthur Keppel-Jones, who has died at the age of 87 in Kingson, Ontario, achieved fame as the author of the political prophecy 'When Smuts Goes: A History of South Africa from 1952-2010'.
Arthur Keppel-Jones predicted that the Nationalist's race policies would arouse worldwide ostracism, culminating in economic sanctions and intervention by western powers that were South Africa's former friends. Internally there would be polarisation: Afrikaner nationalists and other white racists would fight to the end to maintain white supremacy, even with economic ruin staring them in the face. The victims of apartheid would have no recourse other than violent revolution to confront this intransigence, he forecast. Arthur Keppel-Jones lived long enough to see his major prophecy unfulfilled. He was mystified by the Nationalists dismantling apartheid themselves and F W de Klerk and Nelson Mandela co-operating to ensure the transition to a new dispensation. A distinguished historian of southern Africa, descended from the 1820 settlers on his mother's side, Arthur Keppel-Jones went to school and completed a BA in Cape Town. He was a Rhodes scholar and taught at the universities of the Witwatersrand and Natal. After emigrating to Canada, he took up an appointment in 1959 as professor of history at Queen's University, where he stayed for the rest of his academic career. He offered his specialised course in the history of South Africa for the last time in 1983. From the mid-20s, Keppel-Jones identified himself with the numerically small group of liberals who consistently opposed J B Hertzog's segregation policy, in particular his bid (which finally succeeded in 1936) to abolish the common roll franchise for Africans in the Cape. In 1938, in association with leading liberals such as the trade unionist W B Ballinger, his wife, Margaret (a former member of the Wits history department), and author Alan Paton, Arthur Keppel-Jones became involved in a series of initiatives aimed at persuading their fellow liberal, J H Hofmeyr, to leave the United Party and found a new liberal party. Hofmeyr declined, saying the time was not ripe, and the initiatives petered out in the wake of the outbreak of World War 2. Although encouraged, at first, by the liberal rhetoric of Smuts's new wartime ministry, Arthur Keppel-Jones was soon disillusioned by the lack of a genuine move away from segregation. He also believed that, He also believed that, despite the United Party's victory in the general election of 1943, Smuts's departure from the political scene would soon be followed by the coming to power of D F Malays nationalists. This party would then implement its policy of apartheid, the right-wing alternative to segregation. The long-term outcome, Keppel-Jones believed, would be disastrous for South Africa. This was the scenario addressed in When Smuts Goes. Revisiting South Africa in 1972, for the first time since emigrating, Arthur Keppel-Jones conceded that some of his predictions had been wrong. Despite the internal and external pressure, white supremacy remained stubbornly in place. The economy proved similarly resilient and surprised him by its capacity to flourish in an apartheid framework. In common with most other observers, he failed to see that change could come in a way other than violent revolution. Although he intended his book as both a prophecy and a warning, Arthur Keppel-Jones did hot seriously believe the white voters, fired by nationalist and racist rhetoric, would mend their ways. When Smuts Goes was followed by a second polemical tract, Friends or Foes? (1950), which carried the message that in the context of South Africa, liberal values could best be safeguarded in a federal constitution. In articles in the journal Forum he continued to advocate the liberal alternative to apartheid. In the 1953 general election he supported the United Party hoping that it could return to power and move away from apartheid. With the Nationalists victorious again, and his gloomy prophecy proved right, and fearing for the future of his young family in a conflict-ridden society, Arthur Keppel-Jones decided to emigrate. Once established in Canada he was active in helping other South African academics to find jobs in Canada. As a Canadian citizen he strongly supported federal unity against the nationalism of Quebec separatists. As a historian, Arthur Keppel-Jones published two important scholarly works. South Africa: a Short History (1949) was an influential synthesis, especially useful as an introduction to the subject and as a student text. Rhodes and Rhodesia: The White Conquest of Zimbabwe, a massive study based on extensive archival research and reaching original conclusions, appeared in 1983. In his university teaching Keppel-Jones displayed many fine qualities. Cultivated and widely read, he was quick and lively in discussion. He could bring the telling detail to mind, conveyed in a manner that was both conspiring and disarming. Many of his former South African students (of whom I am one) remained his close friends over the years. They include Phyllis Lewsen (the biographer of John X Merriman), the late Colin Webb (former deputy vice-chancellor of Natal University), Jack Spence (director of the Royal Institute of International Affairs in London), John Barratt (former director-general of the South African Institute of international Affairs) and Burridge Spies, professor of history at Unisa. Noel Garson
Das Buch 'Südafrika' aus dem Safari-Verlag ist ein sehr interessantes, mit vielen Fotos versehenes gesellschafts- und landeskundliches Werk aus den 1950er Jahren. | <urn:uuid:5ba353f5-b8ec-47c4-954c-b381a893003d> | CC-MAIN-2018-05 | http://www.namibiana.de/namibia-information/geschichte-politik-gesellschaft/meldung/arthur-keppel-jones-historian-of-an-south-african-destiny-half-foretold-by-noel-garson.html | s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084891706.88/warc/CC-MAIN-20180123032443-20180123052443-00610.warc.gz | en | 0.955637 | 1,227 | 2.59375 | 3 |
Articles related to networking
The Wide World of Wireless and Computer Networking
Learn about wireless networks, Internet and general computer networking solutions. Study our home networking tutorials, practice tests, and other reference ...
What Is Networking? - Wireless/Networking - About.com
In the world of computers, networking is the practice of linking two or more computing devices together for the purpose of sharing data. Networks are built with a ...
Networking Basics - Essential Concepts in Computer Networking
Beginners can study these key networking concepts and technologies to learn the basics of computer networking fast.
How to Use Job Search Networking to Find a Job - Job Searching
Even though job search networking is one of the most successful ways to find a new job, it can sound intimidating and sometimes seems a little bit scary.
Career Networking - Job Searching - About.com
Information on career networking, including how to develop career networking contacts, how to use networking to job search, and how career and job searching ...
Job Search and Career Networking Tips - Job Searching - About.com
The importance of career networking shouldn't be discounted when you are in the midst of a job search. In fact, your career network should become a part of ...
Tips for Successful Business Networking - Human Resources
Business networking is not just a good thing. It's essential to building a successful career. Find 10 tips and the secret to effective business networking.
What is Wireless Computer Networking? - Wireless/Networking
Wireless networks utilize radio waves and/or microwaves to maintain communication channels between computers and other network devices. Wi-Fi is the most ...
Visual Index of Computer Networking Topics - A Simple Network
This guide to networks breaks down the topic into a series of visual exhibits. Each page features one key concept or element of wireless and computer ...
Windows Networking - Wireless/Networking - About.com
The Microsoft Windows family of operating systems support numerous networking technologies and features. | <urn:uuid:d49676dc-73b7-4829-995e-7fe1d86e2c50> | CC-MAIN-2014-35 | http://ruby.about.com/lr/networking/1126344/2/ | s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500822053.47/warc/CC-MAIN-20140820021342-00319-ip-10-180-136-8.ec2.internal.warc.gz | en | 0.873922 | 410 | 2.78125 | 3 |
Alternative Title: Joseph Shuster
Learn about this topic in these articles:
contribution to comic strip
...1937) and Action Comics (begun 1938). Superman, which appeared first in Action Comics, was the creation of Jerry Siegel (scenario or text) and Joe Shuster (art); it was soon syndicated and transposed to other media. The Superman formula of the hero who transcends all physical and social laws to punish the wicked was widely imitated. The...
Superman creators Jerry Siegel and Joseph Shuster introduced Luthor into an already swelling rogue’s gallery, but he ultimately eclipsed all the comic’s other villains. He is Superman’s greatest foe because he relies not on cosmic powers but on the power of his own mind. When it comes down to a battle of wits, Luthor has the advantage over Superman. | <urn:uuid:661fa127-5d07-4900-8971-8b32950578e9> | CC-MAIN-2016-44 | https://www.britannica.com/biography/Joe-Shuster | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719079.39/warc/CC-MAIN-20161020183839-00525-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.929461 | 179 | 2.671875 | 3 |
"And, you shall take on the first day [of Sukkot] a fruit of a citric tree (etrog), branches of palm trees (lulab), a branch of myrtle (hadas) and willows of the brook ('araba), and you shall rejoice before HaShem, your God, for seven days". (Lev. 23).
THE MITZVA: We are commanded to take the above mentioned four species during the seven days of Sukkot. One lulab, one etrog, two 'arabot, and three hadasim are taken together each time. This Mitzva is called "the four species" (ארבעת המינים) or simply, the Mitzva of lulab.
We should hold the lulab, the hadasim, and the 'arabot in our right hand and the etrog in our left hand. Then, we perform the Mitzva of netilat lulab, which literally means "lifting" the lulab. The four species must be held in the direction that they grow.
On the first day of Sukkot, a person must be careful to recite the blessing over his own lulab and etrog. During the other six days the four species may be borrowed from somebody else.
The Ashkenazi custom is to 'shake' (rattle) the lulab while the Sephardic custom is to 'move it up' (lena'anea') in six different directions.
The Mitzva of the four species is not performed on Shabbat, even when the first day of Sukkot falls on Shabbat.
THE SYMBOLISM: One of the symbolisms of the four species is the following: The אתרוג or Citron resembles in its shape the heart, the driving force behind all our actions. The לולב, a palm branch, resembles the spine, which holds the body together allowing us to move. The הדסים - myrtle branches - resemble in their shape the eyes, with which we behold God's world. And the ערבות, the willow branches, resemble the lips which give expression to our thoughts and feelings. Our heart, our body, our eyes, thoughts and words are all directed and elevated to God.
THE NA'ANU'IM: The Sephardic custom is to move the four species in the following order: south, north, east, up, down and west. This order was established by Hakhme haQabbala. Rabbi Mordekhay Eliyahu z"l explained that when we say hodu (thanks) in the Halel we have to think that we are expressing our gratitude to the Master of heavens, Earth and the four corners of the world.
BLESSING: Two blessings are said the first day, 'al netilat lulab and shehecheyanu. One berakha,'al netilat lulab, is said during the other six days.
Since every Mitzva has to be performed after we say the blessing, some people hold the etrog upside down and turn it back after the blessing, otherwise the berakha would be said, unnecessarily, once the Mitzva was performed. Others hold the etrog in their left hand only after the berakha is said.
Women are formally exempted from the Mitzva of lulab. The tradition in most communities, however, is that women perform the Mitzva of lifting the lulab. Rabbis are divided on the issue of women reciting the berakha on the lulab. In general, Sephardic Rabbis oppose to the recitation of this berakha by women and Ashkenazi Rabbis approve. Each person should follow his or her community's traditions.
TODAY WE NEED TO DO ERUB TABSHILIN.
CLICK here TO SEE
WHY AND HOW. | <urn:uuid:7573c942-908b-49d7-8427-e0b239ea13de> | CC-MAIN-2018-30 | http://rabbibitton.blogspot.com/2013_09_15_archive.html | s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676590295.61/warc/CC-MAIN-20180718154631-20180718174631-00290.warc.gz | en | 0.92252 | 852 | 2.84375 | 3 |
Surfer's ear is a common cause of deafness among people who surf. Years of cold wind and water on the ears leads to narrowing of the ear canals. The medical name for this is cranial exostosis. Bony lumps gradually grow, reducing the size of the channel for sound to enter. Frequent ear infections are common as debris builds up in the canal and remains wet for longer after being in the sea or shower. This creates an ideal breeding ground for bugs. Once the narrowing has occurred the only way out is surgery. A surgeon injects local anaesthetic into your ear then uses a chisel or drill to remove the extra bone which has formed. This is painful but it doesn't prevent the bony lumps growing again if precautions aren't taken.
Over the years only a few studies have been performed into this condition. ZenPlugs wanted to find out what surfers had to do to protect themselves. It is common knowledge that ear plugs can help prevent the problem but most surfers don't know that they need to wear a neoprene cap as well. ZenPlugs wanted to find out how much difference wearing both of these together makes. They sent a survey round via social media and a hospital mailing list and received 203 replies. The results were rather surprising. They showed that 60% of those who had spent 10 years surfing regularly without ear protection knew that they had the condition. The real number with the problem will be much higher than this because it usually goes unnoticed in the early stages.
The research showed that wearing a surfer's cap and plugs more than 90% of the time prevented surfer's ear. Without them almost everybody surveyed developed the problem after years of surfing. The more years they had surfed the more likely they were to go deaf.
The reason the cap is required is because, like the ear canal, if the bone behind the ear gets cold it can cause the bony lumps to form. The lump is called the mastoid bone and it is full of air cells which communicate with the middle ear air space. Neoprene is an excellent insulator and the cap also helps to keep your plugs in your ears if you are hit by a massive wave. With molded plugs you can also tie the cord onto your wet-suit zipper so you can find them easily.
Summary. If you surf regularly and want to protect your hearing you need to wear a surfing cap and surfing ear plugs.
Dr Toby Bateson | <urn:uuid:948e17be-726f-4d44-aac5-703acaad7961> | CC-MAIN-2018-47 | http://www.sennensurfschool.com/-blogs/archives/01-2016 | s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039742666.36/warc/CC-MAIN-20181115095814-20181115121814-00157.warc.gz | en | 0.976475 | 503 | 3.1875 | 3 |
In general, if you are unsure, go to the vet quickly. Because a dog with an insect bite often needs medication - especially if it has an allergic reaction. If you are unsure of the symptoms, take no chances. Redness and slight swelling do not have to indicate that your four-legged friend is in danger. However, if he shows symptoms of a shock, it can quickly become dangerous: shortness of breath, swollen larynx, accelerated heartbeat or even loss of consciousness.
Dog with insect bite: Beware of bites in the mouth
You should be particularly careful if your dog has an insect bite in the head or even in the mouth area. The stung area often swells - so if your leg or back is affected, it is uncomfortable for your darling, but at best it is not dangerous. However, if the bee or wasp has caught the dog in the throat or even on the tongue, the mucous membranes can swell. These can then block the airways and in the worst pallid the dog threatens to suffocate. A dog with an insect bite in the mouth often chokes and wheezes because it cannot breathe. A quick instant tip are ice cubes that help the swelling to subside. However, a visit to the veterinarian as soon as possible is essential.
English bulldog: puppy on a trip into the countryside
Wasp sting: doubly dangerous
Especially when your dog is stung in the mouth, it is sometimes difficult to tell whether the culprit was a bee or a wasp. The important difference here is that a bee can only sting once and then dies. With a wasp, on the other hand, it can be dangerous: if it got into the mouth of your four-legged friend and is still alive, it can stab there several times, which of course increases the swelling and thus the danger. The doctor can help here. | <urn:uuid:0bfe9c87-a2f6-42ee-9e8a-fb440daa092f> | CC-MAIN-2021-31 | https://zw.scribalculture.org/1297-dog-with-insect-bite-when-will-it-be-dangerous.html | s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154310.16/warc/CC-MAIN-20210802075003-20210802105003-00007.warc.gz | en | 0.952262 | 385 | 2.515625 | 3 |
Low Frequency High Tech Digital X-rays
We offer the latest in low radiation digital radiography (x-rays). We use a sensor placed in your mouth and computer generate a digital image in about 20 or 30 seconds.
How do dental X-rays work?
When X-rays pass through your mouth during a dental exam, more X-rays are absorbed by the denser parts (such as teeth and bone) than by soft tissues (such as cheeks and gums) before striking the film. This creates an image called a radiograph. Teeth appear lighter because fewer X-rays penetrate to reach the film. Tooth decay, infections and signs of gum disease, including changes in the bone and ligaments holding teeth in place, appear darker because of more X-ray penetration. Dental restorations (fillings, crowns) may appear lighter or darker, depending on the type of material used for the restoration. The interpretation of these radiographs allows the dentist to safely and accurately detect hidden abnormalities.
How often should x-rays be taken?
How often X-rays (radiographs) should be taken depends on the patient’s individual health needs. It is important to recognize that just as each patient is different form the next, so should the scheduling of X-ray exams be individualized for each patient. Your dentist will review your history, examine your mouth and then decide whether you need radiographs and what type. If you are a new patient, we may recommend radiographs to determine the present status of the hidden areas of your mouth and to help analyze changes that may occur later. If you have had recent radiographs at your previous dentist, we may ask you to have the radiographs forwarded.
The schedule for needing radiographs at recall visits varies according to your age, risk for disease and signs and symptoms. Recent films may be needed to detect new cavities, or to determine the status of gum disease or for evaluation of growth and development. Children may need X-rays more often than adults. This is because their teeth and jaws are still developing and because their teeth are more likely to be affected by tooth decay than those of adults.
What are the benefits of a dental radiograph examination?
Many diseases of the teeth and surrounding tissues cannot be seen when your dentist examines your mouth.
An X-ray examination may reveal:
- small areas of decay between the teeth or below existing restorations (fillings)
- infections in the bone
- periodontal (gum) disease
- abscesses or cysts
- developmental abnormalities
- some types of tumors
Finding and treating dental problems at an early stage can save time, money and unnecessary discomfort. It can detect damage to oral structures not visible during a regular exam. If you have a hidden tumor, radiographs may even help save your life.
How do dental X-rays compare to other sources of radiation?
We are exposed to radiation every day from various sources, such as frequent airplane travel and high altitudes, minerals in the soil, and appliances in our homes (like smoke detectors and television screens). What if I’m pregnant and need a dental radiograph examination?
A radiograph may be needed for dental treatment or a dental emergency that can’t wait until after the baby is born. Untreated dental infections can pose a risk to the fetus, and dental treatment may be necessary to maintain the health of the mother and child. Radiation from dental X-rays is extremely low. However, every precaution is taken to minimize radiation exposure. A leaded apron minimizes exposure to the abdomen and should be used when any dental radiograph is taken. A leaded thyroid collar can protect the thyroid from radiation, and should be used whenever possible. The use of a leaded thyroid collar is strongly recommended for women of childbearing age, pregnant women and children. Dental radiographs are not contraindicated if one is trying to become pregnant or is breast feeding.
(American Dental Association, 2006)
Schedule dental visits for you and your family today by calling The Right Smile Center in Sandy Springs at 404-256-3620 and in Chamblee at 770-455-6076. Our dental office is conveniently located on Carpenter Drive in Sandy Springs, and we serve patients from Sandy Springs, Roswell, Dunwoody, Brookhaven, Chamblee, Alpharetta, Johns Creek, Buckhead, Marietta, East Cobb and surrounding communities. We welcome new patients and will be happy to answer all of your questions over the phone or in person. Our dentists and team look forward to making you, and your loved ones, smile! | <urn:uuid:6fc651b3-31e4-48bc-a4da-0e26876b37af> | CC-MAIN-2018-47 | https://rightsmilecenter.com/cosmetic-dentistry/dental-x-rays/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039742981.53/warc/CC-MAIN-20181116070420-20181116092420-00366.warc.gz | en | 0.932072 | 959 | 3.453125 | 3 |
The European Union is about to undergo the biggest overhaul of policy since its foundation, with nearly every major aspect of the economy set to be reassessed in light of the climate and ecological emergency.
The Green New Deal lays out a grand European plan for tackling climate change.
The targets to be reached by 2030 are a minimum 40 per cent cut in greenhouse gas emissions compared to 1990 levels, a share of at least 32 per cent renewables in final energy consumption and at least 32.5 per cent in energy savings.
Europe will have to direct a 1-2 per cent of its annual GDP towards the green economy, including new infrastructure, public procurement, research and development and industrial retooling.
The EU Commission estimates that additional investments are needed to achieve the EU’s 2030 climate target total of €260 billion per year.
However, it is proposing to dedicate €45 billion a year from 2021- 2027.
So that’s not enough to reach the target and everybody is asking who is going to pay the bill.
The €215 billion shortfall will have to be made up by contributions from households, corporations and above all national governments.
Winds of change in Portugal
Some EU member states are performing quite well, especially when it comes to renewables.
The Portuguese government has pledged to close the only two remaining coal power plants still producing electricity within the next three years.
Portugal has over 300 days of sun every year. That, and the strong winds from the Atlantic, give the country a major advantage when it comes to renewable energy.
Completed last summer thanks to a European Investment Bank loan, the Energias de Portugal (EDP) wind farm at Penacova is one of Portugal's newest clean energy projects.
Hugo Costa, deputy country manager at EDP Renováveis Portugal, says the 13 turbines have a total capacity of 46.8 Megawatts. They were manufactured locally, a move that could prove beneficial in the future.
From January to November last year, 53 per cent of Portugal's energy came from renewable sources, while in March 2018 renewable energy production briefly exceeded the whole country's total consumption, covering more than 103 per cent of domestic needs.
This opens the possibility of electricity export revenues for the country. However, at the moment there is a bottleneck in the European electricity grid in the Pyrenees.
Pedro Amaral Jorge, President of the Portuguese Association of Renewable Energy, says moves are underway to open the grid.
“I think Iberia, together, with Portugal included, can be the next Qatar for renewable energy. When you look at the wind, and hydro, and sun, we were able with the proper interconnections between Iberia and France to be able to supply tons of electricity from renewable sources from both sun and wind.”
Catarina Roseta Palma, an environmental and resource economist based at ISCTE – University Institute of Lisbon, told Real Economy: “It will depend on how the grid is managed. We are already interconnected with Spain, and there is a couple of interconnections being worked on.
“But that's not all there is. There's this whole other side of the market, which is demand, which you can use. It's what we call 'demand-response strategies', where you pay companies that shut down their equipment when there is a need for a peak load in consumption.”
Changing how we live and work
The new EU Commission President Ursula Von der Leyen has promised €100 billion to help finance the transition to a low-carbon economy. But there is a lot more to be done.
Real Economy spoke to the Vice-President of the EU Commission, Valdis Dombrovskis, to ask what this enormous transition means for citizens and companies.
Efi Koustokosta, Euronews: "We've seen that Portugal, for example, has done a lot for the transition to a greener economy, especially when it comes to renewables. If member states can do so much by themselves, what more can this Green Deal from the EU Commission give?"
Valdis Dombrovskis, Vice-President of the EU Commission: “Indeed, this will be not just meeting some emissions targets, this requires some substantial transformation of the economy. So, that's what the European Green Deal is about - how we ensure this transformation of the economy, how we move to the carbon neutral economy in a way that is socially acceptable, in a way that preserves our social market economy model. The Just transition mechanism will be part of the picture, it is going to be part of the sustainable Europe Investment Plan which aims to mobilise in general investment for this green transition, basically aiming to unlock at least 1 trillion euros of investment over the next decade. And as part of this, there’s going to be the Just transition mechanism which is more targeted to support the regions and sectors which are most affected by this transition, like for example coal regions."
Efi Koustokosta, Euronews: "What is a green investment for you? What is green for the EU Commission?"
Valdis Dombrovskis, Vice-President of the EU Commission: "The EU has reached an agreement on the classification system, on the green list of green and sustainable economic activities. It basically goes to six environmental categories starting from climate mitigation, climate adaptation, biodiversity, circular economy, waste management, marine ecosystems and so forth. And it basically entails what can be described as green economic activities and what are transition activities, which will help us to transition from the current state to the carbon-neutral economy."
Efi Koustokosta, Euronews: "Is it going to be much more expensive for the ordinary citizens if all these investments and goals must be achieved?"
Valdis Dombrovskis, Vice-President of the EU Commission: "One can say yes, certain jobs will disappear, certain fossil fuels will get more expensive but at the same time there will be many new jobs created in the green economy and there will be many new savings which will make green energy and this transition affordable." | <urn:uuid:8a593589-20e0-4f88-9389-30c34ac84d1b> | CC-MAIN-2020-16 | https://www.euronews.com/2020/01/15/european-green-deal-set-to-transform-economy-in-face-of-climate-threat | s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370491998.11/warc/CC-MAIN-20200328134227-20200328164227-00045.warc.gz | en | 0.94216 | 1,269 | 2.765625 | 3 |
COMBINATION OF TWO WASTES: PYRITE AND SCRUBBER SOLIDS TO PRODUCE VALUABLE BY-PRODUCTS: IRON, SULFUR, AND LIME
Dr. Malcolm Hepworth
University of Minnesota
Thursday, April 2, 1998 3:00 pm
Ben Bandy Conference Center
Center for Applied Energy Research
Currently, gypsum and pyrite, two major wastes generated by the coal combustion industry, have to be land-filled. The feasibility of a new approach of lime, iron, and sulfur products from these wastes is discussed in the present work. By thermal decomposition of pyrite, 42% of the sulfur is recovered and pyrrhotite is produced. A thermodynamic analysis shows that the recovery of iron and lime from pyrrhotite and gypsum in a single-stage process is not feasible. Instead, the process has to consist of two subsequent stages.
The first if the reduction of pyrrhotite with carbon in the presence of lime to produce iron, calcium sulfide, and carbon monoxide, followed by reaction of calcium sulfide with gypsum to produce lime and a concentrated sulfur dioxide stream. The kinetics of the reactions involved in the two-stage process is studied using thermogravimetric analysis. The reaction rates are favorable above 950 deg C and depend on initial reagent concentrations. The effectiveness of magnetic separation of the Fe/CaS mixture is studied. The amount of sulfur in the magnetic fraction depends on the reaction temperature. | <urn:uuid:d96e5238-ca7d-4518-8f61-d4a14b9ea8be> | CC-MAIN-2016-22 | http://www.caer.uky.edu/caerseminar/fshepwor.shtml | s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049278417.79/warc/CC-MAIN-20160524002118-00201-ip-10-185-217-139.ec2.internal.warc.gz | en | 0.885727 | 321 | 2.84375 | 3 |
Available Courses / Computer Science
Computer science is the field of education which encompasses the different applications of computer and the programming aspects related to the same. There are a lot of different languages and platforms which can be used in the field of computers and this is why one needs a clear and thorough understanding of the subject matter.
In our computer science video lectures, you will find a great deal of courses that will concentrate upon the different aspects of computer science. We have lectures devoted to principles of engineering system design which will take you through the basics of how computer science and engineering go hand in hand.
Further, the concepts of algorithm need to be thoroughly built and our video lectures will concentrate upon the same. We have also offered detailed and systematic lectures upon different types of computing like parallel computing, innovative computing, high performance computing and more.
We also have lectures devoted to network security, cryptography, oracle database and more. Even if you want to gain proficiency in the field of UNIX, you are sure to find the same as it is definitely going to assist you.
The online video tutorials are so designed that it will offer you a systematic way of thoroughly exploring every single aspect related to programming ranging from design to database handling, schema design and a lot more. Feel free to devote the right amount of time to different lectures and based upon the same, you can improve your overall proficiency in the subject. | <urn:uuid:bc636fb5-783e-497c-bc5d-18352e36479d> | CC-MAIN-2018-13 | http://freevideolectures.com/subject/computer-science | s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257645248.22/warc/CC-MAIN-20180317155348-20180317175348-00254.warc.gz | en | 0.934763 | 282 | 3.078125 | 3 |
It’s World Antibiotic Awareness Week and we all know that antibiotics are used to prevent and treat bacterial infections and we are lucky to have them. But we are learning we should not take them for granted and the world urgently needs to change the way it prescribes and uses antibiotics.
Antibiotic resistance is becoming a global problem and is due to the misuse and overuse of antibiotics as well as poor infection prevention and control. This happens when the bacteria being treated changes in response to the medicines used.
Here in the UK health professionals have to remind people that antibiotics do not treat viruses like the common cold or flu, as viruses are self limiting.
Even if new medicines are developed, without behaviour change antibiotic resistance will remain a major threat. We all have a responsibility to help bring about these changes to help reduce the spread of infections by….
- Access to clean water
- Good hand washing
- Prepare food hygienically
- Practice safe sex
- Keep Vaccinations up to date.
This is even more important in a resource poor area like Buburi where infections can become a life and death situation very quickly in an already malnourished child or elderly patient.
Let us take it upon ourselves to increase our awareness and spread it amongst our friends and families and save lives. | <urn:uuid:5cfc017e-5056-4fba-91db-68ac8260dc3f> | CC-MAIN-2021-25 | https://www.powerofpads.com/blog/2017/11/13/antibiotics-handle-with-care/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487649688.44/warc/CC-MAIN-20210619172612-20210619202612-00503.warc.gz | en | 0.94093 | 266 | 3.59375 | 4 |
Jack-in-the-pulpit is one of the most unusual and easily identifiable native perennial plants. They can reach to 3 feet in height but most plants will be two feet or shorter. From near the ground level the central stem develops one or two leaves on very long round stalks. New emerging shoots are spike-like covered by a protective sheath.
Leaves: The leaf is tri-parted with ovate segments that have an obtuse base and a tapered tip to a point. These leaflets are usually stalkless or on a very short stalk. There is one central midrib vein with laterals branching to the leaf edge but not quite reaching the edge, instead ending a a vein that encircles the leaf. Leaves turn perpendicularly upwards from their stalk to face the sun. Those plants producing fruit will usually have two leaves.
The inflorescence is a scape (a single flower stalk that arises directly from the underground root) which is shorter than the leaf. The flower parts are a cylindrical spadix (the 'jack') that has flowers only on the lower part. The spadix is blunt on top and is shorter than the spathe (the 'pulpit') which rises around the spadix and is wider at the top and arches over the spadix forming the 'pulpit' shape.
The flowers which are only on the lower part of the spadix are yellow to green, very small, without corollas or a calyx. Sexes are separated (dioecious). Male flowers have several stamens and female flowers have a single pistil. Female flowers are crowded tightly together. The spathe is prominently veined, often with purple tinges.
Fruit: The female spadix develops into a cluster of green berry-like fruit, turning a brilliant red by August. The fruit cluster is frequently the only residue of the plant seen in Autumn. Each fruitlet usually contains 2 5mm seeds, sometimes only one. Seeds are round with a concave top and slightly flattened on one side. The surface is finely reticulated. Seeds take two years to germinate as they require a cold moist period, followed by a warm moist period, then another cold moist period. Each period at least 60 to 90 days. If stored, them must be kept moist. For more details see Eloise Butler's' notes on this plant below.
Habitat: Jack-in-the-pulpit prefers to grow in partial sun to full shade in moist woods, accepting moisture levels from wet mesic to dry mesic. Dappled sun is preferred during flowering. The fresh plant is toxic (see notes below). The plant grows from a round, flattened rhizome, usually referred to as a 'corm'. The corms can produce offsets to start new plants and the plant will also self-seed from mature berries.
Names: The genus Arisaema is derived from the Greek 'aris', a name used by Pliny the Elder, and 'haima', meaning 'blood', referring to a reddish coloring on certain species. The species triphyllum is from the Latin meaning '3-leaved'. The author for the plant classification - ‘Schott’ is for Heinrich Wilhelm Schott (1794-1865), Austrian botanist who did extensive work on the Araceae family. His last position was director of the Imperial Gardens at Schönbrunn Palace in Vienna. He modified the original classification of '(L.)' which refers to Carl Linnaeus (1707-1778), Swedish botanist and the developer of the binomial nomenclature of modern taxonomy.
Comparison: There is one other plant that resembles this species; that is Green Dragon, Arisaema dracontium, which is also found in Minnesota. There the spadix is tapered at the tip, not blunt and it is usually longer than the spathe. There have been reported a number is sub-species or varieties of A. triphyllum, but current authorities such as Flora of North America and the U of M Herbarium do not recognize many of these but rather treat them as part of a single species that has much variability.
Above and below: The early development can occur in late April to early June, depending on seasonal weather. Fruit producing plants will typically have two leaves. 3rd photo above - new shoots emerging with their protective sheaths mottled like snake skin.
Below: Leaf structure - note that lateral veins do not reach the leaf margin. Plants with two leaves (female) will usually bear fruit if a male plant is nearby.
Below: The small flowers develop into large green berries which turn a brilliant red in late summer. Most are eaten by birds and small mammals.
Below: The 5mm seeds. Note the finely reticulated surface.
Notes: Jack-in-the-pulpit is indigenous to the Garden area. Eloise Butler catalogued it on May 31, 1907. Additional Garden plantings were made in later years. Martha Crone noted planting it in 1933, '34, '38, '45 and specifically noted planting 77 plants in 1935, 40 in 1937 and 56 in 1939. Susan Wilkins added plants in 2009. Found throughout Minnesota in moist woods in all but a few scattered counties of the southern part of the state. Its most westerly range in the United States is the line of states from North Dakota south to Texas.
Eloise Butler wrote: "Better known members of the Arum family are Calla (Calla palustris) and Jack-in-the-Pulpit (Arisaema triphyllum). In the case of the Jacks, the upper part of the fleshy flower axis is naked and is used as a support of the roof of the pulpit, or spathe. The small, simple flowers at the base of the axis are without floral leaves and are usually separated, namely, some of the Jacks bear only pollen producing flowers, and others, which in the course of time will develop seeds. The leaves of the Jacks are branched and made up of three leaflets. The seed-producing Jack usually bears a pair of these branching leaves in place of the one carried by the pollen-bearing Jack.
The individual producing the seed must manufacture food for storage in them as well as in the onion-shaped, subterranean bulb, which gives another name - Indian turnip to the plant. The Indians used the turnip, after pressing out the poisonous sap, as a farinaceous food. Jack-the-Jester has, of course, the reputed wisdom of former times; but you’ll get no drippings of it, unless you frequent the sanctuary of the wilderness. But even as a preacher, he cannot refrain from some foolish pranks. No one would be astonished to find, as is sometimes the case, two Jacks fraternally occupying the same pulpit; but an observer was doubled up with laughter to see a Jack holding forth in two united pulpits. Only the student, or one versed in wood lore, would recognize Jack, when he first pricks through the ground, in the form of a slender, slightly curved, sharp-pointed bud, with a protective sheath mottled like snake skin. Again, but few connect the last stage of seed-bearing Jack with the crowded bunch of bright red berries so common in late summer." (Published in the Sunday Minneapolis Tribune May 14, 1911) (read full article.)
Toxicity: Parts of the fresh green plant are toxic. It is a violent irritant to the mucous membrane if chewed and if taken internally it causes violent gastroenteritis, which may end in death.
Lore and Uses: The plant material contains calcium oxalate crystals, which will produce a burning sensation shortly after eating, if not properly prepared. The root has been used for several purposes but it must be boiled and dried first. When fully dried the acridity is made inactive. It can then be used to make a wholesome flour with a suggestion of cocoa flavor. Densmore (Ref. #5) reports its use in solution as a wash for sore eyes. Several early writers such as botany and medical pioneer Jacob Bigelow and also Horace Kephart, attest to early medicinal uses. See Ref.#7 for more information.
