text_en
stringlengths 184
648k
| uid_prefix
stringlengths 5
11
| meta_data
dict |
---|---|---|
THE CULTURAL CAPITAL OF INDIA
1. Importance of Banaras in India and especially for Hindus; various aspects of Banaras, its many names and what makes it the cultural capital of India.
2. Archaeology, Mythology, Geography, and History of Banaras- its unique situation on Ganges, and its journey through the history of India, and quest to know what makes it oldest living city. 3. Religious Varanasi- Many religions, place and types of worship, a religious place and institutions. You will find that even Primitive worship cults are still practiced in this city. Discover the city of Buddha, Jain Tirthankars, Shaiva and Vaishnava saints or Devoted saints like Kabir and Tulsi.
4. Arts, Crafts and Architecture of Banaras: You will be amused to see that Varanasi is a Museum architectural designs. It presents changing patterns and movements in course of history. It has a rich and original variety of paintings and sculptor styles and equally rich treasures of folk art. During the ages Varanasi has produced master craftsmen and Varanasi has earned name and fame for its Sarees, handicrafts, textiles, Toys, ornaments, metal work, clay and wood work, leaf and fibre crafts. With ancient crafts, Banaras has not lagged behind in Modern Industries.
5. Discover Ganga- the holiest of the holy river- its mythology, geography, socio- economic aspects, its monumental ghats and their story and the present condition of pollution. 6. The Capital of all knowledge- Discover the most ancient seat of education in India World the famous scholars and their `Shastrarthas', the great scholars, universities, college, schools, Madarsas and Pathshalas and Guru Shishya traditions, the epics, famous literary works, languages and dialects, journalistic traditions- newspapers and magazine, and famous libraries. 7. Discover the social and cultural fabric- Organisation of sacred complex and social spaces, the cultural pluristic, linguistic and ethnic groups. Discover the city of affluence, intellectuals, oral traditions, castes and customs, personalities, professions, communal harmony . Discover the rural Varanasi. And finally (and with deep insight) peep into, the pleasure of Pans, Thandai, Gamcha, Bahri Alang and Mauj Masti.
8. The City of Music and Drama and Entertainment: Banaras has been famous for its Music both vocal instrumental, it has its own dance tradition. Add to this a very rich stock of folk Music and drama (esp. Ramlila), the tradition Musical soirees, fairs and festival the rich tradition of Akharas, games and sports. Add to this classical Banaras Transport vehicles like Ekka and Modern Traffic Jam.
9. Industrial City: Discover the fast developing city of heavy, light and cottage industries, local handicrafts and other small scale industrial units. ( DLW, BHEL, Electric, Cycle,Pumps, Paper, Glass, Fertilizer etc. )
10. Medical World of Varanasi: Discover the ancient College of Plastic Surgery, Sushruta, Dhanvantri (God of Medicine), Divodas, and practice of all the ancient and modern systems of medicine in action. 11. The Unseen Banaras: Discover the spots around Varanasi, instituions, story of freedom struggle and the martyrs, history of Kashiraj, history of Sarnath, history of Bhadohi (Carpet town), of Mirzapur, of Ghazipur, know about the famous travellers and tourists, of the `Nijam'. And finally having seen the Panorama of Banaras, its continuity of culture, discover the identity of Banaras.
Source of Information:- Department of Culture, Varanasi | 009_2988256 | {
"id": "<urn:uuid:d510bb8d-42b8-45f2-ab7e-47401ee32f9c>",
"dump": "CC-MAIN-2016-30",
"url": "http://varanasi.nic.in/culture/cultr.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257824757.62/warc/CC-MAIN-20160723071024-00062-ip-10-185-27-174.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.8989161252975464,
"token_count": 821,
"score": 2.84375,
"int_score": 3,
"uid": "009_2988256_0"
} |
You can't do much to prevent ADHD -- more and more research links it to genetics. But you can minimize unnecessary risk factors. - Don't drink, smoke or do drugs while pregnant or trying to conceive (like we even need to tell you! ) Follow your doctor's instructions for reducing the chance of preterm labor and delivery, especially if you have special health conditions that put you at risk. Eat healthy, take your vitamins, get your (approved) exercise, and minimize stress. - Once your baby is born, be wary of environmental risks, like lead paint in older homes (keep in mind it wasn't banned by the US government until 1978). Keep up with the advisories on lead in imported toys and other baby items. Avoid bottles, microwave containers and other items using pthalates. - Make sure your baby/toddler/young child eats a healthy diet and keeps a regular schedule with plenty of sleep and exercise. While these strategies won't prevent ADHD, a chaotic home or life and unhealthy lifestyle will make an already hyper and/or distracted child worse. | 008_1404115 | {
"id": "<urn:uuid:de95ca38-9060-4417-89e2-c41c3f13701d>",
"dump": "CC-MAIN-2016-26",
"url": "http://www.parenting.com/health-guide/adhd-attention-deficit-hyperactivity-disorder/prevention",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396875.58/warc/CC-MAIN-20160624154956-00109-ip-10-164-35-72.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9253080487251282,
"token_count": 219,
"score": 3.015625,
"int_score": 3,
"uid": "008_1404115_0"
} |
Environmentalists are nervous about climate change protections being rolled back under the incoming United States administration. However, Pavel Cenkl, Associate Dean of Academics at Sterling College in Vermont, will be expressly addressing climate change deniers as he sets out this August to attempt a record-setting 12-day, 500-mile solo run across Scandinavia. This run, dubbed “Climate Run 2017: Arctic Trail,” will both highlight what climate change has wrought and inspire conversations and action around climate change. “Climate change impacts all of us, and we have to change our collective narrative about climate change from one of resistance to one of resilience,” Cenkl says. “Climate resilience isn’t about just one intervention, or several. It’s looking at the entanglement of infrastructure, culture, policies, and ecology, and seeing what we can do to not just mitigate our impact but to build more intentional and resilient relationships between social and ecological systems. ”
Climate Run 2017 will take place on the Arctic Trail, a 500-mile route that traverses remote mountainous terrain between Norway, Sweden, and Finland—all above the Arctic Circle. Cenkl is aiming to set the fastest known time for completing a largely self-supported run on this trail, but that isn’t his only goal. “I also want to use this run to bear witness to the rapidly changing climate in the region,” he says, “especially on its effects on local Sami communities, and on mountain cultures and environments along the way. ”
During this run, Cenkl will be working with Adventure Scientists, an organization that equips partners with data collected from the outdoors that are crucial to unlocking solutions to the world's environmental challenges, to provide samples for their ongoing global microplastics project. Adventure Scientists look to create a database of microplastics proliferation throughout the world’s marine and freshwater environments. The first Climate Run took place in the summer of 2015 across Iceland. There, he completed a three-day, 150-mile solo run on ancient Viking paths along both trails and roads among rivers, waterfalls, glaciers, thermal springs, and through a high desert. His first Climate Run netted Cenkl recognition by SHIFT and as one of Vermont’s Top Ten Athletes by Vermont Sports magazine. Cenkl says of the locations for both of the Climate Runs, “The Arctic is among the places on earth where climate change is most apparent and most pronounced. ”
Cenkl has been training for his run as both a solo runner and as the coach of theU. S.’s only collegiate Ultra Trail Running Team, Sterling College’s Skyrunners. “My hope is to inspire other athletes, adventurers, and outdoor enthusiasts of all kinds to take the initiative to preserve the lands that we love to explore and to find solutions to the challenges of climate change. ”
Cenkl currently has a crowdsourced funding campaign to support his run, and he has a blog detailing his journey on the way to the Arctic Trail at www. climaterun. org. ABOUT STERLING COLLEGE
Founded in 1958 in Craftsbury Common, Vermont, Sterling College is the leading voice in higher education for environmental stewardship. The College was among the first colleges in the United States to focus on sustainability through academic majors in Ecology, Environmental Humanities, Sustainable Agriculture & Food Systems, and Outdoor Education. Sterling College is accredited by the New England Association of Schools and Colleges and is one of only eight federally recognized Work Colleges in the nation. | 001_3968952 | {
"id": "<urn:uuid:738882c1-0d72-4882-a25d-517e2a90b2a6>",
"dump": "CC-MAIN-2017-39",
"url": "http://vermontbiz.com/people/january/sterling-college%E2%80%99s-pavel-cenkl-announces-%E2%80%9Cclimate-run-2017-arctic-trail%E2%80%9D",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818687324.6/warc/CC-MAIN-20170920142244-20170920162244-00221.warc.gz",
"language": "en",
"language_score": 0.9503568410873413,
"token_count": 749,
"score": 2.6875,
"int_score": 3,
"uid": "001_3968952_0"
} |
In 2010, researchers for NOAA Fisheries, the federal agency that oversees the Endangered Species Act for Columbia River Basin salmon and steelhead, began a research project to better understand what happens to the fish in the 140 miles between the ocean and Bonneville Dam when they return every spring to spawn. The number of marine mammals in the estuary, predators of adult salmon, was concerning and researchers wondered about the potential impacts. NOAA and state fish managers in Oregon and Washington had anecdotal evidence that fish were disappearing before reaching Bonneville Dam. It wasn’t clear why, but there was suspicion that marine mammals – sea lions and harbor seals – might be responsible for some portion of the losses. Today, with the project in its seventh year, researchers have captured and tagged more than 2,200 spring Chinook salmon and followed their migration progress from the estuary near Astoria, Oregon, up the river. Survival has varied over the years, but after accounting for harvest, annual survival has ranged from 55 to 90 percent, meaning that as many as 45 percent of the upriver fish tagged in the estuary did not arrive at Bonneville Dam during some years. Genetic testing shows that about 70 percent of the tagged fish are destined for spawning areas and hatcheries in tributaries of the Snake River and the middle and upper Columbia – including threatened species. Coincidentally, since 2010, the population of sea lions and harbor seals in the estuary has exploded. “Pinnipeds are probably the primary cause of this mortality, but there are possible other causes,” the lead researcher, Dr. Michelle Rub, reported to the Council recently after completion of the current year’s work. Those include fish turning into creeks in the lower Columbia to spawn, fish deaths from disease or injury, or even learned behavior – the same seals and sea lions returning year after year to the annual Columbia River salmon feast (most of the sea lions arrive in the spring and leave by summer). But none of these is as strong a cause as predation by marine mammals, Dr. Rub said. For example, salmon mortality increases as the population of marine mammals increases each spring. But that hasn’t been the case every year. In 2015, predation declined even with a high population of marine mammals, Rub said. Rub said she hopes funding will be available to continue the research in future springs, as some of the recent results add to the mystery. For example, radio telemetry, which researchers began using this year, suggests that less than half of the animals follow fish farther upriver than the estuary. Installing radio tags on both salmon and marine mammals will show where predator and prey are in the river at the same time – valuable information for fishery managers. More data from the research also will help refine models that are being developed to improve survival predictions. | 003_5706639 | {
"id": "<urn:uuid:1b94fd25-ccf9-49ec-ad76-f86fa6df2941>",
"dump": "CC-MAIN-2020-45",
"url": "https://www.nwcouncil.org/news/salmon-smorgasbord",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107878662.15/warc/CC-MAIN-20201021235030-20201022025030-00608.warc.gz",
"language": "en",
"language_score": 0.9591432213783264,
"token_count": 589,
"score": 3.703125,
"int_score": 4,
"uid": "003_5706639_0"
} |
If you have a look at the title of this article you will see that some letters are capitalized and some are not. Although the capitalization of titles can sometimes depend on the particular style of a writer, institution or publication, there are some general rules to keep in mind. The rules for capitalizing titles not only of articles, but also books, papers, speeches, etc, can vary according to a particular style guide, such as Associated Press Stylebook (AP), Chicago Manual of Style, and MLA style. This is known as title case. While you will find similarities between each guide, it's important to pay attention to their differences. Style guide similarities:
- In all three styles, always capitalize the first and last word of any title. - How to Land Your Dream Job
- In all three styles, capitalize nouns, pronouns, verbs, adjectives, and adverbs. - Visiting Beautiful Ruins (noun)
- As She Ran Away (pronoun)
- The Importance of Learning Fast (verb)
- The Poky Little Puppy (adjective)
- She Quietly Waits (adverb)
- In all three styles, do not capitalize articles, prepositions, or coordinating conjunctions. - To Catch a Thief (article)
- One Year in Paris (preposition)
- Magic and Daybreak (coordinating conjunction)
Style guide differences:
- In the AP Stylebook, all words with three letters or less are lowercased. However, if any of those words are verbs (is, are, was, be), they are to be capitalized. - In the Chicago Manual of Style, all prepositions are lowercased, even the lengthier ones (between, among, throughout). - In MLA style, words with three letters or less are always lowercased. So, which one should you choose? Well, it all depends if a certain style is required by your teacher, course, or subject/field. For example, MLA style is commonly used in the liberal arts or humanities. AP style is popularly used in journalism, Chicago is often used in business. A suggestion is to choose one style, or check to see what style is required by your teacher or editor, and stick to it. The General Rules for Title Case
As we can see, there are some exceptions to the general rules for title case set forth by each style guide, but they mostly follow a similar pattern. We know to capitalize the first, last, and important words in a title. Important words include nouns, pronouns, verbs, adverbs, and more. So, generally, these parts of speech are capitalized in titles:
- Nouns – man, bus, book
- Adjectives – angry, lovely, small
- Verbs – run, eat, sleep
- Adverbs – slowly, quickly, quietly
- Pronouns – he, she, it
- Subordinating conjunctions – as, because, that
“Short" words, those with less than five letters, are lowercase in titles, unless they are the first or last words. Generally, we do not capitalize:
- Articles – a, an, the
- Coordinating Conjunctions (fewer than five letters) – and, but, or, for, nor, etc. - Prepositions (fewer than five letters) – on, at, to, from, by, etc. When in doubt and you do not have a reference guide in front of you, here is one general rule recommended by The U.S. Government Printing Office Style Manual:
"Capitalize all words in titles of publications and documents, except a, an, the, at, by, for, in, of, on, to, up, and, as, but, or, and nor. "
What About Sentence Case? Now that we know some of the ins and outs of title case, let's take a look at sentence case. In sentence case, the title is written as if it is a sentence. This is considered a more casual style and is commonly used in newspapers and on the web. Only the first word has a capital letter:
- Budget wedding invitations
- Best technology blogs
However, proper nouns within the title are also capitalized:
- Top 10 things to do in Paris
- Hiking at the Grand Canyon
Whether you're writing in title case or sentence case, every style guide is just a little bit different. You might discover that some publications are moving toward sentence case. There are a couple reasons why writers choose this over title case. First, one could argue that capitalized words slow down a reader's ability to scan. A title written in sentence case could be perceived as having an uninterrupted flow. Next, some publications prefer this style simply because it's more likely to preserve consistency. With sentence case, there's no nitpicking over the capitalization of a three-letter preposition. You might notice an overall trend toward this style. Many heavy hitters in the publishing industry use sentence case, including The Boston Globe, LA Times, and USA Today. However, if you pick up a copy of The New York Times, you'll see they stick with Title Case.