Cultivation: The plant will self seed via bird droppings. You can sow seed yourself in the fall as soon as the fruit and seeds are ready but it will be the second spring before above ground growth is seen. The plant can also be transplanted in late summer to early fall. Commonly found at most native plant nurseries.
References: Plant characteristics are generally from sources 1A, 32, W2, W3, W7 & W8 plus others as specifically applied. Distribution principally from W1, W2 and 28C. Planting history generally from 1, 4 & 4a. Other sources by specific reference. See Reference List for details.
Identification booklet for most of the flowering forbs and small flowering shrubs of the Eloise Butler Wildflower Garden. Details Here.
Friends of the Wild Flower Garden, Inc. Text and photos are by G. D. Bebeau unless otherwise credited. "www.friendsofthewildflowergarden.org" | <urn:uuid:e8f45ba7-697d-4d4a-ab9a-9602e2dbdad1> | CC-MAIN-2018-47 | https://friendsofthewildflowergarden.org/pages/plants/jackinpulpit.html | s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039746110.52/warc/CC-MAIN-20181119192035-20181119214035-00207.warc.gz | en | 0.949901 | 1,953 | 3.46875 | 3 |
(Reuters) – As much as 1 million times the normal level of methane gas has been found in some regions near the Gulf of Mexico oil spill, enough to potentially deplete oxygen and create a dead zone, U.S. scientists said on Tuesday.
Texas A&M University oceanography professor John Kessler, just back from a 10-day research expedition near the BP Plc oil spill in the gulf, says methane gas levels in some areas are “astonishingly high.”
Kessler’s crew took measurements of both surface and deep water within a 5-mile (8 kilometer) radius of BP’s broken wellhead.
“There is an incredible amount of methane in there,” Kessler told reporters in a telephone briefing.
In some areas, the crew of 12 scientists found concentrations that were 100,000 times higher than normal.
“We saw them approach a million times above background concentrations” in some areas, Kessler said.
The scientists were looking for signs that the methane gas had depleted levels of oxygen dissolved in the water needed to sustain marine life.
“At some locations, we saw depletions of up to 30 percent of oxygen based on its natural concentration in the waters. At other places, we saw no depletion of oxygen in the waters. We need to determine why that is,” he told the briefing.
Methane occurs naturally in sea water, but high concentrations can encourage the growth of microbes that gobble up oxygen needed by marine life.
Kessler said oxygen depletions have not reached a critical level yet, but the oil is still spilling into the Gulf, now at a rate of as much as 60,000 barrels a day, according to U.S. government estimates.
“What is it going to look like two months down the road, six months down the road, two years down the road?” he asked.
Methane, a natural gas, dissolves in seawater and some scientists think measuring methane could give a more accurate picture of the extent of the oil spill.
Kessler said his team has taken those measurements, and is hoping to have an estimate soon.
“Give us about a week and we should have some preliminary numbers on that,” he said. | <urn:uuid:a05f5d6f-acfa-47f9-8bc3-0f83d1213af3> | CC-MAIN-2018-51 | https://socialismisnottheanswer.wordpress.com/2010/06/30/methane-in-gulf-astonishingly-high-u-s-scientist/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376825123.5/warc/CC-MAIN-20181214001053-20181214022553-00549.warc.gz | en | 0.97061 | 474 | 2.890625 | 3 |
Presentation on theme: "Treatment of wastewater by combination of ozonization and membrane separation Zsuzsanna László, Cecilia Hodúr."— Presentation transcript:
Treatment of wastewater by combination of ozonization and membrane separation Zsuzsanna László, Cecilia Hodúr
Membrane filtration.. A membrane is a selective barrier that permits the separation of certain species in a fluid by combination of sieving and diffusion mechanisms Membrane filtration configurations: Dead-end Crossflow Driving forces: Pressure difference, Concentration difference, Voltage difference, etc.
Types of membrane filtration Membranes can separate particles and molecules over a wide particle size range and molecular weights Lower pore size/molecular weight cut off (MWCO) means: Higher transmembrane pressure Lower flux (The rate of extraction of permeate measured in litres per square meter of membrane surface per hour (L/m 2 /h)) Higher costs Problems: Membrane fouling Service periods
Membrane fouling – increasing filtration resistance.. (1)Surface (temporary) fouling Foulant appears an evenly deposited layer on the membrane surface Can be easily removed by cleaning solution Permeation rate of membrane can be regenerated by cleaning (2) Pore (permanent) fouling Particulate matter diffuses into the membrane Could be caused by the poor quality of the cleaning water Flux cannot be regenerated by cleaning Determines the lifetime of the membrane
Methods for minimisig membrane fouling.. Physical methods: – Stirring – Vibration – Ultrasonic treatment ect. Physical-chemical methods: – Coagulation-flocculation before treatment larger particles can be removed by higher pore-size membranes – lower pressure – lower cost Larger particles form gel layer on the surface of the membrane instead of pore fouling - This can be achieved by combining waste water pretreatment with ozone and membrane separation
What is ozone?.. Ozone is triatomic oxygen with the chemical formula O 3. Ozone is the very strong oxidant and disinfectant available for the treatment of aqueous solutions and gaseous mixtures. Ozone is generally used in wastewater treatment and drinking water plants (chemical oxidation, disinfection). It is generated generally from oxygen in the air by electrical discharges or by UV radiation <200 nm) Must be produced on-site (it is not stable)
Ozone’s properties provides multiple benefits in water treatment:.. – Oxidation Oxidation COD/TOC Fe/Mn Hydrogen Sulfide Taste & Odor Color Specific Chemicals – Disinfection Disinfection Bacteria Virus Moulds – Flocculation Flocculation Less Chemical Coagulant Lower solids Handling Lower Turbidity & Particles Longer Run time Less Backwashing
Organic colour reduction by ozonation.. Surface waters are generally colored by natural organic materials such as humic, fulvic and tannic acids. Ozone is attracted to break organic double bonds. As more of these double bonds are eliminated, the color disappears. Surface water can usually be decolorized when treated with 2 to 4 ppm of ozone. After Ozone Process
Microflocculation: Improved coagulation and turbidity removal Microflocculation: Improved coagulation and turbidity removal.. Oxidation of dissolved organic materials by ozone results in polar and charged molecules pre-ozonation destabilizes the colloid with a resultant reduction of the amount of coagulant needed to produce a clear filtrate Improved Floc/Clarification & Filtration.
Microflocculation with ozone.. Mechanisms of ozone-induced particle destabilization: (1)Increases in carboxylic acid content caused by ozonation – lead to greater precipitation of metal salts/complexes or increased adsorption to alum flocs (2)Ozone reduces the molecular weight of adsorbed organics, causing disruption of stabilized organic coatings – lead to reduced stearic hindrance or charge neutralization (3)Polimerization of metastable organics – lead to direct precipitation or adsorption (4)Ozone may liberate biopolimers from algae that could act as coagulating polymers (5) Ozone may form amphipatic molecules from organic pollutants that form micelles
Combination of ozone treatment and membrane filtration.. The aim of pre-ozonation should be: - increasing particle size by microflocculation - reducing biofilm building in membrane surface by disinfecting the solution Experimental set-up for combined process:
Effect of ozone pretreatment on permeate flux: Effect of ozone pretreatment on permeate flux:.. It strongly depends on the nature of the feed: (1)Waste waters with high Fe, Ca, Mg-content, waste thermal waters – ozone pretreatment decrease the flux by precipitating metal salts (2)the chemical nature of the wastes determine structure of the microfloccules: this affects the permeate flux, and e.g. in the case of meat industrial waters the stucture of the flocs are more loose, resulting increased permeate fluxes. The effect of ozone pretreatments on relative permeate fluxes in thermal waste waters in the function of ozonation time The effect of ozone pretreatments on permeate fluxes in meat industrial waste waters in the function of amount of absorbed ozone
Effect of ozone pretreatment on filtration resistances:.. Depends on the nature of the fouling compounds, and their reaction with ozone : (1)Waste waters with high Fe, Ca, Mg-content, waste thermal waters – ozone pretreatment increase the membrane fouling by precipitating metal salts, or by formation of degradation by-products (2)the chemical nature of the wastes determine structure of the microfloccules: this affects the filtration resistances, and e.g. in the case of meat industrial waters the loose structure of the flocs resulted decreased polarization layer and fouling resistances. The effect of ozone pretreatments on filtration resistances in thermal waste waters in the function of ozonation time The effect of ozone pretreatments on filtration resistances in meat industrial waste waters in the function of amount of absorbed ozone
Effect of ozone pretreatment on elimination efficiency:.. Comparing the elimination efficiency of membrane filtration and combined method, a higher retention could be achieved with ozonated waters in consequence of the microflocculation effect of preozonation Elimination efficiency of COD, phenolic index and ion content expressed by conductivity during nanofiltration, ozone treatment and preozonation and nanofiltration of model thermal water COD retention during ultrafiltration of meat industrial waste water in the function of absorbed ozone
Summary.. The ozone treatment slightly degrades the organic content, but ion content remains high The remaining organic and inorganic wastes can be eliminated by nanofiltration, and larger molecules or particles by ultrafiltration the appearance and diminishing of degradation by-products determine the efficiency of the membrane filtration probably by changing membrane-solution interactions. The ozonation may produce (a) microfloccules which may be more effectively eliminating from water than the original wastes. The structure of this floccules determine the structure of the polarization layer and resistance, and thus strongly affect the permeate flux. (b) smaller by-products like oxalis acid, which may react with metallic ions of water (e.g. Ca 2+ or Mg 2+ -ions) producing insoluble precipitates. These are easily removable by NF, but may cause higher pore fouling and decreased relative flux. The combination of ozone treatment and membrane filtration enhance the efficiency of elimination of COD and other pollutants. | <urn:uuid:6fb4f379-b892-4fb1-92c7-33e264c7fd85> | CC-MAIN-2017-30 | http://slideplayer.com/slide/4143324/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423320.19/warc/CC-MAIN-20170720181829-20170720201829-00223.warc.gz | en | 0.845049 | 1,622 | 3 | 3 |
by Didi Peccia
Didi Peccia is a small business owner in Helena.
Jan Peccia was not only my sister-in-law, she was my best friend. We raised our babies together and we went into business together. She and I co-owned Montana Book and Toy Company and Augustine Properties in Helena. But in 2013 Jan was diagnosed with melanoma and died just 22 months later.
May is Melanoma Awareness Month, and it is the perfect time to shed light on the dangers of skin cancer. Many young people hear the dangers of skin damage and skin cancer caused by sun exposure and tanning devices, but don’t pay attention to them. These warnings are very real. Skin cancer is the most commonly diagnosed cancer in the country. Roughly 400,000 cases in the United States each year are caused by indoor tanning. Tanning also causes roughly 4,000 cases of melanoma, the deadliest form of skin cancer, each year. An estimated 350 people in Montana are expected to be diagnosed with melanoma this year.
Indoor tanning is so dangerous that the World Health Organization lists artificial tanning devices in the same carcinogenic category as asbestos and tobacco. And, the FDA reclassified tanning beds so that manufacturers must include a visible black box warning to advise against use by teens.
Despite these dangers, misconceptions about the risks and benefits of tanning are prevalent, in part due to false information from the tanning industry. Tan skin is not healthy skin. Having a tan actually means your skin or skin cells are damaged.
Montana’s youth are at greatest risk for damage from tanning because a young person’s skin is still developing. And teens are tanning at an alarming rate. In the past year, one in five high school girls nationwide reported tanning; that number grew to one in four by senior year. Melanoma is the fourth most common cancer among 15-29 year olds and the third most common cancer in people aged 29-35. What’s even scarier is that tanning before age 35 increases a person’s risk for melanoma by 59 percent.
Jan wanted everyone to know the importance of keeping your skin healthy and watching for abnormal changes to moles. I want to honor Jan’s legacy and protect teens by promoting healthy skin and avoiding the dangers of tanning beds. Montana does not have any age restrictions on tanning – but we can change that. As someone who lost a loved one to a preventable type of cancer, I want to educate my state lawmakers about this important issue. The American Cancer Society Cancer Action Network and other health organizations hope to work with legislators in 2017 to restrict access to tanning devices for children under 18.
Until we pass an age restriction on tanning, too many of our youth will expose themselves to harmful UV rays. And more people will continue to lose their loved ones to skin cancer. | <urn:uuid:10907b2f-4f0a-4dd0-b48e-312fab8a7e3a> | CC-MAIN-2017-39 | http://mtcowgirl.com/2016/05/31/guest-post-melanoma-awareness-month-know-the-dangers-of-indoor-tanning/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818696653.69/warc/CC-MAIN-20170926160416-20170926180416-00619.warc.gz | en | 0.954547 | 603 | 2.5625 | 3 |
Climate change has become a serious issue. Controlling energy usage has become a major factor to help reduce emissions. In order to effectively manage a building's energy consumption and CO2 emissions, computerized systems are used to monitor and adjust the buildings energy usage as required on a real time basis. Energy management systems provide better comfort In order to effectively manage a building's energy consumption and CO2 emissions, and safety for the occupants of a building, energy savings for the building owners and less emissions load on the environment.
Energy management systems utilize a set of hardware and software applications to balance the use of air, water and electrical to the needs of the occupants of a building. Heating, ventilation, air-conditioning, and lighting are adjusted by room, based on the needs of the occupants, on a real time basis. Using sensors and time schedules the system can energy on as needed basis and predict energy usage.
This case is to achieve the goal of the best building energy efficiency system and network. Hundreds of monitor and control devices are connected to the system These devices are dispersed through a large building but need to be connected to a central control point. The network infrastructure plan needs to be designed to connect each device to the central control point. Continuous communications between monitoring devices and control devices is extremely important. A redundant network structure is a must for achieving uninterrupted data communication.
A key project objective is to ensure that an uninterrupted data network is established. The data from the end equipment, such as temperature sensors, air conditioner controllers….etc, has to be sent through the network to the control center. The network and power redundancy system is considered part of the building management plan. EtherWAN has developed the best Ethernet redundancy solution, α-Ring. In this installation each floor is served by several EX63000 (Industrial Managed Switches) with α-Ring topology. These switches connect hundreds Lon works I/O devices and direct digital controllers (DDC). Each 4 floors also form a second α-Ring. EX70900 (Hardened Gigabit Managed Switches) are configured in a dual α-Ring increasing network redundancy. EtherWAN hardened managed switches are also configured to utilize link aggregation control protocol (LACP) with backbone routers. The routers communicate through fiber optic interfaces via EM1000 (Fiber Media Converter). The redundant Ethernet network achieves real time monitor/control for energy management for the building.
|EMC1600||16-Bay Media Converter and Ethernet Extender Chassis|
|EX63000||Industrial Managed 16-port 10/100BASE with 2-port Gigabit combo Ethernet Switch|
|EX70900||Hardened Managed 8-port Gigabit Ethernet Switch|
EtherWAN provides a seamless data communication infrastructure to ensure that the real time status is presented by the system. Based on EtherWAN’s comprehensive core technology and strong software design ability, this network provides better data path redundancy. EtherWAN’s unique α-Ring technology provides the best data path redundancy performance, maximum recovery time only takes 15ms, which is the best performance in the industry. By using the ring redundant topology, three rings, which are Dual α-Ring and LACP, this network should not experience any unexpected data interruption. | <urn:uuid:43e650c5-2e92-4228-9a43-5ab0c9ab3b10> | CC-MAIN-2017-39 | http://tw.etherwan.com/application/case/building-automation | s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689028.2/warc/CC-MAIN-20170922164513-20170922184513-00500.warc.gz | en | 0.913655 | 670 | 2.71875 | 3 |
Influential Black Leaders - Coretta Scott King
Influential Black Leaders - Coretta Scott King
Who Was Coretta Scott King?
Coretta Scott met her husband, Martin Luther King Jr., while the two were both students in Boston, Massachusetts. She worked side by side with King as he became a leader of the civil rights movement, establishing her own distinguished career as an activist. Following her husband's assassination in 1968, Coretta founded the Martin Luther King Jr. Center for Nonviolent Social Change, and later successfully lobbied for his birthday to recognized as a federal holiday. She died of complications from ovarian cancer in 2006, at age 78.
Coretta Scott was born on April 27, 1927, in Marion, Alabama. In the early decades of her life, Coretta was as well known for her singing and violin playing as her civil rights activism. She attended Lincoln High School, graduating as the school's valedictorian in 1945, and then enrolled at Antioch College in Yellow Springs, Ohio, receiving her Bachelor of Arts in music and education in 1951.
Coretta was awarded a fellowship to the New England Conservatory of Music in Boston, Massachusetts, where she met soon-to-be famed civil rights leader Martin Luther King Jr., then a doctoral candidate at Boston University’s School of Theology. They married on June 18, 1953, at her family home in Marion.
After earning her degree in voice and violin from NEC in 1954, Coretta moved with her husband to Montgomery, Alabama, where he served as pastor of Dexter Avenue Baptist Church and she, subsequently, oversaw the various tasks of a pastor's wife.
Civil Rights Activist
Working side by side with her husband throughout the 1950s and '60s, Coretta took part in the Montgomery Bus Boycott of 1955, journeyed to Ghana to mark that nation's independence in 1957, traveled to India on a pilgrimage in 1959 and worked to pass the 1964 Civil Rights Act, among other endeavors.
Though best known for working alongside her husband, Coretta established a distinguished career in activism in her own right. Among many roles, she worked as a public mediator and as a liaison to peace and justice organizations.
Death of MLK
On April 4, 1968, while standing on a balcony outside of the Lorraine Motel in Memphis, Tennessee, Martin Luther King Jr. was struck and killed by a sniper's bullet. Four days later, Coretta led her husband's planned march through Memphis to support striking sanitation workers.
The shooter, a malcontent drifter and former convict named James Earl Ray, was hunted for two months before being apprehended. King's assassination sparked riots and demonstrations in more than 100 cities across the country.
Continuing the Mission After His Death
In the aftermath of her husband's assassination, Coretta founded the Martin Luther King Jr. Center for Nonviolent Social Change, serving as the center's president and the chief executive officer from its inception. After spurring the formation of what became the Martin Luther King Jr. National Historic Site, around his birthplace in Atlanta, she dedicated the new King Center complex on its grounds in 1981.
Coretta remained active through her demonstrations against apartheid in South Africa, and by expressing her views as a syndicated columnist and contributor to CNN. She also saw the 15-year fight for formal recognition of her husband's birthday come to fruition in 1983, when President Ronald Reagan signed a bill that established Martin Luther King Day as a federal holiday.
Coretta passed the reins of the King Center over to her son Dexter in 1995 but remained in the public eye. In 1997, she called for a retrial for her husband's alleged assassin, though Ray died in prison the following year.
Coretta suffered a heart attack and stroke in August 2005. She died less than six months later, on January 30, 2006, while seeking treatment for ovarian cancer at a clinic in Playas de Rosarito, Mexico. She was 78 years old.
Coretta's funeral was held on February 7, 2006, at the New Birth Missionary Baptist Church in Georgia, eulogized by daughter Bernice King. The televised service at the megachurch lasted eight hours and had over 14,000 people in attendance, including U.S. Presidents George W. Bush, George H.W. Bush, Jimmy Carter, and Bill Clinton, along with most of their wives. Barack Obama, then a senator, was also present.
The author of My Life with Martin Luther King, Jr. (1969), Coretta had four children with King: Yolanda Denise (1955-2007), Martin Luther III (b. 1957), Dexter Scott (b. 1961) and Bernice Albertine (b. 1963). The surviving children manage the King Center and their father's estate.
We strive for accuracy and fairness. If you see something that doesn't look right, contact us! | <urn:uuid:9b744375-7137-46ba-8971-5aaa43d99e7a> | CC-MAIN-2020-45 | https://unitedblackbooks.org/blogs/black-leaders/influential-black-leaders-coretta-scott-king | s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107880878.30/warc/CC-MAIN-20201023073305-20201023103305-00263.warc.gz | en | 0.975997 | 1,001 | 3.171875 | 3 |
Postmodernism has influenced family therapy in significant ways, from clinical work to family therapy research. Little has been written, however, on how to conduct postmodern research in a manner reflecting marriage and family therapy inquiries. The present study seeks to investigate doctoral students understanding of postmodern family therapy research. Using collaborative language theory and collaborative inquiry, students participated in a dialogue to answer several questions: a) what is postmodernism, b) what is postmodern research, c) what does postmodern research look like, and d) what does this mean for the field of marriage and family therapy. Students indicated that postmodern research is characterized by its flexibility in methods, translates into a new way of conducting research, and creates a natural bridge between family therapy researchers and clinicians.
Postmodernism, Family Therapy, Graduate Students, and Family Therapy Research
The authors would like to thank Dr. Fred Piercy for his guidance support in this project.
Creative Commons License
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 4.0 International License.
Recommended APA Citation
Hertlin, K. M., Lambert-Shute, J., & Benson, K. (2004). Postmodern Influence in Family Therapy Research: Reflections of Graduate Students. The Qualitative Report, 9(3), 538-561. https://doi.org/10.46743/2160-3715/2004.1923 | <urn:uuid:217ba576-f8e2-49ef-945b-4216c3a74068> | CC-MAIN-2022-27 | https://nsuworks.nova.edu/tqr/vol9/iss3/10/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104215790.65/warc/CC-MAIN-20220703043548-20220703073548-00683.warc.gz | en | 0.883453 | 332 | 2.734375 | 3 |
Last Updated on
Neural networks don’t only exist within AI, but they are a fundamental piece of the artificial intelligence puzzle. Understanding what they are, and how they work, helps us understand what AI can do. Terms like machine learning and deep learning are often thrown around by those who don’t know the difference. There are several types of neural networks. However, before getting into recurrent neural networks (RNN), and convolutional neural networks (CNN), let’s start with the basics. So, what is a neural network?
What is a neural network?
A neural network is a pattern recognition circuit. The patterns they recognize are input/output pairs. In other words, which inputs correlate to desired outputs, and which correlate to undesired outputs? The neural network allows it to understand the relationship between these inputs, and develop behaviors that will allow it to produce a desired output when presented with input data it has never seen before.
This simplified definition applies to both biological neural networks (BNN), such as the human brain, as well as artificial neural networks (ANN), such as an AI model. The phrases ‘neural network’ and ‘artificial neural network’ are often used synonymously. However, the concept has existed in nature for far longer than it has existed in computers.
The most popular artificial neural network in the world is OpenAI’s GPT, which powers ChatGPT. OpenAI’s AI chatbot uses GPT-4, a multimodal AI model capable of natural language processing (NLP).
How does a neural network work?
What all neural networks have in common is their structure. They begin with an input layer (the stimuli) and end with an output layer (the output). In between these two points, there will be at least one ‘hidden’ layer. This is the simplest way to describe neural network architecture. If there is more than one hidden layer, it is called a deep neural network. This is where the AI does its ‘thinking’. Hidden layers are trained using training data; links between these layers will strengthen or weaken based on positive and negative reinforcement. The resulting set of hidden layers defines the behavior of the model, and this is what separates AI from other computer systems.
In other computer systems, you would code the behavior of the software in an attempt to produce the output you want. The flaw of this methodology is that it requires a lot of trial and error before the programmer necessarily knows that the behavior they have coded always results in a desired output. In contrast, a neural network will define the behavior required to achieve a desired output.
Model training – Supervised learning and feedback loops
Desirability is defined by the programmer (e.g. a labeled set of photographs, some tagged as ‘good’ and some tagged as ‘bad’ based on the human opinion of the programmer). The artificial intelligence of the neural network is the ability to find an ‘objective’ data-based correlation between these subjective opinions and use that opinion (now defined in its model weighting) to make decisions about new data.
The stimuli could be any of your senses in the case of a biological neural network. In the case of an artificial neural network, this would be your text prompt or input media. If the neural network is part of a generative AI model, then the output will be new data, such as a digital media file or set of instructions for other software. Otherwise, the output could be a discrete data point, such as a number or classification. This is true for discriminative AI models.
Besides convolutional neural networks (CNN), and recursive neural networks (RNN), there are many other terms to get familiar with. Feed-forward, linear regression, reinforcement learning, and long short-term memory are all good places to start for further reading into learning algorithms.
Essential AI Tools
7-in-1 AI Content Checker – One-click, Seven Checks
Winston AI detector
Originality AI detector
How is AI like the human brain?
AI is similar to the human brain in that the former is modeled after the latter. Both use neural networks, only one is artificial and the other is biological. These neural networks work in very similar ways. After all, AI is the simulation of intelligence using computers.
In terms of architecture, we can liken the nodes of a neural network to the neurons of our own brain. These nodes are sometimes referred to as artificial neurons. Similarly, our synapse count is arguably the most comparable metric to the parameter count of an AI model.
For the best part of a century, computer science has allowed us to speed things up, make things more consistent, and remove the need for our own human memory. However, there are still many things that traditional computer systems can’t do. Creating music, theories, photographs, and such creative tasks are challenging (if not impossible) for normal computers. This is generally because there’s an element of subjectivity to them, and computers are very objective binary systems. The success criteria of these things are that a human will observe them with a subjective eye, and call them “good”.
The human brain can do this. Traditional computer systems can’t. AI is the endeavor to fill that gap, and that is how AI is like the human brain. | <urn:uuid:efada7b2-c843-43cf-824e-29d4648bcca5> | CC-MAIN-2024-10 | https://www.pcguide.com/ai/neural-network/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473735.7/warc/CC-MAIN-20240222061937-20240222091937-00170.warc.gz | en | 0.945977 | 1,119 | 3.75 | 4 |
Chicago Herald masthead, December 7, 1917. Aerial view of the damage to Halifax as a result of two ships colliding in the harbour (one filled with 3,000 tons of explosives). The city was destroyed in the world’s biggest explosion until the advent of nuclear weapons. The explosion was followed by a tidal wave, city-wide fires … More Chicago Herald Tells All!
Babies whose mothers had not been located and children injured in the Halifax Explosion on Dec. 6, 1917, were cared for in the YMCA temporary hospital. It was for babies to be identified if their mothers were dead.
Soldiers engaged in rescue work after the explosion, Halifax, 1917.
These following images were all taken by Lt Victor Magnus a officer in the Royal Navy stationed in Halifax at the time of the explosion. The images show the moment two warships collided into each another in December 1917, triggering an explosion which killed nearly 2,000 people. Amateur photographer Victor, who was based in Halifax … More Images Captured By A Sailor!
Explosion aftermath: Halifax’s Exhibition Building. The final body from the explosion was found here in 1919.
A view across the devastation of Halifax two days after the explosion, looking toward the Dartmouth side of the harbour. Imo is visible aground on the far side of the harbour.
SS Imo aground on the Dartmouth side of the harbour after the Halifax explosion of December 6th 1917, in Halifax, Nova Scotia, which happened when SS Mont-Blanc , a French cargo ship laden with high explosives, collided with the Norwegian vessel SS Imo in the Narrows, a strait connecting the upper Halifax Harbour to Bedford Basin. All … More SS Imo
George Washington Gordon (October 5, 1836 – August 9, 1911) was a general of the Confederate States Army during the American Civil War. After the war, he practiced law in Pulaski, Tennessee, where the Ku Klux Klan was formed. He became one of the Klan’s first members. In 1867, Gordon became the Klan’s first Grand Dragon … More
Charles-Geneviève-Louis-Auguste-André-Timothée d’Éon de Beaumont usually known as the Chevalier d’Éon, was a French diplomat, spy, freemason and soldier who fought in the Seven Years’ War. D’Éon had androgynous physical characteristics and natural abilities as a mimic, good features for a spy. D’Éon appeared publicly as a man and pursued masculine occupations for forty nine years, although … More Chevalier d’Eon, a Eighteenth Century Transgender Woman | <urn:uuid:abd7f2b4-7408-4eef-9888-2de5a88d34e7> | CC-MAIN-2017-34 | https://historycomestolife.wordpress.com/category/military-history/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886107744.5/warc/CC-MAIN-20170821080132-20170821100132-00665.warc.gz | en | 0.960678 | 558 | 2.90625 | 3 |
A landmark is a recognizable natural or man-made feature used for navigation, a feature that stands out from its near environment and is often visible from long distances.
In modern use, the term can also be applied to smaller structures or features, that have become local or national symbols.
Originally, a landmark literally meant a geographic feature used by explorers and others to find their way back or through an area. For example the Table Mountain near Cape Town, South Africa, is used as the landmark to help sailors to navigate around southern tip of Africa during the Age of Exploration. Other than natural geographic feature, man-made structures are sometimes built to assist sailors in naval navigation. The Lighthouse of Alexandria and Colossus of Rhodes for example are ancient structures from antiquities built for this purpose, to lead ships to the port.
In modern usage, a landmark includes anything that is easily recognizable, such as a monument, building, or other structure. In American English it is the main term used to designate places that might be of interest to tourists due to notable physical features or historical significance. Landmarks in the British English sense are often used for casual navigation, such as giving directions. This is done in American English as well.
In urban studies as well as in geography, a landmark is furthermore defined as an external point of reference that helps orienting in a familiar or unfamiliar environment. Landmarks are often used in verbal route instructions and as such an object of study by linguists as well as in other fields of study.
Types of landmarks
Landmarks are usually classified as either natural landmarks or man-made landmarks, both are originally used to support navigation on finding directions. A variant is a seamark or daymark, a structure usually built intentionally to aid sailors navigating featureless coasts.
In modern sense, landmarks are usually referred to as monuments or distinctive buildings, used as the symbol of a certain area, city, or nation, such as the Eiffel tower in Paris, Big Ben in London, Christ the Redeemer in Rio de Janeiro or Fernsehturm in Berlin. Church spires are often very tall and visible from many miles around, thus often serve as built landmarks. Also town hall towers and belfries often have a landmark character.
Natural landmarks can be characteristic features, such as mountains or plateaus. Trees also serve as local landmarks, such as jubilee oaks or conifers. Some landmark trees may be nicknamed, examples being Queen's Oak, Hanging Oak or Centennial Tree.
- Lynch, Kevin. "The image of the city". MIT Press, 1960, p. 48
|Look up landmark in Wiktionary, the free dictionary.|
- Media related to Landmarks at Wikimedia Commons | <urn:uuid:895916b5-21b2-420a-86f6-30931bd42ef1> | CC-MAIN-2014-23 | http://en.wikipedia.org/wiki/Landmark | s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00340-ip-10-146-231-18.ec2.internal.warc.gz | en | 0.94702 | 558 | 3.71875 | 4 |
We have all heard the phrase, “It’s not what you know, but who you know.” This was certainly true for Mary Magdalene in our Easter text. Mary Magdalene was streetwise and independent. She knew how to survive in a man’s world. But it didn’t matter what she knew in the eyes of the privileged and the powerful of her day—she was a nobody.
Until she met Jesus, she didn’t know anyone who took her seriously—who listened to her, who valued her, who loved her. For Mary Magdalene, it really was true—it wasn’t what she knew, it was who she knew that made the difference in her life.
But now that “who”—Jesus—was dead, and her life was turned upside down. That is why Mary went to the tomb so early that morning. She couldn’t imagine life without knowing Jesus—without the one and only meaningful relationship she had ever had. Mary Magdalene rose before the sun on that first day of the week to go to the tomb to grieve the one she had lost. Mary gingerly picked her way through the darkness of the pre-dawn, with tears in her eyes and grief in her heart.
But when Mary arrived at the tomb, she was met by an astonishing site. The stone that sealed the tomb had been rolled away. Jesus’ body was gone, and only grave cloths remained. Mary stood at the tomb weeping, thinking someone had taken Jesus’ body away. Mary couldn’t imagine that Jesus was alive—raised from the dead. It didn’t matter that Jesus had mentioned it so many times. Mary knew intellectually about the possibility of resurrection: she knew Jesus raised the widow’s son at Nain; she knew Jesus raised Jairus’ daughter from the dead; she knew Jesus raised Lazarus after he’d been dead 4 days; she heard Jesus himself say a number of times that the Son of Man would be killed and 3 days later rise again.
And yet, there she stood at the empty tomb with Jesus’ body gone—and she was more distraught and dumbfounded than ever because the resurrection was not real for her. Even a conversation with angels didn’t make it real for her! As Mary wept, she turned around and there stood Jesus himself--living and breathing and speaking! Mary sees Jesus with her own eyes. Mary hears Jesus’ voice with her own ears: “Woman, why are you weeping? Whom are you looking for?”
Mary has all the information she needs to trust that Jesus is actually alive: in addition to an empty tomb, folded grave cloths and angels, Jesus himself stands before her and speaks to her. But the evidence before her isn’t enough. It’s not what she knows about resurrection, and now it’s not even who she knows—Jesus is right in front of her. Mary is more confused than ever, thinking Jesus is the gardener!
So what is it that finally makes the resurrection real for Mary? I did not fully understand what it was until my husband’s grandmother had a series of strokes many years ago, and we traveled to Philadelphia to visit her. We learned that Grandmother wasn’t doing well—her memory had been damaged and her activity was severely limited. Dan knew he couldn’t expect much, if anything from this visit. He didn’t know if she would even know who he was.
As we walked into the room, his worst fears were confirmed. Grandmother was lying in bed asleep, and this woman who turned the world over every day, and whose family never ate a store-bought loaf of bread or cake, didn’t even look like herself. She looked all of her 93 years, asleep with her jaw slack. With tears in his eyes, and grief gripping his heart, Dan touched her arm gently and woke her up. He said, “Grandmother, it’s me, Danny.” She opened her eyes and looked over at him. In a familiar voice—a voice that had read him stories, a voice that had said prayers and tucked him in bed at night, a voice that had called him to the dinner table--in that familiar voice, Grandmother looked at Dan and with the delight of recognition, she said, “Oh, you sweet boy.”
In that moment, it didn’t matter what Dan knew about her condition; it didn’t matter who she had been for him before. What mattered was that he was known—known by someone he thought he had lost forever. And that’s what happened to Mary. It didn’t matter what Mary knew. It didn’t even matter who she knew. What mattered on that first resurrection morning was that her Lord—the one she thought she had lost forever—her Lord looked at her and in a very familiar voice; a voice that had said, “your sins are forgiven," a voice that had prayed with her, a voice that had called her to the table--in that familiar voice, Jesus called out her name, “Mary!”
Only when she was known by Jesus, did the resurrection become real for her. For the resurrection to be real in any of our lives, it’s not what we know—it’s not even who we know—it’s Who knows us. On this resurrection morning, our Risen Lord stands before each of us and says in a familiar voice—a voice that has said, “your sins are forgiven,” a voice that has prayed with us and for us, a voice that has invited us to the table with the words, “This is my body….This is my blood”--in that familiar voice, Jesus calls each of us by name: Carol, Dale, Shirley, Tim, Gail, Ollie.
We’ve all come here looking for something. We have all come hoping to make sense of Jesus’ death, hoping to discover some truth about God, hoping that, for us, the resurrection might be real. But underneath all that, we really came looking to be found—to be completely known by the Savior who calls each of us by name. We came to restore a relationship that maybe we feared was lost—perhaps we haven’t been praying, or haven’t been to church in a long time, or we can’t let go of guilt or shame, and we thought our chance for God’s love was gone. Or perhaps we come every Sunday, but never really believed Jesus died for me, personally.
We each came today to be known intimately by name—by Jesus. No matter who you are or who you know; no matter what you have done or what you know—Jesus died for you, and this morning, he calls you by name. There’s nothing he wants more than for you to receive his love, to be in a relationship with him, to engage in a daily conversation with him about the details of your life and the desires of your heart.
The banner on the altar says, “All Are Welcome” and that means you! You are welcome at Jesus’ table, to be forgiven, to be released from guilt, fear and shame, and to be loved just as you are, right now. Because Jesus knows you—Jesus knows your pain and worry, your struggles and fears, your hopes and dreams.
So come to this meal to behold our risen Lord. As you walk forward, say a prayer—“Lord, I turn my whole life over to you, come into my heart anew.” Let’s practice, repeat after me: Lord, I turn my whole life over to you, come into my heart anew (I even made it rhyme so it's easy to remember!). Brent and I will be serving the bread of Communion. If you don’t have a nametag, give us your name as we give you the bread, so that you can hear Jesus call you by name, and say, “this is my body given for you.”
With Mary Magdalene, we leave this Easter Garden today, realizing that it’s not what we know, it’s not even who we know, it’s Who knows us, and you will never be forgotten or alone, ever again. We can join Mary, running from here saying, “I have seen the Lord and he knows Me by name!” | <urn:uuid:203276d4-956d-41fd-b69f-af41f0cc2acc> | CC-MAIN-2018-22 | http://lindaandersonlittle.com/140-it-s-not-what-you-know-or-who-you-know | s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794867217.1/warc/CC-MAIN-20180525200131-20180525220131-00172.warc.gz | en | 0.986961 | 1,804 | 3.34375 | 3 |
Back and neck pain, headaches, and shoulder and arm pain are common computer-related injuries. Such muscle and joint problems can be caused or made worse by poor workstation (desk) design, bad posture and sitting for long periods of time.
Although sitting requires less muscular effort than standing, it still causes physical fatigue (tiredness) and you need to hold parts of your body steady for long periods of time. This reduces circulation of blood to your muscles, bones, tendons and ligaments, sometimes leading to stiffness and pain. If a workstation is not set up properly, these steady positions can put even greater stress on your muscles and joints
Eye strain and fatigue are common complaints from people who use electronic devices regularly. At first, the discomfort is barely noticeable, but gradually it increases in intensity and can develop into strained vision, pain, and even severe headaches for some. Constant exposure to blue light emitted by LED screens has also been shown to degrade sleep quality - another common complaint of those who regularly use their phones or tablets in bed prior to sleep.
The Anti-Blue Light line is a higher class of screen protector that preserves eye health and prevents harmful blue light from impairing your vision and ability to concentrate. An additional razor-thin layer of film filters and disperses blue light that would otherwise cause symptoms of eye fatigue. | <urn:uuid:9db811de-245d-4344-9f6c-db15f52c3a95> | CC-MAIN-2018-51 | https://desire2.co.uk/ergonomics | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376829568.86/warc/CC-MAIN-20181218184418-20181218210418-00015.warc.gz | en | 0.941191 | 272 | 2.8125 | 3 |
This article was written fro St. Monica's Student Abroad Newsletter
With first term quickly coming to an end, in addition to any personal stresses, it wouldn’t be uncommon for you to be developing some academic stress. Your exams and term paper due dates are likely quickly approaching! This can be a very stressful time when you are away at school. The key to stress management is being able to identify your stressors and choosing an approach to help you manage these stressors.
Firstly, let us chat a bit about what stress is. Positive and negative stress are constantly impact all our lives. According to The Random House Dictionary, stress is defined as “physical, mental, or emotional strain or tension,” and, “a situation, occurrence, or factor causing this.” The word “stress” comes from a Latin word meaning, “distress.”
Stress can be difficult to pin down because it is a very individual thing. Since stress is different for everyone, your approach must be personalized, too. Typically, we interpret stress as a negative thing, but it doesn’t have to be that way.
By this point, you may have figured out what your stress indicators are. Some people begin to feel anxious, some get neck pain, some just have difficulty settling down to get work done because they just feel overwhelmed and do not know where to begin. Your symptoms will help you identify exactly what it is that is stressing you out. Once you identify your stressors, you can start to look at how to manage them.
Identifying the cause of stress can help you reduce the number and impact of stressors in your life, and it can help you manage the stress that does occur. If you are having difficulty identifying your stressors, you can always create a stress log. Not only can a stress log help you identify your major stressors, but it can also help you identify trends in those stressors and give you clues as to the best way to manage your stress.
Once you have identified your stressors, you must remind yourself that you have a choice in how you will approach it. You can choose from the three A’s
- Alter the situation or your approach to it
- Avoid the situation
- Accept the situation
Alter – Perhaps you need to alter the way you are approaching a difficult roommate in order to make your living situation less stressful.
Avoid – Study groups can be helpful, and they can also be stressful. If there is a study group that is making you more anxious than it is helping you, you may decide that you will avoid this group.
Accept – Perhaps you haven’t done as well on an exam as you would like. The results may cause you stress, but once you accept them, and that these things do happen, you will be in a better position to work towards a more successful grade the next time around.
The three A’s can really help in dealing with stress once it occurs. However, the best way to manage stress is to create a stress reducing lifestyle. When you live a stress reducing lifestyle, you will do a better job of managing personal and academic challenges when they do arise.
The foundation of a low-stress lifestyle involves 3 essential building blocks: diet, sleep and exercise. Take some time to evaluate your diet. Is it balanced? Are you getting enough sleep? Are you ensuring that you are getting exercise daily? No stress reduction program will be successful in the long term unless you have this solid foundation.
Additional tools that can help you in this upcoming busy academic season are: listening to music, having a sense of humor, soothing stretches, deep breathing, prayer and meditation.
Wishing you a great and low stress month! | <urn:uuid:df8658d5-8b67-4d38-89b9-41ceb7ca2a2c> | CC-MAIN-2019-51 | https://www.learnandleadec.com/blog/archives/11-2017 | s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575541308604.91/warc/CC-MAIN-20191215145836-20191215173836-00008.warc.gz | en | 0.960124 | 771 | 2.765625 | 3 |
Summer Series 2017 - Spectacular scenes under the ice
In October a team of scientists from New Zealand and Finland travelled to Antarctica for a scientific diving expedition under the ice.
Led by NIWA marine ecologist Dr Drew Lohrer, the aim of the expedition was to explore how climate change is affecting the marine biodiversity in Antarctica. A unique combination of species and isolation has provided an area largely unaffected by human activity.
The divers found that there have been surprisingly big changes in the coastal seafloor communities in just a few years.
“What used to be a very stable, sparse and food-deprived animal community on the seafloor under the thick ice in New Harbour is now much richer with more species and higher densities of animals,” Dr Lohrer said.
New Harbour sea ice can go for years without breaking out, and this multiyear ice can grow up to 4.5 meters thick. When the ice is thick, very little light can penetrate the ice to fuel primary production (for example algae) and therefore food supply to the animals on the seafloor is limited.
The rich community now observed is most likely a rapid response to the sea ice breaking out two years in a row, resulting in more light and higher productivity in the ecosystem.
While under the ice divers captured spectacular images of the creatures they saw which they will use for further study.
Water samples were collected from the benthic incubation chambers twice and day, after which they were processed in the “laboratory”. Drew Lohrer and Jen Hillman make measurements, record data, and filter samples. About 300 filtered seawater samples were frozen and brought back to NIWA Hamilton’s analytical chemistry laboratory for analysis. [Photo: Patrick Degerman.]
A large Polar Haven tent, used for eating and meal preparation. A team of nine camping for 20 days requires a lot of food. Red food boxes with dry goods, chilly bins of frozen meats and veg, and LPG bottles for the stoves are lined up outside the tent in an orderly fashion. This was one of three heated huts at camp. The team slept in unheated tents atop the sea ice. [Photo: Patrick Degerman] | <urn:uuid:9fd15fe7-cf58-4ed7-8cbe-46df34873005> | CC-MAIN-2018-09 | https://www.niwa.co.nz/news/summer-series-2017-spectacular-scenes-under-the-ice | s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891815500.61/warc/CC-MAIN-20180224073111-20180224093111-00278.warc.gz | en | 0.943251 | 460 | 3.40625 | 3 |
Public Safety Education
Our staff works seamlessly with the North Greece, Barnard, and Lake Shore Fire Districts, as well as the local school districts to provide fire prevention education to children. Through this program, countless lives have been saved in Greece.
Our public education staff also offers an adult-oriented program aimed at educating our senior population in home and fire safety.
Blood Pressure Screenings
In addition to our public education program, we conduct regular blood pressure screenings at the Mall at Greece Ridge as well as several Senior Living communities in the district. You can find us every Friday morning in the Food Court at Greece Ridge center from 8:30-10:30.
You are also more than welcome to stop in to any of our stations for a blood pressure check.
Smoke Alarms Save Lives
Every year in the United States, about 2,500 people die in home fires. Most of these deaths occur in homes that do not have working smoke alarms.
Smoke alarms should be checked at least once a month and most types require new batteries every six months.
Carbon Monoxide Safety
Carbon Monoxide (CO) is a colorless, odorless, and poisonous gas that is created during combustion. Heating and cooking devices that burn fuel of any kind can be sources of carbon monoxide. It is also created by cars, motorcycles, and gasoline-powered machinery as well as fireplaces. All homes should have a carbon monoxide alarm and these alarms should be checked regularly.
If you need help checking your smoke or carbon monoxide alarms, please let us know. We would be glad to assist you, as it is our goal to ensure all of our residents all have working alarms. We regularly go door-to-door and offer to check our residents’ smoke and CO alarms. If you would like us to check your smoke alarms, please call 227-2123 | <urn:uuid:e38c16e3-10aa-4005-97d7-194c782d36a3> | CC-MAIN-2018-51 | https://www.rrfd.org/outreach | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376828507.57/warc/CC-MAIN-20181217113255-20181217135255-00441.warc.gz | en | 0.956716 | 386 | 2.640625 | 3 |
|Standard:||SI derived unit|
|Named after:||Heinrich Hertz|
|Expressed in:||1 Hz =|
|SI base units||1/s|
The hertz (symbol: Hz) is the SI unit of frequency defined as the number of cycles per second of a periodic phenomenon. One of its most common uses is the description of sinusoidal waves, particularly those used in radio and audio applications.
The hertz is equivalent to cycles per second. In defining the second the CIPM declared that "the standard to be employed is the transition between the hyperfine levels F = 4, M = 0 and F = 3, M = 0 of the ground state 2S1/2 of the caesium 133 atom, unperturbed by external fields, and that the frequency of this transition is assigned the value 9 192 631 770 hertz" thereby effectively defining the hertz and the second simultaneously.
In English, hertz is used as both singular and plural. As an SI unit, Hz can be prefixed; commonly used multiples are kHz (kilohertz, 103 Hz), MHz (megahertz, 106 Hz), GHz (gigahertz, 109 Hz) and THz (terahertz, 1012 Hz). One hertz simply means "one cycle per second" (typically that which is being counted is a complete cycle); 100 Hz means "one hundred cycles per second", and so on. The unit may be applied to any periodic event—for example, a clock might be said to tick at 1 Hz, or a human heart might be said to beat at 1.2 Hz. The "frequency" (activity) of aperiodic or stochastic events, such as radioactive decay, is expressed in becquerels.
Even though angular velocity, angular frequency and hertz all have the dimensions of 1/s, angular velocity and angular frequency are not expressed in hertz , but rather in an appropriate angular unit such as radians per second. Thus a disc rotating at 60 revolutions per minute (RPM) is said to be rotating at either 2π rad/s or 1 Hz, where the former measures the angular velocity and latter reflects the number of complete revolutions per second. The conversion between a frequency f measured in hertz and an angular velocity ω measured in radians per second are:
This SI unit is named after Heinrich Hertz. As with every SI unit whose name is derived from the proper name of a person, the first letter of its symbol is uppercase (Hz). When an SI unit is spelled out in English, it should always begin with a lowercase letter (hertz), except where any word would be capitalized, such as at the beginning of a sentence or in capitalized material such as a title. Note that "degree Celsius" conforms to this rule because the "d" is lowercase.—Based on The International System of Units, section 5.2.
The hertz is named after the German physicist Heinrich Hertz, who made important scientific contributions to electromagnetism. The name was established by the International Electrotechnical Commission (IEC) in 1930. It was adopted by the General Conference on Weights and Measures (CGPM) (Conférence générale des poids et mesures) in 1960, replacing the previous name for the unit, cycles per second (cps), along with its related multiples, primarily kilocycles per second (kc/s) and megacycles per second (Mc/s), and occasionally kilomegacycles per second (kMc/s). The term cycles per second was largely replaced by hertz by the 1970s.
The term "gigahertz", most commonly used in computer processor clock rates and radio frequency (RF) applications, can be pronounced either /ˈɡɪɡəhɜrts/, with a hard /ɡ/ sound, or /ˈdʒɪɡəhɜrts/, with a soft /dʒ/. The prefix "giga-" is derived directly from the Greek "γιγας."
Sound is a traveling wave which is an oscillation of pressure. Humans perceive frequency of sound waves as pitch. Each musical note corresponds to a particular frequency which can be measured in hertz. An infant's ear is able to perceive frequencies ranging from 20 Hz to 20,000 Hz; the average human can hear sounds between 20 Hz and 16,000 Hz. The range of ultrasound, infrasound and other physical vibrations such as molecular vibrations extends into the megahertz range and well beyond.
Radio frequency radiation is usually measured in kilohertz, megahertz, or gigahertz; this is why radio dials are commonly labeled with kHz, MHz, and GHz. Light is electromagnetic radiation that is even higher in frequency, and has frequencies in the range of tens (infrared) to thousands (ultraviolet) of terahertz. Electromagnetic radiation with frequencies in the low terahertz range, (intermediate between those of the highest normally-usable radio frequencies and long-wave infrared light), is often called terahertz radiation. Even higher frequencies exist, such as that of gamma rays, which can be measured in exahertz. (For historical reasons, the frequencies of light and higher frequency electromagnetic radiation are more commonly specified in terms of their wavelengths or photon energies: for a more detailed treatment of this and the above frequency ranges, see electromagnetic spectrum.)
In computing, most central processing units (CPU) are labeled in terms of their clock rate expressed in megahertz or gigahertz (109 hertz). This number refers to the frequency of the CPU's master clock signal ("Clock rate"). This signal is simply an electrical voltage which changes from low to high and back again at regular intervals. This signal is also referred to as a square wave. Hertz has become the primary unit of measurement accepted by the general populace to determine the performance of a CPU, but many experts have criticized this approach, which they claim is an easily manipulable benchmark. For home-based personal computers, the CPU has ranged from approximately 1 megahertz in the late 1970s (Atari, Commodore, Apple computers) to up to 6 GHz in the present (IBM POWER processors).
|10–1 Hz||dHz||decihertz||101 Hz||daHz||decahertz|
|10–2 Hz||cHz||centihertz||102 Hz||hHz||hectohertz|
|10–3 Hz||mHz||millihertz||103 Hz||kHz||kilohertz|
|10–6 Hz||µHz||microhertz||106 Hz||MHz||megahertz|
|10–9 Hz||nHz||nanohertz||109 Hz||GHz||gigahertz|
|10–12 Hz||pHz||picohertz||1012 Hz||THz||terahertz|
|10–15 Hz||fHz||femtohertz||1015 Hz||PHz||petahertz|
|10–18 Hz||aHz||attohertz||1018 Hz||EHz||exahertz|
|10–21 Hz||zHz||zeptohertz||1021 Hz||ZHz||zettahertz|
|10–24 Hz||yHz||yoctohertz||1024 Hz||YHz||yottahertz|
|Common prefixed units are in bold face.|
Even higher frequencies are believed to occur naturally, in the frequencies of the quantum-mechanical wave functions of high-energy (or, equivalently, massive) particles, although these are not directly observable, and must be inferred from their interactions with other phenomena. For practical reasons, these are typically not expressed in hertz, but in terms of the equivalent quantum energy, which is proportional to the frequency by the factor of Planck's constant. | <urn:uuid:9728f167-bb07-4c57-bc74-f00d8b1689bb> | CC-MAIN-2015-27 | http://www.thefullwiki.org/KHz | s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375097396.10/warc/CC-MAIN-20150627031817-00182-ip-10-179-60-89.ec2.internal.warc.gz | en | 0.894593 | 1,690 | 4.09375 | 4 |
The rich and colorful history of the U.S. is not complete without discussing the contributions of Abraham Lincoln. As the 16th U.S. President, he accomplished a lot of huge things and resolved crucial issues such as the eradication of slavery. He also led the country surpass the American Civil War. He successfully replaced James Buchanan. Soon after his death, Andrew Johnson succeeded him as the 17th president of the country. Here is a quick glance at U.S. history, particularly when Abraham Lincoln became president.
When did Abraham Lincoln become president? The people elected him on November 6th in 1860. After this momentous election, he assumed the role as the 16th President of the U.S. when he was inaugurated on March 4, 1861. In the process, he defeated Constitutional Union Party’s John Bell, the Southern Democrat John C. Breckinridge and Democrat Stephen A. Douglas. This impressive feat made him the first ever U.S. President-elect from the state of Illinois. His office lasted until April 15, 1865 right after his brutal assassination.
During his presidency, Lincoln clearly expressed his opposition against slavery in the country. Furthermore, he spent a lot of effort in order to succeed against the American Civil War. He did just that after he defeated Confederate States of America, which closely adhered to secessionism. More than anything else, his biggest accomplishment was the introduction of measures that eventually led to the removal of slavery in the country.
In the 1864 U.S. elections, he was reelected to the office of the president. After this significant event, he went on to promote Ulysses S. Grant as U.S. General-in-Chief. This move happened on March 12, 1864. As U.S. president, he led the country past the Civil War. It ended on April 9, 1865, when the Confederate Army of Northern Virginia commanding leader Robert E. Lee surrendered to him together with numerous other rebels.
Other Important Details and Information
On July 22, 1862, he expressed clearly his opposition against slavery in the country after he discussed the Emancipation Proclamation draft to the members of his cabinet. Aside from ending slavery, he also made some valiant efforts to preserve the Union. On September 22, 1862, he announced the proclamation to the public. It was implemented on January 1, 1863.
According to historians, his efforts to free the slaves helped him won the reelection bid. While watching the play entitled “Our American Cousin” at Ford’s Theatre in Washington D.C. on April 14, 1865, a Confederate spy named John Wilkes Booth assassinated him. Until now, many people still consider Lincoln as one of the greatest U.S. presidents of all time. | <urn:uuid:d5320bef-bf1d-45ff-87b9-6c267c124f5f> | CC-MAIN-2018-43 | http://www.whenguide.com/when-did-abraham-lincoln-become-president.html | s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583510866.52/warc/CC-MAIN-20181016180631-20181016202131-00073.warc.gz | en | 0.981134 | 569 | 3.921875 | 4 |
A Mountain hut (also known as alpine hut, mountain shelter, and mountain hostel) is a building located in the mountains intended to provide food and shelter to mountaineers, climbers and hikers. Most mountain huts are tended to by personnel (hut-keeper) throughout the mountaineering season, who prepare meals and drinks for mountaineers, similar to a restaurant, but usually with a limited selection, as it is not always easy to transport the food to the hut. Furthermore, mountain huts provide simple sleeping berths with sleeping sheets, blankets and pillows. Some huts in more remote areas have no personnel, but mountaineers are allowed to access them. Some of the huts work year-round. | <urn:uuid:a8d84f3a-3c9c-401b-a278-17be789d80c4> | CC-MAIN-2020-40 | https://bghike.com/en/index.php/montains/balkan-mountain/balkan-huts | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600401578485.67/warc/CC-MAIN-20200927183616-20200927213616-00705.warc.gz | en | 0.97286 | 149 | 2.59375 | 3 |
A rose may be a rose by any other name, but when you call a dog a poodle it becomes a very different animal than if you call it a bulldog. Both the poodle and the bulldog are examples of dog breeds of which there are more than 400 recognized world-wide. Breed creation has played a significant role in shaping the modern dog from the length of his leg to the sound of his bark.
From as early as 70 AD basic characteristics and types of dogs were identified, but breeds as we recognize them today were not formalized until the 19th century when dog showing and breeding during the Victorian era became increasingly popular. At that time, the common approach to dog breeding took a turn that remains in effect to this day. During that period clubs were formed to propagate specific types of dogs and competitions were developed to reward the creation of perfect specimens of a breed based on physical criteria. Prior to this time dog competitions focused on the working ability of the dog such as hunting and chasing rather than on their outward appearance and the breeds were created through backcrossing and inbreeding to fix desired traits. In order to carry out the new competitions new rules were introduced to control breeding so that registering a dog with a breed club required that both of the dog’s parents be registered members of the breed club as well, effectively isolating each breed and reducing the available gene pool which dramatically affected the overall health of purebred canines. For instance, selection for coat color is believed to have influenced the development of severe spinal disease in the Cavalier King Charles spaniels and this is just one example out of many.
With the rise in interest in purebred dogs, Kennel Clubs were founded in the United Kingdom and USA in the late 1800s to govern dog showing and breeding, register dogs and establish the first stud books. The American Kennel Club (AKC) recognizes 184 breeds, while the UK Kennel Club currently recognizes 215 breeds. Breeds are classified them into groups, designated by the original function of the breed.
Use this interactive table to explore the world of dog breeds | <urn:uuid:2745c7d3-283f-48a3-a09e-3bbce25dfba1> | CC-MAIN-2018-34 | http://www.gopetsamerica.com/dog_breeds/index.aspx | s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221217354.65/warc/CC-MAIN-20180820215248-20180820235248-00385.warc.gz | en | 0.977818 | 424 | 3.40625 | 3 |
TEN THINGS EVERY AMERICAN SHOULD DO
TO PROMOTE RACIAL RECONCILIATION
One of the most striking findings from our work is that there are many Americans who are willing to accept that racial prejudice, privilege, and disparities are major problems confronting our Nation. Many of them told us that they would welcome concrete advice about what they should do. To fill that need, we offer a brief list of actions that individual Americans could take that would increase the momentum that will make us One America in the 21st century:
(1) Make a commitment to become informed about people from other races and cultures. Read a book, see a movie, watch a play, or attend a cultural event that will inform you and your family about the history and current lives of a group different than your own.
(2) If it is not your inclination to think about race, commit at least one day each month to thinking about how issues of racial prejudice and privilege might be affecting each person you come in contact with that day. The more that people think about how issues of race affect each person, the easier it will be for Americans to talk honestly about race and eliminate racial divisions and disparities.
(3) In your life, make a conscious effort to get to know people of other races. Also, if your religious community is more racially isolated than your local area, encourage it to form faith partnerships with racially different faith groups.
(4) Make a point to raise your concerns about comments or actions that appear prejudicial, even if you are not the targets of these actions. When people say or do things that are clearly racially biased, speak out against them, even if you are not the target. When people do things that you think might be influenced by prejudice, raise your concerns that the person or institution seriously consider the role that racial bias might play, even unconsciously.
(5) Initiate a constructive dialogue on race within your workplace, school, neighborhood, or religious community. The One America Dialogue Guide provides some useful ideas about how to construct a dialogue and lists some organizations that conduct dialogues and can help with facilitation.
(6) Support institutions that promote racial inclusion. Watch television programs and movies that offer racially diverse casts that reflect the real world instead of those perpetuating an inaccurately segregated view of America. Support companies and nonprofit organizations that demonstrate a commitment to racial inclusion in personnel and subcontracting. Write the institutions to let them know of your support for what they are doing.
(7) Participate in a community project to reduce racial disparities in opportunity and well-being. These projects can also be good ways of getting to know people from other backgrounds.
(8) Insist that institutions that teach us about our community accurately reflect the diversity of our Nation. Encourage our schools to provide festivals and celebrations that authentically celebrate the history, literature, and cultural contributions of the diverse groups that comprise the United States. Insist that our children's schools textbooks, curricula, and libraries provide a full understanding of the contributions of different racial groups and an accurate description of our historic and ongoing struggle for racial inclusion. Insist that our news sources--whether print, television, or radio--include racially diverse opinions, story ideas, analysis, and experts. Support ethnic studies programs in our colleges and universities so that people are educated and that critical dialogue about race is stimulated.
(9) Visit other areas of the city, region, or country that allow you to experience parts of other cultures, beyond their food. If you have an attitude that all people have histories, cultures, and contributions about which you could benefit from learning, it is usually not difficult to find someone who enjoys exposing others to their culture.
(10) Advocate that groups you can influence (whether you work as a volunteer or employee) examine how they can increase their commitment to reducing racial disparities, lessening discrimination, and improving race relations. Whether we are a member of a small community group or an executive of a large corporation, virtually everyone can attempt to influence a group to join the national effort to build One America. | <urn:uuid:8c7806db-1791-4fd8-9e7a-eca8b462e431> | CC-MAIN-2014-10 | http://clinton2.nara.gov/Initiatives/OneAmerica/what.html | s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394010672371/warc/CC-MAIN-20140305091112-00015-ip-10-183-142-35.ec2.internal.warc.gz | en | 0.953957 | 833 | 2.9375 | 3 |
Northerners who are starting to surface from the confines that kept them safe from the frigid temperatures that have encased much of North America might get a reward and be able to see the gorgeous northern lights for the next few days. Space weather forecaster Joe Kunches has stated that the Sun sent out an extremely strong solar flare late Tuesday evening. The solar blaze occurred when it was facing directly toward the Earth. That meant the energy from this burst may even continue to send energy this way for several days.
This type of condition is what ends up causing the northern lights. This solar flare might really shake up the Earth’s magnetic field and magnify the Aurora Borealis southward, going possibly as far down as central Illinois, Colorado and to the southern part of lower Michigan. The best possible viewing is believed to be Thursday evening, if the weather permits.
That is where the trouble comes in. Weather does not always cooperate. The main problem people find with getting to see the northern lights is cloud cover. In the deep cold of winter, there are usually a lot of clouds in the northern areas that can see the northern lights. There may be some good news this go-round. Weather forecasters have stated that for most of the viewing area, it is believed that cloud cover may be thin on Thursday evening but no one will know for sure until then. There are always sprinkled patches of clouds around the sky this time of year. There may be very good viewing for those who have the chance, but who knows for sure.
The University of Alaska is stating that most of Canada and the northern parts of the United States should be able to see the northern lights without any problem. Boston, Chicago, Seattle, Cleveland and Des Moines might see the sparkling colors sitting low on the skyline.
This solar storm has already started causing problems for airline flights, causing them to have to be diverted around the poles and may even mess with various GPS devices on Thursday.
Weather forecasters also have a difficult time predicting just exactly when the northern lights will happen. The sky has to obviously be dark. The times of midnight to 5 a.m. are usually considered the best times when northern lights put on their greatest show.
This will be the very first northern lights display of 2014 for the United States and Canada. It may be a really good one since the solar flare was so strong. The solar flare on Tuesday ended up setting the stage for the possible bright display, which might happen across the northern part of the United States on Thursday night. It takes a solar flare to more directly face the Earth, as was stated above, so to have a much better chance of having strong auroras and for them to be visible.
If the northern lights do show up Thursday night, it may give northerners a bit of a boost from the frigid temperatures they have had to endure the past few days.
By Kimberly Ruble
Baraboo News Republic | <urn:uuid:8accac57-223b-44a6-90f6-c408bdbd6a3b> | CC-MAIN-2017-22 | http://guardianlv.com/2014/01/northern-lights-on-show-for-next-few-days/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463608765.79/warc/CC-MAIN-20170527021224-20170527041224-00446.warc.gz | en | 0.962818 | 599 | 2.59375 | 3 |
Unless China abandons its unilateralist approach to cross-border rivers and enters into water-sharing arrangements with its neighbors, prospects for a rule-based order in Asia could perish forever.
Asia’s water resources are largely transnational, making inter-country cooperation and collaboration essential. Yet the vast majority of the 57 transnational river basins in continental Asia have no water-sharing arrangement or any other cooperative mechanism. This troubling reality has to be seen in the context of the strained political relations in several Asian sub-regions.
The river basins in the Asian continent that have a treaty-based sharing arrangement currently in place are the Al-Asi/Orontes (Lebanon-Syria), Araks-Atrek (Iran-Russia), El-Kaber (Lebanon-Syria), Euphrates (Iraq-Syria), Gandhak (India-Nepal), Ganges (Bangladesh-India), Indus (India-Pakistan), Jordan (Israel-Jordan), and Mahakali (India-Nepal).
Arrangements in some of these basins, such as the Gandhak, Jordan, and Mahakali, do not incorporate a formula dividing the shared waters between the parties but rather center on specific water withdrawals, transfers, or rights of utilization. An important arrangement in the Mekong Basin is centered on sustainable water management but without any water sharing.
The only treaties in Asia with specific sharing formulas on cross-border river flows are the ones between India and its two downriver neighbors, Pakistan and Bangladesh. The Indus Waters Treaty remains the world’s most generous water-sharing arrangement, under which India agreed to keep for itself only a 19.48 percent share of the waters. (The volume of waters earmarked for Pakistan — by way of comparison — is over 90 times greater than the 1.85 billion cubic meters the U.S. is required to release to Mexico under a 1944 treaty with that country.)
In addition, Soviet-era water arrangements in Central Asia continue to hold, even if tenuously. Such is the competition over scarce water resources that even sharing arrangements are not free of rancor and discord.
More broadly, Asia’s water map stands out for the unique riparian status that China enjoys. It has established a hydro-hegemony unparalleled on any continent. China is the source of rivers for a dozen countries. No other country serves as the riverhead for so many countries. This makes China the driver of inter-riparian relations in Asia. Yet China also stands out for not having a single water-sharing arrangement or cooperation treaty with any co-riparian state. Its refusal to accede to the Mekong Agreement of 1995, for example, has stunted the development of a genuine basin community.
By building mega-dams and reservoirs in its borderlands, China is unilaterally re-engineering the flows of major rivers that are the lifeblood for the lower riparian states.
To be sure, China trumpets several bilateral water agreements. But none is about water sharing or institutionalized cooperation on shared resources. Some accords are commercial contracts to sell hydrological data to downstream nations. Others center on joint research initiatives, flood-control projects, hydropower development, fishing, navigation, river islands, hydrologic work, border demarcation, environmental principles, or nonbinding memorandums of understanding.
By fobbing off such accords as water agreements, China creates a false impression that it has cooperative riparian relations. In fact, it is to deflect attention from its unwillingness to enter into water sharing or institutionalized cooperation that Beijing even advertises the accords it has signed on sharing flow statistics with co-riparian states.
These agreements are merely contracts to sell hydrological data, which some other upstream countries provide free to downriver states.
The plain fact is that China rejects the very concept of water sharing. It also asserts a general principle that standing and flowing waters are subject to the full sovereignty of the state where they are located. It thus claims “indisputable sovereignty” over the waters on its side of the international boundary, including the right to divert as much shared water as it wishes for its legitimate needs.
This principle was embodied in the now-discredited “Harmon Doctrine” in the United States more than a century ago. This doctrine is named after U.S. Attorney General Judson Harmon, who put forth the argument that the U.S. owed no obligations under international law to Mexico on shared water resources and was effectively free to divert as much of the shared waters as it wished for U.S. needs.
Despite this thesis, the U.S. went on to conclude water-sharing agreements with Mexico between 1906 and 1944.
China, in rejecting the 1997 U.N. Watercourse Convention (which sets rules on shared water resources to establish an international water law), placed on record its assertion of absolute territorial sovereignty over the waters within its borders: “The text did not reflect the principle of territorial sovereignty of a watercourse state. Such a state had indisputable sovereignty over a watercourse which flowed through its territory.” The Harmon Doctrine may be dead in the country of its birth but it appears to be alive and kicking in China.
In this light, it is hardly a surprise that water has become a new divide in China’s relations with riparian neighbors. This divide has become apparent as Beijing has increasingly shifted its dam-building focus from the dam-saturated internal rivers to international rivers, most of which originate on the water-rich Tibetan Plateau.
Then Indian Prime Minister Manmohan Singh personally proposed to Chinese President Xi Jinping and Premier Li Keqiang, in separate meetings in the spring of 2013, that the two countries enter into a water treaty or establish an intergovernmental institution to define mutual rights and responsibilities on shared rivers. Both Xi and Li, however, spurned the proposal.
The Indian assumption that booming bilateral trade would make Beijing more amenable to solving border and water disputes has clearly been belied.
Only three important transnational rivers — the Amur, the Irtysh, and the Ili, which flow to Russia or Kazakhstan — originate in China outside the Tibetan plateau, whose wealth of water and mineral resources is a big factor in its political subjugation.
China’s water disputes with neighbors extend even to North Korea, with which it has yet to settle issues relating to Lake Chonji and two border rivers, the Yalu and the Tumen.
China’s rush to build more dams promises to roil inter-riparian relations, foster greater water competition and impede the already slow progress toward regional cooperation and integration. By erecting dams, barrages and other water diversion structures in its borderlands, China is spurring growing unease and concern in downriver countries. Getting China on board has thus become critical to shape water for peace in Asia.
At a time when dam building has run into growing grass-roots opposition in Asian democracies like Japan, South Korea, and India, China will remain the nucleus of the world’s dam projects. Significantly, China is also the global leader in exporting dams.
While the dams China is building in Africa and Latin America are largely designed to supply the energy for its mineral-resource extraction and processing there, many of its dam projects in Southeast Asia are intended to generate electricity for export to its own market. China is demonstrating that it has no qualms about building dams in disputed territories, such as Pakistan-administered Kashmir, or in areas torn by ethnic separatism, like northern Myanmar.