Advanced Rules to Note
One of the beautiful complexities of the English language is that, for every rule you learn, there's probably an exception. Here are some advanced rules for title capitalization:
Let's take a look at the Chicago Manual of Style's guidelines:
- Capitalize the first element. - Capitalize subsequent elements unless they are articles, prepositions, or coordinating conjunctions (and, but, for, or, nor). - High-Quality Web Services
- First-Rate U.S. Lawyers
- Bed-and-Breakfast Options in Savannah
- Capitalize the second element in a hyphenated spelled-out number. - Do not capitalize the second element if the first element is a prefix that could not stand alone by itself (anti or pre). - Anti-inflammatory Dieting
An open compound comes to life when a modifying adjective is used in conjunction with a noun. This creates a new noun. Hopefully warning bells will signal in your mind, as nouns are almost always capitalized. - Salad Dressing Recipes
- The Best Science Fiction and Fantasy of the Year
The First Word Following a Colon
Let's take a look at both the Chicago and AP Style guidelines:
- Capitalize the first word after a colon. - Feminine Poetry: Ten Women Writers from Around the World
- Capitalize the first word after a colon if it begins an independent clause. - I know who you are: You are my friend
- Do not capitalize the first word after a colon if the clause cannot stand alone. - I know who you are: nobody
Prepositions That Belong to a Phrasal Verb
Prepositions often find themselves on the 'do not capitalize' list. However, when a preposition becomes an important part of a phrasal verb, it does need to be capitalized. - How to Back Up a Computer
- Turn Down the Heat to Save You Money
Following the Rules
If you are debating how to capitalize titles in research papers and articles, your professor or editor will most likely delegate a certain style. In that case, make sure you visit the handbook on that style guide's website. There will be ample guidance and examples. Aside from that, there are a wealth of other resources and handy tools out there. As you craft your titles, pay careful attention not only to the type of word, but also the length and placement of each word. Furthermore, no matter your personal preference, make sure you write the exact titles of books, newspapers, journals, etc. as they are written on the original document (even if they do not follow common capitalization rules). Post a comment. comments powered by
Rules for Capitalization in Titles of Articles
By YourDictionaryIf you have a look at the title of this article you will see that some letters are capitalized and some are not. Although the capitalization of titles can sometimes depend on the particular style of a writer, institution or publication, there are some general rules to keep in mind. Capitalizing Patriotism: The Liberty Loans of World War I
Sung Won Kang, Hugh Rockoff
NBER Working Paper No. 11919
Issued in January 2006
NBER Program(s):Development of the American Economy
In World War I the Secretary of the Treasury, William Gibbs McAdoo, hoped to create a broad market for government bonds, the famous Liberty Loans, by following an aggressive policy of "capitalizing patriotism. " He called on everyone from Wall Street bankers to the Boy Scouts to volunteer for the campaigns to sell the bonds. He helped recruit the nation's best known artists to draw posters depicting the contribution to the war effort to be made by buying bonds, and he organized giant bond rallies featuring Hollywood stars such as Douglas Fairbanks, Mary Pickford, and Charlie Chaplin. These efforts, however, enjoyed little success. The yields on the Liberty bonds were kept low mainly by making the bonds tax exempt and by making sure that a large proportion of them was purchased directly or indirectly by the Federal Reserve. Patriotism proved to be a weak offset to normal market forces. Machine-readable bibliographic record - MARC, RIS, BibTeX
Document Object Identifier (DOI): 10. 3386/w11919
Published: Sung Won Kang & Hugh Rockoff, 2015. "Capitalizing patriotism: the Liberty loans of World War I," Financial History Review, vol 22(01), pages 45-78. | 007_2744796 | {
"id": "<urn:uuid:96132b91-6706-4269-8774-f31d63e2cad5>",
"dump": "CC-MAIN-2018-47",
"url": "http://ueijas.kvalitne.cz/261-patriotism-essay-titles-capitalization.php",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039745486.91/warc/CC-MAIN-20181119064334-20181119090334-00363.warc.gz",
"language": "en",
"language_score": 0.9252832531929016,
"token_count": 2026,
"score": 3.25,
"int_score": 3,
"uid": "007_2744796_0"
} |
What is Parkinson's Disease? How Does it Affect Patients, including Dementia? An initial understanding of the disease is a good place to start. Parkinson's is a neurodegenerative brain disorder. That means the brain, slowly over time, loses its ability to effectively control body movements and emotions as it should. The cause is due to the patient's brain producing less and less of the neurotransmitter (or brain messenger) called dopamine, which controls body movements. When less dopamine is produced, muscles of the patient cannot move in coordinated fashion - resulting in the tremors, shuffled walk, soft voice, and stoic face that you might associate with Parkinson's disease. 50% of all Parkinson's patients will experience some form of cognitive impairment, a type of dementia. It can cause slower thinking and trouble with attention, memory, problem solving and communication. Patients with milder cognitive changes might learn to use schedules and other strategies to manage memory loss; those with more significant Parkinson's-related dementia, will need more supervision and support from caregivers. Learn how MindStart products can help when cognitive functions decline. What are the Treatments for Parkinson's Disease? Treatment for Parkinson's disease is all about managing the symptoms, as there is no cure. Treatment can include:
- Medications to replace the missing dopamine or mimic what it does in the brain, helping to reduce muscle tightness and tremors
- Exercise is a vital component to treatment and might even slow the disease progression. - Occupational, physical, and/or speech therapy to help with walking, balance, performance of daily living skills, cognitive challenges that can appear, talking, and volume of the voice. A newer approach used by some therapists is the LVST Big and LVST Loud programs. These approaches use exaggerated movements and volume of the voice, which can result in improved movement and communication. See the video below for more about this technique. - Music therapy has also been shown to help with breathing, movement, and with using rhythm to help when a patient has "freezing" episodes in their movement. - In more severe cases, when symptoms cannot be managed by medication, surgical interventions maybe be used, such as deep brain stimulation. A medical device (similar to a heart pacemaker) is placed in the brain to provide electrical stimulation in the brain that blocks faulty brain signals that cause tremors and other symptoms. - National Parkinson Foundation
- Whatever It Takes - Multiple resources and idea on living well with Parkinson's
- Exercise tips for Parkinson's diseae
- LVST Big and Loud programs
- Music therapy for Parkinson's disease
- 10 Tips for staying active with all types of dementia | 010_795980 | {
"id": "<urn:uuid:93ffeaa3-a4b2-429a-a2c9-5bebac93f43c>",
"dump": "CC-MAIN-2022-21",
"url": "https://www.mind-start.com/treatments-for-patients-with-Parkinsons-and-dementia.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662572800.59/warc/CC-MAIN-20220524110236-20220524140236-00767.warc.gz",
"language": "en",
"language_score": 0.9301261901855469,
"token_count": 545,
"score": 3.5625,
"int_score": 4,
"uid": "010_795980_0"
} |
Improve your wicket keeping skills by following these drills. This video is designed for newcomers to the sport of Cricket.
Watch the video on the basics of wicket keeping to learn more about the role. This short tutorial video will present you with some drills that you can practice to perfect your wicket keeping skills
In this video you will learn basic drills for the wicket keeper. These drills will help improve your lateral mobility, balance, catches and reaction time. You will need stumps, a cricket ball and cones. Wear pads and gloves whenever you can to get used to moving in them. Get someone to stand two feet in front of you with a stump in each hand held shoulder's width apart at chest height. Stand in the middle of the stumps in the wicket keeping stance. With a bobbing movement to avoid the stumps, move right, then back to the center and then left. Now, lower the stumps to just below your knee height and repeat the movement, this time stepping over the stumps. As you get better, try to move so that only one foot is grounded at any time. Place a ball on a cone, five feet away on either side and get into your stance, holding a third ball in you hands. Stay low and move quickly from sideways, exchanging the ball on each cone with the one in your hand. Two players stand 10 feet opposite each other with a cone placed 5 feet on either side of each of them. A ball is placed in front of the cone that lies to the left of both players. Moving to the left, both players roll the ball towards the cone on the right of the opposite player and move quickly to their right to collect the other ball. Now, they roll the ball to the cone on the left of the opposite player and move left to collect. For more workouts watch wicket keeping drills part 2. Enjoy your game. | 007_4448347 | {
"id": "<urn:uuid:db229913-375f-48a0-b97b-031adb00cb12>",
"dump": "CC-MAIN-2021-31",
"url": "https://www.sikana.tv/en/sport/cricket/wicket-keeping-drills-1",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153391.5/warc/CC-MAIN-20210727103626-20210727133626-00134.warc.gz",
"language": "en",
"language_score": 0.9306877255439758,
"token_count": 403,
"score": 2.640625,
"int_score": 3,
"uid": "007_4448347_0"
} |
Acrylite sheet is a lightweight, rigid and weather-resistant thermoplastic. on Jun 2 2007, at 15:31 in Methods of Producing Synthetic Alexandrite
An Acrylite sheet's surface shifts through the color spectrum as it is viewed from different angles and uses ambient light to provide a mirrorized effect. Developed
for interior applications, the sheet has a treated surface incorporating proprietary technology to give the sheet its radiant effect. Acrylite beads can be used in jewelry. | 006_6751503 | {
"id": "<urn:uuid:fe77e84c-8c2b-4564-afae-73c770d70f59>",
"dump": "CC-MAIN-2015-27",
"url": "http://www.alexandrite.net/discussion/post/acrylite-sheet-is-a-lightweight-rigid-and-weather-resistant-thermoplastic-FRM-159-00001",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375097861.54/warc/CC-MAIN-20150627031817-00101-ip-10-179-60-89.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9190108776092529,
"token_count": 100,
"score": 2.609375,
"int_score": 3,
"uid": "006_6751503_0"
} |
Are you skipping breakfast to drop some pounds? Research actually shows that EATING a good breakfast helps you lose weight and stay healthy. Fry up some eggs and learn more! Harvard University tracked over 2,500 patients for 8 years. They found that people who ate breakfast daily had up to 50% less chance of being obese, and that they were equally resistant to becoming sensitive to diabetes. The reasoning is that your body reacts to how much food it feels is available in its world. If you go for long periods of time without food, your body thinks, "FAMINE! ! " It then gorges when it can eat, and packs the food away as fat to help it survive the famine. If instead you eat frequently during the day, with small meals each time, your body relaxes, knowing there is plenty of food. It doesn't bother putting food in fat storage, and you're far less hungry each time you do eat. Note that what you eat for breakfast is just as important as that you eat it. Another study showed that those who ate carb-rich breakfasts were starving again at lunchtime - and ate a full twice the amount of food and calories. Those who ate low carb breakfasts - with the exact same calorie count - had a much more normal hunger level and were able to eat a nutritious and reasonably sized lunch, and feel full. Study shows Carbs Make People Hungry
10 Atkins Breakfast Ideas
Lisa Shea's Library of Low Carb Books | 005_5126191 | {
"id": "<urn:uuid:0afa4f96-93ad-4031-bb02-b9957567138d>",
"dump": "CC-MAIN-2015-22",
"url": "http://www.bellaonline.com/ArticlesP/art13261.asp",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207928114.23/warc/CC-MAIN-20150521113208-00008-ip-10-180-206-219.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.98097163438797,
"token_count": 303,
"score": 2.640625,
"int_score": 3,
"uid": "005_5126191_0"
} |
Application of Torsion Scan in Medicinal Chemistry
QM Magic Class | Chapter 14
< Magical Power of Quantum Mechanics
We learned about dihedral angle and torsional strain in Chapter 13. In this chapter, we will discuss torsion scan, a valuable tool for medicinal chemists to evaluate what are the likely active conformations of their drug molecules and to assess potential atropisomerism. Application of Torsion Scan in Drug Design
Shown on Figure 1 are 2D structure of two drug molecules, in which naphthyridine amide 1 has excellent inhibitory activity, while quinoline amide 2 exhibits much lower biological activity. These two chemical structures differ only at position 6 with one having a nitrogen atom and the other having a carbon atom, respectively. In this situation, we conduct a torsion scan with Density Functional Theory calculation, rotating the dihedral bond in 20° increment from 0° to 360° between the amide plane and the aromatic core for these two inhibitors, to compare their energy profiles. The torsion scan energy profile of naphthyridine 1 is shown in Figure 3, with 1A being the lowest energy conformation. In this conformation, the amide group is coplanar with the naphthyridine ring and its N10-H is hydrogen bonding with the N6 of the naphthyridine. Quinoline amide 2, with the N6 atom on the naphthyridine ring replaced with a C atom, loses the intramolecular hydrogen bonding, as shown in Figure 4, conformation 2B. Furthermore 2B encounters steric congestion between the N10-H and C6-H. As such, the lowest energy conformation of quinoline amide 2A adopts a N10-C9-C7-C6 dihedral angle at 200° with the amide group being non-coplanar to the quinolone. To adopt the ground state conformation as naphthyridine 1A, the quinoline conformation 2B will be 2 kcal/mol higher than its ground state 2A. Since naphthyridine 1 is more biologically active, we can speculate that its coplanar structure is likely to be the dominant conformation for target binding, and that the orientation of the carbonyl group and/or the amino group in the amide might also be biased for specific hydrogen bonding with the target. This provides an important guide for the design of drug molecules in our next step. On top of assisting us in analyzing the low-energy conformations of drug molecules, we found torsion scan to be very useful in analyzing the rotational isomers (Atropisomerism), providing guidance for their separation, and enabling us to assess whether this could pose significant challenges for further development of these molecules. Application of Torsion Scan in Separation and Characterization of Drug Targets
1H NMR spectroscopy revealed that in our preparation of pyrazolyl triazole derivative 3, a mixture of two compounds was obtained (Figure 5). Could they be regio-isomers? After this mixture was subjected to Supercritical Fluid Chromatography (SFC) on chiral stationary phase, we found that the enriched fractions quickly equilibrated back to same ratio. This makes more sense if the product is actually a mixture of rotational isomers, with hindered rotation of the C-N single bond across the pyrazole and triazole planes, instead of being a mixture of regio-isomers. We have been able to further substantiate the conclusion with a QM torsion scan calculation of compound 3. Shown on Figure 6 is the energy profile of the torsion scan on dihedral angle N3-C2-N1’-C5’ from 0 to 360º, in 19 steps. alculation shows an energy difference of around 1. 14 kcal/mol for the two low-energy conformations, 3A and 3B. Based on the established relationship between Gibbs Free Energy change and equilibrium constant, , the energy difference translates to an equilibrium ratio of 3A : 3B ≈ 1:7 at 25 °C, consistent with experimental observation. Furthermore, the calculation indicates that the energy barriers for the conversion of conformations are 2. 73 (3A to 3B) and 3. 87 kcal/mol (3B to 3A), respectively (Figure 7). These level of energy barriers are enough to slow down their interconversion for discrete 1H NMR signals of each rotamer and to have them partially separated with SFC. This is consistent with the report that an energy barrier higher than 23 kcal/mol (kinetic barrier ) is need to avoid the purified rotamers from equilibrating back to an equilibrium mixture, accounting for our observation that partially separated mixtures of pyrazolyl triazole rotamers reverse back to its equilibrium ratio. In summary, torsion scan is a very powerful calculation tool for medicinal chemists to establish the likely active conformation of their inhibitors, to assess whether their targets of interest could exhibit atropisomerism, to estimate how quickly they could interconvert. Building on What We Just Learned
Shown on Figure 8 is the torsion scan energy profile calculated for the phenylated pyrazolyl imidazole analog 4. What will be the equilibrium ratio of these two rotamers (4A and 4B)? Is it likely we could separate and purify each of the rotamers for biological assays? This article is written and edited by Zhengquan Zhou, Guqin Shi, Liting Dong, Dong Pan, and John S. Wai.
a) A. M. Belostotskii. Conformational Concept for Synthetic Chemist’s Use: Principles and in Lab Exploitation. Hackensack, NJ, USA: World Scientific Publishing, 2015. b) Kinetic Barrier: Atropisomers with low energy barriers usually exist as equilibrium mixtures due to their rapid interconversion. For them to be effectively purified/separated, the kinetic barrier generally has to be ≥ 23 kcal/mol, with a t1/2 at around 33 days, at 25°C. The interconversion rate is also affected by temperature and solvents. | 000_5741395 | {
"id": "<urn:uuid:534f47d4-4840-4a5d-aa5e-b7435d64cb62>",
"dump": "CC-MAIN-2023-23",
"url": "https://wuxibiology.com/application-of-torsion-scan-in-medicinal-chemistry/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649439.65/warc/CC-MAIN-20230604025306-20230604055306-00598.warc.gz",
"language": "en",
"language_score": 0.9063935279846191,
"token_count": 1340,
"score": 2.8125,
"int_score": 3,
"uid": "000_5741395_0"
} |
Plyometric training is one of the most effective training methods for improving sprinting, jumping and change of direction performance in team-sport athletes. Each of these physical performance qualities utilize the stretch-shortening cycle to harness the elastic properties of muscle and tendon. The neuromuscular adaptation that take place in response to plyometric training enable athletes to more rapidly absorb and express force, thereby facilitating quicker and more efficient movement. While few coaches would argue the performance-enhancing effects of plyometric training, there does remain some debate and uncertainly regarding plyometric training volume for stimulating on-field performance markers. Higher volume lower-body plyometric training increases foot contacts, which may be undesirable for athletes who are in-season and are already experience high loads. Thus, lower volume programs are preferred but may not be sufficient for inducing performance improvements. A new study published ahead of print in the International Journal of Sports Physiology and Performance compared the effects of low versus high volume plyometric training in adolescent soccer players. Twenty-five pre-pubertal male soccer players were divided into a low volume (n=13) and high volume (n=12) plyometric training group. Both groups performed plyometric training sessions twice per week with one session emphasizing vertical reactive ability and the other session emphasizing horizontal reactive ability. The training program took place over 8 weeks during the in-season. The high volume group performed roughly double the amount of foot contacts as the low volume group at each session. The low volume group progressed from 50 – 120 foot contacts and the high volume group progressed from 100 – 220 foot contacts. Before and after the training intervention, all athletes were tested in the 30 m sprint test, change of direction test (T-test), squat-jump and countermovement-jump and broad jump. The results showed that there was no significant group by time interaction. This means that there was no statistical difference in how either groups responded to the training program. Both groups significantly and similarly improved their performances in each of the performance tests. Percent improvements ranged from ~2. 5 to 17% for both groups with the largest improvements occurring in the countermovement and squat-jumps. Ultimately, this study showed that performing double the amount of foot contacts in training did not lead to any superior performance improvements in adolescent soccer players. Therefore, to conserve precious training time and to limit the number of impacts on the athlete’s joints, coaches should consider a lower volume approach with their plyometric training. Chaabene, H., & Negra, Y. (2017). The Effect of Plyometric Training Volume in Prepubertal Male Soccer Players’ Athletic Performance. International Journal of Sports Physiology and Performance, 1-22. | 012_6898459 | {
"id": "<urn:uuid:5959b3e9-3f02-4033-86a0-cd5cb3510f7d>",
"dump": "CC-MAIN-2019-47",
"url": "https://www.naseinc.com/blog/low-or-high-volume-plyometrics-for-young-soccer-players/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496670255.18/warc/CC-MAIN-20191119195450-20191119223450-00534.warc.gz",
"language": "en",
"language_score": 0.9399828910827637,
"token_count": 554,
"score": 2.546875,
"int_score": 3,
"uid": "012_6898459_0"
} |
Long-time St. Louisans often shorten the proper noun “the Rock Road” to avoid confusion. The road has been flattened, asphalted and paved over four centuries. It has lost its curves and meanderings. We are getting ahead of ourself. The trail that led to St. Charles Rock Road was originally worn by the Niuachi (or Missouria tribe) as a precursor. The trail was used by the Spanish and French colonists to settle the lower Missouri River Valley. It had become the main connection between St. Louis and St. Charles by 1772. In 1796, Georges Henri Victor Collot, a French explorer, first mapped it on a map. Meriwether Lewis, who was crossing it in 1804, met up with William Clark. The southeastern section of the river was then known as St. Charles Street.
It was made a stagecoach and postal route in 1819. The route became known as St. Charles Road. It was used by westbound pioneers as their primary route to the Santa Fe and Oregon trails. The Rock Road was shaped by laws and cemeteries just as much as the traffic that used it. It was illegal to dig a burial within the St. Louis City limits in 1823. Cemeteries were established along the roads that lead out of the city. The Rock Road was no exception. The Rock Road was legalized in 1834 when a petition was submitted to the St. Louis County Courts for it to be made a permanent highway. Louis Post-Dispatch in 1921 noted that the Rock Road ran “from the Catholic cemetery to a point at the east bank Missouri River opposite St. Charles.”
From there, things became more formal. The Missouri Plank Road Law of 1851 required that the road be covered with 2. 5-inch oak planks. It was officially named the St. Charles Rock Road in 1865. The name of the road is not derived from the magnificent St. Charles Rock bluff formation. A petition was filed to the courts asking that it be “macadamized from end to end” in that same year. This means that it is named after gravel, layers, and more layers that were tamped down following its construction. To pay upkeep costs, tollbooths were established. However, by 1919, the Post reported that it was one the most dangerous roads in St. Louis County. “Full of bad holes, ruts, making driving in automobiles or horse-drawn vehicle unpleasant at daytime and even dangerous at night. ” The former King’s Highway was made concrete in 1921. Why keep the name? Perhaps they thought that “St. Charles Concrete Road just didn’t sound the same. | 012_7013675 | {
"id": "<urn:uuid:7d2e79c6-7c6b-406f-9401-5286d3f9d0fd>",
"dump": "CC-MAIN-2023-06",
"url": "https://corporaterebelsunited.com/st-charles-rock-road-near-st-louis-has-a-history/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500042.8/warc/CC-MAIN-20230203024018-20230203054018-00389.warc.gz",
"language": "en",
"language_score": 0.9879295229911804,
"token_count": 567,
"score": 3.25,
"int_score": 3,
"uid": "012_7013675_0"
} |
18 February 2009—The day an average telecom carrier can send 1 trillion bits (one terabit) of data per second down a single optical fiber may still be many years away. But in the lab, the single-fiber terabit threshold may well be crossed just one or two years from now, thanks to recent research. Two groups of engineers—one from Australia and Denmark and the other from California—have independently created new optics technologies that could greatly increase the Internet’s speed limits. The key to the new technologies is nonlinear optics, in which physics allows for an optical fiber’s properties to be adjusted from moment to moment. On the Internet, packets of data are carried mostly by laser light over optical fibers. But in order to route a data packet through each leg of its trip, the address of the packet’s destination must be decoded. This can be done only electronically, by converting the data’s photons into electrons. The electronics are the horse and buggy of the system—unable to keep pace at even a fraction of the bits per second that an optical fiber can handle. Two leading contenders in the terabit Internet race involve tunable optical fibers and tunable arsenic-glass chips. In both cases, lasers transmit the signal’s zeroes and ones, while a separate laser (or set of lasers) adjusts the properties of the optics in order to ”demultiplex,” or break up, the data into separate streams whose data is in the right range for electronics. ”The highest bit rate that you can do electrically is 40 gigabits per second right now,” says Leif Katsuo Oxenlowe, associate professor of photonics engineering at the Technical University of Denmark, in Lyngby. ”That’s at least what’s commercially available. In labs around the world, [electronics is] reaching 100 Gb/s. ”
Oxenlowe says his group of 13 scientists—led by Benjamin Eggleton at the Centre for Ultrahigh Bandwidth Devices for Optical Systems (CUDOS), which is part of the Laser Physics Centre at the Australian National University in Canberra—has been testing a 5-centimeter-wide glass chip that can receive optical signals of up to 640 Gb/s and, when a laser periodically changes the chip’s index of refraction billions of times per second, siphon off a 10 Gb/s signal. That slower signal, in turn, can then be piped into a standard electronic router. | 001_2473916 | {
"id": "<urn:uuid:8f41c2b6-272f-46be-8cae-4a6c992c11e3>",
"dump": "CC-MAIN-2014-15",
"url": "http://spectrum.ieee.org/telecom/internet/two-steps-toward-a-terabit-internet/0",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609530136.5/warc/CC-MAIN-20140416005210-00088-ip-10-147-4-33.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.8988309502601624,
"token_count": 531,
"score": 3.234375,
"int_score": 3,
"uid": "001_2473916_0"
} |
The Quinault Tribe of the Northwestern United States is voluntarily recalling almost 58,000 pounds of live or un-eviscerated Dungeness crab because of possible domoic acid contamination, which can cause amnesic shellfish poisoning in people. With Dungeness crab being a popular New Year’s dish, public health officials in Washing state posted the recall notice today in hopes of reaching holiday cooks before meals are prepared. It is not clear how far the crab may have been distributed. Domoic acid is a naturally occurring toxin produced by certain types of algae and can be harmful to humans if contaminated shellfish is consumed. Domoic acid can cause amnesic shellfish poisoning (ASP) with symptoms including vomiting, nausea, diarrhea, and abdominal cramps within 24 hours of ingestion. In severe cases, ASP can cause permanent short-term memory loss. All live or un-eviscerated Dungeness crab harvested from Dec. 23 through Dec. 28 from the Point Chehalis to Destruction Island GHPO056 zone by the Quinault Tribe are subject to recall. The recalled live crab was sold to food processors in Washington State, with further distribution to wholesalers and retailers. This recall is being issued due to elevated domoic acid levels in crab viscera — the internal organs or “butter” — tested during enhanced biotoxin monitoring. Dungeness crab meat samples have not exceeded the FDA regulatory action level at this time. Customers who purchased live or whole crab harvested by the Quinault Tribe from during the designated harvest time are advised to destroy or eviscerate all product. Consumers with questions should contact the place of purchase. Local health jurisdictions in Washington are not being asked to participate in any formal recall verification activities at this time, but appropriate staff should be aware of the recall. For other recent food recalls affecting Washington State, see: www. doh. wa. gov/foodrecalls. (To sign up for a free subscription to Food Safety News, click here. ) | 009_5477589 | {
"id": "<urn:uuid:eca2a869-1885-40c0-bf50-ba0d725dd1fb>",
"dump": "CC-MAIN-2022-21",
"url": "https://newsakmi.com/food-drinks/certain-dungeness-crabs-recalled-because-of-poisoning-risk/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662545326.51/warc/CC-MAIN-20220522094818-20220522124818-00435.warc.gz",
"language": "en",
"language_score": 0.9321013689041138,
"token_count": 429,
"score": 2.53125,
"int_score": 3,
"uid": "009_5477589_0"
} |
Discover LinuxSecurity Features
Authoritative Guide on Linux Disk Encryption
Digital security is getting stronger, so criminals and law enforcement alike may be more willing to physically take your laptop or storage device to gain access to your data. It's possible, however, to protect yourself against this invasion of privacy thanks to encryption. This article will discuss disk encryption, its uses and types, and its advantages and disadvantages. We will also show you how to encrypt a Linux hard drive and the various Linux encryption methods at your disposal. What Is Disk Encryption? Encryption is the process of converting textual data into a secret code (a. k.a. ciphertext) for secure communication between multiple parties. Users can encrypt files or messages so that they are only accessible to other selected clients using shared protocols and encryption algorithms. Types of Encryption
The challenge of encrypting data has been tackled by some of the world’s brightest minds for generations. Leading intelligence agencies, cybersecurity consultant firms, and computer scientists have dealt with this issue, developing various encryption types and standards. The most prominent ones include the following:
- Public Key
Uses of Encryption
Developers and IT experts most commonly use cryptographic systems for the following applications:
- Network monitoring tools
- CASB (Cloud access security brokers)
- Password managers
- NGFS (Next-gen firewalls)
- WAF (Web app firewalls)
- VPN (Virtual private networks)
- WEP (Wired Equivalent Privacy) and WPA (Wi-Fi Protected Access) wireless standards
Data-at-Rest Encryption vs. Full-Disk Encryption in Linux
A data-at-rest encryption program encrypts and decrypts data while it is being written to or read from a disk partition, block device, or directory. DVDs, hard drives, and flash drives are all examples of block devices. It is important to view data-at-rest encryption as an adjunct to existing security mechanisms within the operating system, particularly regarding user-based access control and network access security. Full disk encryption (as its name suggests) encrypts the whole disk, functioning below the filesystem layer. In a nutshell, it's block device encryption. This means the kernel’s encryption module translates the data when reading blocks from disks (or writing them). When it comes to device-mapper encryption in Linux, dm-crypt is the default solution as it provides complete control over partitioning and key management. Dm-crypt is managed through cryptsetup, while LUKS (Linux Unified Key Setup, detailed later on) is an additional frontend layer that simplifies all cryptographic processes for dm-crypt. Need for Encryption
Servers are often housed in well-fortified data centers. This, coupled with the fact that Full Drive Encryption (FDE) only protects data at rest and physical servers are usually run for extended periods without any rest, lends credence to the argument that encryption is unnecessary. However, every drive will leave the data center to be repaired or disposed of sooner or later. By protecting your old drives with encryption, you avoid them showing up on the dark web while still carrying customer data. An encrypted drive is easy to crypto-erase if it is still functional, and if not, the data remains inaccessible without the encryption key. Further, with the increased attention to international standards such as the GDPR and California’s Consumer Privacy Act, it is prudent to encrypt everything, everywhere, at all times. Encryption Dos and Don’ts
Here are some things you should make sure TO DO when it comes to encrypting your data:
- Ensure the drive runs properly beforehand
- Test on a pilot group
- Check for any driver or BIOS-related interference
- Consider the authentication options
- Include removable media support
- Consider Active Directory integration
- Check the supported platforms
And here are a few things you should NOT DO:
- Overlook key management
- Jump in too quickly
- Underestimate deployment time
- Expect full user acceptance
Should You Encrypt Your Linux Partition? Encrypting your Linux disk has the following benefits:
- Keeping sensitive data secure from unauthorized access
- Preventing remote surveillance
- Ensuring that sensitive corporate information is not stolen
- Keeping personal data safe from theft and loss
Disk encryption also has a few negative consequences, such as:
- Throttling system performance
- Making it almost impossible to recover the entire system in case of sudden failure
- Increasing the difficulty of data recovery
Advantages of Full Disk Encryption
The full disk encryption (FDE) method encrypts drives at the hardware level, significantly enhancing data protection. Let’s look at some of its major advantages. Improved Data Security
Strengthened data security is, without question, one of the most important benefits. Drives on your PCs are encrypted using robust encryption algorithms, protecting all the data stored on them. Even when a drive is removed from the current computer and put into another, the drive data is still inaccessible if a correct key is not used. Full disk encryption (FDE) encrypts all data from the moment it is stored on a hard drive instead of just encrypting a folder or a file. Essentially, this process of encryption is automatic. In this respect, it's far more convenient than file or folder encryption, which requires manually selecting the files or folders you want to encrypt. Limiting User Mistakes
In addition to fully automatic encryption, another advantage of FDE is its ability to avoid encryption errors. Users are bound to make mistakes to some extent, as we all know. In the case of FDE, this can be avoided. Disadvantages of Full Disk Encryption
FDE also has a few drawbacks. We will talk about the major ones below. In-Transit Data Not Protected
Data sent through emails or shared between devices are not protected by FDE and could potentially be accessed by unauthorized third parties. When reading a drive protected by full disk encryption, you are prompted to enter the authentication key each time. This process may slow your computer down. Data Recovery Complications
Like other kinds of encryption, disk data recovery is complicated by full disk encryption. This is hardly surprising if you think about it. It would make no sense to encrypt data if it could be recovered quickly. Linux Disk Encryption Options
There are several options at your disposal when it comes to encrypting your Linux disk. Let’s briefly look through some of our favorites. It is possible to mount encrypted file systems using Dm-crypt, a Linux kernel-level encryption tool. An operating system uses mounting to access a file system by attaching it to a directory (mount point). With VeraCrypt, you can perform on-the-fly encryption (OTFE) for free. With the software, you can create a virtual encrypted disk within a file that works just like an actual disk. As well as encrypting a partition, it can authenticate the entire storage device before booting. The Cryptmount utility allows users to access encrypted filesystems without having root privileges on GNU/Linux systems. You will need Linux 2. 6 or higher to run it. The program is capable of handling both encrypted partitions and encrypted files. Enterprise Cryptographic Filesystem (eCryptfs) allows encrypting disks on Linux. Unlike dm-crypt, which offers a block device encryption layer, eCryptfs provides an actual stacked cryptographic file system. The loop-AES package encrypts both file systems and swap partitions quickly and transparently. Loop-AES is suitable for encrypting not only disk partitions but swap space, removable media, and other devices. Various measures are available to strengthen encryption, including passphrase seeds, multiple hash iterations, MD5 IV, and alternating encryption keys. Linux Unified Key Setup
The Linux Unified Key Setup, or LUKS for short, provides a generic key store. This is an area of a hard drive dedicated to storing keys, which can be unlocked using multiple passphrases. Here’s what you need to do to encrypt your Linux partition with LUKS:
- Install cryptsetup-luks. On CentOS or RHEL, run the following command: # yum install cryptsetup-luks. On Debian or Ubuntu, run # apt-get install cryptsetup
- Configure the partition. - First, list all of the partitions using # fdisk -l and # blkid
- Then, use # cryptsetup luksFormat to prepare the partition for encryption. This command will wipe the partition clean. - Set up a logical device-mapper device using # cryptsetup luksOpen. Using this command, you will initialize the volume and set an initial key. - Check the status of the encryption with # cryptsetup luksDump
- Format the partition. - Use the following command to allocate block data with zeros
- Format the partition to your chosen filesystem
- Mount the system
Disk Encryption Security Concerns
Despite our best efforts, data encryption will not be able to provide complete protection for all of our security needs. As technology advances, increasingly secure encryption systems/algorithms are developed, but attackers' techniques continue to improve. Encryption systems can be attacked in three main ways:
- Using keyloggers and brute force methods to find cryptographic keys
- Attacking the encryption algorithm through cryptanalysis
- Attacking the software that implements the encryption algorithm
You may consider your PC 100% protected with encryption, but there are plenty of ways for cybercriminals to attack and steal your data. For example, encrypting your entire disk will not protect you from someone intercepting your online communications. An unpatched Windows OS, old software, or an older operating system (like Windows XP) can be exploited remotely to infect your computer with malware. As a result, your disk encryption is rendered useless as the keys to decrypt the disk are stolen. The information security field is continuously evolving. In the future, we will see more robust encryption algorithms based on their mathematical strength/key size and persistence against outside attacks, not to mention quantum computing, which will render all of today's encryption algorithms useless. Having your laptop or hard drive stolen can be stressful, but encryption keeps your data safe. You can use encryption even if you have obscure hardware or a non-mainstream operating system. The article above has presented some options for protecting your data on Linux and shown you the advantages and disadvantages of this process. However, it is important to remember that encryption can only protect you against physical threats. You may still be susceptible to cybercrime in other forms. Enlisting the help of a cybersecurity consultant firm is your best bet in terms of ensuring complete data security. | 003_4570090 | {
"id": "<urn:uuid:6f0677ca-6d58-40c5-b630-06d9b7838a27>",
"dump": "CC-MAIN-2023-50",
"url": "https://linuxsecurity.com/features/authoritative-guide-on-linux-disk-encryption?highlight=WyJkaXNrIiwiZW5jcnlwdGlvbiJd",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679099281.67/warc/CC-MAIN-20231128083443-20231128113443-00517.warc.gz",
"language": "en",
"language_score": 0.8910606503486633,
"token_count": 2244,
"score": 3.40625,
"int_score": 3,
"uid": "003_4570090_0"
} |
ELS17 – Recognise actions (EV3)
Lego Mindstorms EV3 v 1. 2.1 for EV3 Firmware version 1. 09H
The student must recognise the actions on the verb picture cards. It can be delivered in a number of ways as described in ELS17 of the Edurob curriculum document, and summarised below. - The teacher shows the students the verb-card ( stand, walk, drink, eat, play, etc. ) and asks the question, “What is he/she/it doing? ” The robot rewards correct answers with a student appropriate reward behaviour. - Three verb cards are face down on the table (dance, walk, sing ). The robot commands, “take a card. Then the robot asks, “What is he/she/it doing? ” If the student gives the correct answer, the robot will perform the action (NAO) or play an appropriate sound (EV3). - The verbs cards are on the table. The robot says: “Take a card. What is he doing? ” If the student gives correct answer, the teacher will ask the student to perform the action. The robot rewards actions with a student appropriate reward behaviour. The EV3 can perform the following separate programs for action sounds (EV3_ELS17):
Program path: “ELS17/randomanimal” – random animal sound from the following list or use the followimg paths for specifics. Program path: “ELS17/whataction – Says, “What action are they doing? ”
Program path: “ELS17/pickone – Says, “Pick one of the cards. ”
And sound effect files can be played with:
Program path: “ELS17/walk”
Program path: “ELS17/run”
Program path: “ELS17/skip”
Program path: “ELS17/play”
Program path: “ELS17/sing”
Program path: “ELS17/dance”
Program path: “ELS17/eat”
Program path: “ELS17/drink”
robot interaction file: EV3_ELS17. zip (Download)
Action cards download file: ELS17_Cards_for_ActionsEV3. pdf (Download)
Use with file: EV3_EncouragePraise. zip (Download)
Can also be used with other reward behaviours such as songs or dances. | 005_1412182 | {
"id": "<urn:uuid:84f64c82-640a-4cb6-bf94-f7daf660cc74>",
"dump": "CC-MAIN-2021-17",
"url": "https://isrg.org.uk/ev3/els17/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038101485.44/warc/CC-MAIN-20210417041730-20210417071730-00058.warc.gz",
"language": "en",
"language_score": 0.8661304116249084,
"token_count": 535,
"score": 2.734375,
"int_score": 3,
"uid": "005_1412182_0"
} |
World Tourism Day In English - 800 in words
The World Tourism Day celebration was started by the United Nations World Tourism Organization in 1980, which is celebrated every year on 27 September. This special day was chosen because on this day UNWTO was celebrated in 1970. The law came into effect in what is considered a major milestone in the field of world tourism, aimed at raising awareness of the important role of world tourism in affecting international communities as well as social, economic, cultural, political values on a global scale. People have to be made aware about what it does. world tourism day 2021
World Tourism Day 2021 will be celebrated on Monday, 27 September.