Transparency, collaboration, and sharing are the building blocks of water peace. Renewed efforts are needed to try and co-opt China in basin-level institutions. Without China’s active participation in water institutions, it will not be possible to transform Asian competition into cooperation.
Only water institutions involving all important co-riparians can make headway to regulate inter-country competition, help balance the rights and obligations of co-basin states, and promote sustainable practices.
If China were to accept rule-based cooperation, it would have to strike a balance between its right to harness transnational water resources for its development and a corresponding obligation (embedded in customary international law and the U.N. Watercourse Convention) not to cause palpable harm to any co-riparian state.
A balance between rights and obligations indeed is at the heart of how to achieve harmonious, rule-based relations between co-basin states. To be sure, any water arrangement’s comparative benefits and burdens should be such that the advantages outweigh the duties and responsibilities, or else a key state that sees itself as a loser may walk out of discussions or fail to comply with its obligations.
China must be persuaded that its diplomatic and economic interests would be better served by joining forward-looking institutionalized cooperation. Beijing will need considerable convincing, of course, if it is to participate in any basin-level framework centered on compromise, coordination, and collaboration. If China insists on staying on its current unilateralist course, the risk is not only that it will define and implement its water interests in ways irreconcilable with those of its co-riparian states, but also that prospects for a rule-based order in Asia could perish forever.
Brahma Chellaney is a geostrategist. This is excerpted from his paper in the latest issue of Asian Survey by permission of the Regents of the University of California. | <urn:uuid:64609030-5582-4fbb-9769-aa03ac081a3d> | CC-MAIN-2019-47 | https://chellaney.net/2014/09/12/co-opt-the-water-hegemon/?shared=email&msg=fail | s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496668004.65/warc/CC-MAIN-20191114053752-20191114081752-00257.warc.gz | en | 0.94964 | 1,970 | 3.375 | 3 |
We will finish reading the novel before Thanksgiving. We will further discuss the novel upon return from the holiday break. I wanted the students to know how the story ends so they may have a better idea of what they would like to do as a project.
The project is due Monday, December 6
The students may work alone, in pairs, or in small groups depending on the project they pick.
We have been discussing the different types of projects that can be done.
Here are some ideas.
Write an epilogue for the story. Let us know what you think happens to the characters.
You may write an epilogue or act out a final scene.
Create a newspaper that may have appeared in this time period.
If you like to draw, sketch various scenes from the book.
Put together a diorama depicting at least two scenes from the book.
Create a 3-D map of colonial Boston
Create the route that Paul Revere took? Did Paul Revere actually do it?
Create several political cartoons that may have appeared at this time
Act out scenes from the book. (Not the violent ones)
Put together a panel and interview various characters in the novel.
Write and perform a song about the book.
Create a board game for the novel.
Put together a pictorial essay on the fashion for ladies and gentlemen.
Research etiquette for the time period.
Create a war scene for the battle of Lexington and Concord.
Compile and explain protests songs of this period or another period in history.
How is Yankee Doodle a protest song?
Research an actual figure who appears in the novel.
Research political cartoons.
Research the blue laws. | <urn:uuid:72e643b6-3d6a-4c99-9d50-9644747d912d> | CC-MAIN-2016-50 | https://sites.google.com/site/homepagemrsshirman/johnny-tremain-project | s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698543030.95/warc/CC-MAIN-20161202170903-00113-ip-10-31-129-80.ec2.internal.warc.gz | en | 0.942064 | 349 | 3.296875 | 3 |
|» Key to Instructions|
|To help readers follow the instructions in this article, we used two different typefaces: Boldface type is used to identify the names of icons, agendas and URLs. Sans serif type shows the names of files and the names of commands and instructions that users should type into the computer.|
Q. Some of my Excel projects require me to input the same data on several worksheets. As you can imagine, it’s a time-consuming task. Since you’ve suggested so many handy shortcuts for other jobs, I wonder if you have one for this task?
A. You’re in luck. There’s a speedy way to enter data on multiple worksheets simultaneously. The trick is to group the worksheets in which you want the data entered. In fact, by grouping worksheets, you can also simultaneously enter both formatting and formulas—three solutions for the price of one.
To do this, you first have to understand the grouping function. You can group two or more consecutive worksheets (for example, January, February, March) or two or more nonconsecutive worksheets (January, March, 2001).
Let’s do the consecutive sheets first. Click on the tab of the first worksheet, and while holding down the Shift key, click on the tab of the last sheet in the group. That will group all the sheets between the first and last sheet tab.
To group nonconsecutive sheets (such as January, February, April), click on the tab of the first worksheet. This time, hold down the Ctrl button and click on any of the sheets you want included in the group. The worksheets you select will appear in white, as shown below.
Any data, formula or formatting you enter or apply in one worksheet will appear simultaneously in the other grouped worksheets.
To remove the grouping function, click any tab not in the group or right-click on any tab in the group and select Ungroup Sheets from the shortcut menu. | <urn:uuid:4952cbc8-476d-40dc-bb59-d3317be36398> | CC-MAIN-2017-26 | http://www.journalofaccountancy.com/issues/2001/nov/duplicatedatainworksheets.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321553.70/warc/CC-MAIN-20170627203405-20170627223405-00513.warc.gz | en | 0.885476 | 429 | 2.734375 | 3 |
Copper Leaf, Pulchella - Plant
Description for Copper Leaf, Pulchella
Basic varieties come in several different colors - red, pink and white. The red is a rusty mix of coppery red with bright pink accents. Pink has beautiful mottled pink, green and white leaves (bright pink in more sun, pastel pink in part shade). White is creamy white mixed with green. Newer cultivars include smaller-leaved shrubs like Inferno as well as new colors such as showy Tricolor with red, green and yellow foliage.
|Common name||Flower colours||Bloom time||Height||Difficulty|
|Copper plant.||These shrubs do flower but with narrow, dangling, fuzzy blooms (called "catkins") similar in color to the foliage so the blossoms are all but invisible.||-||3 to 5 feet.||Easy.|
Planting and care
Add composted cow manure and top soil (or organic peat humus) to the hole when you plant. Plant 3 feet apart. Come out from the house 2-1/2 to 3 feet. If you re planting along a driveway or walk, come in about 3 or 4 feet. Copperleaf plants will work fine in a container.
|Copperleaf plants like full sun to part shade - and the more sun,the brighter the leaf color. It will enjoy part shade too, especially in hot and dry climates.||Plant your copper leaf in organically rich soil that has been amended with compost.||Keep a regular watering schedule for these shrubs. If they stay too dry for too long they won t look their best.||Copper plant prefers temperatures above 50 degrees Fahrenheit.||Fertilize 3 times a year - in spring, summer and fall - with a good granular fertilizer.|
Caring for Copper Leaf
- Trim occasionally for shape and height (do branch trimming rather than using hedge trimmers).
Give the plant a hard pruning in spring (late March or early April) for bushier growth and to keep it the size you want.
Typical uses of Copper Leaf
Ornamental use: Landscape uses for copper plant
accent by the entry
single yard specimen
anchor plant for a bed of smaller plants
lining a walk or drive
surrounding tall palms
along a blank wall
lining the edge of a porch, deck or patio
Want to write review ?Click here to Login
What garden lovers say ... ?
How often should i water it and does it come with soil or should i get my own soil?
I like the plant, this is the only plant survive 7 days in traffic and after 2 days it becomes healthier again.
This plant can be planted in a simple pot. | <urn:uuid:de63bf03-cad4-4320-9098-216e28628f52> | CC-MAIN-2018-22 | https://nurserylive.com/flowering-plants/copper-leaf-plants-in-india | s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794870604.65/warc/CC-MAIN-20180528004814-20180528024814-00404.warc.gz | en | 0.872281 | 579 | 2.953125 | 3 |
“Our nation was born in genocide when it embraced the doctrine that the original American, the Indian, was an inferior race. Even before there were large numbers of Negroes on our shore, the scar of racial hatred had already disfigured colonial society. From the sixteenth century forward, blood flowed in battles over racial supremacy.”
– Martin Luther King, Jr., from “Why We Can’t Wait” (1963)
In recent weeks, a 15-year-old girl was assaulted by a New Haven Police Officer and just this past Tuesday, video footage surfaced of Walter Scott murdered by Officer Michael Slager over a traffic violation. Though the fire of Ferguson may have seemed to die down, its spirit lives on like burning embers, inhabiting our bodies and bodies across the nation.
A few month ago as we stood outside the Native American Cultural Center, cleansing ourselves with sage and a light rain, we could hear echoes of a Black Lives Matter demonstration flooding the streets of New Haven. While we mourned the massacre of about two hundred peaceful Cheyenne and Arapaho people that occurred 150 years ago, masses of people mourned the death of Michael Brown and Eric Garner just a few months ago.
Our chants of “We cry out” faded into “Eric Garner, Michael Brown, shut it down, shut it down.” We lit candles, sang, and prayed for the stolen lives at Sand Creek and throughout Indian country. At the same time, protesters marched and held a die-in demonstration to demand justice. The spirits of the Native American and African American communities could not have felt more connected to me than in these short moments. It was a beautiful reminder that the struggle against systemic racism and state brutality is a fight we all share. Although we are ethnically different, and although our experiences have been vastly different, our fates are linked.
On November 29th, 1864, 700 armed Colorado militiamen attacked a peaceful Cheyenne and Arapaho village and killed about two hundred people, most of whom were women, children, and older men. The Union army, led by Colonel John Chivington, scalped, mutilated, and paraded the villagers’ lifeless bodies.
Chief Black Kettle had raised an American flag over Fort Lyon in anticipation of passing U.S. troops to signal alliance with the U.S. However, the flag was ignored and during the brutal onslaught a white flag of capitulation was raised in desperation, but the soldiers continued on their rampage. Hands up, don’t shoot.
In the years preceding the Sand Creek Massacre, the U.S. signed the Fort Laramie Treaty of 1851, which recognized the traditional territories of the Arapaho, Cheyenne, Sioux, Crow, Assiniboine, Mandan, Hidatsa, and Arikara. The US would respect traditional land claims and give annuity to the tribes, as long as they could build forts on Indian land to ensure safe passage for Americans on the Oregon and Santa Fe trails to get to the California gold rush) and in exchange, allowed the U.S. to build forts on these territories. The Cheyenne and Arapaho were forced to cede most of their lands by 1861. With the onset of the Civil War, the U.S. forces in Colorado became more militarized, and Governor John Evans developed a harsh attitude towards Indians.
As Colin Calloway, Professor of History and Professor of Native American Studies at Dartmouth, puts it, over time “war became so common in Indian country, wars against Indians such a recurrent feature of early American history, that it was easy to assume Indians were warlike by nature and therefore merited treatments as ‘savages.’ The Indian wars also, some would say, left a more sinister mark on American culture: a nation built on conquest could not escape the legacy of its violent past.” The combination of hundreds of years of oppressive and vicious attitudes towards Native Americans and the militarization of the U.S. forces would culminate in the genocide and ethnic cleansing that took place at Sand Creek.
Simon J. Ortiz of the Acoma Pueblo published From Sand Creek to memorialize and honor the Cheyenne and Arapaho people who lost their lives in 1864. Ortiz juxtaposes historical narrative with free form poetry to grapple with the legacy of Sand Creek. His poetry works against the exclusion of Native Americans in U.S. history and challenges the master narrative of “discovery,” retracing the roots of this nation back to its indigenous population, who had inhabited Turtle Island for thousands of years.
He describes the transgenerational suffering, writing: “They crossed country / that would lay / beyond memory. / Their cells / would no longer bother / to remember. / Memory / was not to be trusted.” These lines describe the distressing issue of the American government’s denial of the mass genocide of Native peoples, an issue that has effectively made all of American society, easily forgetting to look down at its own bloodied hands,ignorant and indifferent to what its government had to do to become what it is today.
It was only fate that the uprisings catalyzed by the Michael Brown case in Ferguson fall on the 150th anniversary of the Sand Creek Massacre. There was indictment for neither Darren Wilson in the Michael Brown case, after he shot the unarmed teenager, nor Daniel Pantaleo in the Eric Garner case, after he killed the father of six with an illegal chokehold. Although the actions of Colonel Chivington were condemned, he was only forced to resign without any criminal charges being brought against him. These are stories seen repeatedly throughout history of the United States allowing the genocide of the marginalized peoples in its society. Now, more than ever, the African American and Native Americans communities, along with other minorities, are uniting over their shared pain and in the fight for equality, crying out “Idle No More” and “No Justice, No Peace.”
by Leanne Motylenski | <urn:uuid:1b46d95a-e133-4a1a-9d1e-c9db49032aa0> | CC-MAIN-2017-17 | http://downatyale.com/from-sand-creek-to-ferguson/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917125074.20/warc/CC-MAIN-20170423031205-00525-ip-10-145-167-34.ec2.internal.warc.gz | en | 0.967098 | 1,261 | 2.953125 | 3 |
Depression is a pandora’s box of feelings and symptoms. In defining depression, a common thread could be any lingering or pronounced feeling ( sadness, lethargy, self loathing, hopelessness etc ) that is related to an aversion of activity. A child, or an adult who lives on a diet of sugary, nutrient-deficient foods, may feel so lethargic as to prefer sitting immobilised in front of a screen. This may lead to the condition known as “depression” and could be labelled as such. Perhaps along with finding a satisfactory definition for the condition, we should also look a little closer at the reasons depression has become so prevalent in our modern society, in both young and old.
The front line treatment for depression treatment is antidepressants, which often cause side effects and provide inadequate relief.
It is not normal to be depressed for long periods of time, even when a past trauma is involved. We were designed to experience happiness. Our emotional brain, called the limbic, when functioning well, is made to allow us to experience life’s rewards. Often, when we are in a chronic state of depression, the limbic brain’s ability to achieve reward is compromised. It may be due to a diet that is not capable of producing mental health, lack of proper mobility and exercise, candida, even metabolic poisoning. But usually, there is a physical component that needs to be revealed and treated in tandem with the psychology.
By searching for underlying factors contributing to depression, these factors can be addressed and symptoms can be relieved using treatment without prescription drugs.
The most common causes of aversion to activity are malnutrition, physical pain, physical exhaustion, mental exhaustion, and stress. Unfortunately, the word depression has come to be used so freely and casually, that the most apparent reasons for the condition can often be completely overlooked. Instead of a rigorous search for possible environmental, nutritional or lifestyle factors, a quick trip to a doctor for treatment limited to medication is commonly resorted to with dismal results. Like a mechanic who tries to adjust the carburetor by letting air out of the tires, failure to correct the situation will occur.
The comprehensive, individualized and drug-free depression treatments we employ usually provide relief that far exceeds the benefits of antidepressants.
Perhaps it is time to take a wider look at the factors leading up to the diagnosis of depression. This is what is done at the Alternative to Meds Center. Simple drugging of depression symptoms is not the most healthy treatment nor the most economic solution especially in the long run. Years of suffering take its toll on not only marriage, schoolwork and satisfaction in day to day life, it can cost one their job as well as their happiness and health. If one has been unable to get a handle on depression we invite a call to any of our knowledgeable staff at the number listed on this page who will be happy to discuss a targeted plan of treatment for depression geared toward finally getting the relief that is sought. We also offer tapering programs for Paxil withdrawal and many other drugs. If you or a loved one has been unable effectively relieve depression we invite you to call one of our knowledgeable counselors at 1 (800) 301-3753.
Dr. John Motl, M.D.
Dr Motl is currently certified by the American Board of Psychiatry and Neurology in Psychiatry, and Board eligible in Neurology and licensed in the state of Arizona. He holds a Bachelor’s of Science degree with a major in biology and minors in chemistry and philosophy. He graduated Creighton University School of Medicine with a Doctor of Medicine. Dr. Motl has studied Medical Acupuncture at the Colorado School of Traditional Chinese Medicine and at U.C.L.A. | <urn:uuid:b6cc428e-7b46-4929-abe7-0f032fc951c3> | CC-MAIN-2019-47 | https://www.alternativetomeds.com/mental-health/depression/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496670821.55/warc/CC-MAIN-20191121125509-20191121153509-00070.warc.gz | en | 0.956626 | 764 | 3.171875 | 3 |
By the third week after conception, the primitive mouth has formed. Over the next few weeks, the tongue, jaws and palate develop. During the sixth week, the formation of embryonic cells or tooth buds that eventually form into teeth commences. By eight weeks, the tooth buds of all the primary (baby) teeth can be discerned; by twenty weeks, the tooth buds of permanent teeth start to develop. The development of the teeth within the jaw continues after birth.
Normally, the first primary teeth start to appear in the mouth around six months after birth. The primary central incisors, lateral incisors, first molars, canines and second molars normally appear in this order at intervals from 6-24 months.
By age two and a half years, most children have their full complement of 20 primary teeth – 10 teeth in the upper (top) jaw and 10 teeth in the lower (bottom) jaw.
As stated, prevention is better than cure, since pregnancy does not automatically damage a woman’s teeth. If the mother’s intake of calcium is adequate during pregnancy, her bones – not her teeth – will provide the calcium her growing baby needs. This calcium loss is quickly made up after breastfeeding is stopped. However, the demands of pregnancy can lead to particular dental problems in some women. With proper hygiene at home and professional help from your dentist, her teeth should remain healthy throughout pregnancy.
Babies are not born with a sweet tooth. Babies will enjoy home-made baby foods without sugar. If you’re buying baby foods, look out for the ones without sugar. You don’t have to buy special juices either. Babies will enjoy ordinary fruit juice. For very young babies you should dilute juice with plenty of cooled, boiled water.
Sugar and sugary foods can be a tooth’s worst enemy. For good dental health, cut down on how often a baby eats sugary foods and drinks. Give them as part of a meal instead of between meals if you can. Having sugary foods and drinks too often puts the teeth at risk of tooth decay. This is especially important once the baby teeth start to appear (around 6 months).
The best way of caring for a baby’s teeth is to give food that helps a baby grow and develop. You can use the Food Pyramid as a guide – choose plenty of foods from the bottom of the pyramid, and less of the foods at the top. You can see that sugary foods are at the top of the pyramid.
It is important to never give sweet drinks in the baby bottle. This can be harmful once a baby’s teeth start appearing. Try not to let the baby develop the habit of sleeping with a bottle at night or at nap time. Infants and toddlers should not be put to bed with a feeding bottle or dinky feeder. A baby’s bottle should be used for feeding – not as a pacifier.
A baby will be able to use a cup at 6 months, and they can be weaned off a bottle by 12 months. Give them plenty of cooled, boiled water to drink and about 1 pint of milk each day (breast or formulated milk up to one year and cow’s milk after that).
Some babies get sore gums when they are teething. Babies can get restless or irritable, and they might start sleeping or feeding badly. Sometimes this may lead to problems digesting food or to loose stools. Teething doesn’t make a baby really sick, though, so any sick child should be seen by a doctor – don’t pass it off as just ‘teething’.
If a baby’s gums seem sore or the baby seems cranky and dribbles a lot, there are some things that you can do to help.
Try giving them something to chew on. There is a good selection of teething rings on the market – but make sure they are made of soft material and are big enough so that there is no danger of choking. Some parents/carers find that teething rings containing fluid which can be cooled in the fridge are best. Milk, cooled, boiled water, or very diluted sugar-free fruit juices may help – sweet drinks do not. If a baby wakes at night and is irritable, you can use a mild pain reliever – preferably sugar-free. Ask your doctor or public health nurse to recommend one. Avoid ointments which numb the gum unless your dentist recommends them.
Not all children need soothers or pacifiers. If you feel the baby needs a pacifier, it is important to make sure it is the correct design. An orthodontic one is the most suitable. Only use it when absolutely necessary and wean the baby off it as soon as possible. Otherwise, it may have long term ill effects on the way a baby’s teeth grow. Never dip the soother into sugary liquid (honey, jams or syrupy medicines) to encourage the child to use it.
Babies get a lot of pleasure and satisfaction from sucking things – including their own thumbs. There is no real harm in letting them suck their thumbs. Most infants will stop on their own. You can expect children to give up sucking by the age of 4 years.
Thumb sucking is only really a problem if children go on sucking their thumbs after this age. Some children suck their thumbs very hard. This can pull their teeth out of shape. Children who suck hard should be helped to give up. If you want to help a child give up sucking, remember that sucking makes the child feel contented and secure. Encourage the child to do other things instead.
When children are learning to walk they are especially likely to fall and injure their teeth or mouth. You should bring a child to see a dentist if they hurt their mouth and the bleeding doesn’t stop, or if they damage a tooth, or if they fall and drive a tooth back up into their gum. Your dentist will be able to take an x-ray and decide if anything needs to be done.
Pre-pregnancy dental health
You are less likely to have dental problems during pregnancy if you already have good oral hygiene habits. Suggestions include:
- Brush your teeth at least twice daily with fluoride toothpaste.
- Floss between your teeth.
- Visit your dentist regularly.
If you are planning on getting pregnant, but you are also planning on having some elective dental procedures, see your dentist. It is more convenient to have elective procedures done before you conceive. If you require dental treatment during pregnancy, non-urgent procedures are often performed after the first trimester.
Pregnancy may affect your dental care. For example, the dentist may put off taking x-rays until after the birth of your baby. If dental x-rays are unavoidable, the dentist can take precautions to ensure your baby’s safety. If the pregnant woman has a dental condition that requires general anaesthesia or medications, she should talk to her dentist, doctor or obstetrician for advice. | <urn:uuid:276f833d-4740-402b-b4a1-6342a52e66c4> | CC-MAIN-2019-13 | https://www.immploy.com/2019/01/24/toothache-awareness-day-prevention-better-cure/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202572.29/warc/CC-MAIN-20190321193403-20190321215403-00247.warc.gz | en | 0.951223 | 1,469 | 3.625 | 4 |
Introduction to Immune Deficiency Disorders
- The immune deficiency conditions are a group of disorders that result from one or more abnormalities of the immune system and that manifest clinically as an increased susceptibility to infection.
- This group of human diseases was ushered in by a single seminal observation made by a clinician who carefully studied a child with recurrent respiratory infections and who later documented the first immune deficiency disorder in the human.
- In 1952, Colonel Ogden Bruton, while searching for the reasons why a young child hospitalized at Walter Reed Army Hospital in Washington, DC, was suffering from repeated and life-threatening infections, found that the child was unable to synthesize specific antibodies and, later, that the child’s serum lacked gamma globulin. Further, the child’s susceptibility to infection was reversed by the administration of serum gamma globulin.
- This landmark discovery represents a consummate example of clinical research that led not only to the current explosive molecular and phenotypic dissection of the immunodeficiencies that are described in this chapter, but that also set the stage for the subsequent development of clinical immunology as we know it today.
- X-linked agammaglobulinemia (XLA) represents the first of over 150 entities that have come to be known as the primary immunodeficiency disorders, some of which will be described here (for a fuller account, refer to Chapter 16 of Bellanti, JA (Ed). Immunology IV: Clinical Applications in Health and Disease).
- Although these are rare, they have been useful in unraveling many of the molecular pathways that govern both the innate and the adaptive immune systems and that have provided new diagnostic and therapeutic modalities for the treatment of a wide variety of allergic (Chapter 18, Bellanti, JA (Ed). Immunology IV: Clinical Applications in Health and Disease), autoimmune disorders (Chapter 19, Bellanti, JA (Ed). Immunology IV: Clinical Applications in Health and Disease), and malignant diseases (Chapters 20 and 21, Bellanti, JA (Ed). Immunology IV: Clinical Applications in Health and Disease).
- Because most of the primary immunodeficiencies result from abnormalities in cellular maturation emanating from known molecular lesions in signaling pathways, transcription molecules, or cytokine systems, it may be useful to frame these defects according to the normal ontogenetic development of the immune system described in sections 1, 2 and 3.
- These are shown schematically in Figure 1.
- The fetal bone marrow provides stem cells that have the potential to progressively differentiate into: (1) a hematopoietic lineage that contains individual precursor cells that give rise to the erythrocytes, granulocytes, monocytes, and platelets; and (2) a lymphopoietic lineage that contains precursor cells that give rise to T lymphocytes, B lymphocytes, and natural killer (NK) cells.
- Mononuclear cells (monocytes) migrate to the lung, liver, spleen, brain, and peripheral lymph nodes where they differentiate into specialized macrophages (e.g., alveolar cells, Kupffer cells, and microglial cells) capable of antigen uptake, processing, and antigen presentation to T lymphocytes.
- Lymphoid precursors are influenced by cytokines as well as a variety of hormonal factors that cause them to differentiate into mature T lymphocytes (e.g., thymic hormones) or B lymphocytes. Although the hormonal source of B cell maturation in the chicken is known to be derived from the bursa of Fabricius, the source of only some of the factors in the bone marrow responsible for B cell differentiation is known in the human.
- T cells may be recognized by the presence of the T cell receptor (TCR) as well as specific membrane proteins referred to as cluster of differentiation (CD) molecules recognized by specific monoclonal antibodies which differentiate lymphocytes into two major families, CD4+ T helper and CD8+ T cytotoxic cells.
- These CD surface proteins on T cells change during maturation. For example, they appear and then disappear as the cell matures from a stem cell to a fully developed T lymphocyte, e.g., double negative CD4−/CD8−, to a double positive CD4+/CD8+, to a specialized mature T cell bearing a single marker, i.e., CD4+ or CD8+ single positive T cells, which emigrate from the thymus into the peripheral tissues.
- B cell differentiation shows similar changes of cell surface proteins with maturation. Pre-B cells have no surface immunoglobulin but later develop surface IgM and IgD immunoglobulins and then lose these as the cell differentiates into fully developed B cells bearing IgM, IgG, IgA, or IgE.
- Until recently, it has been difficult to place the developmental origin of the NK cell in the developmental scheme of monocytes, myeloid cells, T cells, or B cells. NK cells share some surface membrane characteristics of both T lymphocytes and monocytes. It is now recognized that there exists a “natural” population of NK cells and an induced population of NK cells bearing an invariant T cell receptor that are referred to as iNKT cells. These cells also play an important role in killing of cancer cells and viral-infected cells.
The Primary Immunodeficiencies
- The immunodeficiencies have been classically divided into: (1) the phagocytic cell deficiencies, (2) the complement deficiencies, (3) the antibody deficiencies, (4) the cell-mediated deficiencies, and (5) the combined cellular and antibody deficiencies.
- Shown in Figure 2are the relative frequency distributions of the primary immunodeficiencies according to this classification. As can be seen from this figure, the antibody deficiencies are by far the most frequently diagnosed.
Defects of Oxidative Metabolism
Chronic Granulomatous Disease (CGD) (MIM ID #306400)
- This disorder is the most common of the syndromes associated with defective oxidative metabolism resulting in diminished bactericidal activity. In most cases, it is inherited as an X-linked trait, although autosomal recessive forms are known.
- The underlying defect is impaired generation of activated forms of oxygen, i.e., superoxide (O2−) and hydrogen peroxide (H2O2) due to a variety of enzymatic defects involving the nicotinamide adenine dinucleotide phosphate (NADPH) oxidase system
- The NADPH oxidase is a multicomponent enzyme complex required for the generation of superoxide and its metabolites hydrogen peroxide and bleach. The structural components are referred to as phox (phagocyte oxidase) proteins.
- At rest, the complex exists as separate components: the cytochrome b558 is comprised of gp91phox, the 91kd beta chain, and p22phoxthe 22kd alpha chain. Together they form a complex that binds heme and flavin, embedded in the walls of secondary granules.
- In the cytosol are the structural proteins p47phoxand p67phox, and the regulatory components p40phox and RAC. p47phox and p67phox are phosphorylated and bind tightly together on neutrophil activation.
- In association with p40phoxand RAC, they join to the complex of gp91phox and p22phox to form the intact NADPH oxidase. This complex harvests an electron from NADPH and donates it to molecular oxygen, creating superoxide (O2−). Superoxide dismutase (SOD) converts O2− to H2O2. Myeloperoxidase converts H2O2 to bleach by combination with chlorine. Phagocyte production of O2− facilitates activation of certain proteins inside the phagosome.
- Mutations in gp91phox, p22phox, p47phox, and p67phoxcause chronic granulomatous disease (CGD), characterized by recurrent life-threatening infections due to catalase-positive bacteria and fungi and granulomatous complications (MIM #306400, 233690, 233700, and 233710).
- Shown in Figure 3 are the NADPH oxidase mutations that give rise to CGD together with their inheritance patterns, chromosomal locations, and relative frequencies.
- The gp91phoxvariant is X-linked, located on Xp21, and accounts for about two-thirds of cases; the other three variants have an autosomal recessive pattern of transmission, and p47phox, located on chromosome 7, accounts for about 25 percent, with p22phox, located on chromosome 16, and p67phox, located on chromosome 1q42, accounting for the rest.
- There are no autosomal dominant cases of CGD. CGD occurs in 1/200,000 live births, but this may be an underestimate. The majority of patients are diagnosed as toddlers and young children; infections or granulomatous lesions are usually the first manifestations.
- Symptoms usually begin during the first few years of life, with the advent of recurrent disseminated abscesses or pneumonias.
- The characteristic suppurative granulomas scattered throughout the body at these sites gave rise to the name of the entity. Individual granulomas consist of peripheral collections of lymphocytes and macrophages surrounding a central necrotic core, superficially resembling the granulomas seen in tuberculosis.
- The epidemiology of CGD infections in less developed countries is not as well defined, but it differs slightly from North America and Europe.
- In countries where BCG vaccination is still administered, local BCG lymphadenitis is common.
- In North America, the overwhelming majority of infections in CGD are due to only five organisms: aureus, Burkholderia cepaciacomplex, Serratia marcescens, Nocardia, and Aspergillus.
- In contrast to other primary immunodeficiencies, the infectious agents found in CGD are of low virulence in normal individuals and are characteristically catalase-positive.
- Certain catalase-negative organisms, such as Streptococcus pneumoniaeand Streptococcus pyogenes, which also produce hydrogen peroxide, do not often infect these patients.
- Trimethoprim/sulfamethoxazole (TMP/SMX) prophylaxis has reduced the frequency of bacterial infections markedly. In patients receiving TMP/SMX prophylaxis, staphylococcal infections are essentially confined to the liver and cervical lymph nodes.
- In recent years, fungal infections, typically those due to Aspergillusspecies, have become more predominant. Although itraconazole prophylaxis has been shown to reduce fungal infection, newer antifungals, such as voriconazole and posaconazole, should further reduce fungal mortality in CGD.
- The use of IFN-γ has been shown to reduce the number and severity of infections in CGD by 70 percent compared to placebos. Therefore, current recommended prophylaxis in CGD is trimethoprim/sulfamethoxazole, itraconazole, and interferon gamma.
- The gastrointestinal and genitourinary tracts are frequently affected by granulomata. Esophageal, jejunal, ileal, cecal, rectal, and perirectal involvement with granulomata mimicking Crohn’s disease have been described, and affect 43 percent of patients with X-linked CGD and 11 percent of those with p47phox
- Gastric outlet obstruction is common and may be the initial presentation of CGD. Bladder granulomata and ureteral obstruction are common in patients with defects in gp91phoxand p22phox and readily relieved with steroids.
- Prednisone 1 mg/kg for a brief initial period then tapered to a low dose on alternate days is usually successful.
- However, relapse or recurrence of gastrointestinal granulomatous disease is common, requiring the frequent use of prolonged low-dose steroid therapy. The use of infliximab increases the rates of fungal and bacterial infection in CGD, just as it does in normal individuals.
- The X-linked gp91phoxcarrier females typically have two populations of phagocytes: one that produces superoxide and one that does not. Discoid lupus erythematosus-like lesions, aphthous oral ulcers, and photosensitive rashes are seen in gp91phox Infections are not usually seen in female carriers unless the population of normal neutrophils is below 5 to 10 percent; then, these carriers are at risk for CGD type infections.
- The diagnosis of CGD is made by demonstration of reduced or absent superoxide generation.
- Although the nitroblue-tetrazolium (NBT) assay was the most widely known diagnostic test for chronic granulomatous disease in the past, which was based on the direct reduction of NBT by superoxide free radical to form an insoluble blue formazan in the normal and its absence in the patient, it has been largely replaced by the flow cytometric dihydrorhodamine (DHR) assay, which is now preferred because of its speed, ease of use, ability to distinguish X-linked from autosomal patterns of CGD, and its sensitivity to very low numbers of functional neutrophils.
- Immunoblot and mutation analysis has also been used to identify specific proteins and mutations. The precise gene defect should be determined when possible, as it is critical for genetic counseling and is prognostically significant.
- p47phoxdeficiency has a significantly better prognosis than X-linked disease: mortality for the X-linked form has been shown to be about 5 percent per year, compared to 2 percent per year for the autosomal recessive varieties.
- Bone marrow transplantation leading to stable chimerism has been successfully performed in patients with CGD, including for refractory infection, predominantly from Aspergillus.
- In some studies using reduced-intensity non-ablative bone marrow transplantation from HLA-identical siblings into CGD patients, success was greater in children than adults, but transplant-related toxicities, such as graft versus host disease, remained problematic.
- Gene therapy for p47phoxand gp91phox deficiencies have been successful, but not durable.
The Leukocyte Adhesion Deficiencies
- Over the years, a number of defects of leukocyte movement from the blood into tissues has been identified which predispose patients to recurrent infection.
- These include a group of molecular defects that come under the general heading of leukocyte adhesion deficiency (LAD).
- These molecular lesions are responsible for the clinical manifestations resulting from an impaired step in the inflammatory process, namely, the emigration of leukocytes from the blood vessels to sites of infection, which requires adhesion of leukocytes to the endothelium.
- Leukocyte adhesion to each other, endothelium, and to bacteria is required for travel, communication, and inflammation to fight infection. The leukocyte adhesion molecules, predominantly the integrins and selectins, mediate these processes.
- Leukocyte β2 integrins are heterodimeric molecules on neutrophils, monocytes, and lymphocytes that attach to intercellular adhesion molecules (ICAMs) on the endothelium in order to exit the circulation (Figure 4). ICAMs are also expressed on other leukocytes, mediating some forms of cell-cell adhesion. Certain β2 integrins bind directly to pathogens or to a complement.
- The integrins are composed of an α chain (CD11a, CD11b, or CD11c) noncovalently linked to a common β2 subunit, CD18.
- The αβ heterodimers of the β2 integrin family are CD11a/CD18 (lymphocyte-function-associated antigen-1, [LFA-1]), CD11b/CD18 (macrophage antigen-1, [Maca-1]; complement receptor-3, [CR3]), and CD11c/CD18 (p150,95; complement receptor-4, [CR4]).
- Since CD18 is required for normal expression of the αβ heterodimers, mutations that eliminate or impair CD18 lead to either very low or no expression of CD11a, CD11b, and/or CD11c.
- These mutations lead to inability of leukocytes to bind to endothelium, with each other, to certain pathogens, or to complement opsonized particles, thereby causing leukocyte adhesion deficiency type I (ITGB2, 21q22.3; MIM #116920).
- In addition to LAD I, two additional defects of the leukocyte adhesion cascade have been described, referred to as LAD II and LAD III, involving several precise ordered steps such as rolling, integrin activation, and firm adhesion of the leukocytes (for a fuller description, look at the resource section below and Chapter 16 of Bellanti, JA (Ed). Immunology IV: Clinical Applications in Health and Disease. I Care Press, Bethesda, MD, 2012).
Defects of the Innate Immune System
- One of the most rapidly developing areas of immunologic research that is finding clinical applicability is being directed to the study of genetic mutations involving signaling pathways and pattern recognition receptors (PRRs) involved in innate immune function, e.g., TLRs that are associated with severe innate immunodeficiency phenotypes (section 1).
- These present powerful opportunities to determine the relationship between specific immunological defects and human disease processes in vivo.
- There are several emerging studies of human primary immunodeficiencies associated with abnormal TLR signaling that demonstrate that this pathway is critical for human defense against infection.
- TLRs mediate recognition of microbes, regulate activation of the innate immune response, and provide a linkage with adaptive immune responses.
- Cellular and molecular studies over the past several years have identified a number of common TLR polymorphisms that modify the cellular immune response and production of cytokines in vitro. In addition, human genetic studies suggest that some of these polymorphisms are associated with susceptibility to a spectrum of diseases, particularly the infectious diseases.
- Signaling pathways activated through receptors for IL-1β, IL-18, TNF-α, CD40, and for many of the TLRs are shared with those for ectoderm formation.
- These pathways converge at the activation of NF-κB, an important transcription factor dependent on the activation of the inhibitor of the NF-κB kinase (IKK) complex and its subsequent phosphorylation of the NF-κB inhibitor, IκB (Chapter 9 in Bellanti, JA (Ed). Immunology IV: Clinical Applications in Health and Disease. I Care Press, Bethesda, MD, 2012).
- Defects in one of the IKK components, IKKγ, also called the NF-κB essential modulator (NEMO), cause ectodermal dysplasia together with a complex set of immunodeficiencies with dysfunction of the innate (Toll-like receptors, TNF-αR, and IL-1R) and adaptive (CD40 and IL-18) immune systems (Figure 5).
- These patients have a very significant susceptibility to nontuberculous mycobacterial infections, which may be mediated through IL-12 induction.
- These patients may also require prophylactic antibiotics and intravenous immunoglobulin due to ineffective immunoglobulin class switching (Chapter 6 of Bellanti, JA (Ed). Immunology IV: Clinical Applications in Health and Disease. I Care Press, Bethesda, MD, 2012 and Immunopaedia case studies: An 8-year-old boy with recurrent respiratory infections & Immunodeficiency and failure to thrive).
- Some patients respond well to IFN-γ treatment in the setting of disseminated mycobacterial infection. This syndrome is described in greater detail below together with the hyper IgM syndromes.
Lymphocyte Immune Deficiencies
Combined T Cell and B Cell Defects
- T lymphocytes are the pivotal cells sine qua nonfor orchestration of adaptive immunity.
- They direct the killing of intracellular pathogens and the responses of B lymphocytes and antigen-presenting cells (APCs) in the defense against extracellular pathogens (sections 1 & 2).
- They can also kill directly when they recognize aberrant surface molecules.
- Consequently, defects in T cell development and/or function invariably can also result in defects affecting B cell, NK cell, and myeloid compartments.
- For ease of discussion, these have been grouped both according to their functional sites of derangement, e.g., signaling, DNA rearrangement and repair or purine metabolic sites, as well as their phenotypic severity, e.g., SCID versus non-SCID.
- Figure 6 shows a schematic representation of these combined T and B cell defects portrayed according to this arbitrary classification.
Severe Combined Immune Deficiencies (SCID)
- Severe combined immunodeficiency (SCID) is a collection of severe heritable genetic immunodeficiency disorders in which both “arms” (B cells and T cells) of the adaptive immune system may be crippled due to a defect in one of several possible genes.
- It is known as the “bubble boy” disease, named after David Vetter who survived isolated in a plastic bubble for 12 years because of the condition’s extreme vulnerability to infectious diseases.
- The overall incidence is estimated to be 1 in 75,000 births, and without treatment, SCID patients usually die during infancy.
- Several different forms of SCID have been described based on differential involvement of T, B, and NK cell lineages. There are several types of SCID that are characterized by defective T cell function with different levels of B cell and NK cell impairment (Figure 6).
- When considering the diagnosis of SCID, the most serious of the immune deficiency disorders, it is important to keep several things in mind.
- SCID is a medical emergency. If the patient with SCID is to survive transplantation, it is important to avoid community viral infections, which can be devastating;
- Persistent engraftment of maternal lymphocytes, i.e., graft-versus-host disease (GVHD), is both a symptom of SCID and a cause of many of the symptoms, such as failure to thrive and rash;
- A phenotype of infections and clinical illness characterize the presentation of these patients, and the focus of laboratory testing is directed at efforts to confirm the genetic defects;
- Since some mutations in patients with SCID are of the missense type, proteins can still be produced and detected by flow cytometry but are non-functional. Therefore, the clinical picture, typically developed out of the infection profile and the flow cytometry information, must ultimately guide decisions about which genes to sequence.
The Clinical Presentation of Patients with SCID
- SCID typically presents early in life with failure to thrive, diarrhea, recurrent infections due to respiratory viruses, herpes viruses, Pneumocystis (carinii) jiroveci, and bacteria.
- Although mucosal candidiasis is common, aspergillosis is not.
- In contrast to patients with interferon-γ/IL-12 pathway defects, described previously, where susceptibility to both mycobacteria and BCG is present, generalized complications of BCG vaccine are common in patients with SCID when the vaccine is administered, but nontuberculous mycobacterial infections are not.
- The underlying defects are caused by improper lymphocyte proliferation due to failure of signal transduction (i.e., receptor defects) or toxicity (adenosine accumulation and lymphocyte death).
- Therefore, absolute lymphopenia is a common finding in many forms of SCID.
- In addition, T lymphocyte failure may facilitate persistent engraftment of maternal T lymphocytes transferred to the fetus during pregnancy, leading subsequently to the alloreactive response of the engrafted maternal T cells against the fetus referred to as GVHD, which typically presents in the neonatal infant as rash and/or diarrhea.
- Treatment for all forms of SCID should include prevention of viral infection, prophylaxis against Pneumocystis jiroveciwith trimethoprim-sulfamethoxazole, and consideration of early bone marrow transplantation or gene correction. The overall frequency of SCID is approximately 1/50,000
Defects of Cytokine and Signaling
IL-2 Receptor Common Gamma Chain Deficiency T- B+ NK- SCID (MIM ID #300400)
- The prototype for the most common form of SCID has been considered to be the X-linked (SCID-XL)form due to mutations in the shared IL-2 common gamma chain receptor (IL-2Rγc, Xq13) found in receptors for IL-2, IL-15, IL-4, IL-7, IL-9, and IL-21 (Figure 6).
- Figure 7 shows the central role which the IL-2Rγc chain plays in immune responsiveness since this component is an obligatory signal transducing chain for several cytokine receptors, including IL-2R, IL-15R, IL-4R, IL-7R, IL-9R, and IL-21R (hence the designation common gamma chain).
Defects in B Cells
- B cells begin their antigen-independent life in the bone marrow, but it is only in peripheral lymphoid tissues during the antigen-dependent phase where they encounter antigen, experience class-switch recombination (CSR) and expansion, and become the predominant cells in these tissues (Chapters 2and 6 of Bellanti, JA (Ed). Immunology IV: Clinical Applications in Health and Disease. I Care Press, Bethesda, MD, 2012]).
- Their ontogeny and differentiation have been largely defined through the arduous characterization of immune defects leading to hypogammaglobulinemia, beginning with the molecular study of the flagship entity, X-linked agammaglobulinemia.
- The major B cell defects can be divided into three major categories of antibody deficiencies:
- (1) defects in early B cell development,
- (2) hyper-IgM syndromes (also called class-switch recombination defects), and
- (3) common variable immunodeficiency (CVID) (Figure 8).
Defects in Early B Cell Development
B Cell Defects with Severe Reduction in All Serum Ig Isotypes with Absent B Cells: X-Linked Agammaglobulinemia (XLA) (MIM ID #300755)
- First described in 1952 by Bruton, severe X-linked agammaglobulinemia (XLA) has been the paradigm for understanding the pure role of the B cell in immune function.
- The disease is now known to be due to defects in a tyrosine kinase, Bruton tyrosine kinase, BTK (MIM #300300).
- Since BTK mutations lead to severe defects in B cell development past the pro-B cell stage, circulating B cells are typically absent altogether in XLA in contrast to other B cell defects where these cells may be present.
- Because XLA affects almost exclusively the ability to produce antibody, it is not usually clinically apparent until after transplacental maternal antibody has waned after six months of age.
- Typical presentations include upper and lower respiratory infections, diarrhea, cellulitis, meningitis, and sepsis.
- Infections are typically caused by Gram-positive, highly pathogenic encapsulated organisms such as Streptococcus pneumoniaand Haemophilus influenzae type b.
- Infections caused by Gram-negative organisms, including Campylobacterspecies and Pseudomonas as well as other organisms such as Pneumocystis and herpes viruses, are not common.
- Although susceptibility to infection with high-grade encapsulated bacteria has been the hallmark presentation of patients with XLA, it is also known that these patients can also suffer from certain viral infections.
- Enterovirus infections have been especially severe in XLA, often causing a severe meningoencephalitis. The basis for this susceptibility of XLA patients to viral infection recently has been shown to be due to a special role of BTK as a key signaling molecule that interacts with and acts downstream of TLR8 and TLR9 in signal transduction, making for a unique innate defect in addition to antibody deficiency
Defects in Class-Switch Recombination (CSR)
Severe Reduction in Serum IgG and IgA with Normal/Elevated IgM and Normal Numbers of B Cells: The Hyper IgM Syndromes
- This is a second major class of immunodeficiencies with relatively normal numbers of hypofunctional T, B, and NK cells characterized by infections similar to those seen in patients with SCID, but typically with a more delayed and slightly milder presentation.
- Because of the fundamental T cell functional defects in these diseases, without defects in cellular survival, the suspicion of an immune deficiency may come less from the initial laboratory examination and more from careful piecing together of the clinical history, infection profile, and functional studies.
- Some of these cases have normal to increased IgM with low IgA and IgG and normal B cell numbers. There are four syndromes in this category recognized so far, and they are sometimes collectively grouped as the hyper IgM syndromes. These include
- (1) CD40 ligand (CD154) deficiency;
- (2) CD40 deficiency;
- (3) activation-induced cytidine deaminase deficiency (AID); and
- (4) uracil DNA glycosylase (UNG) deficiency.
CD40 Ligand (CD154) Deficiency (MIM ID #308230)
- CD40L is a T cell membrane protein that interacts with CD40, its cognate receptor, on B cells, dendritic cells, monocytes, macrophages, and activated epithelial cells.
- CD40L on T cells activates CD40 to drive B cell immunoglobulin class switch from IgM to IgG (class-switch recombination, CSR), as well as for subsequent maturation of antibody and formation of normal lymph node anatomy.
- Figure 9 shows a schematic representation of the critical role of CD40L/CD40 binding for the class switch and shows how a deficiency of the CD40 can lead to partial IgG/IgA/IgE hypogammaglobulinemia with normal or elevated IgM levels.
- In addition to directing B cell function, CD40L is critical for the control of certain intracellular parasites that are characteristic of SCID, such as Pneumocystis jiroveci.
- Other characteristic infections include Cryptosporidium, with eventual hepatic involvement, leading to sclerosing cholangitis, and histoplasmosis.
- Liver damage significantly reduces the success of bone marrow transplantation, and therefore filtered water that is free of Cryptosporidiumis recommended once the diagnosis is suspected (this precaution may or may not be necessary, depending on regional water supplies).
- Other significant complications of CD40L deficiency include neutropenia, which may respond to G-CSF or IVIG, and malignancy, which may develop in adolescence or adulthood.
- See Immunopaedia Case study: An 8 year old boy with recurrent respiratory infections
CD40 Deficiency (MIM ID #109535)
- Since CD40 is the cognate receptor for CD40L, it is expected that mutations in CD40 should resemble CD40L defects at both clinical and laboratory levels.
- This is indeed the case, and patients with CD40 deficiency present with hypogammaglobulinemia, impaired antibody maturation, and impaired lymphoid organ development and anatomy.
- The few patients identified have had Pneumocystis, Pseudomonas, and Cryptosporidiuminfections, all with clinical characteristics similar to patients with CD40L deficiency. | <urn:uuid:7db8e78c-ffb9-4463-a854-58e17364173e> | CC-MAIN-2019-47 | https://www.immunopaedia.org.za/immunology/special-focus-area/1-primary-immunodeficiencies/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496669422.96/warc/CC-MAIN-20191118002911-20191118030911-00284.warc.gz | en | 0.914338 | 6,910 | 2.9375 | 3 |
Readers may be familiar the Liberation Theology that came out of places like Peru, Mexico, Chile and Argentina during the 1960s and beyond, and out of El Salvador after the terrible civil war there during the 1980s. If the remnants of Colonialism, what I like to call coloniality after Aníbal Quijano, had not survived until our time, it would never have been necessary for concerned theologians to develop Liberation Theology. Yet it is sometimes difficult for modern readers to perceive that various colonial factors have survived through the centuries taking the form of debt peonage, racism, gendered relationships, and good old-fashioned power lust that work in tandem with newer forms of subordination, bank-loan debt, urban red lining, transportation routing, and voter suppression. Conversely, it is also sometimes difficult for modern readers to perceive that diverse liberative fundamentals elaborated during the twentieth century can find their antecedents during earlier periods. Coloniality and the Rise of Liberation Thinking during the Sixteenth Century first presents the subordinating elements of transatlantic colonialism as they were installed in what was for them a New World and then analyzes anti-hegemonic discourse that responded to them in the hope of liberating people who had fallen upon unfortunate times, into unfortunate circumstances. This sixteenth-century thought offers solutions for both colonial and postcolonial living.
2.Can you summarize what your book is about? What are its findings?
The first half of the Coloniality and the Rise of Liberation Thinking considers the nature of the social subordination achieved through the means of chattel slavery and the encomienda debt-peonage system. While chattel slavery was based on a notion that we would latter come to understand as race, the encomienda functioned as a system of debt. This debt was at first owed in return for Christian education, but slowly transformed into monetary debt incurred on the encomienda. This monetary obligation was inescapable in a colonial situation because its resolution was insured with forced labor. The encomienda, in fits and starts, slowly became the Latin American hacienda system enshrining the means of social and economic control now known as debt peonage. Integral to understanding how these mechanisms functioned was “hegemony”, the consent of the people at the bottom to be ruled by the people at the top (as outlined by Gramsci). There had to be a large enough percentage of the people giving this consent, either consciously or subconsciously, for the colonial system to work.
The second half of the book explores anti-hegemonic thought in four authors who are well known in our time but not usually looked at together in comparative context. They are: St. Thomas More, English humanist and statesman, later chancellor of England, who was concerned with human behavior and whose Utopia greatly impacted thinking in the Spanish colonies; Erasmus of Rotterdam, considered by many to be highly representative of the Northern Renaissance, who was appointed as tutor to the Spanish king fiercely engaged in the Conquest; Friar Bartolomé de las Casas who criticized Spanish atrocities in “The Indies” becoming known as the Apostol of the Indians; and Felipe Guaman Poma de Ayala, a Peruvian nobleman deprived of his rights, who learned to read and write Spanish which he used to denounce the injustices of colonialism. The study of these four antihegemonic, theologically minded authors reveals that even in the sixteenth century (the beginning of the seventeenth for Guaman Poma), what scholars today recognize as hegemonic coloniality could be perceived and courageously denounced even before concepts such as freedom of thought and expression were codified as central ideals of Western Civilization.
3. What inspired you to write this book?
Many readings and experiences eased me into this line of thinking. First a graduate seminar taught by my beloved professor Luis Eyzaguirre (RIP) at the University of Connecticut exposed me to colonial chronicles and at the same time to the context of Renaissance humanism that generated them. That was thirty years ago, but the seed was planted, and I have been thinking along these lines ever since. Two books that anticipated Coloniality and the Rise of Liberation Thinking, where my thinking on these matters congealed, have appeared. The first, Decolonizing Indigeneity: New Approaches to Latin American Literature, issued by Lexington Books, helped me to hone my skills with a decolonial methodology applicable to both indigenous- and Spanish-authored texts. The second, The Formation of Latin American Nations: From Late Antiquity to Early Modernity, brought out by the University of Oklahoma Press, gave me the tools to fathom and delve into sovereign indigenous nations existing in the fifteenth and sixteenth centuries in the lands now known as the Americas. The thrill of writing those first two books helped galvanize my commitment to the idea of free nations in order to complete Coloniality and the Rise of Liberation Thinking, which had been in the back of my mind all along. The three books form a kind of trilogy that acknowledges nations existing in the Western Hemisphere before the arrival of Europeans and looks at the right of these nations to exist without outside interference, even during the sixteenth century.
4. What was the most surprising or exciting thing that you discovered during your research?
What most surprised me the most from the research that went into Coloniality and the Rise of Liberation Thinking was the fact that decolonial liberative thinking could exist inside and become part of the colonial surge that was coming out of Europe and then enshrined in the colonial system in the Americas. Decolonialism within colonialism.
5. What impact do you hope that this book will have?
I hope this book will help scholars to think outside the sixteenth-century box and see that liberation thinking was possible during that century to better understand that century, and how that thinking can relate to our time, to better understand the “now”.
6. What are you currently working on?
I am presently branching out on a new area as I investigate the sixteenth-century author Inca Garcilaso de la Vega’s influence in Peru during Peru’s first century of independence, the nineteenth century.
by Thomas Ward, Loyola University Maryland | <urn:uuid:53054eda-71d1-4aa7-aa1a-8bb92e014be0> | CC-MAIN-2023-06 | https://www.arc-humanities.org/blog/2021/03/18/qa-with-thomas-ward-on-coloniality-and-the-rise-of-liberation-thinking-during-the-sixteenth-century/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764501066.53/warc/CC-MAIN-20230209014102-20230209044102-00466.warc.gz | en | 0.966821 | 1,298 | 3.359375 | 3 |
Could anyone educate me on the authenticity of the attached report on "Theodora episcopa"?
Karen Jo Torjesen
New York, NY
From the Inside Flap:
"Under a high arch in a Roman Basilica dedicated to two women saints, Prudentiana and Praxedis, is a mosaic portraying four female figures.... The faces of Mary and the two saints are easily recognizable. But the identity of the fourth is less apparent. A carefully lettered inscription identifies the face on the far left as Theodora Episcopa, which means Bishop Theodora. The masculine form for bishop in Latin is episcopus; the feminine form is episcopa. The mosaic's visual evidence and the inscription's grammatical evidence point out unmistakable that Bishop Theodora was a woman. But the a on Theodora has been partly effaced by scratches across the glass tiles of the mosaic, leading to the disturbing conclusion that attempts were made to deface the feminine ending, perhaps even in antiquity."
This telling image begins an extraordinary odyssey into the real place of women in early Christianity. A vital contribution to the debate on women in the church, this groundbreaking book by respected scholar Karen Jo Torjesen reveals not only that women were priests, prophets, and even bishops in early Christianity, but also how and why they were systematically effaced by the institutional church.
In ancient Mediterranean society, Torjesen explains, women could play often quite powerful social and political leadership roles at the level of the household but not in public. Hence, as long as the early church gathered in private homes, women who regularly guided their households both economically and culturally often led the congregations. It was an almost subversive act to worship as Christians in the ancient world, yet women bravely organized and maintained the growing groups of followers. But as Christianity emerged from its domestic enclaves and the church became a public institution, women were relegated to private, subservient, and invisible roles dictated by Greek and Roman society's proscription of women's activity in the public sphere.
Cogent and convincing, Torjesen asserts that the sexism and misogyny that remain in the church today do not derive from Jesus and his first followers--who radically challenged conventions about gender and status--but from the social context in which Christianity flowered. Thus, those who deny women full participation in the leadership of the modern church based on the teaching and practice of Jesus and the early church, are quite simply, dead wrong. | <urn:uuid:f7db3067-f229-442e-8872-48df4f92bbd3> | CC-MAIN-2016-07 | http://www.iol.ie/~duacon/l960804.htm | s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701162938.42/warc/CC-MAIN-20160205193922-00077-ip-10-236-182-209.ec2.internal.warc.gz | en | 0.972731 | 514 | 2.625 | 3 |
Henry Gray (18251861). Anatomy of the Human Body. 1918.
appearance, and are agregated to form lymphoid follicles. These lymphoid cells are probably derivatives of the entodermal cells which lined the original diverticula and their subdivisions. Additional portions of thymus tissue are sometimes developed from the fourth branchial pouches. Thymus continues to grow until the time of puberty and then begins to atrophy.
FIG. 1179 Minute structure of thymus. Follicle of injected thymus from calf, four days old, slightly diagrammatic, magnified about 50 diameters. The large vessels are disposed in two rings, one of which surrounds the follicle, the other lies just within the margin of the medulla. (Watney.) A and B. From thymus of camel, examined without addition of any reagent. Magnified about 400 diameters. A. Large colorless cell, containing small oval masses of hemoglobin. Similar cells are found in the lymph glands, spleen, and medulla of bone. B. Colored blood corpuscles. (See enlarged image)
Structure.Each lateral lobe is composed of numerous lobules held together by delicate areolar tissue; the entire gland being enclosed in an investing capsule of a similar but denser structure. The primary lobules vary in size from that of a pins head to that of a small pea, and are made up of a number of small nodules or follicles, which are irregular in shape and are more or less fused together, especially toward the interior of the gland. Each follicle is from 1 to 2 mm. in diameter and consists of a medullary and a cortical portion, and these differ in many essential particulars from each other. The cortical portion is mainly composed of lymphoid cells, supported by a network of finely branched cells, which is continuous with a similar network in the medullary portion. This network forms an adventitia to the bloodvessels. In the medullary portion the reticulum is coarser than in the cortex, the lymphoid cells are relatively fewer in number, and there are found peculiar nest-like bodies, the concentric corpuscles of Hassall. These concentric corpuscles are composed of a central mass, consisting of one or more granular cells, and of a capsule which is formed of epithelioid cells (Fig. 1179). They are the remains of the epithelial tubes which grow out from the third branchial pouches of the embryo to form the thymus.
Each follicle is surrounded by a vascular plexus, from which vessels pass into the interior, and radiate from the periphery toward the center, forming a second zone just within the margin of the medullary portion. In the center of the medullary portion there are very few vessels, and they are of minute size.
Watney has made the important observation that hemoglobin is found in the thymus, either in cysts or in cells situated near to, or forming part of, the concentric corpuscles. This hemo globin occurs as granules or as circular masses exactly resembling colored blood corpuscles. He | <urn:uuid:eaab0429-4a37-479a-893d-febace705cbc> | CC-MAIN-2015-22 | http://bartleby.com/107/pages/page1274.html | s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207929869.17/warc/CC-MAIN-20150521113209-00295-ip-10-180-206-219.ec2.internal.warc.gz | en | 0.944599 | 665 | 3.359375 | 3 |
FREEDOM AND SAFETY
The city of Barcelona is a sensory bustle. Elaborate tiled buildings glint beneath swaying palm trees while vendors hawk their goods in Spanish and Catalan. Amid such color and sound, it would be easy to overlook the gray plastic shields that have appeared on lampposts along the city’s main drag. It’s even easier to miss what they contain: sensor boxes that collect data on everything around them.
Each is equipped with its own hard drive and a wifi-enabled sensor, which tracks elements of its environment like noise and crowd levels and pollution and traffic congestion, then transmits it to a central data service via a fiberoptic cable. Fortune reports that the sensors can even monitor the number of selfies posted from the area.
Beneath its old-world charm, Barcelona is outfitted with new-world technology, which led digital market research firm Juniper Research to grant it the title of the world’s smartest city in 2015. But it didn’t retain that superlative for long - Singapore superseded it the following year. Around the world, city government offices are equipping their cities to collect a growing amount of data about residents and their activities. Barcelona, Boston, London, Dubai, and Hamburg have already begun the process; India has ambitious goals to revamp 100 of its cities by 2022. Singapore plans to become the world’s first “Smart Nation.”
All of these efforts promise to make cities cleaner, safer, more sustainable, and more efficient. But ethicists have a different concern: How can citizens maintain privacy when data is being collected from all around them?
Smart cities rely primarily on two types of information: aggregated data and real-time data. Sensors aggregate data about a specific place or thing into larger computer networks, which then analyze large quantities of information to spot trends. Some cities have already used aggregated data - to monitor the most popular parking spaces in central London, to analyze traffic on Boston roads to spot hazards, and to adjust the brightness of streetlights depending on the size of crowds in Barcelona parks. Because the data is aggregated, it is effectively anonymized; it can’t be used to track individuals or gain information about them.
Cities are also gathering real-time data that does focus on individuals. In 2013, a company called Renew London piloted a program in which sensors installed in recycling bins tracked the wifi signals from passing phones. The sensors could then use the phone’s unique media access control (MAC) address to target advertisements on that bin to the individual, based on his or her movement within the sensor network. For example, if the individual had frequently passed a particular clothing store or restaurant, he or she might see more ads for that establishment.
A screenshot of marketing materials issued by the now-shuttered Renew London initiative.
Renew had attempted to bring the targeted advertisements users see online into the real world. Yet unlike most websites, the company was not legally required to inform citizens that they were being tracked. After details emerged (and outrage ensued), London’s city government asked Renew to halt its trial.
Despite the backlash, many other cities are still pursuing initiatives that gather real-time data. In Singapore, for example, the government plans to require all cars to have a satellite navigation system that will monitor the location of each vehicle at any given time, plus its speed and direction. This tracking system will allow the government to automatically charge cars for parking fees and tickets, as well as levy a tax based on how much an individual drives.
The island nation is also testing several programs that gather data about city-wide infrastructure issues and the amount of energy used in individual units of government-sponsored housing (80 percent of the population lives in these complexes). Elderly and infirm patients could opt in to a program that monitors movement inside their apartments.
As more objects become connected to the internet, they will gather even more information.
“Every day - just through our smartphones, credit cards, et cetera - we leave behind us lots of digital footprints, which are recorded thousands of times every day and stored somewhere in the Cloud,” Carlo Ratti, director of the Massachusetts Institute of Technology (MIT) Senseable City Lab, told Futurism. This deluge of data could enable cities to create new smart city programs, with the intention of making our lives better.
But those programs are not without risk. “The worrying thing about this is that we live in an asymmetrical world, where just a few companies and public institutions know a lot about us, while we know little about them,” he said. Cloaked in their black boxes of information, those companies could be selling personal information for advertising and marketing, or allow hackers to gain access to information that users didn’t even know they were giving up.
Ratti believes that the best strategy to combat potential misuse of this data is for future smart city governments and organizations to implement a more transparent and flexible “data contract” between individuals, companies, and governments. Some places are already initiating such contracts - the General Data Protection Regulation (GDPR), slated to kick in beginning May 2018, will require that all businesses within the European Union share what kind of data they collect from residents and gain individuals’ consent for its use (though interestingly, it does not address data collection by governments).
The law also allows EU citizens to opt out and be “forgotten,” or to have personal data - everything from your mobile device ID to your genetic sequence - removed from any database if they no longer feel there is a compelling reason to keep it.
In order to keep future smart city initiatives transparent, Ratti said that “taking advantage of such new rules that will go into effect soon [will be] a great way to put pressure on companies that collect large amounts of data today.”
Such prodigious and complex data could particularly put individuals at risk if it got into the hands of hackers. At the 2015 Black Hat computer security conference, security experts Greg Conti, Tom Cross, and David Raymond pointed out in a presentation and subsequent paper that information security in a city is far different from that of a private company:
Cities feature complex interdependencies between agencies and infrastructure that are a combination of federal, state and local government organizations and private industry, all working closely together to keep the city as a whole functioning properly. Preparedness [against hacking] varies widely. Some cities have their act together, but others are a snarl of individual fiefdoms built upon homegrown technological houses of cards.
“It’s going to be an ongoing battle between the hackers and defenders, just as is going on right now,” Christos Cassandras, professor of electrical and computer engineering and head of the division of systems engineering at Boston University, told Futurism. Private companies and city institutions will likely need to be better coordinated in their security efforts.
Hacking is a perpetual threat, and anything connected to the internet is vulnerable. Ratti pointed out that hacking has always been part of the introduction telecommunications technology; in 1903, during an early demonstration of radio transmission technology between Cornwall and London, a music-hall magician hacked the system to broadcast several lewd messages to the Royal Academy of Sciences’ waiting - and soon scandalized - audience.
The best tool to fight hackers in smart cities, Ratti said, might be the one that many computer security teams use today: “white hat” hacking. Engineers try to infiltrate a system as a hacker would in order to identify weaknesses that real hackers could leverage (not to get information, as a real hacker would).
“White hat hacking may become routine practice - a kind of cyber fire drill - for governments and businesses, even as academic and industry research focuses in the coming years on the development of further technical safeguards,” Ratti said.
Finally, there is the threat that governments themselves will use the data for nefarious purposes. As Engadget points out, democracy watchdog Freedom House ranks Singapore as only “partly free” because its leading party has a history of suppressing dissenters.
There are concerns, therefore, that data the government collects could be used against political dissidents. The privacy defense charity Privacy International expressed concerns about Singapore’s lack of privacy laws in 2015, particularly given that their constitution does not guarantee a right to privacy and that they had not ratified the International Covenant on Civil and Political Rights, which includes a clause that protects privacy. Policy analysts and industry experts have echoed these considerations, both about Singapore and smart cities more generally.
Singapore has taken steps to mitigate those fears and ensure citizens that their security will be protected. Vivian Balakrishnan, the country’s minister for foreign affairs and leader of the Smart Nation Initiative, told Engadget that under the Smart Nation Plan, only “anonymized traffic data will be collected and aggregated” from toll roads, and that officials will “engage independent security consultants” to test the system for weaknesses. He added that Singaporean government is dedicated to building the nation into “an ‘open-source’ society that’s characterized by high levels of trust, transparency, and openness.”
In the end, though, it will be up to individual citizens - in Singapore, and in other smart cities around the world - to stay abreast of these new programs as they are implemented. Citizens can only hold their governments to promises of safety if those citizens know what data is being collected about them.
A few years ago, when Cassandras began giving talks on smart cities, he used to tell his audience that he thought most of the technology he discussed was 10 to 15 years away. Today, he admits that he was wrong - the technology has arrived far sooner. Now he expects progress will move even faster, he said.
Competition has driven this growth, Cassandras believes. “The private companies are so under pressure to compete globally,” Cassandras said. He added that “all it takes is two or three players who are moving forward faster than other” to rapidly advance the entire industry.
Cities, similarly, are under pressure to become much more sophisticated in a short timeframe. Many metropolitan areas are expanding very rapidly, so some government officials may choose to use smart technologies to prevent problems like pollution, dangerous overcrowding, and unsafe streets. A city that fails to address those problems can be plagued with health issues, legal challenges, and a drop in population - citizens and businesses alike could be tempted to relocate to cleaner, more modern centers.
“More often than not, in this process there are a lot of risks.”
Cassandras sees dangers in the rapidity of this growth. “More often than not, in this process there are a lot of risks,” he said. “Sometimes commercial development tends to put those risks, those dangers, those concerns on the side, in the effort to be there first, and make a profit first.”
Yet he also doesn’t find the data collected by smart cities more worrisome than what’s collected online already. “I’m more concerned about my privacy when I buy something on Amazon or put in my credit card number to find an airline ticket,” he said. Cassandras, and many experts in this upcoming technology, ultimately sees smart cities as an improvement for human lives. If done right, smart cities promise their residents cleaner, safer, and more efficient lives - as long the data in our lived environment is policed the same way we defend our city’s homes and streets. | <urn:uuid:1eef807b-1d53-44d0-97c1-b8ca915961a8> | CC-MAIN-2020-34 | https://freedomandsafety.com/en/content/blog/smart-cities-may-be-end-privacy-we-know-it | s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735810.18/warc/CC-MAIN-20200803111838-20200803141838-00465.warc.gz | en | 0.95407 | 2,419 | 2.734375 | 3 |
Panel backs HCV test for baby boomers
A national panel of experts on disease prevention, the United States Preventive Services Task Force (USPSTF), now recommends that all Americans born from 1946 to 1964 should be tested at least once for hepatitis C virus (HCV) infection. The recommendation follows an earlier call for wider screening for hidden HCV by the Centers for Disease Control and Prevention.
HCV infects the liver. Over time it can cause inflammation, liver damage, and cancer. The infected person's blood can transmit the virus. Past or present intravenous drug users and anyone in the United States who received a blood transfusion before 1992 are at heightened risk. Most of the estimated 3.2 million Americans now infected are unaware they have the virus. Prolonged treatments with antiviral drugs can prevent further liver damage and the need for a transplant. | <urn:uuid:9fe7ed65-f2d1-45bd-8587-a524ef910738> | CC-MAIN-2017-22 | http://www.health.harvard.edu/diseases-and-conditions/panel-backs-hcv-test-for-baby-boomers | s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463615093.77/warc/CC-MAIN-20170530105157-20170530125157-00225.warc.gz | en | 0.909707 | 176 | 3.125 | 3 |
He was the second son and fifth child of Charles and Emma Darwin. Cool family. Best known for his idea that the Moon was part of the Earth at one time...now regarded as incorrect.
On the formation of the Moon...