This time India has been given a chance to host the World Tourism Day 2019. Through which people will be able to know the history, culture and literature of India in a better way. The theme of this year's Tourism Day is 'Tourism and Jobs: A Better Future for All'. This theme has been kept in view of the increasing demand of employment today, where everyone can get employment through tourism, especially women and our youth. On this occasion, a program is being organized by the Ministry of Tourism at Vigyan Bhawan, New Delhi, in which eminent people from different countries will participate and they will contribute to the country's economic development, tourism, private and public tourism sector and promotion of tourism. To discuss various topics like developing human capital skills etc. This day is celebrated every year all over the world to make people aware with a particular topic. In 2013 the theme of the event was Tourism and Water: Protecting Our Common Future and in 2014 Tourism and Community Development. Perhaps the theme of this event in 2015 will be Millions of Tourists, Millions of Opportunities. This day is celebrated every year on 27th September to make people aware about the importance of tourism. Every year a message to the general public UNWTO. is sent by the Secretary-General of the It is celebrated with great interest by various tourism enterprises, organizations, government agencies and etc. On this day various types of competitions like photo contests, tourism award presentations with free entry, discounts/special offers etc. are organized for the general public to promote tourism. Tourism has become a continuously growing and developing economic sector around the world due to various attractive and new destinations for tourists. So it has become the main source of income for the developing countries. Theme of World Tourism Day
- The theme of 1980 was "Contribution of tourism to the preservation of cultural heritage and peace and mutual understanding". - The theme of 1981 was "Tourism and Quality of Life". - The theme of 1982 was "Pride in Travel: Good Guests and Good Hosts". - The theme of 1984 was "Tourism for International Understanding, Peace and Cooperation". - The theme of 1985 was "Youth Tourism: Cultural and Historical Heritage for Peace and Friendship". - The theme of 1986 was "Tourism: a vital force for world peace". - The theme of 1987 was "Tourism for Development". - The theme of 1988 was "Tourism: Education for All". - The theme of 1989 was "Tourists' free movement makes a world". - The theme of 1990 was "Tourism: An Unrecognized Industry, a Free Service". - The theme of 1991 was "Communication, Information and Education: Power Factors of Tourism Development". - The theme of 1992 was "Tourism: a factor of increasing social and economic cohesion and interaction between peoples". - The theme of 1993 was "Tourism Development and Environmental Protection: Towards a Sustainable Harmony". - The theme of 1994 was "Quality Employees, Quality Tourism". - The theme of 1995 was "WTO: Twenty Years Serving World Tourism". - The theme of 1996 was "Tourism: Tolerance and a Factor of Peace". - The theme of 1997 was "Tourism: A Leading Activity for Job Creation and Environmental Protection of the Twenty-First Century". - The theme of 1998 was "Public-Private Sector Partnership: Keys to Tourism Development and Promotion". - The theme of 1999 was "Tourism: Preserving World Heritage for the New Century". - The theme of 2000 was "Technology and Nature: Two Challenges for Tourism in the Early Twenty-First Century". - The theme of 2001 was "tourism: a tool for peace and dialogue between civilizations". - The theme of 2002 was "Eco-tourism Key to Sustainable Development". - The theme of 2003 was "Tourism: a driving force for poverty alleviation, job creation and social harmony". - The theme of 2004 was "Sports and Tourism: Two Living Forces for Mutual Understanding, Development of Culture and Society". - The 2005 theme was "Travel and Transport: From the Fantasy of Jules Verne to the Reality of the 21st Century". - The theme of 2006 is "Enriching Tourism". - The theme of 2007 was "Tourism Opens Doors for Women". - The theme of 2008 was "Tourism Responding to the Challenge of Climate Change and Global Warming". - The theme of 2009 was "Tourism - A Celebration of Diversity". - The theme of 2010 was "Tourism and Biodiversity". - The theme of 2011 was "Tourism Connects Culture". - The theme of 2012 was "Tourism and Energetic Sustainability". - The theme of 2013 was "Tourism and Water: Protecting Our Common Future". - The theme of 2014 was "Tourism and Community Development". - The theme of 2015 was "Millions of Tourists, Millions of Opportunities". - The theme of 2016 will be "Tourism for All - Promoting Worldwide Access". - The theme for World Tourism Day in 2017 was "Sustainable Tourism - A Tool for Development". - The theme for World Tourism Day in the year 2018 was "Tourism and Cultural Preservation". - The theme for World Tourism Day in the year 2019 was "Tourism and Jobs: A Better Future for All". - The theme for World Tourism Day in the year 2020 was "Tourism and Rural Development". | 000_3376600 | {
"id": "<urn:uuid:f5b0800b-0bf7-43dc-97c3-94349e733719>",
"dump": "CC-MAIN-2023-14",
"url": "https://writeatopic.com/events/world-tourism-day",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296946584.94/warc/CC-MAIN-20230326235016-20230327025016-00744.warc.gz",
"language": "en",
"language_score": 0.9365418553352356,
"token_count": 1273,
"score": 2.9375,
"int_score": 3,
"uid": "000_3376600_0"
} |
In my Databases lecture, the teacher mentioned that SQL is not just a data definition language (DDL), data manipulation language (DML) and view definition language (VDL), but also a storage definition language (SDL). The last usage doesn't come with any further explanations or examples. Searching for extra information on the internet regarding using SQL as a SDL yields no relevant results. Could anyone give an example of using SQL as a storage definition language? Would a specification such as MySQL's
SET storage_engine=MYISAM; count as a storage definition? It doesn't really relate to the data being stored, but rather, how it's stored. | 005_378492 | {
"id": "<urn:uuid:2f81949f-60a5-4075-b897-cf93bfabd2c3>",
"dump": "CC-MAIN-2015-14",
"url": "http://dba.stackexchange.com/questions/34563/sql-as-a-storage-definition-language-sdl",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131292683.3/warc/CC-MAIN-20150323172132-00079-ip-10-168-14-71.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.929360032081604,
"token_count": 137,
"score": 2.796875,
"int_score": 3,
"uid": "005_378492_0"
} |
Bryn Mawr Classical Review 2010. 08. 31
Mauro Bonazzi, Jan Opsomer (ed. ), The Origins of the Platonic System: Platonisms of the Early Empire and their Philosophical Contexts. Collection d'Études Classiques 23. Louvain/Namur/Paris/Walpole, MA: Éditions Peeters; Société des Études Classiques, 2009. Pp. 227. ISBN 9789042921825. €49. 00 (pb). Reviewed by Ryan C. Fowler, Knox College (firstname. lastname@example. org)
Table of Contents
This 23rd volume in the Collection d’Études Classiques series contains seven articles that examine the trend by Plato’s followers of systemizing Plato’s philosophy from the 1st c. BCE onward. This process followed a variety of directions and was subjected to a number of philosophical influences, especially Aristotelian, Stoic, and Pythagorean. The result was a broad variety of “Platonisms” without strict orthodoxy, a situation that would change only with Plotinus.
The editor’s introduction (p. 1-2) grounds the task as an attempt to determine precisely the contribution and content of “the key moments that together make up the long history of Platonism.” For the editors, the moment in which devotees of Plato became Platonists and started to look for doctrines that could be organized into a systemized whole is of major importance . This endeavor (“arguably”) started at the end of the Hellenistic era, “but especially in the early days of the Empire” (2). Much of what shaped this period, beyond the systemization itself, was due to the fact that many key doctrines were still undecided even after centuries of debate. No less significant were the other forces with which Platonism was confronted: a renewed interest in Aristotelian texts; a renewed Pythagorean tradition; the continued importance of Stoicism; and the integration or rejection of the Hellenistic (New) Academy, the Platonism of which was almost unrecognizable as such (beyond its extreme aporetic stance). What follows is a brief review of each of the studies in the volume. 1. It is no surprise to see the importance of θεωρία (“l’idée de contemplation”) in either imperial Platonism (in particular Plotinus), or in the conceptions of philosophy and happiness as expressed by both Plato and Aristotle. Its relatively weak presence in Hellenistic philosophies, Bénatouïl writes, should not lead us to import this characteristic into Platonism in some broader sense, since it would be reductive to imagine that the Hellenistic period had no role in the history of θεωρία/A. Thus Bénatouïl explains the role of Antiochus of Ascalon (c. 125-68 BCE) in the gradual return of the contemplative life to Platonism. To do so, Bénatouïl examines the state of θεωρία (“le statut de la θεωρία”) in Hellenistic Stoicism, which he takes to be Antiochus’ point of departure. Antiochus, by finding that reason is in fact “eclipsed” (20) by theoretical and practical activities (contrary to Stoicism), would restore to Platonism the primacy of contemplation as the most noble activity, as thought (la pensée). Next Bénatouïl looks at the Didaskalikos of Alcinous as a point of arrival; he compares its positions to those of Antiochus in order to confirm that the latter represents a starting point for imperial Platonism. Bénatouïl argues that Antiochus’ positions on θεωρία constitute real criticisms of the Stoics, and are inspired more by Plato than Aristotle, a view contrary to some current (and ancient, e. g., Cicero) interpretations. What makes the task difficult is reconciling Antiochus’ seeming preference for the theoretical life with Augustine’s insistence (Civ. Dei 19. 3) that the philosopher preferred a third type of life comprised of both theoretical and practical activities (the “mixed life”). Bénatouïl explains that Antiochus wanted to follow both Aristotle and Theophrastus in stressing the theoretical life, as well as the first Academics (perhaps Plato himself) in valuing the mixed life. Alcinous’ hierarchization of the contemplative and practical lives, then, continues and completes the criticism of Stoicism started by Antiochus in his analysis of the various natural human activities. 2. Antiochus’ importance to imperial philosophy has been clear since Dillon (1996), Glucker (1978), and Theiler (1930). 1 Here, Bonazzi looks to explain the precise nature of Antiochus’ position and philosophical affiliation. Many studies of the philosopher take extreme positions by underplaying either Antiochus’ debt to Plato and Aristotle or the significance of Stoicism to Antiochus’ stance, or overplaying his polemical attitude as signifying either his disinterest in Stoicism or his outright opposition to it. Bonazzi steers a middle course by claiming that Antiochus was neither a closet Stoic nor an anti-Stoic Platonist, but a Platonist concerned with reconciling the two schools. Far from being a simple, slapdash ‘eclectic’, however, he was interested in subordinating Stoicism to Platonism. To show this, Bonazzi focuses on the problem of the telos and the doctrine of the passions. Was Antiochus interested in apatheia (freedom from emotions, as the Stoics), or metriopatheia (restraint over the passions, as the Peripatetics)? By taking advantage of the polysemy of apatheia and showing that apatheia is in fact eupatheia (49), Antiochus tries to integrate Stoic apatheia into his own brand of Platonism. As speculative as his conclusion must remain, Bonazzi’s attempt to solve this puzzle is appreciated, especially given the dearth of reliable or consistent evidence. In the end, then, Antiochus’ task fell between Skeptical Platonism and Platonizing Stoicism: how to tackle Stoicism without submitting to it. 3. Staab’s purpose is to understand the point of contact between Platonism and Neopythagoreanism during the Empire. He works to correct the early misinterpretation that Platonism fully eclipsed Pythagoreanism at the time. To do so, he looks at Eudorus (1st c. BCE), who begins with a view of the world informed by the dualism of Pythagoras and ends with a decidedly Platonic monotheistic view. (82)
The point of departure for the Pythagoreans’ methodology in the Empire is the conviction that Plato’s ideological structure is rooted in Pythagoras. This approach made it possible to describe all of the teachings within the Platonic tradition as able to be interpreted in Pythagorean models and terms. Thus Staab shows that Pythagoreanism did not “become” Platonism, but was an independent sect of Platonism in the Empire. He means to contradict those misinterpretations which both deny a defined Pythagorean current of thought and dissolve Pythagoreanism completely into the Platonism of this period. (58) With this in mind, Pythagoreanism might better be termed a “denomination” within the Platonism of the Empire. (56-7)
Staab’s bibliography in particular is extensive and profitable. 4. Eudorus of Alexandria is known for being involved in the two major developments in 1st c. Platonism: the rebirth of dogmatic Platonism and a renewed interest in the treaties of Aristotle’s school. Chiaradonna studies the extent to which Eudorus is involved with both the construction of a Pythagorean Platonism with an orientation toward theology, and the interaction between Platonism and Aristotelianism. The point of departure for Chiaradonna is Eudorus’ work on Aristotle’s Categories.
For Chiaradonna, if one overemphasizes the fact that Eudorus criticized certain passage of the Categories, an important point is lost: his criticisms relate to details, but never call into question the doctrines of the Categories as such. His work probably aimed to attach the Categories to a brand of Pythagorean Platonism, while correcting some individual elements. Thus, for Chiaradonna, Eudorus was at the origin of the various “Middle-Platonic” attempts to incorporate the Categories into Platonism. Several contemporary examples of this approach are found, with important variations, in the work of the anonymous commentator on the Theaetetus, in Alcinous, and in Plutarch.
In their own ways, both Eudorus and Porphyry aimed at building a unified philosophical tradition by subordinating the re-examined and corrected doctrines of Aristotle to their own views of Platonism. The few fragments of Eudorus we have, however, are not enough to develop this parallel with certainty. What is more, the oeuvre of the important authors of the 2nd and 3rd centuries, e. g., Alexander of Aphrodisias and Plotinus, on which the complex integration of Aristotelianism and the Platonism of Porphyry is based, has very little in common with Eudorus and his conceptual background. 2
In short, the first reception of the Categories of Aristotle into the Platonism at the time of Eudorus is indebted to a general trend found between the first century BCE and the first century CE. “If” there are any elements of continuity that connect the Platonism of this time to that of later centuries (in particular, in Plotinus and Porphyry), they are definitively not to be found in the uses of the Categories in this period. 5. Trabattoni helpfully identifies the targets of Philo’s controversial De opificio mundi 2. 7-12: Who is it who admires the world more than its maker? Are these the same men who deny providence? Can one attribute the metaphysical theory in sections 8-9 (i. e., on involving an active, creative cause and passive object) to a particular school? To what extent can it be said that this treatise was influenced by Plato’s Timaeus? Trabattoni works through all the possible answers to these questions systematically and clearly, and his thoroughness is apparent. His argument, therefore, is worth a careful reading. In essence, this section of the De opificio mundi is consistent with the ideas Philo would have come away with after reading the Aristotelian Peri philosophias and the De mundo, which may help identify the men who seem to admire the world more than its creator (or who support a thesis that “praises the world and blames God”). For Philo the idea of the eternality of the world prevents any idea of providence, which is predicated on the act of creation of the world by God and His continued involvement with it: one leads essentially to the other. This stance is consistent with both Mosaic and (aspects of) Platonic philosophy, since God’s creative action turns the passive into the most perfect masterpiece, the world (though it is only Moses who has reached “the very summit of philosophy,” given the influence of the opening of Genesis). For Trabattoni the impetus of Philo’s drive to reconcile Platonic with Mosaic philosophy is the fact that Platonism provides the Ideas, which are absent from Genesis, while the Mosaic contribution accounts for their creation, a notion absent from the Timaeus.
6. Opsomer attempts a philosophical portrait of Plutarch’s teacher, the mysterious Ammonius (1st c. ). He portrays the Egyptian as a mild and tactful instructor who discussed aspects of Platonic theory (e. g., the doctrine of recollection), and the hermeneutic tool of allegorical interpretation of texts. He is represented as reverent to the Delphic God, Being and the One, and (thoughtful) numerology. Opsomer gives one important possible difference between Plutarch and his teacher, in that the latter has no interest in the irrational soul, while the student uses it to explain disorder in the world (cf. De animae procreatione in Timaeo), instead of blaming matter’s penchant for chaos. Opsomer helpfully suggests that, instead of looking for specific influences, we should imagine a general tradition of interpreting the theory of flux in a certain way (e. g., leading to a lack of personal identity, which alleviates the fear of death), and that Philo, Seneca, and “Ammonius”/Plutarch were aware of it. This suggests that Ammonius was not directly involved in a Neopythagoreanism that was independent of Platonism, but rather was guilty of moderate Pythagorean tendencies in a New Academic/skeptical framework. This explanation could account for the various philosophical elements in Ammonius’ famous speech in Plutarch’s De E.
Opsomer’s presentation of all the evidence is exhaustive, and his judgment balanced. His twenty-six numbered conclusions concerning Ammonius at the end of the piece are enormously helpful (174-178); the bibliography is an excellent source for works on Plutarch and Ammonius.
7. Donini answers some of the questions that surround Plutarch’s De genio Socratis. While there have been recent attempts to understand how the two topics of Socrates’ daemon and the execution of the anti-Spartan Thebans in 379 are connected in this work, by looking specifically at Epaminondas as a thematic connection, Donini looks to explain Plutarch's philosophical point through the characterization of his protagonist. By using both philosophical discourse and historical narrative, Plutarch offers Epaminondas as proof of the unification of two opposing interpretive principles: one construing Plato (and even Aristotle) as a progeny of Pythagoras (or Pythagoreanism), the other presenting Plato as the disciple of Socrates and progenitor of the New Academy. Plutarch was constrained to argue for the coexistence (indeed, a convergence), of these different threads in Platonism and the Academy's unification of both traditions (as reflected in the title of his lost work, “There was only one Academy of Plato”). Pythagorized Platonism and the Socratic-Academic tradition could co-exist readily in Plutarch’s characterization of Epaminondas.
Read in this way, Plutarch’s De genio Socratis contains allusions and novelistic references that transmit a message that has great historic, philosophical, and conceptual value. Plutarch emerges as a true inheritor of his model’s style: Plato also uses invention and careful attention to detail to help form convictions without necessarily dictating them. At the end of the volume is a reasonable “Index of Ancient Names” (including names important to the volume, but no “Simmias,” “Galaxidorus,” etc. ); a helpful “Index of Modern Names”; and a five-page “Index Locorum.”
The topics of all of these pieces clearly interrelate and help explain aspects of the imperial systemization of Plato. This volume is a welcome addition to the continued effort to push against the unhelpful label ‘eclectic’, which can be coupled with dismissal without much investigation. Anyone with an interest in the origins of Platonism at the start of the Roman Empire would do well to study this volume. 1. Theiler, W. Die Vorbereitung der Neuplatonismus. Berlin 1930. Dillon, J., 1996. The Middle Platonists , 2nd ed. Ithaca: Cornell University Press. Glucker, J., 1978. Antiochus and the Late Academy, Göttingen: Vandenhoeck & Ruprecht. One may add Tarrant (e. g., Scepticism or Platonism? The Philosophy of the Fourth Academy. Cambridge 1985), whose work seems to be relatively neglected in much current scholarship and might warrant more than a single reference in this volume. 2. Reading the grammatical referent of elle after the semicolon to be the more remote l’intégration, rather than the more proximate l’oeuvre. (108) | 001_4703863 | {
"id": "<urn:uuid:8854d693-0ba5-49c0-b3f9-797d738d2cb7>",
"dump": "CC-MAIN-2017-39",
"url": "http://bmcr.brynmawr.edu/2010/2010-08-31.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689028.2/warc/CC-MAIN-20170922164513-20170922184513-00116.warc.gz",
"language": "en",
"language_score": 0.9302307963371277,
"token_count": 3602,
"score": 2.859375,
"int_score": 3,
"uid": "001_4703863_0"
} |
Demonstrating Ojibwe Treaty Rights -- the 1855 Treaty Raises Big Questions for Pipeline Proposals of the North
As Ojibwe people, our 1855 treaty protects our right to harvest, hunt, and fish within our treaty territory. New pipelines proposals from Enbridge put that land at risk, and infringe on those rights. These videos document the struggles to assert treaty rights over the past four years, and give some insight into the Indigenous Rights Based Strategic Framework for protecting the integrity of the north country for all Minnesotans.
Several Ojibwe netted fish on Lake Bemidji, Minnesota on May 14, 2010 to demonstrate Ojibwe treaty rights. The State of Minnesota confiscated and destroyed the nets because they thought it was against the law. The tribes went on to challenge the 1855 Treaty in court. Audrey Thayer from the Minnesota ACLU describes the day's events. | 011_5806175 | {
"id": "<urn:uuid:2627bb2a-fa2a-4d03-b004-d23733259541>",
"dump": "CC-MAIN-2017-13",
"url": "http://www.honorearth.org/audrey_thayer_demonstrating_ojibwe_treaty_rights",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218188717.24/warc/CC-MAIN-20170322212948-00344-ip-10-233-31-227.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9202756285667419,
"token_count": 187,
"score": 3.28125,
"int_score": 3,
"uid": "011_5806175_0"
} |
Archaeologists say remains of a rare, circular 1850s prison block unearthed at the former Pentridge Prison is of world significance in penal history. The public will next month be able to view the extraordinary bluestone foundations of the panopticon, shaped like a Trivial Pursuit token, which experts say is one of the few examples of its type to survive. It was part of a brutal 19th-century movement to keep prisoners in solitary contemplation, under total surveillance. Pentridge had three: this one, next to A Division on the north of the site is the first to be unearthed. Log in to leave a comment. Sign In / Sign Up | 011_6899804 | {
"id": "<urn:uuid:fa1d5ed0-c307-42e0-9882-bad3c6cb1526>",
"dump": "CC-MAIN-2017-09",
"url": "http://en.geneanet.org/genealogyblog/post/2014/05/1850s-cell-block-unearthed-at-historic-australian-prison-html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170884.63/warc/CC-MAIN-20170219104610-00327-ip-10-171-10-108.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9610331654548645,
"token_count": 135,
"score": 2.59375,
"int_score": 3,
"uid": "011_6899804_0"
} |
Part 1: Word Power = Coaching Power
“Our words are good indicators of what’s really important to us. ” –Robert Kiyosaki
Coaches generally agree that the mental game is at least 50% of success in baseball. They also generally admit they aren’t as well trained in coaching the mental game as they are in coaching the physical, technical part of the game. A good first step to improving your coaching of the mental game is having a strong vocabulary for it. If you think something is important, have words for it. Robert Kiyosaki, a rich guy who wrote the best seller, “Rich Dad, Poor Dad,” says the #1 most important step to becoming rich is to learn the vocabulary of money. Know what is meant by “asset,” “liability,” “stock,” “yield,” “interest,” “dividend,” and you can navigate in the world of money. You can’t operate effectively in the world of money if you can’t understand conversations about money. The same is true for coaching: You can’t effectively communicate about the mental game unless you have the words to talk about it. Perhaps the most consistent feedback Ken Ravizza and I have gotten in the past 24 years about our book Heads-Up Baseball is that the book gave them the ability to talk much more powerfully about the mental game because it gave them a vocabulary for it. Coaches tell us that one of the most valuable ideas in Heads-Up Baseball is the “Inner Signal Light.” We say each pitch in a game is like an intersection with a traffic light… but that light is inside each player. When feeling confident and focused and present, a player has a “green light. ” When a bit rattled, he has a “yellow light,” and when really losing emotional control he has a “red light. ” Just like when you’re driving a car, green means go – proceed to the next pitch. A yellow light means things are headed in the wrong direction and the player must decide if he should proceed to the next pitch, or step back, take some time, and see if he can get back to a green light before the next pitch. (We teach techniques for how to get from “yellow” to “green” — and how to perform when you can’t get out of a yellow light — at HeadsUpBaseball2. com. )
We term the process of a player gradually losing his composure “spiraling out of control. ”
This simple metaphor gives coaches and players access to talking about the mental game with greater clarity. It gives coaches a way to be more precise and helpful in their coaching. For example, say a batter pops out on a pitch outside the strike zone. Which coaching sounds more likely to cultivate better performance in the future:
- “That was a terrible pitch to swing at, Jones, you choked. You need to be more disciplined at the plate. ”
- “Jones, what color would you say your inner signal light was before the pitch you popped up on? ”
The first statement is pretty typical in baseball. The term “plate discipline” gets used a lot. “I hear you coach,” a player could (even should) respond, “what are the steps to becoming more disciplined at the plate? ”
The use of a question and the signal light terminology in the second statement leads the player to examine is own experience. He’ll replay the at-bat in his mind and can use the distinctions “green light” and “yellow light” to both gain awareness of what he experienced at the plate and have a way to communicate that experience. “I guess after the ump called that first pitch a strike I spiraled out of control a bit and got to a yellow light… if not a red. ”
“OK,” says the coach, “and when did you notice you had a yellow light? ” The coach could also follow up with, “What could you have done to help you get back to a green light between pitches? ”
We contend that the possibilities for effective coaching are much greater with the use of the inner signal light terminology than without it. Other Heads-Up Baseball terms that can help you more effectively coach the mental game include:
- Focal Point
- Mission, and
Ken and I are also now using phrases, like “Keep your Controllables Greater than your Uncontrollables,” “Keep your Mission Greater than your Feelings,” and “Keep your Learning Greater than Your Experience” to express key mental game concepts and skills. We’re finding these terms and phrases create much broader and richer territory for productive coaching. So if you want to have more money, learn the language of money. If you want to improve your coaching in the mental game, improve your mental game vocabulary. The more “word power” you have, the more power you’ll have to improve player performance. You don’t have to launch a big “mental game program” with your team to improve their mental skills. Just start introducing words into your coaching vocabulary that have been helpful to thousands of coaches and before long you’ll notice a rise in the level of your coaching conversations – which will likely lead to better and more satisfying performances. If you think now would be a good time to upgrade your mental game coaching vocabulary, click here to learn more our new Heads-Up Baseball Monthly Coaching Program! | 008_6709557 | {
"id": "<urn:uuid:f0767f21-c940-4dc5-9414-3d2cf46c302a>",
"dump": "CC-MAIN-2018-51",
"url": "https://www.headsupbaseball2.com/coach/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823183.3/warc/CC-MAIN-20181209210843-20181209232843-00086.warc.gz",
"language": "en",
"language_score": 0.9675762057304382,
"token_count": 1206,
"score": 2.578125,
"int_score": 3,
"uid": "008_6709557_0"
} |
It’s been a wild week of monkey business. Tuesday, we wrote about an amazing study of monkey social status reflected in their genome. It turns out that was only the beginning. This week has also seen research on primate sleeping habits, monkey mob-mentality and… reading baboons? When did our human ancestors come out of the trees to sleep? It’s a debate among scientists—feet structure and fire-building evidence create theories that say, according to New Scientist, that
hominins may not have slept on the ground until Homo erectus appeared 1. 9 million years ago. They lacked upper body adaptations for climbing and may have used fires to ward off ground-dwelling nocturnal predators. But a new study of chimpanzee sleeping habits in Africa demonstrates that even our tree-climbing ancestors may have slept on the ground. Chimp ground nests are found even where chimps have large predators—indicating that ground sleeping could have started in hominins long before fire-building and feet adaptations. ScienceNOW reports this week on a new study in Current Biology about chimpanzees and the mob-mentality. Similar to humans, it really is monkey-see, monkey-do—when the chimps watched their peers drop a ball into a box and receive a treat, they did the same thing. The researchers then tried it on human toddlers—they had the same response. According to ScienceNOW:
This moblike mentality makes evolutionary sense, the [research] group says, since doing what everyone else is doing is usually a good way to avoid hidden dangers. Finally, we give you a study in the recent edition of Science about baboons that can tell the difference between a real word and a random mixture of letters. Not quite reading, but close, say researchers. NPR reports that this could say a lot about how our brains work to read. “The part of the brain that we use to recognize words when we're reading is actually part of the more general brain region for visual object identification,” [lead author Jonathan Grainger] says. Grainger says brain scans of people reading support that notion, though, of course, we also use language areas to understand what we're reading. So many monkey studies, so little time… All important because they teach us about who we are. Image: Joel Fagot | 001_3170572 | {
"id": "<urn:uuid:f8cb6e07-e223-4533-84db-3b4a1d46993d>",
"dump": "CC-MAIN-2014-15",
"url": "http://www.calacademy.org/sciencetoday/monkey-business/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609533308.11/warc/CC-MAIN-20140416005213-00452-ip-10-147-4-33.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9577673673629761,
"token_count": 488,
"score": 3.265625,
"int_score": 3,
"uid": "001_3170572_0"
} |
Should a search be made throughout the length and breadth of the United States, no fairer or finer example of the selfmade American could be found than Frederick Weyerhaeuser, lumberman. Brought by chance, in early manhood, in touch with the making of lumber he seized upon this accidental circumstance as upon an opportunity, mastered the rudiments with a thoroughness that has characterized his every action in life, and upon this practical knowledge built his exceptional business career. One by one he saw the possibilities as they opened before him. Each possibility became to him a probability and was made a certainty. He mastered in turn the details of lumber manufacture and sale, of the purchase and economical utilization of pine lands, of log supply in its branches-cutting, sorting and rafting to the mills, details of the building and maintenance of railroads for logging and marketing mill products, of the operation of the various industries subsidiary and supple-mental to the principal business of lumber manufacture. Incidentally he became a financier and has been chosen for his judgment to advise and direct great institutions of the financial world. His career is so interwoven with the growth of the great white-pine industry of the North that it would be difficult to make reference to any chapter in the history of lumbering in that region without mentioning his name. The story of Frederick Weyerhaeuser’s life is so remarkable in its incidents and yet so rational and consistent in the developmental sequence of its events that its telling in very truth would seem like the creation of some master mind in the realm of fiction. The story of his business career, the part he has taken in the development of the Northwest will never be fully known, for such a narration would be of necessity an autobiography, and Mr. Weyerhaeuser is the last man who could be induced to tell of his achievements in detail. Should he serve as his own historian, short and simple would be the annals. His is not the disposition to tell of the prodigious industry and unerring discernment which has made it possible to launch and build up countless industries, amass great wealth and extend the field of his usefulness until it has covered the entire country. To intimate friends Mr. Weyerhaeuser sometimes talks of himself, but the topics are apt to relate to his boyhood in Germany, his emigration to America, his early trials and deprivations, his determination to do every task assigned him so well that the confidence of his employer could be gained and advancement honestly won. More particularly would he write, if his hand held the biographical pen, and he were sure of friendly interest in those who read, of his days in a little Illinois town where on a small salary he and his bride enjoyed existence as only young people happily married and hopeful of the future can enjoy it. He would tell of his beautiful home life, of his wife and family and cherished friends. He would tell of his desire for simplicity in living and freedom from the burden of social obligation that wealth often brings. To his closest friends he might speak of his interest in other men, the younger ones just putting their shoulders to the wheel, in the older ones, those who have done their best and yet have failed of substantial rewards which have been his own. Frederick Weyerhaeuser is a man whose business success has been noteworthy even in this country where a large measure of success is not uncommon. He has another side upon which his friends delight to dwell. It is Frederick Weyerhaeuser, the good citizen, the admirable neighbor, the kind and sympathizing friend, that his old associates in Rock Island hold in high regard. Frederick Weyerhaeuser is a native of Niedersaulheim, a village of the Rhine valley, situated near the city of Mainz. Long ago the little village with the long name was one of the Roman walled cities that the world-conquerors scattered over Germany. It is in the midst of a beautiful agricultural region. The ancestors of Mr. Weyerhaeuser were farmers and vine-dressers. Far yonder toward the dark ages, some four hundred years ago, tradition has it the Weyerhaeusers came from Western Germany to settle in Niedersaulheim. John Weyerhaeuser, the father of Frederick Weyerhaeuser, was one of the solid men of the village, owning a fifteen acre farm and a three acre vineyard. He died at the age of fifty-two, October 6, 1846, when Frederick was about twelve years old. There were children in the Weyerhaeuser home at Niedersaulheim-eleven of them. Frederick and four sisters survived the others and reached maturity. When a little fellow of six he was sent to the Protestant school. The essential foundations of an education were provided by his teachers and a proper grounding in religious truths also looked after. Mr. Weyerhaeuser remembers that each Wednesday and Saturday afternoon was devoted to the study of the Bible and the church catechism. At eight years of age he commenced work upon the farm helping about such tasks as his strength permitted and received his first valuable lessons in responsibility. Four years later the death of his father made necessary the shortening of his school life and he took upon himself a large part of the work of the farm and vine-yard. In life’s school the boy was learning other lessons than those in books, lessons of accomplishment, of reliability, of self confidence. That he learned them well his subsequent success testifies. An incident of his boyhood life was his confirmation in the German Reformed Church at the age of fourteen. It might be remarked in this connection that after coming to this country Mr. Weyerhaeuser attended the Lutheran Church and that since his home has been in St. Paul he has been allied with the Presbyterian Church. During Mr. Weyerhaeuser’s boyhood days the thoughts of the people of this German village were turning toward America. In the Rhine valley farming land was high in price and the chance for bettering one’s condition small. The United States came to be looked upon as the land of promise, a land where there were broad acres, climatic conditions not unlike those of Germany and a chance for every man. One of Mr. Weyerhaeuser’s older sisters and an aunt made a pilgrimage across the water in 1849 and settled in Western Pennsylvania. Their letters turned the longings of the remainder of the family into determination, and in 1852 they followed to the land of opportunity. The party which included Frederick, then a sturdy youth of eighteen, landed in New York City in July of that year and proceeded to Western Pennsylvania, where settlement was made at Northeast, a small place about fifteen miles from Erie.