Five serious theories have been proposed for the formation of the Moon (not counting the one involving green cheese):
The Fission Theory: The Moon was once part of the Earth and somehow separated from the Earth early in the history of the Solar System. The present Pacific Ocean basin is the most popular site for the part of the Earth from which the Moon came.
The Capture Theory: The Moon was formed somewhere else, and was later captured by the gravitational field of the Earth.
The Condensation Theory: The Moon and the Earth condensed together from the original nebula that formed the Solar System.
The Colliding Planetesimals Theory: The interaction of earth-orbiting and Sun-orbiting planetesimals (very large chunks of rocks like asteroids) early in the history of the Solar System led to their breakup. The Moon condensed from this debris.
The Ejected Ring Theory: A planetesimal the size of Mars struck the earth, ejecting large volumes of matter. A disk of orbiting material was formed, and this matter eventually condensed to form the Moon in orbit around the Earth.
A detailed comparison of the properties of Lunar and Earth rock samples has placed very strong constraints on the possible validity of these hypotheses. For example, if the Moon came from material that once made up the Earth, then Lunar and Terrestrial rocks should be much more similar in composition than if the Moon was formed somewhere else and only later was captured by the Earth.
These analyses indicate that the abundances of elements in Lunar and Terrestrial material are sufficiently different to make it unlikely that the Moon formed directly from the Earth. Generally, work over the last 10 years has essentially ruled out the first two explanations and made the third one rather unlikely. At present the fifth hypothesis, that the Moon was formed from a ring of matter ejected by collision of a large object with the Earth, is the favored hypothesis; however, the question is not completely settled and many details remain to the accounted for.
Several mechanisms have been proposed for the Moon's formation 4.527 ± 0.010 billion years ago, some 30–50 million years after the origin of the Solar System. These include the fission of the Moon from the Earth's crust through centrifugal forces, which would require too great an initial spin of the Earth, the gravitational capture of a pre-formed Moon, which would require an unfeasibly extended atmosphere of the Earth to dissipate the energy of the passing Moon, and the co-formation of the Earth and the Moon together in the primordial accretion disk, which does not explain the depletion of metallic iron in the Moon. These hypotheses also cannot account for the high angular momentum of the Earth–Moon system.
The prevailing hypothesis today is that the Earth–Moon system formed as a result of a giant impact: a Mars-sized body hit the nearly formed proto-Earth, blasting material into orbit around the proto-Earth, which accreted to form the Moon. Giant impacts are thought to have been common in the early Solar System. Computer simulations modelling a giant impact are consistent with measurements of the angular momentum of the Earth–Moon system, and the small size of the lunar core; they also show that most of the Moon came from the impactor, not from the proto-Earth. However, meteorites show that other inner Solar System bodies such as Mars and Vesta have very different oxygen and tungsten isotopic compositions to the Earth, while the Earth and Moon have near-identical isotopic compositions. Post-impact mixing of the vaporized material between the forming Earth and Moon could have equalized their isotopic compositions, although this is debated.
The large amount of energy released in the giant impact event and the subsequent reaccretion of material in Earth orbit would have melted the outer shell of the Earth, forming a magma ocean. The newly formed Moon would also have had its own lunar magma ocean; estimates for its depth range from about 500 km to the entire radius of the Moon.
A web exhibition of manuscripts from the collections of the University of Glasgow Library
Segue to a new book...
"The great Moon-rock heist - extract"
Thad Roberts was a messed-up kid who had one dream: to be an astronaut. So how did he end up breaking into Nasa and making off with the most valuable thing on Earth?
July 8th, 2011
Thad Roberts was a messed-up kid who had one dream: to be an astronaut. So how did he end up breaking into Nasa and making off with the most valuable thing on Earth?
July 8th, 2011
It had to be the strangest getaway in history. The rain was so thick that Thad Roberts could barely make out the red light just a few feet ahead; the latest in a series he'd had to wait at. Even worse, between lights, he'd had to keep the Jeep at an agonising 5mph. It was unbelievably hard to drive so slowly, especially when your heart felt like it was going to blow right through your ribcage. But that was the mandatory speed limit at Nasa.
He glanced down and almost smiled at the sight of his girlfriend Rebecca crouched beneath the dashboard. A few minutes later they came to the last light – red, of course. Even worse, Thad made out the security kiosk. He kept his head facing forward. He didn't want to have to explain why he was at the compound past midnight on a Saturday. Thad was counting on the guards not being eager to step out into the rain. Even so, if one had looked carefully, he might have noticed that the Jeep was sagging in the back, the vehicle's rear axle bent so low, the chassis almost scraped the ground.
The final light shifted to green and the exit gate came into view. It swung upward, then they were through. Thad slowly accelerated. Ten mph. Twenty. Thirty. Rebecca sat up, throwing an arm over his shoulder. Then they were screaming in joy. They'd done it. My God, they had pulled it off.
Two years earlier, September 2000
Stretched out along the road into the Johnson Space Centre (JSC), blinding white in the Texan sun, was a huge rocket. Thad had read about the Saturn V, but seeing it up close was awe-inspiring. As he drove away from the gate, he could see the place was huge – more than 100 buildings on 1,600 acres – and this was just one facility; all around Clear Lake were multiple Nasa complexes serving the astronauts and scientists as they trained for future missions. And now Thad was part of all this.
On average, there were 800 applicants for every 50 spots on the JSC intern programme, most engineering majors from the country's top universities. These "co-ops" spent at least three "tours" at the centre in Houston and most went on to work there; a handful ended up in the astronaut training programme.
Thad had spent two years building himself into exactly the sort of person JSC was looking for. He'd majored in physics, geology and anthropology, got his pilot's licence, become an expert scuba diver, taken Russian and Japanese. Along the way, he'd fought the gnawing sense that, no matter what he did, he'd always be starting a few steps back from the other kids; most would probably come from more elite schools, paid for by loving parents (his own strictly Mormon father had disowned him when he'd discovered Thad's high-school love affair with Sonya, his future wife). Most wouldn't already be married at 23. Hell, most wouldn't be 23; they'd be college age, from middle-class backgrounds, not deep in debt. Thad was different. He'd always be an outsider. He'd have to work harder than everybody else to prove himself.
A swarm of smiling, energetic kids gathered at the entrance. Thad could count on one hand the people he called friends. He and Sonya were a self-contained unit. But here Thad was a blank slate. He could reinvent himself – in many ways, that thrilled him even more than the rocket outside.
As the only new co-op without an engineering background, Thad was assigned to life sciences and the astromaterials lab. Brian Helms, a co-op on his second tour, explained they'd be mostly getting lunar rock and meteorite samples ready for transportation. Then he took off his gloves and headed towards the door. "We'll have time to talk about this later. You're going to the pool party, right?"
Thad followed his new friend. He hadn't been to too many parties, because he was married, because of his upbringing. At this one, everyone was maybe a little too exuberant; at least Thad knew he was.
"So this is a monthly thing?" he asked. "Seems like it should be more of a weekly thing."
One of the co-ops laughed, an athletic-looking guy in a polo shirt that probably cost more than Thad's entire wardrobe. "We're going to be working too hard to party every week," he said. "At least those of us involved in rocket engineering."
Thad ignored this subtle knock on his lack of engineering background, pressing on instead with an idea for a weekly contest to pull off the most awesome experience they could – from sneaking on to the Vomit Comet to gaining access to the Lunar Lab or Mission Control.
He had their full attention now. Thad looked at the excited faces. "Tell you what I'm going to do," he said quietly, so they had to lean in to hear. "I'm going to get next to the Space Shuttle Simulator."
As they got out of the pool, Brian Helms moved close to him: "Don't do anything stupid, man. You don't need to impress anyone."
Thad glanced at him. "I'm not trying to impress anyone. I just think it will be fun. Lighten up. I'm not going to do anything that's against the law."
Thad kept his head low as he strolled past the security cameras; he'd been casing Building 5 for 20 minutes, but hadn't come up with anything resembling a plan. He reached the steps once more and this time went in. He found himself in a spartan foyer, facing a huge, smooth metallic door. Above, another camera pointed down at him. To the left was a punch pad and a tiny TV screen.
Thad almost turned and ran, but the camera could already see him. Before he could move, a woman's voice echoed out of the TV screen.
"Can I help you?"
Thad had to improvise. "Yes, I'm here for the Shuttle Simulator."
A buzz, and the door sprang open. He found himself in a busy hallway. There were people in white lab coats, but Thad's eyes focused on the astronauts with shuttle patches on their shoulders.
A few people were holding clipboards. He waited until one moved past, then fell into step and smiled, forcing the nervousness out of his voice. "Can you point me towards the Shuttle Simulator?"
"Sure, I'm headed that way."
They took a 90-degree turn and suddenly were in front of another metal door. The man swiped an ID and hollered at someone on the other side.
"This guy's here for a simulation run – can you take care of him?"
Thad nearly choked, but the man held the door open and he had no choice but to step inside.
He was standing at the edge of an enormous hangar. In the centre, rising high into the cavernous space, stood the Space Shuttle Simulator.
"That's what 100 million of your tax dollars will get you," a technician said as he approached. "You're here for the monthly systems check?"
"That's correct," Thad heard himself respond. "I'm supposed to observe the test run."
"The rest of your crew is already inside," the tech responded, starting towards the simulator. "If we hurry, we can make it before it begins."
Thad's eyes widened. Well, in for a penny, in for a $100m simulator. He followed the man to a hatch. Before he could blink, he was inside the cockpit of the shuttle. Every surface was covered in switches, diodes, buzzers and levers. There was a man strapped into the pilot's seat to Thad's right. His hands were flicking around, starting the launch sequence. Without looking up, he gestured towards the other chair – the commander's seat.
Thad felt panic. It took a moment to figure out how to strap himself in. Then the pilot said something and Thad heard the hatch sealing shut. "Let's finish the checklist," the pilot grunted. There was one between their seats. With his pilot's licence, he was just about able to follow what was going on, mimicking the pilot's lead, flicking a switch here and there, reading a temperature control.
"Fire it up," the pilot said.
The entire cockpit began to shake and jerk up and down, and suddenly tilted all the way on its back, nose pointing up. Thad stifled a gasp – he was looking at the sky. What he had thought were windows were actually high-definition monitors, playing feedback from a real shuttle launch.
A second later, Thad was slammed hard into his seat. The view became one of pure motion, streaks of light like laser beams flashing before his eyes. The noise of the engines was like thunder. Thad realised he was shouting with excitement. Maybe the pilot noticed, maybe he couldn't hear over the din – Thad didn't care. In his mind, he was sitting in the cockpit of a rocket ship, hurtling toward Mars.
Sitting at the edge of the swimming pool telling the other co-ops his story, Thad could see his charisma reflected in their eyes. He had secured his place at the top of the social food chain. It was a spot he'd never occupied before, and he liked it. At JSC, he'd reinvented himself as this impressive character; everybody wanted to be around him. Days were spent in the lab, nights sailing or rock climbing.
Thad Roberts Thad Roberts working inside Building 31, from which he was later to steal a 600lb safe full of moon rocks, worth, he calculated, $40bn. Photograph: Courtesy Thad Roberts
He got to know some of the JSC staff, who also seemed to enjoy hearing about his adventures. One such acquaintance was Dr Everett Gibson, one of the first scientists to study the moon rocks brought back by the Apollo programme, and the meteorite that proved there had once been life on Mars.
Life at JSC was full and exciting. Thad wondered if his enthusiasm for it was also the source of the friction he and Sonya had begun to experience in the past couple of months, back in Utah, before he'd returned for his second tour. Daily life had seemed a distraction. He couldn't wait to get back to Houston.
When Sonya came to visit, Thad wanted to show her why the place was so amazing. First he took her to his lab, then to meet Gibson, who took them to his lab and told them to wait outside while he returned some moon rocks to his safe. Curious, Thad craned his head round the door. Inside was a huge upright safe, a piece of paper with numbers written across it taped on top. Could those numbers actually be the combination?
Gibson returned and handed Sonya a small glass vial. "This is a calcareous meteorite. It's the lowest density meteor we've ever found. They usually break up when they come into the atmosphere, but this little piece survived the journey."
"This is amazing," Sonya said. "This isn't from the moon, is it?"
"No," Gibson said. "Moon rocks are a little too valuable to give away. All the moon rocks we've got came from those six Apollo missions. There aren't any more, and there aren't going to be any more. It wouldn't even be legal for me to own one. The ones I have in my safe I've acquired over 30 years of research proposals, and when I retire, they'll go right back to the lunar vault."
"But this meteorite?" Sonya asked.
"That's a gift to you guys."
Gibson waved their gratitude away. "It's our job to inspire young people like yourselves. That's really the point of this place."
The visit had been a big success but now, when they spoke on the phone, all Sonya wanted to talk about was her modelling, her life in Utah. It was getting harder for Thad to live in both places at once. A few weeks later, he got an inventory job at the Lunar Lab. The most secure building Nasa had ever built, it was atmosphere-controlled, had no connection to the outside world – no wires, pipes, ducts – and was supposedly strong enough to survive 1,000 years underwater without damage to the contents. Inside a heavy vault, Thad had checked off 110,000 samples and also discovered a smaller vault-within-a-vault where Nasa kept its returned rocks – used in experiments and therefore no longer useful as research samples. A scientist told him that, although they had the same monetary value, they were basically considered trash. Thad calculated that there were $40bn-worth locked up in there. It seemed an incredible waste.
He didn't sleep well that night. Every time he closed his eyes, he saw that miniature door. Money had never been a big deal to him before, mainly because he'd never had any. But now things were different. His relationship was in trouble. He'd reinvented himself at JSC, but deep down he was still this messed-up kid who had been kicked out of his house, had married too young, who wanted to be an astronaut but would probably never have the chance. Yet he was living as if it was just a matter of time. He was swept up in the fantasy.
Back at the University of Utah, Thad made the acquaintance of a stoner called Gordon. He was probably even younger than Thad and had some minor criminal record. Thad told him he had some moon rocks, and asked Gordon if he thought he could find a buyer.
"I could probably figure that out," Gordon said. "I'm pretty good with the internet."
Thad nodded, his excitement rising. Was there really anything wrong with Gordon sending out a few emails? Thad hadn't done anything wrong yet – and he was probably never going to. It was just a mental game. When Thad next checked his emails, he saw that Gordon had sent out a form letter to potential collectors. Although many simply explained that the sale of moon rocks was, indeed, illegal, a handful seemed interested.
Using a ridiculous fake identity created by Gordon, Thad followed up with an advertisement to a Belgian mineral club's online newsletter:
My name is Orb Robinson from Tampa, FL. I have in my possession a rare, multicarat moon rock I am trying to find a buyer for. The laws surrounding this type of exchange are known, so I will be straightforward and nonchalant about wanting to find a private buyer. If you, or someone you know, would be interested in such an exchange, please let me know. Thank you.
I might be interested if the price is right… Have you any proof that the goods are what you say they are?
Thad hunched over his laptop, staring at the email from the Belgian rock collector. He hadn't really thought about price because he hadn't any idea how one would actually pull off the heist. He tried to figure out how much imaginary cash he'd demand for his imaginary moon rock. He needed to come up with a number that was both achievable and high enough to make it worth his while.
"Make it worth your while!" he repeated, incredulous at his own thoughts. Breaking into a Nasa building, stealing the most valuable thing on Earth, endangering his chances of ever becoming an astronaut – Thad shook his head. That was only one way of looking at the mental game. Nasa had designated those rocks as trash. Thad could use the money to make himself a better scientist. And if he became an astronaut, he might one day help Nasa in its quest to get to Mars, which meant, in a way, this theft would be a good thing for the institution. He had to continue to think about the heist in those terms, because in those terms it was more than palatable, it was heroic and noble.
Thad was now on his third tour, working as a dive assistant at the Neutral Buoyancy Lab. Containing 6m gallons of water, it was the largest indoor pool of water on Earth, the premier astronaut training environment. Deep below its surface was a full mock-up of the International Space Station, the shuttle cargo bay and even the Hubble telescope.
He was also in love. He'd met Rebecca on a cliff-jumping expedition, where she'd rushed past him, the first to jump. Staring at the swirl of granite dust where she had just gone over, Thad knew something significant had taken place. Without another word to the college kids behind him, he had thrown himself over the precipice after her.
Thad had always loved Sonya, but it had never been this all-encompassing, mind-bending thing. Maybe it was time to tell Rebecca about the mental game he'd been playing, because he was coming close to setting up a meeting with the Belgian's American sister-in-law, Lynn Briley, who was going to do the deal for him: $100,000 for a moon rock.
Even as he was telling Rebecca, he was thinking it through, not just how impossible the actual heist would be, but asking himself why he didn't just erase all the emails, lose the contact info. And yet… "I mean, $100,000. But the money's only part of it."
He kept expecting Rebecca to interrupt, to tell him he shouldn't do it, he'd be risking everything, that he would get in huge trouble, that it was a really bad idea. But she remained silent, letting him finish the thought that had been building since the moment he'd first laid eyes on her.
"Rebecca, I want to give you the moon."
Thad's eyes were watering. Silence. Then her eyes lit up: "That sounds so romantic. Let's do it."
10. 9. 8…
Friday morning, 7am. Thad was moving through Building 31. He stopped at a closed door with an electronic cypher lock, checked no one was nearby, then took out a compact and applied powder to the keypad with a small brush. Leaning close, he blew off the excess, then stepped back to survey his work. Satisfied, he calmly continued down the hallway, humming the theme from Mission: Impossible. Earlier, it had been the music from James Bond as he mixed fluorite, gypsum and talcum. Even the name he had given this portion of the preparation – Phase One – made Thad feel like he was part of an adventure he'd one day tell his grandchildren about.
7. 6. 5…
The meeting with Lynn Briley was going to take place in Florida, because that's where Gordon had set his fictitious Orb Robinson. Thad borrowed a Jeep from another co-op, saying he was helping a friend move house, then switched the numberplate for one from a similar-aged Buick he'd found in a parking lot. As he drove back to Clear Water, his heart was beating fast. He still hadn't crossed any real lines, but now he was driving the getaway vehicle: a Jeep that wasn't associated with him, that had a Nasa sticker affixed to a window and a stranger's numberplate above its bumper.
4. 3. 2. 1…
Five hours later, Thad was at a motel, laying out his tools on the floor of his room. He had counted only three other cars outside. With luck, there would be nobody nearby when they arrived after the heist. He felt a thrill. Heist. It sounded so cool. The great moon rock heist. He laughed out loud.
Thad drummed his fingers against the steering wheel, staring at the torrential rain. The tropical storm had come out of nowhere, meaning that no one had turned up for the star-gazing trip they'd arranged as an alibi the night before the heist. As they sat there, the tension inside the Jeep was explosive.
Thad had a sudden thought: "Why don't we do it now?"
"The rain is a perfect cover," Rebecca whispered.
Thad reached out and put his hand on hers. "Holy shit, we're really going to do this, aren't we?"
Rebecca was right; the guards didn't even shine a flashlight in Thad's direction as he held out his ID card. Neither uttered a word as they pulled up behind Building 31. Now they were actually here, Thad wasn't sure he wanted Rebecca to leave the car. Even if he were caught, she couldn't get into huge trouble just for waiting outside. At worst, it was like a college prank gone bad.
"Thad," she said, "I want to do this with you."
He knew he shouldn't let her. But he also knew if she did, it would bind them together for life.
"OK," he said, shocking himself. A second later, they were inside.
There he was. Up on the big screen, 20ft tall in overalls, surgical mask and latex hospital cap. He was moving like a cat down one side of the never-ending hallway. His girl was right behind him.
A flurry of choreographed motion as they shifted to the other side of the hallway, passing from one security camera to the next. Then, in front of them, the door with the cypher lock. Thad took out a torch and shone it on the keypad. Rebecca gasped as five of the keys lit up. Thad winked. His magic powder had worked. And into the lunar vault.
Except he wasn't in the lunar vault. He was in a lab, Gibson's lab, standing in front of a safe, staring at a combination lock that would not open.
He truly wasn't certain when the plan had changed – when he had shifted from the mental game of breaking into the lunar vault to the much more doable puzzle of breaking into Gibson's lab. But somewhere along the way, just enough reality had broken into Thad's fantasy to push him to this place, to this crime. In his mind, it was morally equivalent to robbing the trash safe in the lunar vault. These were used moon rocks, trotted out for lectures, but essentially still Nasa's trash. Gibson had had 30 years with them; it was Thad's turn.
He tried the combination once more, then sized up the safe: 500-600lb. Thad had expected to be able to open it, but had planned for the chance that he couldn't. He pointed past Rebecca to the dolly they had carted along. Together, they heaved on the safe and dragged it out to the Jeep.
Back at the motel, Thad carefully placed the saw against the crack at the edge of the door and drew it back and forth – the sound of screeching metal barely covered by the TV at full volume. After half an hour, there was a sudden metallic pop.
Inside were five drawers of small capsules and Teflon-sealed bags of material. As Thad unpacked the samples into a tackle box, one catalogue number jumped out at him. It was from the first Apollo mission, collected by Neil Armstrong, the first man on the moon. "This one I'm keeping."
Slowly, it began to dawn on him that they had samples from every moon landing in history. Then he saw the letters ALH 84001. The Mars sample.
Though the deal was for $100,000-worth, if he actually wanted to calculate the full street value of what he had taken… the range could be anywhere from $400,000 a gram to $5m for the same amount. That put the value of 101.5g of the rocks at somewhere between $40m and half a billion.
He'd be meeting the Belgian's sister-in-law on Saturday. In five days, he and Rebecca would have enough money to go away, start a new life.
It took three days for anyone at Nasa to miss the safe. Brian Helms was the one to tell him, rushing into the showers at NBL, talking breathlessly about a trillion-dollar heist. Thad had been about to correct him when he realised his phone was ringing. Before he could get a word out, Rebecca was half-shouting at him, frantic: "Everyone knows the safe is gone."
The rumours were still swirling three days later as Thad fought his way through a typical day at JSC; until finally he was outside, waving goodbye to Brian for the weekend. He rushed to pick up Rebecca for the 14-hour drive to Orlando. There was a Sheraton close to the restaurant where he was due to meet Lynn Briley, and here they finalised their plan. Thad would go in first, and Gordon and Rebecca would come in 20 minutes later. Gordon went off to find a pizza and smoke a little weed.
"Gordon's going to be back any minute." Rebecca's voice drifted out through the open bathroom door. "This could get really awkward."
Thad grinned. "You obviously haven't spent a lot of time with stoners. Getting a pizza to them is kind of like a religious affair. If Gordon makes it back in time for the exchange, I'll be shocked."
He crossed to where the tackle box was sitting and reached for the bag from Apollo 11. With one hand he lifted the mattress and placed the bag underneath. If Rebecca noticed the fist-sized lump, she didn't say anything. For the briefest of seconds, he saw himself, hovering over her, fantasy and reality superimposed. Exactly 33 years earlier to the day, Neil Armstrong had taken the first step – but right then, right now, Thad Roberts was the first man to have sex on the moon.
It was the kind of restaurant that could be in any town in America, the perfect public setting for a deal to go down. Thad was pleased to see the restaurant was crowded. A good five minutes went by while he waited to be seated. He started to feel pretty nervous. Then he saw her, dark-haired, respectable-looking. She shook his hand, a waiter took their order, then they went right to business. Thad told her the samples were back at the Sheraton, then blurted, "I'm telling you, this has been the most exciting event in my entire life."
He knew he was talking too much, but he couldn't help himself. The woman seemed amused. Thad asked her about Kurt, her husband; she said he was waiting nearby for her to call.
"Do you want to talk to your husband before you meet the others?" he asked. She nodded.
Thad was about to answer when he saw Gordon and Rebecca. Gordon was talking very loudly, ordering Heinekens over the din. Thad turned back to the woman. "That's fine. I'll wait right here."
A few minutes later Thad saw a tall, thin man approaching the table wearing a blazer and a tie. Kurt Emmermann certainly looked European. And he was holding a briefcase in his left hand.
As he introduced himself, Thad couldn't keep his gaze off that briefcase. He had no intention of opening it in the restaurant, but he knew what was inside. More money than he'd seen in his life.
"Unbelievable," he said, realising he was saying it out loud, but not caring. "You spend so much time thinking about it, you see it in a movie in your mind, and then it's happening right now."
The woman and her husband were looking at him. He glanced at Rebecca, catching her eye. She headed over, weaving between a pair of diners being led to their table. As she passed them, Thad noticed something peculiar. The other people in the restaurant all seemed to be middle-aged. No kids, no teenagers, no families. Nobody in their 20s, other than Thad, Rebecca and Gordon.
He stood as Rebecca reached the table, introducing her to Lynn and Kurt. Then Kurt broke into the conversation for the first time, in a thick European accent. "Now, this is exciting. I'm betting you will think about this for the rest of your life. You guys will be off to some beach somewhere, and you'll remember this day, this life-changing event. Very fun." Rebecca seemed to be put at ease by the man's happy comments.
Thad told Lynn and Kurt about the Mars sample and they leaned in, listening closely. They seemed really interested. Maybe she'd want to buy that, too! Hell, he felt that anything could happen.
Suddenly there was Gordon, his eyes bloodshot, his breath stinking of alcohol. They needed to wrap this up quickly. Thad lowered his voice, speaking directly to Lynn. "Do you want to get the cheque?"
Lynn suggested Thad ride with her and Kurt, and Rebecca and Gordon follow in the other car.
"Yeah, that's fine." Thad liked the idea of separating the couple from Gordon. As the woman held the door open for Thad, he smiled at her. She smiled back, but he noticed she was glancing past him. He followed her gaze but it was just another couple of restaurant patrons. A man and woman, dressed formally for a warm Saturday evening.
Odd, but Thad told himself he was just being paranoid. In a few minutes, it would be just him, Rebecca and a briefcase full of cash. After that, maybe a nice beach.
Thad was still thinking about that beach as they pulled into the Sheraton parking lot, Rebecca and Gordon a single car's length behind. Lynn and Kurt had been pretty chatty for the short drive, talking about everything from the muggy weather to the best beer-makers in Belgium. Thad was starting to like them, and even found himself wondering if they'd all stay in touch after the deal was completed. But the minute Lynn jammed her foot on the brake, sending the car skidding to a screeching halt, his mind went blank in a burst of pure terror. He opened his mouth, but before he could find any words Lynn and Kurt were out of the car – and then there were men with guns racing at him from every direction. Bright lights exploded, illuminating the entire front of the hotel. Thad gasped, pressing back against the car seat, trying to disappear into the sticky, sweaty vinyl. But then one of the men was grabbing at the car door, and suddenly there were hands all over him. As he was dragged out, he could hear the thump of a helicopter up above, the fierce wind from the rotors pulling at his hair. And Thad could see at least 20 police cars, lights flashing, parked behind barricades and yellow tape.
"On your knees!" screamed a voice next to his ear. "Now!"
It was Kurt, but now Kurt wasn't talking about idyllic beaches, and he didn't have a Belgian accent. Now Kurt was aiming a handgun at the back of Thad's head. And there, just a few yards away, was Lynn, an FBI badge affixed to her suit jacket, talking to two men in police uniforms. And they were all looking at Thad. And Thad knew, with every fibre of his being, that he was fucked.
Rebecca was given a probational sentence and 180 days of house arrest; her father banned her from talking to Thad again. Gordon went on the run and was finally tracked down in a Utah state park where he gave his name as Job from the Bible. Thad was sentenced to seven and a half years in jail, where Sonya served him with divorce papers.
[This is an edited extract from Sex On The Moon, by Ben Mezrich, published next week....] | <urn:uuid:b95e7b26-3a72-4db3-b54d-026d9c974dfa> | CC-MAIN-2017-13 | http://philosophyofscienceportal.blogspot.com/2011/07/sir-george-howard-darwin-moon-and-moon.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189316.33/warc/CC-MAIN-20170322212949-00269-ip-10-233-31-227.ec2.internal.warc.gz | en | 0.988569 | 7,683 | 3.40625 | 3 |
If you are a student of Vedanta, you probably know that every living being is made up five (pancha) Koshas. Koshas is a Sanskrit word which means ‘sheath’ or ‘layers’. Based on this, the 5 koshas can be defined as follows: The word ‘maya’ in the names shown below means ‘made up of’.
- Annamaya Kosha – Sheath made of food – This is our physical body.
- Pranamaya Kosha – Sheath made of energy – to keep the physical body functional
- Manomaya Kosha – Sheath made up of mind stuff
- Vijnanamaya Kosha – Sheath made of intelligence/knowledge
- Ananadamaya Kosha – Sheath made of bliss
The ‘made of’ used above is not some abstract term. It literally means that the koshas are made of the things stated above. For example, the Vijnanamaya kosha is made of intelligence. The substratrum of the kosha is intelligence. Just like material is made up of atoms and molecules, in the same way this kosha is made up of intelligence. Intelligence is its essence. This logic applies to other the koshas also and each kosha has its own building blocks. Most books describing the 5 koshas use the above illustration. It may not be an accurate representation, but it does convey the idea quite well. Each outer sheath covers the inner sheath. If you peel off the outer sheath, you move to the inner sheath. The Food Sheath covers the Pranamaya Kosha, the Pranamaya Kosha covers the Manomaya Kosha and so on. It is like peeling the layers of an onion or unpacking the Russian dolls. If you peel all the 5 layers, the above image shows you will reach your inner core, which is Pure Consciousness. Instead of Pure Consciousness, the term we will use in this article is Self-Awareness. They mean the same.
Pure Consciousness = Self-Awareness
The concept of the 5 Koshas was first revealed in the Taittiriya Upanishad, which was written around 600 BC. This Upanishad is the source material for a detailed analysis of the 5 koshas. The great sages closed their eyes and meditated, looking for their innermost core. During this process, they gained tremendous insights into a wide variety of subjects. The insight into the 5 Koshas is one of them.
The main purpose for discussing the 5 Koshas is to show the correct path to reach your inner core which is Self-Awareness. The strategy of neti, neti is described – not this, not this is suggested in this Upanishad. In this methodology, you start eliminating what is not you, till you discover your inner self. Each one of us thinks we are the physical body. You identify the physical body as yourself. The Taittiriya Upanishad explains that the physical body is only made up of food – Annamaya Kosha. It is born out of food; it lives on food and after dying it goes back as food. It is therefore impossible that your inner core, which is Self-Awareness, can be made up of food. The Upanishad suggests you meditate on this idea and when you are convinced that you are not the body, you peel away the Food sheath as not being yourself.
The next inner layer is the Pranamaya Kosha. It vitalizes the body and keeps the body and the inner organs functioning. Blood circulation, breathing and muscle toning etc. are some of the powers of this Kosha. Without this Kosha, the physical body is dead. The Upanishad explains that this layer is inert, it has no intelligence, it does its job like a robot. It is a slave doing its job faithfully. The Upanishad ask us to meditate on this idea and conclude that you are not the Pranamaya Kosha. This way you can eliminate this layer also.
The next sheath is the Manomaya Kosha or the mind stuff. The mind is continuously changing, it is changing with every thought. There is hardly a moment when there is no thought in the mind. We are taught that out inner core of Self-Awareness is unchanging. So, the ever-changing mind just cannot be our inner core. After meditating on this idea, you can peel away this sheath.
The next sheath you will encounter is the Vijnanamaya Kosha. This sheath is made up of intelligence. During deep sleep (sleep without dreams), this Kosha is no longer active, yet you still exist – even if you have no thoughts, feelings or emotions, and your mind is absent, YOU still exist. Your inner core is always present. It cannot take a leave of absence. If the Vinanamaya Kosha is absent during deep sleep, it only means that you cannot be the Vijnanamaya Kosha. This way, you can negate this Kosha also.
The next kosha is the Ananadamaya Kosha. This is the innermost kosha and it is closest to the inner core. Ananda means bliss but this Kosha should not be translated as the “Bliss Sheath”. Ananda or bliss as it is commonly translated occurs only in ideal conditions when there are no thoughts in the mind. This is impossible during the waking and dream states. During the waking and dream state, the mind full of activity. During these active states, this Kosha is the center of emotions or feeling. I am tired, I am sad and so on. This means that this kosha has many different such attributes We are taught that Self-Awareness is without attributes or qualities, therefore we cannot be this Kosha. By meditating on this Kosha, you can say, neti, neti to this Kosha also.
Once the identification with all the 5 koshas is removed, what remains is Self-Awareness. The Taittiriya Upanishad uses this teaching methodology of neti, neti for reaching your inner core. This does seem logical and powerful. To better implement this teaching, it is a good idea, that we have a more detailed understanding of the 5 Koshas. We will now analyze the 5 koshas in the following ways:
- Self-Awareness and the 5 Koshas
- 5 Koshas and the 3 bodies
- Role of the different Koshas
Self-Awareness and the 5 Koshas
To start our discussion, it is important to understand Self-Awareness and Awareness. As mentioned, Self-Awareness is our inner core and Awareness is the nature of Self-Awareness. Please read my post ‘Analyzing Awareness’ for a detailed explanation. Here is a quick run-down.
If Awareness is analyzed, it will be found to have three things: Subject, Intelligence and Object. If any one of them is missing, there will be no Awareness.
- There must be a Subject, who is aware of the experience. The subject is the knower of Awareness
- There must be an Object, which must be experienced. This object is the known part of Awareness
- There must be Intelligence by which the subject gets to know the object. This is the knowing part of the Awareness
Awareness = Subject + Object + Intelligence
Power of Awareness = Power of Knower + Power of Knowing + Power of Known
Awareness is made up of Subject, Intelligence, and Object and it has three different powers – Knower, Knowing and Known. It must be understood that the Subject, Intelligence, and Object and the three powers are not something outside in the world, but they are within Awareness and they make up Awareness. Wherever there is awareness, Subject, Intelligence and Object are present with all the three powers. Right now, you are aware of reading this article, therefore Subject, Intelligence and Object are present within your Awareness of this article.
What is Self-Awareness? There must be a Self who is Aware. Vedanta teaches us that this Self is our inner core, which is full, complete and it is stand alone. For Awareness to be full and complete, it must be Self-Aware. Self-Awareness means that ‘Awareness is aware of Awareness’. It is like saying ‘I am seeing a tree’. Here ‘I am’ is the subject and the tree is the object. Seeing is the intelligence connecting the object with the subject. Applying this to Self-Awareness, you will notice that the subject is Awareness, object is Awareness and the intelligence is Awareness. Awareness plays the role of subject and object. In other words, both the subject and object are the same. This is not easy to grasp, but there is only one entity in which subject and object are the same It is therefore non-dual. This complete, independent Self Awareness is our inner core. There is no separation between the subject and object. Self-Awareness is non-dual and homogenous. It is Self-Shining.