In this new land the strong boy, trained to work on the farm in the Fatherland, and not afraid of responsibility, turned his attention to any task that offered and they were of all sorts. At one time he fancied learning the trade of a brewer and entered the employment of a relative engaged in brewing. The first year he received $4 a month; the second and last, $9 a month. The employment was not congenial. Next he tried farming, and hired out for a year at $13 a month and board. Had any admirer of Frederick Weyerhaeuser at this stage of his life predicted the brilliant future that he has since experienced, the prophecy would have been considered as impossible as it was ingenious. So does truth out-fiction fiction in building the biography of a successful man. The ancestral farm in Germany having been sold, Mr. Weyerhaeuser, with his share of the proceeds came to the West and to Rock Island, where he arrived in March, 1856. If he at this time glimpsed the future, and saw how broadly his name would be written across the commercial life of this thriving western town, he kept his fancies to himself. True to his former habits of industry he took the first worthy occupation that offered and went to work on the construction of the Rock Island & Peoria Railway, now a part of the Rock Island System. Soon after he took what seemed a better position, that of night fireman at the sawmill operated by Mead, Smith & Marsh, in Rock Island. Here, then, was the first round of the ladder that led to advancement in the lumber world, that led to wealth and influence and power. From that lowly first foothold the climb was steady, certain and swift. Two days after he took this position at the mill the night shift was laid off; not so the new fireman. It had taken only two days to show his employers a touch of his quality and he was retained and made tallyman. In this position his duties included keeping account of the output of the one oratory and one mulay saw that formed the vital equipment of the mill and also loading the boards upon trucks. Here he more than earned his wages and established himself with his employers. One day at noon some farmers came to the mill to buy lumber. The salesmen and those in charge were away. The tallyman pushed his lunch bucket to one side, and with the Weyerhaeuser judgment which has since stood its owner in good stead filled the farmers’ orders and turned the $60 in gold he had received over to the salesman when he returned from dinner. Mr. Marsh approved the sale and noted the young German tallyman’s readiness and judgment in an emergency. The self-reliance and efficiency manifested in this incident brought about Mr. Weyerhaeuser’s being soon given charge of the yard and local sales. While in the employ of Mead, Smith & Marsh the happiest event in Mr. Weyerhaeuser’s eventful life occurred, his marriage to Miss Sarah Elizabeth Bloedel. This young lady came from her home in Erie, Pennsylvania, early in 1857, to visit her sister, Mrs. F. C. A. Denkmann. She was from Mr. Weyerhaeuser’s native village. The bond of interest this created deepened in intensity and ripened into love. Six months later her consent to marriage was won and the ceremony took place October 11. Fifty years later, in October, 1907, the golden wedding was celebrated by Mr. and Mrs. Weyerhaeuser, with the loving and joyous aid of children and grandchildren at the old home, Rock Island. The first ceremony was a simple one. To its golden anniversary metropolitan newspapers sent picked men to report and illustrate this event. In December of the year 1857, Mead, Smith & Marsh opened a lumber yard in Coal Valley, Illinois, a flourishing town to which the new railroad had just been completed and which was advantageously located in a fine farming community. Mr. Weyerhaeuser was given charge of this venture which proved a profitable one. While he was gaining valuable experience and knowledge of the demands of lumber purchasers his employing firm were nearing financial straits which finally resulted in such embarrassment that their assets were purchased by Mr. Weyerhaeuser as he was able from time to time until he was fairly embarked in the lumber business for himself and in his own name. This was a time of financial unrest the country over and the modest financial craft just launched was in danger for some months with others that went down. Coming to Rock Island to secure lumber for his Coal Valley yard Mr. Weyerhaeuser formed the plan of operating the unused mill of his former employers. A raft was bought in Davenport and the idle saws bit into Weyerhaeuser logs. The lumber was laid down in Coal Valley at a cost of $8 per thousand feet. There was a good margin in the sale of this lumber, and when this was added to the profits of Mr. Weyerhaeuser’s operations as a building contractor and grain buyer, the new business man was delighted to find that during the latter nine months of 1859 he had cleared $3,000 and during 1860, $5,000. When the affairs of Mead, Smith & Marsh were closed up and the old mill put upon the market at a modest figure, with a small sum of cash required to bind the bargain, a partnership was formed between Mr. Weyerhaeuser and his brother-in-law, F. C. A. Denkmann, then conducting a grocery store in Rock Island. The mill was purchased and the future-great firm of Weyerhaeuser & Denkmann commenced operations. In two years the mill had freed itself from imkncumbrance. Its capacity was steadily increased and in a few years reached an annual output of from 3,000,000 feet to 10,000,000 feet. The ever increasing lumber business of the firm did not engross their entire attention. Mr. Weyerhaeuser was interested in a number of enterprises in the years succeeding the purchase of the mill. He owned a part of a flouring mill at Coal Valley. He and Mr. Denkmann had an interest in a woolen mill. In 1871 the Coal Valley business was put in charge of an employe and Mr. Weyerhaeuser moved to Rock Island.
Between the years 1858 and 1871 the foundations of the great business of lumbering afterward carried on by the firm were laid broad and deep. The personal characteristics of the members of the firm made their association mutually beneficial. Mr. Denkmann, a fine mechanic, took charge of the mills and surmounted all the mechanical difficulties of manufacture. Like his partner he was possessed of great vigor and executive ability. Mr. Weyerhaeuser’s natural abilities and training made him a great salesman, one who knew intimately the wants of customers. His genius in providing a competent log supply for the mills was also early apparent. He was not content with the method of purchase from log drivers then in vogue. He saw that a mill to succeed must be backed by adequate stumpage and took hold of that problem. He went into the woods and lived with the lumberjacks. He learned how to buy timber and estimate timber lands. In the northern woods be became endowed with prophetic vision, and cast an anchor to windward, as the sailors say. With the co-operation of his partner, the firm of Weyerhaeuser & Denkmann inaugurated their policy of purchasing pine lands. Great tracts were bought on the Chippewa River and its tributaries. Other lumbermen did likewise. Logs cut at the different camps floated down the stream in confusion. The necessity for sorting the logs of different owners led to the organization of the Mississippi River Logging Company at Chicago, following a meeting of conference attended by representative lumber men of the Northwest, December 28, 1870. This company was destined to occupy a great field in the white pine industry. The logs of stockholders were sorted at great logging works at Beef Slough, Wisconsin, and at West Newton, Minnesota. Logs were purchased by the company from the various stockholders. These logs naturally varied in quality and value. The task of grading and pricing these logs and apportioning the credits to be given the different stockholders was deputed to a committee of which Mr. Weyerhaeuser was the chairman and executive. That his associates felt entire confidence in his uprightness and fairness needs no other proof. Mr. Weyerhaeuser has been the president of the Mississippi River Logging Company since September 5, 1872. From the time when the log supply was planned, secured and safeguarded, the business of Weyerhaeuser & Denkmann grew with its growth and strengthened with its strength. Each gain in breadth of operation revealed still other fields where development was possible. Other mills were added to the equipment. Timber lands were purchased in other parts of the country and mills established to work the logs into lumber. A list of the corporations and companies in which Mr. Weyerhaeuser has held an interest and official position would be an astounding revelation of the man’s breadth of executive ability and business acumen. He has always been a consistent follower of his theory formed years ago that the purchase of pine land was always the best thing a lumberman could do. This plan he has followed even after pine land had gone to a figure where further advancement seemed unlikely. He is quoted as saying to a friend who doubted the wisdom of a purchase where the price seemed prohibitive of profit: “I know this much: Whenever I buy timber, I make a profit; whenever I do not buy, I miss an opportunity. I have followed this practice for many years and have not lost anything by it. ”
Another notable feature of Mr. Weyerhaeuser’s business policy has been his belief in cooperation. This principle he has always employed. It has reduced the cost of production by sharing with competitors any general and necessary expense. It has eliminated friction and promoted a cordial under-standing. among men engaged in the same line of business. If he has at any time planned a large deal, others have been invited to share in the development of the plan and in the profits. This disposition has won for him not only the respect but also the warm regard of associates in the lumber industry. The habits of a lifetime of industry are not lightly shaken off. Although the necessity for work long ago disappeared, Mr. Weyerhaeuser is devoted to his business. There is much in organization and execution beside the piling up of wealth. There is a joy in accomplishment, and it is this that has kept Mr. Weyerhaeuser from seeking a life of ease which to him would be not only inglorious but distasteful. He is still Frederick Weyerhaeuser, lumberman, and it is easy to predict that he will never write “retired” after his signature. Since his removal to St. Paul from Rock Island, a step made desirable by the location of his newer home in the field of his operations, he has become a member of the Town and Country, the Commercial and the Minnesota Clubs, but his time is spent at his office or in the society of his wife at home. To Mrs. Weyerhaeuser, the friends of the family who have known the Weyerhaeusers longest and best ascribe a splendid share in the credit for the success which has crowned the modest business beginnings in Rock Island a half century ago. No man ever had a more judicious advisor, say those who know, than this same wife who mingled with her common sense advice at business crises the steady encouragement of love and thoughtfulness. Mr. Weyerhaeuser has also had the invaluable assistance of late years of his four sons, all born and bred in the lumber business. When the character of these lieutenants in charge of the outposts and animated by the same loyalty to the Weyerhaeuser interests that has inspired their founder is considered, the credit for a large share of recent success is apparent. Seven children have been born to Mr. and Mrs. Weyerhaeuser. The eldest is John P. Weyerhaeuser, now managing the Nebagamon Lumber Company, Lake Nebagamon, Wisconsin.
A daughter, Elise, is the wife of Dr. William Bancroft Hill, a member of the faculty of Vassar College.
A daughter, Margaret, now Mrs. J. R. Jewett, lives in Chicago. Her husband is a professor of the Semitic languages in the University of Chicago.
A daughter, Apollonia, is Mrs. S. S. Davis, of Rock Island. Mr. Davis is one of Rock Island’s successful business men. A son, Charles A. Weyerhaeuser, made his reputation as a lumberman in the management of the Pine Tree Lumber Company of Minnesota. He is now president of the Pot-latch Lumber Company, with mills in Washington.
A son, Rudolph M. Weyerhaeuser, is in charge of the great interests at Cloquet, Minn.
A son, Frederick E. Weyerhaeuser, after experience at Cloquet and in the South in lumber manufacture, is now at St. Paul serving the family interests as principal assistant to his father. The greatest tribute paid to the man, Frederick Weyerhaeuser, is the love and admiration of his old friends and neighbors at Rock Island. They esteem him for personal qualities of exceptional sort, for his upright character and for his willingness that all should prosper, even as he has done. | 011_5780881 | {
"id": "<urn:uuid:b99b211c-4d14-4725-bca4-42552d6515f0>",
"dump": "CC-MAIN-2017-13",
"url": "https://www.accessgenealogy.com/illinois/biography-of-frederick-weyerhaeuser.htm",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218190181.34/warc/CC-MAIN-20170322212950-00406-ip-10-233-31-227.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9858315587043762,
"token_count": 4267,
"score": 2.578125,
"int_score": 3,
"uid": "011_5780881_0"
} |
By Cathy English, Revelstoke Museum & Archives
One of the signs of a flourishing new community was the establishment of a newspaper. Revelstoke’s first was the Kootenay Star, which began publishing on June 22, 1890. The paper was owned and published by Hugh McCutcheon, who also ran the Kamloops Sentinel. Its first editorial introduced the paper as “…essentially the people’s paper – started and maintained in the people’s interests. ”
The editor, James W. Vail, proclaimed that “every man – be he Grit or Tory, Loyalist or Liberal – will receive his just due from the STAR. Like other men, the publisher has political sympathies, but these will not be allowed to interfere with the discharge of any duty towards a neighbour. ”
A one-year subscription to the weekly Kootenay Star could be purchased for $3. The Kootenay Star continued to publish until March 31, 1894, when it was quickly replaced by the Kootenay Mail, whose first issue appeared on April 14, 1894. The first editor was R.W. Northey, who had replaced James Vail as editor of the Kootenay Star.
The office on Front Street held a large printing press that required two operators — one to feed the paper sheets and take the impressions and the other to ink the forms. The press was capable of printing 250 two-page sheets per hour. The first editorial stated: “The MAIL has no pull with any individual, corporation, or political party, but will pursue a strictly independent course on the diving wall, which will enable it to take a whack at any offending head which pops up on either side. ”
A column entitled “Things said and done about town,” was published in the Kootenay Mail each week under the pen name Diogenes, who was most likely Northey. In March, 1895, Diogenes made comments about a case before the courts and offended some of the directors of the Revelstoke Printing and Publishing Co. which owned and published the Kootenay Mail. The directors tried to oust Northey, but he barricaded himself in the office, and locked out the directors. He issued a paper on March 9, 1895 giving his side of the dispute. When he was forced to leave the building for food and drink, the directors entered the building and issued a paper under the same date giving their own version of the dispute. Northey was fired, but filed a suit claiming compensation for dismissal without six months notice, and was awarded a settlement of $260. The museum has print copies of both of the March 9, 1895 issues, one labelled ‘Exhibit A,’ and the other ‘Exhibit B,’ as these were used in the court case. Burt Campbell came to Revelstoke in 1895 to work on the Kootenay Mail as a printer. He was 17 years old at the time. The paper was short of funds due to the Northey settlement, and Campbell and the other printer, Smith, occasionally went on strike, and refused to print the paper when they were not paid. On one occasion, William Cowan, one of the directors of the company, encouraged Campbell to go on strike because he needed him to play in a local soccer game. Cowan even agreed to pay Campbell a week’s wages. In April 1896, B.R. Atkins became an owner in the Kootenay Mail and took over as editor. Campbell became a partner in the Mail company in 1897, at the age of 19. Competition started in January 18, 1897 with the first issue of the Revelstoke Herald, published by Arthur Johnson and R. Parm Pettipiece.
The Mail and the Herald were on opposite sides in provincial politics. When J.D. Sibbald was appointed as gold commissioner, the Herald supported him, and sided against J.M. Kellie, M.P.P., who did not approve of Sibbald’s appointment. The Mail supported Kellie and was also upset by Sibbald’s appointment. In the Dec. 18, 1897, issue of the Mail, it was stated: “J.M. Kellie M.P.P., got back Saturday last from his trip through the constituency. His stand against the government was everywhere endorsed, and the Herald and its peanut gang are the only persons who requested him to resign his seat. What a call-down for the peanut gang! ”
B.R. Atkins went to Victoria to work as private secretary to Premier Semlin, and Burt Campbell purchased his half-share as of March 31, 1899. The legal documents had to be post-dated to April 29, 1899, the day following Campbell’s 21st birthday as he could not legally own the business until he turned 21. The Kootenay Mail and the Revelstoke Herald merged in January of 1906 and continued to publish until April 1917 under the name Mail-Herald.
The Revelstoke Review began publication on April 11, 1914. Arvid Lundell was a newsboy for the paper in 1914, and became editor in 1926. He was associated with the paper until his death in 1984 although he took a back-seat as editor while he pursued a political career as mayor of Revelstoke and Member of the Legislative Assembly. Members of the Lundell family continued to own and operate the paper until it was bought by the Revelstoke Times.
The Times began its run in 1985 as a monthly called Front Row Centre. The paper was re-named and became a weekly at the start of 1989. The Times and the Review were in competition until November 1992, when the papers merged and became the Times Review.
Other local papers of note were the Revelstoke Herald, published by Clay Stacey in the 1970s, and the Unique, published by Doug Powell in the 1990s. With files from Alex Cooper, Revelstoke Review | 010_1995627 | {
"id": "<urn:uuid:f2288272-7637-4157-9b40-15af00bd5957>",
"dump": "CC-MAIN-2019-26",
"url": "https://www.revelstokereview.com/life/all-the-news-thats-fit-to-print-newspapers-in-revelstoke/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999291.1/warc/CC-MAIN-20190620230326-20190621012326-00197.warc.gz",
"language": "en",
"language_score": 0.9857376217842102,
"token_count": 1264,
"score": 2.703125,
"int_score": 3,
"uid": "010_1995627_0"
} |
Task of a Corner Guard or an office involves implementing relevant measures to protect lives and properties. Corner Guards are most often confused with peace officers who are in fact assigned by the state with an aim to enforce law and preserve peace in public. Distinction between Corner Guards and Peace Officers Corner Guards using the northern tool scaffolding other hand are crime, threat and risk prevention officers who are hired to protect specific properties or even people. However, these jobs may involve detecting the same offenses that peace officers act upon, such as fights or burglaries. This kind of jobs in field however doesn’t include acting on offenses such as motor vehicle traffic violations and circumstances. It is the job in the Corner Guard to simply protect the person or prevent any damage or destruction of the assigned property. Peace officers are being used to protect all property and people and as well as to enforce laws. In simple words, the Corner Protection is in the prevention business. It is their responsibility generate sure crime does not take place and that they keep an open watch against impending danger and report any crime may come across. In addition to the scope of protection, a key difference between these two jobs is that while one enforces the law, the other does ‘t. Common Responsibilities on Officer Jobs It is the role of officers and Corner Guards to protect people and property of their employers and contracted users. It is their responsibility to discover a ways to prevent offensive events before they be expected. The absence of any unwanted incidences is a sufficient indicator that the Corner Guard is doing his job right. It is the responsibility of a Corner Guard to remain visible to be a warning to potential criminal activity. Significant damage, injuries and thefts can be prevented when the officer looks like he is on Corner Guard and aware at all times. It is the job of any Corner Guard to stay as alert as possible on the watch any kind of kind of abnormal tasks. They should always keep their eyes and ears open for unusual sights and sounds. A vigilant Corner Guard is always worried about activities that draw them away from their assigned threads. | 009_4654263 | {
"id": "<urn:uuid:1cfb9366-8018-4c7b-8279-0a7612876ead>",
"dump": "CC-MAIN-2019-13",
"url": "http://www.monsterbeatsosterreich.com/wall-protection-is-a-must-in-busy-buildings/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912203991.44/warc/CC-MAIN-20190325133117-20190325155117-00117.warc.gz",
"language": "en",
"language_score": 0.9731916785240173,
"token_count": 418,
"score": 2.5625,
"int_score": 3,
"uid": "009_4654263_0"
} |
What you put on your body is just as important as what you put in it. Your skin is the largest organ in your body, and it absorbs everything including toxins. If you are concerned about not eating unhealthy foods like trans fat, then you'll definitely want to know which synthetic ingredients you should watch out for in the products you use. - Methyl, Propyl, Butyl and Ethyl Parabens: Used as a preservative to inhibit microbial growth and extend shelf life. Unfortunately, it can cause allergic reactions and skin rashes. Preliminary research found parabens in human breast cancer tumors. - Diethanolamine (DEA), Triethanolamine (TEA): These are used as foaming agents, but can cause allergic reactions, eye irritation, and dryness of the hair and skin. DEA and TEA are toxic if absorbed into the body over a long period of time,
and are associated with cancer in lab animals. - Diazolidinyl Urea, Imidazolidinyl Urea: Often used as preservatives, the American Academy of Dermatology has found these chemicals to be a primary cause of contact dermatitis (irritation caused by foreign substance). Both these chemicals release formaldehyde, which can be toxic. - Sodium Lauryl/Laureth Sulfate: This is a cheap, harsh detergent used in many shampoos for its ability to cleanse and foam. Often derived from petroleum, it causes eye irritation, dry scalp, skin rashes and other allergic reactions. Be on the lookout for pseudo-natural products that list this ingredient with the phrase "comes from coconuts" - it's still bad for you. - Petrolatum: Also known as petroleum jelly, this is a mineral oil derivative that can clog your pores. This in turn disrupts your body's natural ability to moisturize its own skin, leading to dryness and chapping. Manufacturers use it because it's really inexpensive. - Propylene Glycol: Ideally this is a vegetable glycerin mixed with grain alcohol, both of which are natural, but it's usually made from synthetic chemicals. It has been known to cause hives and eczema. Beware of related chemicals labeled PEG and PPG. - PVP/VA Copolymer: A petroleum-derived chemical that's used in hair styling products and some cosmetics. Considered toxic since if inhaled, it can damage the lungs. - Stearalkonium Chloride: This toxic chemical was designed by the fabric industry for use as a fabric softener. Companies use it in hair conditioners and lotions because it's much cheaper than natural conditioning ingredients such as proteins. - Synthetic Colors: Labeled as FD&C or D&C and followed by a number, these make products look pretty but can be carcinogenic. - Synthetic Fragrances: Labeled simply as "fragrance," there's no way to tell what chemicals are actually in the product. People can get headaches, dizziness, rashes, and respiratory problems from them. People may also experience hyper-pigmentation, which means this chemical may cause brown spots to form on your skin. Want to know what else you should avoid? Then read more
Fit's Tips: Before buying beauty products, check the ingredients list. These ingredients can be found in make-up, lotions, shampoos, conditioners, perfumes, baby care products, sunscreens, toothpastes, nail products, and deodorants. If you're looking for a good brand that doesn't contain these nasty ingredients, check out Aubrey Organics. | 002_4862621 | {
"id": "<urn:uuid:fdebaa71-1e22-4bc2-a7dd-178fafa94783>",
"dump": "CC-MAIN-2014-41",
"url": "http://www.fitsugar.com/10-Toxic-Cosmetic-Ingredients-Avoid-204330",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657118950.27/warc/CC-MAIN-20140914011158-00182-ip-10-196-40-205.us-west-1.compute.internal.warc.gz",
"language": "en",
"language_score": 0.9491919279098511,
"token_count": 757,
"score": 2.71875,
"int_score": 3,
"uid": "002_4862621_0"
} |
Our Term 1 Curriculum Map is below. Please click here for the Term 1 Timetable.
Please click here for a helpful document which advises what to expect and when with your children's development. BBC Bitesize have created some wonderful resources to help support your little ones get ready for starting school. Please click on the link below to have a look:
The below are links to useful and fun websites and games to further support your child's learning at home. The below website supports with some ideas to help promote early language development at home. | 011_2549121 | {
"id": "<urn:uuid:4370dc6e-0e37-4260-a3d1-af4f1fedbcde>",
"dump": "CC-MAIN-2019-35",
"url": "https://www.cathedralprimaryschool.org/children/reception",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027323067.50/warc/CC-MAIN-20190825042326-20190825064326-00119.warc.gz",
"language": "en",
"language_score": 0.9470499753952026,
"token_count": 115,
"score": 2.59375,
"int_score": 3,
"uid": "011_2549121_0"
} |
|Coccidioidomycosis is a soil dwelling fungi which is especially common in desert areas such as southwestern United States and northwestern Mexico. Coccidioidomycosis can infect the lung and sometimes spread to other organs such as the brain. |
Coccidioidomycosis infections can range from a mild febrile illness to chronic infections to death. Coccidioidomycosis infections are also known as “Valley Fever”. Coccidioidomycosis is a soil fungi, and exposure to dust is associated with higher risk of Coccidioidomycosis infections. Outbreaks of Coccidioidomycosis have been associated with windstorms, earthquakes, military training exercises, hunting trips, and archaeological expeditions. A case series was recently presented of 10 film crew and actors who developed either confirmed (5 cases) or probable (5 cases) Coccdioidomycosis infections following outdoor filming in California. Filming was done in area that underwent soil disruptive work such as digging and grading just prior to the filming. The filming area was also near a dusty mining operation. Five of the affected workers reported dusty conditions during the filming. Five of the cases required emergency room treatment and two of the cases were hospitalized for 2 or 28 days. People working on dusty jobs (such as agriculture or construction) should wear respiratory protection such as particulate respirators or dust masks to reduce risk of Coccidioidomycosis infection. Planting drought-resistant vegetation can reduce airborne dust in many areas. Wetting soil with water prior to digging operations can also reduce airborne dust. Persons living/working in arid areas who develop fever and cough should receive immediate medical attention for diagnosis and treatment of possible Coccidioidomycosis infections. Related Articles and videos | 011_4235397 | {
"id": "<urn:uuid:d873700b-d8ee-4e79-80c1-64f1c17a4497>",
"dump": "CC-MAIN-2019-39",
"url": "https://knowthecause.com/valley-fever-or-coccidioidomycosis-among-a-california-film-crew/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573908.70/warc/CC-MAIN-20190920071824-20190920093824-00010.warc.gz",
"language": "en",
"language_score": 0.9494915008544922,
"token_count": 382,
"score": 3.640625,
"int_score": 4,
"uid": "011_4235397_0"
} |
To the uninitiated, the Ancient Battery of Baghdad looks like a clay jar, albeit an unusual one with an iron rod protruding from its top. To its discoverer, Wilhelm König, the function of the ancient artefact was obvious. It was an ancient Parthian battery. One created centuries before any other known examples. The theory has since been hotly contested in academic circles, with many considering it “debunked”. So, what led König to this conclusion? And was he right? That is the root of the Baghdad Battery mystery. What Is The Baghdad Battery? The Baghdad Battery is actually a nested trio of artefacts. There is the small clay pot which, when found, measured 14cm in height, but would have been taller when it was complete. Its top, broken off, is believed to have been sealed with asphalt. Inside this was a copper cylinder, the second object, which in turn encased the third, an iron rod. The rod would have protruded through the jar’s stopper. The Wilhelm König Battery
The Baghdad Battery is often called the Wilhelm König Battery, after the man said to have discovered it. A painter and archaeologist who would go on to become director of the National Museum of Iraq, König himself provided no details of where, when and how he came across the item. It is generally accepted that the Wilhelm König Battery was found in what is now the locality of Khujut Rabu in the Iraqi capital of Baghdad. However, like much about this artefact, the details are unclear. For example, some think König unearthed it on an excavation in 1936, others that he found it in 1938 in the basement of Iraq’s National Museum.
One of the few facts not in dispute is that it came from somewhere near the site of the ancient royal city of Ctesiphon. However, its date of creation is another story. Ctesiphon was capital of both the Parthian and Sasanian Iranian empires. While König believed it to be a Parthian battery, dating it somewhere between 150 BC and 223 AD, more recent archaeologists have determined it to be Sasanian (224–650 AD). Even at the latter end of this date scale, this would still significantly predate what is considered the first ever description of an electric battery by Alessandro Volta on 20th March 1800. What is certain is that König did publish a paper on the subject, “A galvanic element from the Parthian period? ”, which was featured in the German journal Research and Progress in 1938. This is where he first put forward his theory about the purpose of artefact. So what convinced König that this was in fact an ancient Parthian battery? Was the Baghdad Battery a battery? The core of the Baghdad Battery mystery is whether the artefacts in question made up a battery cell. König, who first posited this theory, did not have any ancient writings on which to base it. To this day, no such records have been found. So, what led him to the Parthian battery conclusion? He might have noted that the artefact had the two metals with different electro potentials. This together with an electrolyte are the main components required to make a battery. In support of this, there is evidence that an ionic solution – an electrolyte – might have been present in the jar. Tests on the corrosion on the item indicates that it probably once contained something like vinegar or wine. Whatever the case, it is true that the Baghdad Battery as described can conduct electricity with the addition of such a solution. Around a volt or so of it. Had there been wires involved, the voltage could have been much higher. In the event that the Baghdad artefact was in fact a battery, there are different ideas as to what it was used for. What Could the Baghdad Battery have Powered? Various uses have been proposed for the Baghdad Battery. Several civilisations have long used forms of electricity in medicine. For example, the Greeks found that placing electric fish on feet helped in pain relief. One suggestion has been that the battery was embedded inside statues of idols, so as to “buzz” followers. A sort of religious magic trick. This was actually tried out on a 2005 documentary. For his part, König believed the battery was used in gilding, the process of coating one metal with another. It’s known that such practices were happening at the time in jewellery making and other activities, but using more primitive methods. He theorised that the battery was developed to allow for the much easier process of electroplating. Critics of this theory point to the fact that there is no evidence of this process at the time or after it. Meanwhile, there is plenty of evidence of other gilding methods, especially mercury residue from its use in the process. One of the main flaws of König’s theory relates to the potency of the Baghdad Battery itself. As it was, it could only produce around a volt of energy. Such low amperage simply couldn’t power very much. Certainly it couldn’t be used for gilding. As for wires increasing the power, none have been found and there is no evidence of ancient wiring knowledge. What’s more, one would need to constantly refill the electrolyte, which would have been incredibly difficult given the apparent asphalt stopper. This would have made it inconvenient. However, the death knell of the theory, say critics, is the lack of any mention of such a device, either at the time or after. Surely such an advancement would have been noted. And, even if not, why was it not used by others or since? If not a Battery, then what? The Scroll Jar Theory
Many believe the vessels of the Baghdad Battery once acted as storage for sacred scrolls. Not only are they visually similar to other examples of such containers at nearby sites such as Tigris, but it was found in a place that contained many such jars. According to this hypothesis, the iron rod would have had the scroll wrapped around it, which was then placed inside the copper tube. König even cited such scroll jars in his paper as being common at digs. An Intriguing Mystery
The idea of an ancient battery is an intriguing one. However, as many point out, just because it could have been a battery, it doesn’t mean it actually was one. And it is far more likely to have been used as scroll storage. To quote Gerhard Eggert’s article, “The Enigmatic Battery of Baghdad” (1996, Skeptoid Magazine):
“In my opinion, the ‘magical container’ hypothesis is much more probable than the ‘power source’ claim. The latter is a ‘mystification by science’ (Thurnshirn 1986) of the object, which violates Occam’s razor. ”
Sadly, there is now a new Baghdad Battery mystery, one that precludes, or at least severely hinders, the solving of the first. In 2003, it was looted from the National Museum during the invasion of Iraq. Today, its whereabouts remain unknown. | 012_249711 | {
"id": "<urn:uuid:69475731-4476-41a2-b94f-a92d2f8b4455>",
"dump": "CC-MAIN-2022-49",
"url": "https://www.discoveryuk.com/mysteries/the-mystery-of-the-baghdad-battery/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446709929.63/warc/CC-MAIN-20221126212945-20221127002945-00753.warc.gz",
"language": "en",
"language_score": 0.9776312708854675,
"token_count": 1521,
"score": 3.328125,
"int_score": 3,
"uid": "012_249711_0"
} |
Exploring the Magic of Thorium Energy
At the end of this effort, we will have destroyed our 100 tonnes of highly-enriched uranium from weapons. We will have destroyed our 100 tonnes of weapons-grade plutonium from decommissioned weapons. We will have destroyed the 700 tonnes of plutonium and other actinides in the spent nuclear fuel. We will have essentially eliminated the issue of spent nuclear fuel as a concern. We will have replaced the coal and gas electrical generation in the country. We will have added enough additional electrical generation to the nation’s grid to power electric cars rather than gasoline-powered ones. We’ll have cleaner air. We’ll have cleaner water. We’ll keep hundreds of billions of dollars in our country because we’ll be energy-independent. And we will have solved the energy crisis permanently. Kirk Sorensen wants to shift energy production away from fossil fuels toward a sustainable method of nuclear fission based upon thorium. Thorium is three times more plentiful than uranium, is less prone to being used for nuclear weapons proliferation, and can be used sustainably while burning up dangerous weapons-grade nuclear materials, and potentially hazardous nuclear waste from more conventional fission plants. All of this is unlocked by the fundamental properties of thorium. We can make it happen. May we have the wisdom to do so. _KirkSorensen
accelerator driven nuclear reactors, can be utilised in liquid fluoride thorium reactors, and now comes news that a company called Thorium One is developing a thorium - plutonium - MOX fuel that can be used in "existing infrastructure for nuclear reactors. "
The Vancouver, Canada-based company is attempting to fund the development of a new fuel design—called Thorium Plutonium MOX—that it says can be used in existing infrastructure for nuclear reactors in the production of nuclear energy that does not create bomb-usable waste. There are currently 440 nuclear reactors operating in the world with uranium-based nuclear energy (see Nuclear power is green power, says expert). . . . The company is on a mission to become an integrated international nuclear fuel company, developing its product for nuclear utilities using the chemical element thorium, instead of uranium. “Thorium can be used as a nuclear fuel that can act as a supplement to uranium in nuclear reactors,” he said. The waste product of the thorium fuel cycle, uranium-233, can be separated and reprocessed or recycled for use in new fuel, Thorium One said. _CleanTech_via_NextBigFuture
Kirk Sorensen's website, Energy from Thorium (EfT). The archives of EfT are loaded with well written tutorials on various aspects of thorium power. The sidebar has links to useful videos, articles, websites, books, and piles of PDF documentation dealing with thorium energy and other aspects of nuclear energy. Thorium offers an opportunity to turn weapons and waste into useful and abundant, clean, sustainable energy. Why haven't we heard more about Thorium from our government, our news media, our thought leaders in academia and punditry, and the rest of the "leading lights" of society? | 010_5423121 | {
"id": "<urn:uuid:1753359c-0769-498e-938c-2d5d25d76ced>",
"dump": "CC-MAIN-2016-50",
"url": "http://alfin2300.blogspot.com/2010/04/exploring-magic-of-thorium-energy.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698543577.51/warc/CC-MAIN-20161202170903-00296-ip-10-31-129-80.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9113743305206299,
"token_count": 661,
"score": 2.96875,
"int_score": 3,
"uid": "010_5423121_0"
} |
Understanding Nasal Anatomy: Outside View
Why does your nose look the way it does? And what goes on inside a nose to let a person breathe easily? Learning the anatomy of the nose can help you better understand the answers to these questions. The outside view
One way to tell if a nose fits well with a face (aesthetics) is to divide the face into equal thirds. The nose should fit within the middle third. Then, thinking of the nose as a triangle can help you see the best size and shape for the nose. From the front. Imagine a triangle starting at the top of your nose and extending to the outer corners of your mouth. Does your nose fit inside that triangle? The nose itself should also be shaped like a triangle and balance with the length and width of your face. From the side. Imagine a triangle with one side extending along the bridge of the nose and another extending out from the base of the nose. Does your nose fit within this triangle? The tilt of the tip should also balance with the forehead and chin. From beneath. The nostrils and tip of the nose should also form a triangle. © 2000-2017 The StayWell Company, LLC. 800 Township Line Road, Yardley, PA 19067. All rights reserved. This information is not intended as a substitute for professional medical care. Always follow your healthcare professional's instructions. | 003_552089 | {
"id": "<urn:uuid:afa58d84-ce39-4d6d-a1f2-31535a36df3f>",
"dump": "CC-MAIN-2018-05",
"url": "http://princetonhcs.kramesonline.com/HealthSheets/3,S,89971",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084888041.33/warc/CC-MAIN-20180119144931-20180119164931-00090.warc.gz",
"language": "en",
"language_score": 0.9352928996086121,
"token_count": 284,
"score": 3.09375,
"int_score": 3,
"uid": "003_552089_0"
} |
The United States officially informed the United Nations it will be withdrawing from the Paris Climate Agreement in a document issued on Friday.