Awareness = Subject + Object + Intelligence
In Self-Awareness, Self = Subject = Object = Intelligence.
This Self-shining Awareness is like a Bulb of Awareness and it is our inner core. It is not dependent upon anything else and it generates its own light of Awareness.
Pixel of Ignorance and Koshas: If our nature and inner core is Self-Awareness, why don’t we know it, why don’t we feel it? The simple answer is that we are ignorant of our inner core. Since we have forgotten our true nature, Ignorance covers up Self-Awareness. When we forget who we really are, Ignorance pops up and like a veil, covers Awareness.
This veil of Ignorance is made up of a countless number of pixels, each pixel representing a living being. Each living being thus has their own unique pixel of ignorance, depending upon their degree of ignorance. A self-realized person will have zero ignorance and at the other extreme there are living beings with 100% ignorance, who have no clue about their true nature. Each one of us falls somewhere in between these two extremes. You have a pixel of ignorance; I have one and every living being has a pixel of ignorance. You could say that the veil of ignorance with its countless pixels covers Self-Awareness.
The pixel of ignorance is a mix of ignorance and knowledge, unique for each living being. It also contains the personality traits (vasanas) accumulated over all past births of an individual. It’s like your passport, which all of your prior travel details. We will see that this pixel of ignorance is our seed body. Vedanta calls this pixel the spiritual heart or cave. One can also call this the soul of the human being.
Ignorance has a strange power; it can separate the subject and object from the non-dual Self-Awareness. Yes, it has that power! How does this happen? Because of ignorance, we forget we are both the subject and object, we do not know that both subject and object are one and non-dual. If we do not know that we are both Subject and Object, it means that the subject and object are no longer a single entity but are separate and independent entities. Non duality becomes duality by the simple fact of forgetting. This forgetting or not knowing is the power of Ignorance.
Although Self Awareness is nondual, it does have the following 4 parts:
In Self-Awareness, Self = Subject = Object = Intelligence
When subject and object separation take place, the different Koshas are created. The process of separation of the subject and object is like refraction. Place a prism in front of light and we can see the 7 different colors on the other side. In the same way, the pixel of ignorance refracts the light of Self-Awareness into the following 3 different Koshas plus the Sakshi as witness.
- Manomaya Kosha – The home of the objects
- Vijnanamaya Kosha – The home of the intelligence
- Ananadamaya Kosha – The home of the self
- Sakshi (Witness) – The home of the subject.
These homogenous and integrated parts of Self-Awareness become the 3 Koshas + Witness. Thus, we see that the above 3 Koshas are a mix of Self-Awareness and the pixel of Ignorance.
Koshas = Awareness + Ignorance
So, these 3 koshas evolve from a pixel of ignorance. What about the Annamaya Kosha and the Pranamaya Kosha? Their evolution is independent from the other 3 koshas. Let us this discuss this further:
Annamaya Kosha: This is the physical or gross body. We know the starting place for the physical body is the mother’s womb. It grows from a single cell to a complex physical body all in the womb. I recently found out that the Garbha Upanishad gives a detailed analysis of the growth of the fetus in the womb. It gives a comprehensive timetable as to when the different parts of the body show up. It is quite amazing. It would be nice if the medical community could verify the timetable mentioned in this Upanishad.
Pranamaya Kosha: The Garba Upanishad also indicates that in the 7 month of being in the womb, the pixel of ignorance or the soul (jivatman) enters and connects with the Annamaya Kosha. How is the connection made? The connection is made by the Pranamaya Kosha. The Pranamaya Kosha is made up vital energy, connects the soul with the Annamaya Kosha. The 5 senses – eyes, ear, tongue, nose, and skin in the Annamaya Kosha are connected to the Manomaya Kosha. Also, organs of action like hands, legs, speech etc. are interconnected between the 3 koshas and the Annamaya kosha. It is quite amazing how these connections are made seamlessly. So, the main role of Pranamaya kosha is to interconnect the 3 koshas from the pixel of ignorance with the Annamaya kosha
It is quite intriguing to learn from the Upanishad that the seed only enters the body in the 7th month. Before that, the fetus is just a piece of flesh like any other part of the body. So, the baby in the womb has a soul, a personality only after 7th month. Before that it is a body part within the womb. What is unknown and intriguing is how the selection is made. Which soul will enter which body? I am sure there must be a logical process which is controlled by some laws of nature.
5 Koshas and 3 Body’s
To get a better understanding of the 5 Koshas, it is important to correlate this with the 3 bodies. Vedanta teaches us that every living being has the following 3 different bodies.
- Seed Body
- Subtle Body
- Gross/Physical Body
We saw earlier that due to the pixel of ignorance, the seed body is created. The seed body creates the subtle body. The subtle body creates the gross body.
What is the difference between a kosha/sheath and a body? A sheath is a layer within a body. A pastry or a cake is a body and this pastry/cake may have different layers like cream, chocolate, fruits etc. In the same way each of the 3 bodies has different layers or koshas. Let us see each one of them in little more detail:
1. Seed Body:
The seed body is like any seed from which a tree with branches, leaves and fruits are created. The seed already has the potential form of the tree already built in. You could say that the tree in an unmanifest condition is present in the seed. The seed body is also called a causal body because it is the cause for the tree. In the same way, an individual seed body will become a human being with all his or her tendencies – character/personality traits (called vasanas). This seed body will also contain the blueprint of one’s life including all the karmas that will be exhausted in this life. It is important to know that every object (living + nonliving) in the universe has a seed body. In fact, even the universe has a seed body. The seed body for the universe will be the total of all the seeds for individual objects.
Earlier, we discussed the pixel of ignorance. This pixel of ignorance is the same as the seed body. Vedanta teaches us that the seed body resides in the spiritual heart or cave. The spiritual heart is not the physical heart. It is subtle; it does not have a physical form, and it’s something we all have within us. According to Ramana Maharishi, the spiritual heart is two fingers to the right side of your chest.
Seed Body = Pixel of Ignorance
When the seed body with the power of the Pranamaya Kosha connects with the fetus or the Annamaya Kosha, magic happens. The light of Self-Awareness refracts through the pixel of ignorance (seed body) and creates the Anandmaya kosha, Vijanamaya Kosha and Manomaya Kosha. The fetus is no longer a fetus but a living being with a personality etc. When the refraction takes place and the 3 koshas are created, the integration is complete. At this moment, the seed body starts to germinate in the living being. The seed body blossoms to play out the blueprint of life.
The Anandamaya Kosha is within the seed body. It is the main layer within the pixel of ignorance. The seed body operates through the Anandamaya Kosha. The Anandamaya kosha houses the feeling of ‘I-ness’, and creates the feeling of I within us. The feeling of ‘I’ is also called the Ahamkara or Ego. Ahamkara in Sanskrit means the ‘I Maker’.
2. Subtle Body
As mentioned, the Manomaya Kosha and Vijnanamaya Kosha are created by the refraction of Self-Awareness. After refraction, these two are housed in the Subtle body as two sheaths. A common name for the subtle body is the mind. From our experience, we know that the mind is located within the brain. So, when the refraction takes place in the pixel of ignorance, the 2 koshas are beamed as the mind within the brain.
We know the mind is rarely quiet, it is continually active. This means that the Manomaya kosha and Vijnanamaya koshas have a heavy load of activity. If you are a student of Vedanta, you will learn that the activity in the mind is made up of ‘vrittis’ or mental waveforms. These vrittis represent the different objects or combination of objects. The object waveforms are made up of mind stuff – they are made up of the 2 sheaths in the subtle body. Manomaya Kosha helps creates the material for the objects, while the Vijnanamaya Kosha adds intelligence to the mind stuff.
Subtle Body = Manomaya Kosha + Vijnanamaya Kosha
Manomaya Kosha is the home of objects. The power to become objects is within the Manomaya Kosha. The input side of the Manomaya Kosha is connected to the 5 organs of sense and 5 organs of action. The 5 organs of sense are – nose for smell, tongue for taste, ear for sound, eyes for vison and skin for touch. The 5 organs of action are – feet, hand, mouth for talking, organs for excretion and reproduction. The output side of Manomaya Kosha is connected to Vijnanamaya Kosha.
Vijnanamaya Kosha is the home of intelligence. It is the storehouse of knowledge. The input side is connected to the Manomaya Kosha, while the outside is connected to the Anandamaya Kosha. We have seen earlier that the Anandamaya kosha is a layer within the seed body.
3. Gross Body
Annamaya Kosha is part of the Gross body. We have seen earlier that the gross body is created in the mother’s womb. It is connected to the other koshas through the Pranamaya Kosha.
In the 3 bodies, we have covered all the koshas except the Pranamaya Kosha. The question is where does the Pranamaya Kosha fit? Is it part of the seed, subtle or gross body? There is no clear-cut answer. Some believe it is part of the gross body and other think it is part of the subtle body. The Pranamaya Kosha comes into force, when the seed body connects with the fetus in the womb. According to the Garbha Upanishad, this happens in the 7th month. It is not really a sheath, but it is the interconnector between the seed body and the fetus in the womb. This fetus finally becomes the Annamaya Kosha. The Pranamaya Kosha sustains this Annamaya Kosha for the duration of its life.
Roles of the Different Koshas
Each Kosha plays a different and distinct role. Let us try to understand this.
Perceiving: The perceiving of objects takes place in the Manomaya Kosha. We mentioned earlier that the Manomaya Kosha is connected to the 5 organs of the senses. It must be understood that the input signals from the 5 sense organs does not come from the gross body, but it comes from the subtle version of the 5 sense organs. Every gross object (living + nonliving) in the universe has a subtle version. This means every part of your body has a subtle version. There is a subtle version of your ear, eye, nose and every cell and tissue and bone. Each of the subtle objects is made of ‘vrittis’ or mental waveforms. Based on this reasoning, it is only logical to assume that there is a fully functional subtle universe made of waveforms. Everything that we experience really occurs in the subtle universe, the gross universe is only the manifestation of the subtle universe. This may seem radical, but it is the only truth. These object waveforms are the building block of the subtle universe. Science, with its string theory, is moving in the same direction.
It could be vision, sound, touch, smell and taste, the perception of these objects takes place in the Manomaya kosha. For example, when the input signal is for a tree, the Manomaya Kosha creates the required material which makes up the tree. This material is in the form of mental waveforms or vrittis. This mental waveform has the required ingredients for the tree. If the input is music; it creates the material which makes up the sound for the music. This way, it handles all the input signals coming from the outside world.
The perception does take place in the Manomaya Kosha, but the kosha has no clue what these objects are. It creates the source material, but it is clueless what it is. The Manomaya Kosha needs help, it therefore passes on the input signals to the Vijnanamaya Kosha for decoding.
Learning/Thinking: Vijnanamaya Kosha has intelligence. At the time of birth, the Vijnanamaya Kosha is a blank slate. With the power of intelligence, it learns continuously and acquires a great deal of knowledge. With this learning, it decodes the input signal. In the process of decoding, it adds intelligence to the object waveform. The object waveform is now made of knowledge. Knowledge is the substratum of the waveform. The object waveform has the knowledge of what the waveform represents. The object waveform has the knowledge, but there is no awareness. There is knowledge but no awareness within Vijnanamaya Kosha. There must be an ‘I’ or self who is aware. There is no ‘I’ or self within this kosha.
Vijnanamaya Kosha is powerful, it has the power of thinking, analyzing, and remembering. Some these powers are as follows
- Power of Cognition or Sensation
- Power of Imagination
- Power of Logic
- Power of Will:
- Power of Memory
It like a CPU in a computer, crunching and analyzing all sorts of numbers. Intelligence seems to be there but no awareness. In the same way, the Vinanamaya Kosha has all these powers, but there is no self who is aware of these activities.
Feeling: Feeling and similar emotions takes place in the Anandamaya Kosha. The name ‘Anandamaya’ does not convey this idea. We have seen earlier that Anandamaya Kosha means maker of bliss. This bliss can only happen when there are no vrittis or mental waveforms in the mind. Is this possible? Yes, only during deep sleep. During deep sleep there are no vrittis, no mental waveforms in the mind. The mind is blank. When there are no vrittis in the mind, only during that state, Anandamaya kosha experiences bliss. During the waking and dream states, this is not possible. A continuous stream of object waveforms is being sent fromthe mind. The Anandamaya kosha must react to these incoming vrittis.
We have seen earlier that the Anandamaya Kosha is made up with of feeling of ‘I’. This feeling is nothing but the ego. The ego is looking for permanent peace and happiness in the world. We saw that the Vijnanamaya Kosha decodes objects (waveforms) coming in from the 5 sense organs in the Manomaya Kosha. These objects are presented to the Ahamkara or ego. What does the Ahamkara do with these object waveforms? The ego has a clear goal – it is looking for continuous happiness. It evaluates the object waveform against this key criterion. If the ego thinks this object can provide that happiness, it will like that object. If the ego thinks that it will not provide that happiness, it will dislike that object. In Vedanta this is called Raga(like)/Dvesha (dislike). The ego will run towards the object it likes and run away from objects which it dislikes. Ego undertakes this task for all the thoughts and objects which it encounters.
This is how the ego interacts with the object waveform presented by Vijnanamaya Kosha and adds the sense of feeling to the object waveform with its likes/dislikes. This kosha starts to feel a range of emotions covering the entire spectrum. It feels, happiness, sadness, anger, jealously, attraction, repulsion and so on. This sense of feeling takes place in Anandamaya kosha.
Most living beings live within these 5 koshas. The ego operates within these 5 koshas. This does not help reaching your inner most core, which is Self-Awareness.
Knowing: Knowing is the ultimate level. This level is beyond the 5 koshas. It functions in our inner most core. It functions in the realm of Awareness. How to understand this? Let us start our discussion with the following statements, we make every day:
- I am listening to music
- I am reading this book
- I am thinking to travel
- I am talking on the phone
- I am looking at a tree
All the above statements are happening within the 5 koshas. We all live our daily lives within the 5 koshas. We undertake such tasks every moment. If we take a step deeper into our inner core, we can make the same statements as follows:
- I am knowing that I am listening to music
- I am knowing that I am reading this book
- I am knowing that I am thinking to travel
- I am knowing that I am talking on the phone
- I am knowing that I am seeing a movie
The above is not the right way to construct the sentence. We have done so to being the knowing part into the sentence. There is a tremendous change in these statements as compared to the earlier statements. ‘I am listening to music’, ‘I am reading this book’ etc., are no longer self-contained sentences, but they are the objects in the statement. It would seem that ‘I am’ in ‘I am knowing….’ is witnessing these objects. It could be listening to music, reading a book etc. Your Real Self is just witnessing, and not doing any action. The ‘I am’ in ‘I am knowing…’ is your Real Self. Yes, it is a witness, but it is aware that it is a witness. This is important. It is an awareful witness. This is Self-Awareness.
The ‘I am’ in ‘I am listening….’ is not your Real Self. This ‘I am’ in ‘I am listening……’ is really your ego. The ego always thinks it is the real Self. Vedanta teaches that the ego masquerades as the real I, but when you make a proper inquiry, you will find that the ego is like any other object. Ego is just another thought in the mind.
Daily, as you apply the Knowing part to every sentence you say or think you will discover your Real Self within you. The ‘I am’ in ‘I am knowing….’ is your Real Self.
The ego and the 5 koshas are not part of your Real Self. Self-Awareness is your Real Self. Ignorance is hiding the Real Self. The goal is to discover the Real Self and stay within that Real Self. | <urn:uuid:cee57181-1bc7-4977-9991-e2095cbd762d> | CC-MAIN-2022-05 | https://vedantaandscience.com/?p=639&replytocom=12290 | s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320303868.98/warc/CC-MAIN-20220122164421-20220122194421-00269.warc.gz | en | 0.94633 | 6,404 | 2.75 | 3 |
The appearance of a person vets modernity if she has engaged herself with the latest trend and marks others according to that rage. This enumerating thought process comes up with the definition of Fashion which has promulgated its roots in the minds of people.
The word fashion generally means the face or appearance of a particular thing. It was first used in the 14th century, and the credit of its invention goes to Charles Frederick Worth, first designer, who in 1858 labelled his created garments in the name of fashion.
Fashion can be considered as the preface of someone’s extant personality to procure the standards in the modern society as it is used as an instrument to thicken its stem to endure a person’s existence before modern society.
Due to its magnificent strife among the youth, the modern time has become an era of fashion. It has influenced many lives. The impact of fashion has reached that level where one cannot think of the honouring presence without wearing trendy apparels and branded accessories.
Fashion delivers variation to our lives. Without it, our lives will be savourless. Let us see how this blog promotes this argument over fashion and utilisation of loans to access its touch.
Fashion- An expression
A person can express his distinctive personality, particularly in clothing, footwear, accessories, gadgets, make up etc. through fashion. It relates to the approach of pursuing something, discrete performance, and dealing behaviour with others.
It encompasses an extensive range of genres, be it fall in manners, lifestyle, speech, actions and habits. Present-day society puts its focus on many intellectual forms of discussions over the significance of fashion and clothing. If the sense of fashion and clothing were eliminated from our lives, the world population would have no difference and life would be monotonous.
If no fashion and clothing difference adopted, there would be a loss of distinctive social classes and traditions. Diversity flourishes when we present our cultures before each other. Lack of this sense might dull the beauty of diversity.
Eradication of diversity through fashion and clothing could change the dynamics of socio-regional-world relationships.
Fashion in relation to youth
Being fashionable is no more the talk of desires, but it becomes the need to get satisfied. Modernised world attracted the people of every age group, especially the Youth. Mostly youngsters get attracted to fashion.
When the era of modernisation began, it brought multiple changes in world society. Orthodox principles somewhere left behind, and the new generation tried to grow with the exclusiveness of modernity.
Young people want freedom in what they desire. The strong influence of fashion upon them can be seen through the excitement in following the trends instantly.
Fashion provides them with the opportunity to create views and attitude towards social culture. It is a medium to exchange their opinions and beliefs.
Does fashion produce employment?
It is seen that everyone around us is inspired by fashion and wills to act according to its manner. Economically, fashion does involve certain jobs as it is a field of exchanges goods and services.
Since many people find it challenging to pick one out of many fashion jobs, one would confront the difficulties as there are several different opportunities in the fashion industry.
The fashion industry is very competitive to pursue your dreams. You may face rivalries against you because there is a high demand for fashion jobs.
Below you will observe a description of respective fashion jobs and helpful in getting the idea you can easily go with to make your career in the fashion industry:
1- FASHION FORECASTER- It is among the highest-ranking careers in the fashion industry. A fashion forecaster forecasts about the future style and trends. She perceives depth knowledge of fashion and holds the expertise to frame creativity in his analysis and researches.
2- FASHION STYLIST- The work of fashion stylist is to decorate or make someone look good. She must be familiar with colours, styles and fabrics. She is responsible for selecting the top- notched photoshoots, events, etc.
3- FASHION PHOTOGRAPHER- To become a fashion photographer, a person must know angles and lightings. She has to work with a stylist, makeup artists and models to ensure the efficiency of the products.
4- FASHION DESIGNER- Many people are curious about the fashion industry, intensively, fashion designing. This profession is of extravagance, but it requires a lot of gruelling hours in both hard and smart work.
5- FASHION MERCHANDISER- She should be familiar with the demands of costumers’ demand and know how to present them. She must have the sense of business also. She develops marketing strategies and creates visual displays before consumers.
Making careers in the fashion industry demands a culpable determination and a lot of hard work. Employers look for something that assures his hiring special.
What finance can do?
If somebody is going to take admission in the fashion specialised academies, start as a freelancer or to start up her own fashion company and she is not capable of raising monetary inputs by her own. Then the next solution is to seek financial assistance from outside with a valid proposal.
There is an offer called debt consolidation loans for bad credit by the direct lender where no guarantor is required. This loan specially framed for those who are already in debt and their credit score is not fair. Still, people desire to open their work in the fashion industry.
One can rely on this loan offer and can achieve his dreams.
Fashion becomes a medium to convey one’s feelings and thus helps in developing personality. Along with this, a money-making process can employ numerous people.
It is a privilege to everyone how she wants to change her appearance and enjoy the state of being fashionable and trendy. In addition, no one can force her to do as per his or her opinion. It emphasises to make its own decisions.
It encourages choosing how you want to dress up and what views for you should be made by the people, although it is not necessary. | <urn:uuid:6c1b5201-90c9-431d-a9b3-cac8673a61d9> | CC-MAIN-2021-31 | https://www.gossipgirldaily.org/fashion-the-prospect-to-adorn-the-dreams/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046152000.25/warc/CC-MAIN-20210726031942-20210726061942-00298.warc.gz | en | 0.964456 | 1,253 | 3.03125 | 3 |
We know, but we don't know
An April 2 Science Codex article featured research by Associate Professor of Psychology Ryan Howell that indicates consumers may purchase material items with the mistaken belief that those items provide more value than money spent on experiences. "People actually do know, and accurately predict, that life experiences will make them happier," Howell said. "What they really underestimate is how much monetary value they will get out of a life experience. Even though they're told experiences will make them happier and they know experiences will make them happier, they still perceive material items as being a better value."
Associate Professor of Biology Katharyn Boyer's research that examines the best way to restore native oyster habitats to the SF Bay was the subject of an April 7 Bay Nature report. "We’ve even had sturgeon stopping by (the one acre test reef). It’s a boon to a large array of organisms," Boyer said. "We do consider it a win-win, but we’re cautious about how much we can say about it at this point. There are big decisions we want to make as a society on how close to the shoreline we have our infrastructure. (And) oysters and our reefs are part of a solution that everyone, scientists and managers included, will have to address."
Investing in the future
Chairman of the SF State Foundation Board John Gumas commented on the Foundation's pledge to divest from direct ownership of companies with significant exposure to the production or use of coal and tar sands for an April 8 San Francisco Examiner report. "The foundation makes investments so that returns can help build the University and its future -- that is our fiduciary responsibility," Gumas said. "We believe that with careful planning we can both build our endowment and do our part to endow future generations with a healthy environment."
For more media coverage of faculty, staff, students, alumni and programs,
see SF State in the News. | <urn:uuid:79895e27-36bf-4329-b5d0-c37e89efe8d5> | CC-MAIN-2019-04 | http://www.sfsu.edu/~news/cmemo/spring14/april14news.htm | s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583659944.3/warc/CC-MAIN-20190118070121-20190118092121-00426.warc.gz | en | 0.967335 | 402 | 2.65625 | 3 |
The oldest interface is still one of the best. Learning about shells and utilities can pay off for jobs where they're the fastest or most flexible.
Have you sat down with that grey-haired system administrator and watched what’s happening as her (or his) fingers fly over the keyboard? Ever wondered why they’re still Stuck In The Stone Age, typing text instead of using the obviously easier mouse and menus? Suspect that person is a geezer who can’t learn new techniques?
Maybe they did learn Linux (actually, Unix) before everyone had windows on a monitor. But there’s a reason why they keep a terminal window (or ten) open on their desktops: this is a power platform that can be the fastest way to work. It remembers what you’ve done (so it’s easy to repeat and/or modify), has built-in programmability (need a loop? no worries!), and gives you full access to the library of hundreds of Linux utility programs that were designed for just this environment. A terminal and utilities do jobs that a GUI can’t touch.
Less power than your wristwatch
The Linux command line was born around the time Linus Torvalds drew his first breath: in the days of small Unix systems with tiny amounts of memory. Back then, a tty was a teletype — those clattering machines that also sent and received telegrams over 110-baud lines. Using Unix meant typing on a keyboard and waiting for the (often-busy) system to respond. Every byte and CPU cycle were precious. The Unix command line evolved to help people cope with this environment.
Not the only way
We aren’t saying that you’ll only want to use the command line. Understanding where it’s useful and how to use it will let you choose whether to use your terminal window or a GUI.
Why would you want to type on a command line instead of (say) choosing commands from a GUI menu? There are more reasons than we can cover in three pages. Here are some of the best:
- Linux utility programs — sort, cut, join, and hundreds of others — are powerful and flexible tools that are ready to run with a few keystrokes. Options let you fine-tune (or completely change) how utilities work.
- Powerful I/O redirection lets you save data to files, read data from files, and connect a series of utilities together in a pipeline that lets you custom-build exactly what you need… again, with just a few keystrokes. GUI applications — which have to pack all possible operations into a set of menus and checkboxes — can’t be nearly as flexible or powerful.
- Linux commands can operate on many files at once. Filename completion lets you specify filenames by typing a few characters and the TAB key. Some GUIs have that feature too. But most GUIs don’t have wildcards, which let you specify one or many files with just a few keystrokes. The pattern
[A-Z]*.txt matches any filename that starts with an uppercase letter and ends with
.txt; that could be many files. (
[:upper:]*.txt handles non-English filenames too.) Use
/home/*/data0[0-5] to match all files named data00 through data05 in all directories under /home — for instance, /home/amy/data01, /home/randolph/data06, and so on.
- A shell is actually an interpreter for a programming language: the language of command lines. It puts powerful loops, tests, variables, I/O manipulation, error-trapping, and more at your fingertips when you type a command line.
Put these same command lines in a script file, and you have a shell script — which lets you repeat those stored commands anytime you want to. It’s the same language from the command line or from a script file. Learn the shell “language” and you can use it both places!
One of the authors of the Apress book “From Bash to Z Shell: Conquering the Command Line” gave a good example of this. “Earlier this week we had to rearrange a bunch of source files … arranging according to newer directory structure conventions. Lots of little jobs like renaming files to lower case would be really laborious from a GUI. From the shell I could do all the stuff on the fly as fast as my colleague explained what needed doing. He was quite impressed and it’s convinced him to try to learn more about it all himself.”
- Command substitution lets you use the output of one command as part of another command line. If you haven’t used a shell before, this is hard to explain… but, trust us, it’s very powerful. For instance, you can run a file-search program like find, then run another command on the files that find found.
This kind of flexibility is unheard-of in a GUI menu system.
Behind the scenes
If you’re new to the command line, understanding some basics can help you fit the pieces together.
On modern systems, the old teletype device has been replaced by either a console terminal (which fills your screen — like the virtual terminals that appear when you press Alt+Fn or Ctrl+Alt+Fn; see the console manual page for details) or a terminal window (which is like other GUI windows).
Running “inside” the terminal is a shell. A shell is a Linux program that’s designed for running both internal “built-in” commands (like cd to change the shell’s current directory) and external commands (like grep, perl, vim, and many more). There are several different shells; bash, tcsh, and zsh (“Z shell”) are probably the most popular, but you can choose whatever shell you like.
A shell is a program like any other on Linux. So a shell can run another shell; that’s the situation when you run a shell script (a text file with one or more command lines, which start with a command like cd, grep, perl, vim, …).
A shell does the following steps, over and over:
- Unless it’s reading from a script file, it outputs a prompt (like
$ — or anything you set it to) and waits for step 2.
- Reads a command line from the terminal (followed by the RETURN key) or from a script file.
- Parses (interprets) the command line to find the command name(s), special characters like
? (wildcards that let you specify one or many filenames without much typing),
> (redirection symbols, which route programs’ input and/or outputs).
- Runs the command(s) and waits for them to finish.
- Repeats the steps for the other commands until the script file ends, or the user types exit or CTRL-D. Then the shell program terminates — and the terminal window closes, or virtual console prints another
We can’t give many examples in a three-page column that also explains the basics. If you’d like to see of what you can do in this feature-rich environment, browse through some of the past six years’ Power Tools columns.
Being able to use any command in a loop — to do something repetitive, with just a few command lines — is one of the most obvious reasons to use a shell instead of a GUI. Here’s a loop that finds every filename ending with .c in the current directory and makes a copy with
OLD_ preceding the filename. (The
-p is an option that tells cp to give the copy the same last-modification date as the original file.) Linux utilities normally run silently unless they have errors… but, if you wanted to see what files cp is copying, you could add the
$ for f in *.c
> do cp -p $f OLD_$f
> are prompts. These tell you that the shell is waiting for commands. You can customize prompts to show much more information: the name of the current directory, the computer name, your username, the date and time, and almost anything else.
To repeat the previous loop at some later time, you could navigate up in the shell’s history list by pressing the up-arrow key on your keyboard — and, when you see the loop you typed before, press RETURN to re-run it. It’s also possible to edit the loop interactively at this point. Or, you could use one of the history commands available on old teletypes. This command repeats the previous for loop:
Not all shells will let you repeat an entire loop with !for; they may only repeat the first line. The shell will show the loop commands, then re-execute them. This is an example of why Linux commands generally do what you ask without confirmation: in this case, cp will replace the previous backup files with the new ones. (If you didn’t want that, you could have added a cp option like -i, “interactive,” which asks before overwriting.)
Want to back up every filename ending in
.c in the entire directory tree — which could be tens or thousands of directories? Replace the
*.c in the previous loop with command substitution and the find utility. Here we’ll change the cp command line to make copies whose names end with
$ for f in $(find . -name '*.c' -print)
> do cp -p $f $f.bak
That loop has a couple of subtle problems that you’ll understand once you learn more about how shells work. (You could add
-type f to tell find to copy only files — not directories whose names happen to end with
.c. Also, if any names have spaces or special characters, you should be sure they’re handled correctly.) The Z Shell has a built-in
** recursive-matching operator that’s easier than find. Here’s the previous loop using Z shell:
% for f in **/*.c
for> do cp -p $f $f.bak
This is an example of the power of different shells: if you know how to use more than one, you can choose the best shell for a job. (Many Linux users only learn bash… and that’s plenty!)
Maybe your IDE (programming environment) has a function that can copy your source code. But can it copy any or all directories? Can you choose the backup method, and whether the backups keep the original timestamps? Can you add conditional tests to choose which files are backed up — for instance, only files modified in the past day, or only files with more than 100 lines, or only files containing a call to the function foobar(), or …? If you can, that’s a sophisticated IDE! But what if you want to make a zip or tar archive instead of a backup? Or if you don’t want to copy the files; you want to rename them? Or …
Or maybe you should take the time to learn the fundamentals of shells and utilities. Once you learn the basics (like for loops) you can use those same fundamentals with the hundreds of utilities to do thousands of operations — with just a few keystrokes. Grab a good book (like the Apress book mentioned earlier; shameless plug: this author wrote part of it) and get ready to be a (grey-haired?) Linux guru yourself. | <urn:uuid:556593c4-20a6-4df7-bd93-923dad06f994> | CC-MAIN-2013-20 | http://www.linux-mag.com/id/7096/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705957380/warc/CC-MAIN-20130516120557-00079-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.903775 | 2,460 | 2.96875 | 3 |
Our editors will review what you’ve submitted and determine whether to revise the article.Join Britannica's Publishing Partner Program and our community of experts to gain a global audience for your work!
Twenty Thousand Leagues Under the Sea
Twenty Thousand Leagues Under the Sea, novel by Jules Verne, first published in French as Vingt Mille Lieues sous les mers in 1869–70. It is perhaps the most popular book of his science-fiction series Voyages extraordinaires (1863–1910).
Professor Pierre Aronnax, the narrator of the story, boards an American frigate commissioned to investigate a rash of attacks on international shipping by what is thought to be an amphibious monster. The supposed sea creature, which is actually the submarine Nautilus, sinks Aronnax’s vessel, and he is held prisoner along with his devoted servant, Conseil, and Ned Land, a temperamental harpooner. The survivors meet Captain Nemo, an enigmatic misanthrope who leads them on a worldwide, yearlong underwater adventure.
Learn More in these related Britannica articles:
Nautilus…Jules Verne’s classic science-fiction novel
Twenty Thousand Leagues Under the Seawas published, describing the voyage of Captain Nemo’s Nautilussubmarine.…
…Lieues sous les mers(1869–70; Twenty Thousand Leagues Under the Sea), and also a character in the subsequent L’Île mystérieuse(1874; The Mysterious Island).…
Jules Verne, prolific French author whose writings laid much of the foundation of modern science fiction. Verne’s father, intending that Jules follow in his footsteps as an attorney, sent him to Paris to study law. But the young Verne… | <urn:uuid:f1faf107-9aeb-4500-a911-37635deb4aad> | CC-MAIN-2020-24 | https://www.britannica.com/topic/Twenty-Thousand-Leagues-Under-the-Sea | s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347415315.43/warc/CC-MAIN-20200601071242-20200601101242-00462.warc.gz | en | 0.887988 | 386 | 3.484375 | 3 |
With a gross national income (GNI) per resident of (2017) US $ 37,970, France ranks in the top third of the industrialized countries and EU countries. The transition from an agricultural state to a modern and leading industrial and service society took place relatively slowly.
After 1945, the French economy, which had been characterized by small-scale agriculture, found itself in an accelerated process of catching-up industrialization and modernization (especially in relation to the Federal Republic of Germany) under the conditions of a corporatistically organized macroeconomic framework plan introduced in 1946. With this system of planification an attempt was made to achieve a balanced application of the control methods of planning and competition. The economic plans, which the private sector was encouraged to adhere to through the granting of state loans and contracts, proved to be an effective instrument for implementing agreed growth and investment goals until the French economy opened up to Europe. Added to this was the nationalization of key sectors (energy industry, transport, major banks, insurance companies) and some industrial companies.
The reconstruction and the increase in production in the 1950s (the level of 1929 was reached in 1949) took place within the protected framework of a largely closed economy; Little was exported to countries outside the franc zone (6% of gross domestic product [GDP]). A turning point was brought about by the loss of colonial markets in the course of decolonization in the early 1960s and the customs union established in the EEC. The transition to an open economy required an internationally competitive industry. Economic policy goals were: Promotion of key industries (electronic and capital goods industry), creation of a coherent national industrial structure, formation of internationally competitive groups of companies, based on state and private large companies.
The main economic policy problem of the 1970s and 1980s was the question of adapting to the demands of international competition and the new technological challenges, with two different strategies opposing each other: 1) a liberal strategy of global market-oriented structural adjustment, the core elements of which are adherence to free foreign trade, the acceptance of the international division of labor and the resulting pressure to adapt as well as a forced active and passive internationalization of the French economy; 2) a modernization concept, which – without questioning the opening of the French economy – attached great intrinsic value to industrial policy structural reforms and domestic economic development goals and was shaped by the will for a strongly self-determined economic and social development. Despite these different economic policy approaches, the public sector remained more decisive for the French economy (the second largest in the EU, after Germany) than in the other western industrialized countries.
The country was able to recover relatively quickly from the economic setbacks as a result of the international financial crisis (decline in gross domestic product in 2009: -2.6%), but without entering a stable growth phase. Attempts were made to counteract the high national debt (2017: 97% of GDP) through a strict austerity policy. However, the public sector’s declining willingness to invest favored the rise in unemployment to 10.6% (2015) (that of youth unemployment even to 23.7%) and thus the weakening of the domestic market.
Foreign trade: Until the beginning of the 1990s, the French trade balance consistently showed import surpluses. From 1992 to the beginning of the 2000s, export surpluses were achieved thanks to greater international competitiveness. In recent years, however, the opposite trend has occurred (2017: exports: € 473.6 billion, imports € 552.7 billion). France ranks seventh among the world’s trading nations. Important export and import goods are chemical products, machines, motor vehicles / parts and food. The most important trading partners are the EU countries, among which Germany comes first, followed by Belgium, the Netherlands, Spain and Italy. The EU countries account for around 60% of all French exports.
The name France is derived from the Germanic Franks who populated Romanized Gaul in late antiquity. Charlemagne created a great empire, from the western part of which France eventually developed. In the feudal state (Angevin Empire), which was temporarily connected to the English monarchy, the kings strengthened their power at the expense of the territorial lords. The French nobility took a leading role in the Crusades. 1309–76 and during the Western Schism (1378–1417) in competition with Rome, the Pope resided in Avignon. In the early modern period, France rose to become a major European power in a permanent conflict with the Habsburgs in Spain and in the Roman-German Empire. After the Huguenot Wars(1598) solidified the absolutist monarchy, which under Louis XIV radiated politically and culturally across Europe. France became a colonial power in the 18th century. The French Revolution abolished the Ancien Régime in 1789 and created the modern nation-state with basic democratic rights for its citizens (republic from 1792). Napoleon I , Emperor of the French from 1804, subordinated Europe to the hegemony of the “Grande Nation” (until 1815).
Industrialization took hold in the first half of the 19th century. After the July Revolution in 1830 France became a constitutional monarchy, after the February Revolution in 1848 it became a republic again, and again after the fall of the Second Empire under Napoleon III. as a result of the defeat in the Franco-German War. In the Third Republic (from 1870) a party democracy was formed with a strict separation of state and church (laicism). During the First World War, France suffered great human losses and destruction. Popular Front governments (1936–38) laid the foundation for the French welfare state. After the military defeat by Hitler’s Germany (1940), the État Français (Vichy regime) became an authoritarian satellite state (until 1944). The Fourth Republic grew out of the Resistance against him and the German occupation. It was wiped out by internal political conflicts and decolonization, especially in Indochina and Algeria. Under President Charles de Gaullethe Fifth Republic was created (from 1958). It ended the Algerian War (1954–62), became reconciled with Germany and, from the mid-1970s, became an engine of European unification. In the 1980s, the first measures were taken to break the strong political centralism through more powers for the departments and regions. Globalization, overcoming the euro crisis, populism and the integration of immigrants and their descendants, especially from the former colonies in Africa, were a particular challenge to France at the beginning of the 21st century. | <urn:uuid:bc6fb2bd-d608-47ad-9087-3492e58be8de> | CC-MAIN-2024-10 | https://www.politicsezine.com/france-business-and-history.html | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474541.96/warc/CC-MAIN-20240224144416-20240224174416-00327.warc.gz | en | 0.960327 | 1,352 | 2.984375 | 3 |
Act 200 of 1993 heralded the arrival of the Interim Constitution for the Republic of South Africa. Prepared to enable the new government to put in place a final constitution within two years, it came into effect on the appointment of a government of national unity in 1994.
The interim constitution was created after the politicians wrangled their way through the sections of the draft while taking representations from the public and interested bodies.
The draft document was then patched together by a team of constitutional lawyers who had to embody sound legal principles in the draft, notwithstanding that the politicians, in reaching a settlement, had ignored the legal principles involved. It was a formidable task, but with help from the constitutions of countries such as the US, Canada, India, Germany and Namibia, a document was finally produced which provided the springboard for the new South Africa.
The interim constitution, which is now in force, creates a position where, for the first time in South Africa, the constitution is the final authority between the state and its subjects.
In view of its importance section 4, “Supremacy of the constitution” is quoted in full. It says:
This constitution shall be the supreme law of the Republic and any law or act inconsistent with its provisions shall, unless otherwise provided expressly or by necessary implication in this constitution, be of no force and effect to the extent of the inconsistency.
This constitution shall bind all legislative, executive and judicial organs of state at all levels of government.
The interim constitution also created a bill of rights in which the fundamental rights of all the state's citizens are protected. It provides for the creation of a constitutional court, consisting of a president and 10 other judges, which has jurisdiction throughout the Republic as the court of final instance over all matters relating to the constitution. And, in schedule 4, it provides 34 constitutional principles upon which the final constitution is to be based.
The constitutional court has begun its duties and has already ruled the death penalty unconstitutional in the light of section 9, which provides that every person has the right to life.
On 8 May, 1996 the Constitutional Assembly adopted a constitution intended to be the final constitution, with a majority of 86 per cent, though only a two-thirds majority was required. Two days later the Constitutional Assembly transmitted the proposed constitution to the Constitutional Court and requested that court to certify it in terms of section 71(2) of the interim constitution.
In view of the importance of the matter and in the national interest, the president of the court ruled that it would receive written and oral representations before coming to its decision on the final constitution.
On 6 September, having considered the draft and the rep resentations of the various persons and organisations, the court found that the judges were “unable to and do not certify that all of the provisions of the Constitution of the Republic of South Africa, 1996, comply with the constitutional principles contained in schedule 4 to the Constitution of the Republic of South Africa Act 200 of 1993”.
The court found that the constitutional principles as contained in schedule 4 are not upheld because:
The right of employers to engage in collective bargain ing is not recognised.
Ordinary statutes are shielded from constitutional review.
Fundamental rights, freedoms and civil liberties protected in the draft legislation are not “entrenched”.
The independence and impartiality of the Public Protector, the Auditor-General and the Public Service Commission are not adequately provided for.
The legislation fails to specify the powers of the Public Service Commission, making it impossible for the court to certify that legislative autonomy has been recognised.
There is a failure to provide a framework for the struc tures of local government.
As a result of this non-compliance with schedule 4 the Constitutional Assembly has three months to rework the constitution. But the court stated the Constitutional Assembly “drafted a constitutional text that complies with the majority of the requirements of the constitutional principles”.
It also emphasised that the court has a judicial mandate and that it had no right to express itself with regard to the political choices of the Constitutional Assembly, except in dealing with compliance or not of the constitutional principles. It is now up to the Constitutional Assembly to prepare a further draft for the scrutiny of the Constitutional Court.
Hopefully, when drawn and certified the final draft will give South Africa a constitution that will stand the test of time and be looked upon with pride by fair-minded persons everywhere. | <urn:uuid:33bbe768-5ebe-478d-a135-e9d24cef5b5c> | CC-MAIN-2016-40 | http://www.thelawyer.com/issues/23-september-1996/constitutional-consternation/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738661780.47/warc/CC-MAIN-20160924173741-00059-ip-10-143-35-109.ec2.internal.warc.gz | en | 0.9496 | 903 | 3.359375 | 3 |
Software Testing: What It is and Why It Matters
Americans are addicted to our smartphones and devices, and we are quick to upgrade when a new iteration is released. But without software, our devices are nothing more than useless hunks of glass and metal. Software brings our devices to life, yet we pretty much take it for granted, expecting it to perform flawlessly in nanoseconds.
s, they test and retest their products to ensure they are free of bugs and glitches before releasing them. There is a broad range of software testing levels, approaches and types, and each has its use in software development. We’ll look into some of the most common.
Table of Contents
Before you hire a software development team to bring your concept to life, it’s a good idea to do a concept test. Concept testing evaluates the idea of your project to see if it is viable before you commit to development. It provides data about cost, risk, potential revenues and other important metrics. Concept testing can bring to light key factors that you may not have considered, such as prospective user personas, product benefits and uses, advertising and distribution, and other key factors that can make or break your product’s success.
Automated vs Manual Testing
End user experience is the acid test of software performance. If an application is complicated or awkward to use, or if it has frequent glitches and failures, you have an inferior product that will quickly be discarded. Manual testing puts the software tester in the user’s shoes, to see what works well and what needs improvement. Manual testing often involves reviewing documentation to check that the specified features have met all requirements, and using the end product to evaluate its performance from a user experience perspective.
Automated tools test and evaluate software products using test scripts that are executed and generate results automatically. Automated testing is useful for identifying defects through the entire development cycle, but does not evaluate user experience. Most software developers use both automated and manual testing methods to ensure the end product performs flawlessly and delivers satisfying user experience.
Early Testing Saves Time and Money
Testing performed by software engineers in the early stages of the development cycle can make a huge difference in the quality and performance of the end product. Shifting focus from software feature development to quality control early on can eliminate hours of time wasted later, fixing bugs and rewriting code.
Software developers can promote superior products by performing the following tests prior to handing the product over to quality assurance engineers for more extensive testing:
- Testing for basic functionality: Do basic tests for buttons, text entry fields and basic API functionality to make sure the software won’t crash before releasing it to test engineers.
- Thoroughly reviewing code: Once you perform basic functionality tests, do a peer code review to double-check for problems.
- Incorporating static code analysis: Use static code analysis tools to check your source code for security and concurrency issues, and to ensure coding standards.
- Running unit tests: Test units independently for valid and invalid inputs, and run unit tests each time a change is made to the source code repository.
- Running tests for single-user performance: Load testing on backend code is a common part of development, but you should also test the frontend for responsiveness from a single-user perspective. If page-load speed is slow, fix the underlying problem before passing it along.
While conducting test elements may not be as sexy for developers as building features and functionality, identifying and fixing issues early on can speed up the development process and ensure the delivery of a superior product.
Software Testing at Tateeda
Software engineering is a craft that requires knowledge, experience and creative talent. The developers and testers at Tateeda are dedicated to creating the highest quality custom software solutions to meet the needs and requirements of our clients. We test and retest throughout the software development cycle to deliver an end product that performs flawlessly and delivers satisfying user experience. Contact us today with your concept or project, and let Tateeda bring your vision to life. | <urn:uuid:d478d278-cc2a-4fae-9e02-5f951eb08057> | CC-MAIN-2023-06 | http://test.tateeda.com/blog/software-testing-what-it-is-and-why-it-matters | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764494936.89/warc/CC-MAIN-20230127033656-20230127063656-00588.warc.gz | en | 0.921609 | 829 | 2.8125 | 3 |
Portugal and the Nazi Gold: The ‘Lisbon Connection’ in the Sales of Looted Gold by the Third Reich
Between January 1, 1939 and October 31, 1945, Portugal received at least 123.8 tons of looted gold directly or indirectly from the Reichsbank, ranking it second only to Switzerland among countries that received stolen gold from the Third Reich. Nazi Germany used stolen gold in order to pay for needed raw materials, such as tungsten, while Portugal was eager to increase its gold reserves. The Swiss National Bank served as one of the main launderers of this looted gold from the Third Reich. After the war, the Allies demanded the return of 44 tons of this gold, most of this being from the Belgian national reserves. However, Portugal consistently refused to hand over more than four tons, claiming that there was no clear evidence that the gold had been acquired illegally. The article examines the labyrinth through which looted gold was transferred to Portugal, helping to increase that country’s gold reserves by nearly 600%. | <urn:uuid:8e492444-d018-4c8f-a737-fa259458f10b> | CC-MAIN-2022-21 | https://store.yadvashem.org/he/portugal-and-the-nazi-gold-7 | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662531762.30/warc/CC-MAIN-20220520061824-20220520091824-00404.warc.gz | en | 0.977955 | 209 | 3.265625 | 3 |
New Planet That Can Support Life Found
Astronomers from the Carnegie Institution of Washington and the University of California, Santa Cruz have announced another habitable planet found in the universe.
Image Credit: Time
They announced it in Astrophysical Journal Letters and the planet is quite interesting compared to other planets found that may support life. The new planet, playfully called GJ667Cc, is about four and a half times the size of Earth and is found 22 light-years away. Because of the size of the planet scientists say that it's probably not a gas planet and is more like our Earth where it has rock and water. They also say that it's most likely around the same temperature as Earth. Since it's such a perfect candidate for life could this be where the UFOs and aliens are coming from? It is possible but since it's so very far away it would be a hard for them to get here without very superior technology that we couldn't comprehend.
Image Credit: Alien UFO Research
Since NASA launched Kepler scientists around the world have found almost 200 planets that could support life. | <urn:uuid:abaab955-882b-4763-9b5f-22c3b68ff0c1> | CC-MAIN-2015-27 | http://ufodigest.com/article/new-planet-can-support-life-found | s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375097246.96/warc/CC-MAIN-20150627031817-00082-ip-10-179-60-89.ec2.internal.warc.gz | en | 0.964926 | 222 | 2.75 | 3 |
Lev Davidovich Bronstein —better known to the world as Leon Trotsky— died on August 21, 1940, in Coyoacan, Mexico. One could think that the name of this Russian revolutionary would have come to my ears in my contemporary history classes in my first year of high school here in Cuba.
Nevertheless, the name Trotsky was not written in the history book that I carried around when I was 14 and 15. From the classes of that period I can only remember the figure of Lenin, who was glorified by my teacher.
Like the more than 30 other students in my class, I knew of Vladimir Ilyich Lenin as the primary and practically sole leader of the Great October Socialist Revolution. The only other memory that I retained of those classes was the day we learned about the causes for the collapse of the USSR; for some reason, many of the students in the room looked at each other as if we had been double-crossed.
The history lessons concluded, as did my high school studies, without me ever learning that there had been a Leon Trotsky. Only a few days before I began my program at the university —and by pure chance— I heard a song by a Cuban folk singer about how Trotsky had been one of the main figures in the Russian Revolution of 1917.
The name of that revolutionary stuck in my mind, but any information about him was scarce in every place one could go to look him up. It wasn’t until my third year at the university that the fact that I found myself among a very particular group of people allowed me to discover the full story of a part of history that no one had thought it necessary to reveal to me.
Finally the name of Trotsky stopped being just a name and for me turned into a person who had carried out actions of critical importance for the Russian Revolution. He had been the principle representative of the St. Petersburg’s soviets (workers’ councils) as well as in the organization of the Red Army.
Perhaps the fact that I had never before known about Trotsky made me become an assiduous reader of most of his works, among which I have to highlight Permanent Revolution (1930) and The Revolution Betrayed (1936).
August 20th will mark 70 years since the fateful attack carried out by a Stalinist clique against a man who exhibited in his deeds and writings a love for the world proletariat. He was confident that a social structure different from capitalism could free life of all wrongs.
Yet despite everything, this Trotsky still doesn’t appear in Cuban history books. There’s no mention of the founder of the Fourth International, an organization committed to the struggle against bureaucracy, against those who sought to enrich themselves at the expense of other people’s labor, against those lacking scruples in accentuating the differences between classes in a society that aimed to construct socialism, and against those who did not allow the workers to either participate or decide.
So isn’t it important to reclaim him in the history taught on the island, a person truly committed until the final few days of their life to the non-degeneration of societies that are called socialist. | <urn:uuid:f6e9293c-58ee-4a90-bddf-a0bbe26e295b> | CC-MAIN-2019-30 | https://havanatimes.org/diaries/daisy-valera/trotsky-as-taught-in-cuba/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195529007.88/warc/CC-MAIN-20190723064353-20190723090353-00021.warc.gz | en | 0.982476 | 648 | 3.1875 | 3 |
As the efficiency of computing has increased and new numerical methods have become worldwide, modeling and analysis of musical instruments and sound synthesis have developed rapidly. One of these methods is the waveguide method, which has allowed me to create a discrete time model representing the two way wave propagation in the trumpet tube using delay and reflection elements.
It is neccessary to acquire the knowledge of the physical and musical behavior of the trumpet and waveguide modeling. These have allowed me to create my own trumpet model with the requisite additions: the diameter changes of the body of the instrument, the radiation impedance and also the reflection. I have investigated the inaccuracy of the model, and made time and frequency domain analyses. I have paid elevated attention to the input impedance and the inharmonicity of the model, which characterizes the quality of the trumpet’s sound. I have investigated the effects of the valves on the trumpet’s physical parameters and working mechanism. Finally, I have compared my results with the literatures’. I have paid attention to a theoretical background of modeling the blowing pressure.
The published methods and results of this paper can result in a better understanding of the behavior of the trumpet and creating the physical model-based sound synthesis. | <urn:uuid:a43fe42a-50a9-4579-864d-2e3022ecd694> | CC-MAIN-2018-22 | http://diplomaterv.vik.bme.hu/en/Theses/Trombita-waveguide-modellezese | s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794865411.56/warc/CC-MAIN-20180523024534-20180523044534-00065.warc.gz | en | 0.940201 | 250 | 2.546875 | 3 |
The Romans were immensely proud of their empire. Through the Pax Romana they believed that they were bringing the light of civilisation to the darkest corners of Europe and Asia. They had an unshakeable belief that Rome was superior to any other country or culture, so by conquering foreign peoples, they thought they were doing them a favour.
How paternalistic! What they promoted in the end was fascism and imperialism. It was the mother of all scams, and we are still witnessing this ruinous and degenerate culture today.
Let's get some facts straight. Civis romanus non sum. I am not a Roman citizen.
All my ancestors were Hernici, an ancient Italic people, and thus I am an Hernicus or Hernican.
Though their territory was included in Latium, in the sense in which that term was understood in the days of Augustus, Hernicans were still distinguishable as a separate people. Cicero categorised their spoken Latin as rusticitas, and Hernicans are mentioned even at a later time as retaining many characteristics of their rude and simple forefathers.
For most of the 5th century BC, the Roman Republic had been allied with the other Latin states and the Hernici to successfully fend off the Aequi and the Volsci. In the early 4th century BC this alliance, however, fell apart. A war fought between Rome and the Hernici in the years 366–358 BC ended in Roman victory, and the submission of the Hernici.
Rome also defeated a rebellion by some Hernican cities in 307–306 BC, which a few years earlier had allied with the Aequi and the Marsi, proof that the Hernicans were still resisting the Arrogantia Romana. Those cities which had stayed loyal to Rome — Alatri (Aletrium), Ferentino (Ferentinum), and Veroli (Verulae) — retained only nominal independence as municipia. The rebellious Hernicans of Anagni (Anagnia) and of other cities were incorporated directly into the Roman Republic, and were given citizenship without the right to vote (civitas sine suffragii latione), in essence citizenship without the right to marry Roman citizens, so they were citizens, but effectively treated like peregrini (foreigners). In the course of the following century the Hernici became indistinguishable from their Latin and Roman neighbours, and disappeared as a separate people. It is an old story, but few realise that the Hernicans were the first to become a conquered people by the so-called forces of civilisation.
Let me again repeat the simple facts. Civis romanus non sum. I am not a Roman citizen.
Not only all my ancestors were Hernici, but today I have the same kind of phoney citizenship that was granted to the rebellious Hernicans of Anagni (Anagnia) and of other cities.
Even though I am an Italian, and thus a European Union citizen through my mother and the Roman legal concept of jus sanguinis, since I have refused to submit to the Arrogantia Romana, today I have neither a European passport, nor an Italian national ID card, and so if I go to Italy I cannot stay for a longer time than any American tourist.
I also have a phoney American citizenship by the Roman legal concept of jus soli, and for this reason I cannot legally become the next President or Vice President of the United States, so I have rejected my original US citizenship by rebellion against New York City, and have acquired Native American citizenship by adoption, since I was adopted by a Native American traditional organisation that is acknowledged by some recognised Native American tribes, bands, or traditional communities.
Hernican [1, 2] was the ancient language of central Italy that the Hernici spoke, a member of the Oscan group within Sabellic (Osco-Umbrian). Two inscriptions in the language have been identified thus far, dating to the 1st millennium BC.
Hernican, a North Oscan dialect, was written in a manner similar to how Oscan proper was written. Some Sabellian languages were affiliated with Oscan (the so-called North Oscan dialects: Hernican, Marrucinian, Paelignian, Vestinian), others with Umbrian (Aequian, Marsian, Volscian).
It should be noted that the word Hernici is a derivative of what the Marsi called Herna. As was stated in Latin, «Hernici dicti a saxis, quae Marsi herna dicunt.» Translation: "The Hernici are named from the stones, which the Marsi call herna." So there was certainly some linguistic adoption even between Sabellian languages.
This linguistic adoption goes even further in me, and shows just how much of a freedom fighting Sabellian or Italic I am. My forename Cesidio [3, 4] derives from the Latin Caesidius (the Roman nomen of the gens Caesidia), which in turn derives from the Oscan Kaisidis (or Caisidis). The name Caesidius, like all aristocratic names ending in "idius", "iedius", or "edius", is of Sabellian language origin, the oldest epigraphic evidence coming from the Marsi area of the city of Trasacco in the 4th century BC.
Oscan speakers adopted the Etruscan alphabet to write their language. This event probably occurred around the 7th century BC, but the first evidence of the Oscan alphabet did not appear until the 5th century BC in the form of inscriptions on coins.
The Oscan alphabet was written from right to left, a feature preserved in Etruscan and in a few languages today such as Arabic and Hebrew , but not in Latin. Also, to mark separation between words, a dot was used.
As Rome conquered territory occupied by Oscans, it assimilated the Oscan people into the Roman world. As a consequence, the Oscan ethnic identity and culture disappeared, and the Oscan language ceased to be spoken and written by the end of the 1st century AD.
Víteliú was the Oscan term for the Italian peninsula. This name is probably connected with the word for "calf" (seen in the Latin vitulus, and the Umbrian vitlu), and was originally applied to the Greek colonies in Italy. Gradually the word came to refer to the entire peninsula, and was adopted by allied Sabellian tribes to foster a sense of nationalism during the Italic revolt against Rome. A form of the ancient word survives in the modern Italian name Italia (Italy). | <urn:uuid:b2401423-9942-467b-87d7-e0fd2d4250dc> | CC-MAIN-2017-34 | http://hernici.com/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886117519.82/warc/CC-MAIN-20170823020201-20170823040201-00359.warc.gz | en | 0.974985 | 1,410 | 2.90625 | 3 |
The MGM-140/-164/-168 Army Tactical Missile System (ATACMS) is a series of short-range, road-mobile, solid-propellant fueled, surface-to-surface ballistic missiles created by the United States. The ATACMS was designed to take over the conventional role of the MGM-52 Lance missile, providing tactical support to ground troops. The missile closely resembles its predecessor and is typically deployed from modified Multiple Launch Rocket System (MLRS) launch vehicles. The missile first saw use during the 1991 Persian Gulf War. There were a total of five variants planned, the standard Block 1, the extended-range Block 1A, an anti-hard target Block 1A variant, the terminated anti-tank Block 2, and a terminated nuclear version.1
ATACMS at a Glance
Originated From: United States
Possessed By: United States
Class: Short-range Ballistic Missile (SRBM)
Basing: Road mobile, vehicle-based
Length: 3.98 m
Diameter: 0.61 m
Launch Weight: 1673 kg (Block 1), 1321 kg (Block 1A)
Payload: Single warhead, 160-560 kg
Warhead: HE, HE blast fragmentation, 300-950 submunitions
Propulsion: Single-stage, solid propellant
Range: 165 km (Block 1), 300 km (Block 1A)
In Service: 1986
ATACMS Block 1
The Block 1 is the standard service version of the ATACMS. It is a tactical system designed to attack high-value targets of rear-echelon forces such as airfields, Surface-to-Air Missile (SAM) sites, artillery/missile forces, supply areas, and command groups. The large number of M74 submunitions saturates an enemy-held area and destroys both troops and equipment. The spread on the submunitions allows the ATACMS Block 1 to be used against moving military targets or against open facilities.
The M74 munitions used by the Block 1 are Anti-Personnel/Anti-Material (APAM) weapons. Each is a round ball with a diameter of 0.06 m and a weight of 0.59 kg. They are wrapped in a tungsten fragmenting wall with a steel casing and incendiary pellets.2 This allows the submunition to be highly effective against both personnel and equipment. The area of effect depends upon the height at which the submunitions are released, enabling either a large area of light damage or a small area of heavy damage. The munitions are ideal for the destruction of infantry and light equipment (communication gear, launch equipment, aircraft, support facilities, etc.), but are ineffective against anything heavily armored. The ATACMS Block 1 is launched from a modified version of MLRS M270 AVMRL (Armored Vehicle Multiple Rocket Launcher), which exchanges twelve MRLS rockets for two ATACMS Block 1 missiles. A single ATACMS Block 1 can also be carried and fired by a US Army HIMARS XM142 wheeled light vehicle. 3
The Block 1 has a range of 165 km and employs a single 560 kg warhead. This warhead is equipped with 950 M74 submunitions. The ATACMS Block 1 has an inertial guidance system that provides it an unknown level of accuracy; however, saturation of the area combined with the short-range of the missile provides a strong likelihood that the target will be successfully hit. The missile is 3.98 m long, 0.61 m wide and has a launch weight of 1,673 kg. It uses a single-stage solid propellant motor.
The ATACMS system ultimately derives from the 1978 ‘Assault Breaker’ technology demonstration program, which developed the concept of a ground launched guided missile equipped with guided submunitions. Formally begun as the Joint Tactical Missile System (JTACMS) in 1983, the program combined the Army’s Corps Support Weapon System and the Air Force Conventional Standoff Weapon programs. The testing phase for the ATACMS Block 1 was completed in December 1989 and the missile entered service in 1991 for use in the Persian Gulf War. In 1997, a total of 1,647 missiles had been ordered by the US Army and were in production.
The ATACMS Block 1 has been exported to several U.S. allies including: Bahrain, Greece, South Korea, Taiwan, Turkey, and the UAE. 4
As of 2009, it is believed that the Block 1 began a phase-out process, with no new orders being placed by the United States, though some foreign sales still occur.5 Spent Block 1 missiles are slated to be replaced by the Block 1A variant.
ATACMS Block 1A
The Block 1A has a minimum range of 100 km and deploys a single 160 kg warhead. The maximum range depends on the warhead, with 300 km for the submunition and 270 km for the unitary. This warhead can be equipped with 300 M74 submunitions, which are dispersed over the target area, or a unitary HE warhead. There are two different versions of single warhead versions, either for blast/fragmentation or for HE hard-target penetration. The ATACMS Block 1A uses an improved inertial guidance system combined with a Global Positioning Satellite (GPS). Given the improved guidance and the short range of the system, the accuracy for the unitary warhead is likely 10-50 m CEP, though the saturation from submunitions eliminates CEP as a concern. The missile is 3.98 m long, 0.61 m wide and has a launch weight of 1,321 kg. It uses a single-stage solid propellant motor.
The ATACMS Block 3, also designated as the TACMS-Penetrator, is an ATACMS Block 1A equipped with a Mk 4 reentry vehicle carrying a HE penetrating warhead. This variant has a range of 250 km.
The ATACMS Block 1A began testing in 1995 and entered service in 1998. Production of the Block 1A was planned to continue until 2003 with a US Army total of 625, but further orders were made and filled after 2003. In September 2016, a 10-year life-extension program began on the ATACMS. As a part of this program, the submunition warheads are slated to be replaced with unitary ones.6
ATACMS Block 1A Unitary
The Block 1A Unitary is a unitary warhead version of the ATACMS Block 1A missile, using either the 213 kg HE blast/fragmentation warhead from the AGM/RGM-84 Harpoon or the 247 kg HE blast penetration warhead from the SLAM-ER missile to replace the 300 submunitions of the Block 1A. It is now known as the Block 1A unitary missile. The ATACMS Block 1A unitary has been designed to minimize collateral damage and to attack critical target points in all weather. Its 300 km range allows it to attack targets far behind enemy lines and rapid reloading allows for sustained firing. The small size of the missile and the mobility of launch vehicle system allow the missile to be positioned for maximum effectiveness.
Development started in 1999 on the ATACMS Block 1A unitary. Forty-three unitary warheads were ordered in 2000, which were delivered and tested the following year. Orders for the unitary warhead version of the Block 1A missile were first placed in 2000 and tested in 2001. A further 24 Block 1A unitary missiles were ordered in February 2002, and an additional 68 were ordered in February 2004. Some original Block 1 missiles were converted to the unitary warhead design, thus raising the total number of Block 1A unitary missiles to around 280. A 2008 test of a Block 1A unitary missile successfully used the missile to make a vertical dive on a target.7 The U.S. Army has announced that it plans to replace all ATACMS missiles with their Long Range Precision Fires (LRPF) missiles beginning in 2018.8
ATACMS Block 2
The Block 2, which was terminated in October 2002, was to be the anti-tank version of the ATACMS system. Equipped with guided anti-armor Brilliant Anti-Tank (BAT) guided submunitions or BAT P31 improved submunitions, it was designed for the ‘many-on-many’ approach, deploying multiple submunitions against multiple targets. The system released the Brilliant Anti-Tank (BAT) submunitions over an area and the munitions found and homed in on vehicles. It was intended to attack and destroy moving armored units or stationary missile/rocket vehicles. The missile had a range of 140 km (87 miles) and was to be deployed with a single 268 kg warhead. It was 3.98 m long, 0.61 m wide, and had a launch weight of 1,483 kg. It used a single-stage solid propellant motor. As of 2002, funding for the Block 2 was cut, and the program closed.9 | <urn:uuid:d2d7c78d-1ba3-4ebc-aca6-5107f7ad9696> | CC-MAIN-2019-51 | https://missilethreat.csis.org/missile/atacms/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540548544.83/warc/CC-MAIN-20191213043650-20191213071650-00250.warc.gz | en | 0.932836 | 1,883 | 2.546875 | 3 |
Mineral dust measured in ice cores from Antarctica provides unique information about climate variability in the past more than 800 000 years. Higher dust load in the atmosphere during glacial times is attributed to higher aridity in the source and higher storminess during colder climate. Changes in dust concentration in ice cores emerge from changes in the source and changes of the transport. Dust size distribution data provide the possibility to separate concentration changes in ice cores in those attributed to the source and those attributed to the transport. The low accumulation in almost all ice cores from the Antarctic plateau complicates the measurements of dust concentration and size in seasonal resolution. The EPICA ice core drilled in Dronning Maud Land, an area of relatively high accumulation (recent accumulation rate: 64 kg/(m²year)), provides the unique possibility to obtain dust concentration and size distribution data in subannual resolution even during the last Glacial, when the accumulation was lower by a factor of two. Here we present data from two depth intervals, one during the Glacial and one during the Antarctic cold reversal (ACR). We found dust maxima during winter with dust concentration higher by a factor of 7.5 in winter than in summer during the last Glacial, and by a factor of 3.5 during the ACR. Dust concentration changes on Glacial-Interglacial time scales are in the order of 50-100. Dust size changes are on annual scale in the same order of magnitude as on glacial-interglacial time scales. With a simple one dimensional transport model we attributed subannual changes in the dust concentration during glacial times to 40-70% to the source and the remaining 30-60% to the transport. During the ACR almost all subannual dust concentration changes in DML can be explained by transport.
Helmholtz Research Programs > MARCOPOLI (2004-2008) > NEW KEYS - New keys to polar climate archives | <urn:uuid:da53dc42-04dd-4e7e-81e1-16fe161ab62e> | CC-MAIN-2016-36 | http://epic.awi.de/19286/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471983026851.98/warc/CC-MAIN-20160823201026-00096-ip-10-153-172-175.ec2.internal.warc.gz | en | 0.919495 | 391 | 3.1875 | 3 |
When you were younger and would dream about what the future would be like, surely you imagined self-driving or even flying cars. Our IT expert, Rion Kolosieke, joined Guy Phillips and his crew last week for Tech Talk to discuss where current technology is at when it comes to self-driving vehicles and the different concerns it could bring to the roadways.
Is the world ready for self-driving cars?
A self-driving car is classified as a vehicle that is capable of being aware of its environment and can move with little to no human interaction. These vehicles use a slew of advanced controls and sensory technology to navigate appropriate paths as well as acknowledge obstacles and signals around them.
While the concept of autonomous cars sounds futuristic and like it would make life easier, technology has a lot of catching up to do before we're seeing drivers relaxing and drinking coffee while their vehicle takes them to work. Driving can be unpredictable, and people are forced to make significant decisions in a matter of seconds when behind the wheel. If humans sometimes struggle to make the right decision under pressure, it's hard to trust that a piece of technology could do the same. There will always be human error and unknown circumstances that can happen while driving.
The future of self-driving vehicles doesn't rest solely on the shoulders of technology. For the cars to be a success, vehicle manufacturers, insurance companies, and legislation would have to come to multiple agreements. Not only would the logistics of self-driving vehicles need to be worked out, but there would also need to be buy-in from consumers. As Rion and Guy mentioned, some people enjoy driving and more than likely, there would be instances where people would not want to give up the full freedom of the road.
Security Issues and Vehicles
Just like with other technologies on the market, there are cyber security concerns when it comes to the future of cars. Earlier this year, the electric car maker, Tesla, participated in a hacking competition. The event challenged hackers with trying to find security issues with the Tesla Model 3 car. After the a participant found a security flaw, they were awarded a Model 3, courtesy of Tesla! The company then went in and fixed the security issue.
Rion explained that companies don't know about every hole that exists within their technology until someone exploits it. A lot of work goes into developing the technology that we use every day, but flaws happen. As of now, there are no set security standards for self-driving cars, and there would need to be in order for them to successfully hit the market. Guy Phillips and the group came to the same conclusion that there are a lot of other kinks that need to be worked out when it comes to cars before we begin taking drivers out of the equation entirely.
Tech Talk on KTRS
Each week the IT Experts at SumnerOne host Tech Talk on The Big 550 KTRS with Guy Phillips. Tune in every Friday afternoon at 4:20 to learn more and stay up-to-date on the latest with technology and cyber security. To learn more about SumnerOne, contact us. | <urn:uuid:c8098775-4544-42f2-8d25-2dca8bbbd785> | CC-MAIN-2019-47 | https://blog.sumnerone.com/in-case-you-missed-us-autonomous-cars-on-tech-talk-with-ktrs | s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496668772.53/warc/CC-MAIN-20191116231644-20191117015644-00540.warc.gz | en | 0.976158 | 633 | 2.828125 | 3 |