The State Department also said in a press release that the United States would continue to participate in United Nations climate change meetings during the withdrawal process, which is expected to take at least three years. “The United States supports a balanced approach to climate policy that lowers emissions while promoting economic growth and ensuring energy security,” the department said in the release. The deal came to a stand still after President Donald Trump announced his decision to withdraw saying the accord would have cost America trillions of dollars. Also read: Nokia 8 Images Leaked Online
He also emphasised that the deal would have killed a great number of jobs, and could negatively impact the oil, gas, coal and manufacturing industries. The US however, says its still open to renegotiating the deal which hasn’t settled well with the other countries and leaders who said that would be impossible. A good number of business leaders have considered Trump’s withdrawal as a blow to international efforts to combat climate change, and a missed opportunity to capture growth in the emerging clean energy industry. Allan Bangirana is a freelance writer for Newslibre & CEO of Innovware startup project. He is passionate about tech, games and entertainment. He also enjoys writing about anime and many other topics. | 004_4884697 | {
"id": "<urn:uuid:594e428b-d243-4554-9e59-334538a53ccf>",
"dump": "CC-MAIN-2018-13",
"url": "https://spur.innovware.net/news/us-quits-paris-climate-change-deal/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257645248.22/warc/CC-MAIN-20180317155348-20180317175348-00163.warc.gz",
"language": "en",
"language_score": 0.9746149778366089,
"token_count": 282,
"score": 2.53125,
"int_score": 3,
"uid": "004_4884697_0"
} |
On May 29, 1953, New Zealand mountaineer Edmund Hillary and Nepalese Sherpa mountaineer Tenzing Norgay became the first climbers confirmed as having reached the summit of Mount Everest at 29,028 ft. , the highest place on earth. Sir Edmund Hillary Biography – A web page devoted to Sir Edmund Hillary at the Academy of Achievement, a living history museum that brings students face-to-face with the extraordinary leaders, visionaries, and pioneers who have helped shape our world. Hillary: A Photo History – This student activity is part of the Hillary Conquers Everest Series. It includes maps, photo histories, interview transcripts and a teacher’s guide. Imaging Everest – The online version of the Imaging Everest exhibition enables people all over the world to view a remarkable collection of photographs from the Royal Geographical Society’s approximately 20,000 photographs taken on nine Mount Everest Expeditions between 1921 and 1953. These images show the landscape and people of the Himalayan region and tell the story of those involved in the first attempts to climb Everest. | 005_5390986 | {
"id": "<urn:uuid:ac472dee-3e43-407c-8182-7375c2ff8afd>",
"dump": "CC-MAIN-2018-22",
"url": "http://www.homeschoollibrary.info/2012/05/29/mount-everest-summit-reached-by-edmund-hillary/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794865468.19/warc/CC-MAIN-20180523082914-20180523102914-00521.warc.gz",
"language": "en",
"language_score": 0.915972888469696,
"token_count": 220,
"score": 3.03125,
"int_score": 3,
"uid": "005_5390986_0"
} |
The Red-crested Cardinal (Paroaria coronata) is a bird species in the tanager family (Thraupidae). It was formerly placed in the Emberizidae, and notwithstanding its common name, it is not very closely related to the true cardinals (family Cardinalidae). It is found in northern Argentina, Bolivia, southern Brazil, Paraguay and Uruguay. Its natural habitats are subtropical or tropical dry shrubland and heavily degraded former forest. Among other regions, it is found in southern part of the Pantanal.
It has also been introduced to Hawaii and Puerto Rico. In Brazil, it has been introduced to various places outside its historical range, as in the Tietê Ecological Park in São Paulo, alongside with its very similar-looking close relative, the Red-cowled Cardinal (P. dominicana). The Yellow-billed Cardinal (P. capitata) could also be easily confused with the Red-crested Cardinal; both the Red-cowled and Yellow-billed have a very short crest that is not visible except in excited birds, and in the case of the latter also a black throat, darker upperparts and a bright yellow bill. The character Pedro (spoken by will. i.am) in the 2011 animated film Rio is unmistakably a Red-crested Cardinal, with the species' tell-tale features of a long crest, grey upperparts, red throat and greyish bill. - ^ www. ceo. org. br/parqu/tiete. htm | 004_556101 | {
"id": "<urn:uuid:28af26fa-56bc-4030-9612-54feb7f966f9>",
"dump": "CC-MAIN-2015-06",
"url": "http://eol.org/data_objects/13321280",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422121478981.94/warc/CC-MAIN-20150124174438-00142-ip-10-180-212-252.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9499605298042297,
"token_count": 326,
"score": 3.078125,
"int_score": 3,
"uid": "004_556101_0"
} |
Public menorah displays for Chanukah date back to the mid-70s in the US, with the first public menorah in 1974 in Philadelphia and then another much, much larger one in 1975 in San Francisco, both part of the CHABAD movement. In more recent times families, synagogues, and communities have begun to build oversized menorahs with children’s participation. Whether this is a manifestation of an attempt to build and create a large holiday decoration at least equal in size to the Christmas trees we see around us is a moot point. It’s enough to happily proclaim: “We are Jews. It’s Chanukah! This is fun! This menorah, this ‘Hanukkiah’ is ours and we are proud of it and ourselves. ”
The creative aspects of this are astounding, with the materials as varied as one can imagine, using whatever’s around the house, or around Home Depot. Whatever is the ‘toy of the year’ with the capability of infusing the creation with color and light, and with the help of all hands capable of participation – that works, too. If, on Sukkot, all hands can decorate the sukkah, so too on Chanukah the Hanukkiah can be created by young and old alike. There is noting like experiential education to encourage and add spark to any learning. What a brainstorm, when architect, Stephen Schwartz, of Livingston, NJ, thought of using LEGO building blocks as the perfect material for a large group model building activity, in this case — a giant, Giant, GIANT, menorah! One that could be assembled with some planning and direction in a relatively short amount of time, and even taken apart in a very short amount of time. As Schwartz explained to me this past Sunday morning at Temple Beth Torah in Westbury, NY, this idea came to him eighteen years ago. His daughter, then a second grade teacher, invited him to her class to discuss architectural models. He realized that the 3D aspect which LEGO could provide, aided learning. That “AHA” moment was given a new twist when he combined it with Jewish learning. He has been invited to create and build giant menorahs with students up and down the east coast of the US ever since. I also learned that via BUILDING BLOCKS WORKSHOPS Stephen Schwartz offers several architectural programs, including secular options, such as the designing of historic towns and the architecture of a community, and also including those with Jewish themes: Jerusalem, Masada, Beit Hamikdosh, the Warsaw Ghetto, Shushan Purim, and this one – building the tallest LEGO Menorah. Heads up: Ours today, just about 13’ 6” tall! Hands on experiences such as this, prove that Jewish education is alive and well, despite studies to the contrary, and despite negative influences on all education by Common Core standards. What I witnessed on Sunday was … just AWESOME! Close to 50 students in the Hebrew School, and some parents, perhaps some grandparents too, and younger siblings sat around tables, and on the floor. With buckets and buckets of LEGO blocks, all provided by Stephen Schwartz as part of the program, the students were challenged to work in teams and to design and create platforms of a certain size and shape which, when locked together, could serve as the GIANT tower on which a magnificent menorah would be added within the two hour time frame. They eagerly took on the challenge! I did not see even one child uninvolved! In groups, they planned their LEGO masterpieces. Some Magen David paper patterns were provided to include within the LEGO building, but some groups just planned their finished products around some color scheme. Not even the tables in the back of the room holding the various games and prizes awaiting a raffle drawing enticed the children! Not even the scent of carb filled latkes and other goodies filling the air called to them. They were ENGAGED! Visible in the sanctuary, was a very intricately designed Hanukkiah waiting patiently on a table. A magnificent model, approximately 4’ tall and 5’ wide, it sat there brought in advance. I tentatively tested it. Whew! The LEGO blocks, 4,000 in this model alone, were very tightly held together; the entire piece needed careful handling! On the bimah, a huge ladder stood open, awaiting this final product’s raising and installation as the crown atop the students’ LEGO towers. Like a conductor in front of an orchestra, Schwartz moved about the groups, encouraging, helping, suggesting, explaining. Each team knew what it was after, and hurried to comply with a finished product, proudly carrying theirs towards the bimah as the time grew shorter. Rabbi Katz and Cantor Fleigelman stood off to the side, observing from afar, as did the Hebrew School teachers and members of the Mens Club, which sponsored the event. This was the children’s important work and the children knew it! I chatted with the synagogue president for a few minutes who remarked, “This guy is as in demand as a mohel! ” I could see why. Then it was the final moment! The various Hanukkiah bases were completed and placed on the bimah. First, a wide base of LEGO bases formed the bottom layer and then Schwartz carefully mounted the ladder adding section to section to section, climbing higher and higher, the tower created by interlocking all the groups’ LEGO creations. It was so enjoyable to view each team’s unique tower section, the LEGO colors defining the pattern the students had created. The diversity of the individual patterns distinct and beautiful, just as we see among the Jewish people of the world. All heads turned upwards as the magnificent LEGO Hanukkiah previously constructed was lifted and affixed to the top of the tall tower, its two wax candles ready to light for the first eve of Chanukah. Ooohs and ahhs were heard. Rightly so. Schwartz lit the candles, Cantor Fleigelman led all in song and prayer. I dare say that those participating will remember this GIANT Hanukkiah and their part in its creation. We proclaimed that we are Jewish and it is our holiday! We rejoice in the realization that we do not have to pray or play dreidel in secret cellars as did the Jews of Spain, as a diversion to the authorities during the times of the Spanish Inquisition.
All that work required deconstruction, so that Stephen and his wife, Bunny, could take this magnificent event on the road to the next venue on their schedule. While a few adults helped and took all the tower structures apart and Stephen packed up the Hanukkiah top section, the children enjoyed their well-earned latke lunch. What a start to Chanukah! I may become a groupie and follow this show on the road. The ‘ruach’ was infectious. Stephen Schwartz can be reached at: BUILDING BLOCKS WORKSHOPS. There’s always next Chanukah or a piece of Jewish history for students to more fully explore through architecture and hands on learning. | 012_1744927 | {
"id": "<urn:uuid:ce10c046-8d25-4723-a2d8-0208875b81b3>",
"dump": "CC-MAIN-2017-17",
"url": "http://blogs.timesofisrael.com/let-the-giant-menorah-building-begin-its-chanukah/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122992.88/warc/CC-MAIN-20170423031202-00468-ip-10-145-167-34.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9666315913200378,
"token_count": 1507,
"score": 2.53125,
"int_score": 3,
"uid": "012_1744927_0"
} |
Silicene Transistors Emerge as an Alternative to Graphene – Could Succeed Silicon
Graphene is an amazing substance, truly the wonder material, albeit with one caveat. As the famous saying goes “Graphene can do anything, except make it out of the lab”. Because of its planar nature and highly reactive edges, correct application of Graphene remains a dilemma that scientists have yet to solve but in the mean time researchers at University of Texas Cockrell’s School of Engineering have come up with an alternative to Graphene that appears to be in the same league as the former – Silicene.
Image courtesy of Extremetech.com
Silicene transistors could replace silicon in computing
Ofcourse the problem isn’t as simple as simply being able to manipulate graphene, there is a very fundamental problem with Graphene computing namely that of the band gap. Simply put, graphene has serious problems not-conducting current, which is something that is utterly essential in making transistors. While there have been breakthroughs in creating this off-state in the past, they still require alot more work. The other option is reinventing computing from the ground up – something not really feasible for the short run. Silicene was proven to exist only as late as 2010, and is currently one of the top contenders along with the delightfully controversial hemp based transistors. Silicon is actually pretty similar to carbon in nature and lies just alongside it on the periodic table. It is infact one of the alternative base for life to exist elsewhere in the universe. And best of all, it appears to have the coveted band gap. That means that it is possible to put silicene in a state where electricity is not flowing. “Apart from introducing a new player in the playground of 2D materials, silicene, with its close chemical affinity to silicon, suggests an opportunity in the road map of the semiconductor industry,” “The major breakthrough here is the efficient low-temperature manufacturing and fabrication of silicene devices for the first time. ” – Deji Akinwande
There is however a very slight problem (read: crippling flaw) with silicene currently. It degrades under oxygen extremely quickly. While that is almost a negligible concern for high end applications, this will make it more or less unfeasible for mainstream products unless they can develop a coating capable of keeping oxygen out (it currently degenerates well under 2 minutes). Akiwande hopes to apply his successful research into germanene also (which degrades in a few hours). It remains to be seen which material will win the race for the future of computing. Silicene is quite possibly the top contender but my hunch remains with Graphene. | 004_4900703 | {
"id": "<urn:uuid:6d56ea97-3b92-45d5-9ad0-bbac298701d0>",
"dump": "CC-MAIN-2018-13",
"url": "https://wccftech.com/silicene-transistors-emerge-alternative-graphene-succeed-silicon/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647519.62/warc/CC-MAIN-20180320170119-20180320190119-00777.warc.gz",
"language": "en",
"language_score": 0.9593619108200073,
"token_count": 573,
"score": 3.15625,
"int_score": 3,
"uid": "004_4900703_0"
} |
NOAA Public Affairs Monica Allen - 301-734-1123
NWS Public Affairs Susan Buchanan - 301-713-0622
When using information from this page, please credit NOAA / PMEL / NOAA Center for Tsunami Research
The South Java tsunami was generated by a Mw 7. 7 earthquake (9. 222°S 107. 320°E), 2006-07-17 08:19:28 UTC, 230 km (145 miles) NE of Christmas Island (according to the USGS). A preliminary simulation of 07/17/06 South Java event was performed with available seismic data. The earthquake origin is located at 107. 263 deg (lon), -9. 295 deg (lat). A 100x50 Km source is ruptured during the simulation with a slip amount of 2 meters. The fault 's Dip, Rake and Strike angles were 7, 67 and 270 deg respectively. The earthquake source was located 10 Km deep. The image shows tsunami radiation pattern with color coded information about the max wave height at different locations throughout the Indian Ocean.
The following animation displays qualitative information about the tsunami propagation including tsunami wave interaction with ocean floor bathymetric features, and neighboring coastlines. The timer displays time elapsed since time of the earthquake, providing an estimate of tsunami arrival time at different locations. Wave propagation animation (small version -- 2 MB)
Wave propagation animation (large version -- 67MB)
Unit Sources: 2. 0*io41a
Need a file viewer/reader? | 008_4126608 | {
"id": "<urn:uuid:b809cc46-5398-46c5-bca1-eb2b363b2661>",
"dump": "CC-MAIN-2016-26",
"url": "http://nctr.pmel.noaa.gov/java20060717.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395039.24/warc/CC-MAIN-20160624154955-00152-ip-10-164-35-72.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.8837361931800842,
"token_count": 314,
"score": 2.625,
"int_score": 3,
"uid": "008_4126608_0"
} |
WATER AND CHO ARE EQUALLY PREFERABLE DURING A 2-HOUR PRACTICE
Herm, L., Ficek, S., Simmons, D., Olson, A., & Bacharach, D. (2001). How effective is a sport drink in enhancing performance of football practice drills? Medicine and Science in Sports and Exercise, 33(5), Supplement abstract 1452. This study assessed the effect of carbohydrate consumption during football practice on selected skills. Ss (N = 67) completed two practice sessions one week apart during similar environmental conditions and with equivalent program content. Skills were sprint-agility and a 160-yd cross-field shuttle. Ss were given a bottle of fluid of either CHO or water. A post-practice recall of perceived rating of exertion during the skills was recorded. There were no differences in performances, RPE, fluid consumption, or preference for type of fluid. After practice, flavored drinks were preferred. Implication. Commercial fluids or water are adequate fluid replacement forms during a 2-hour football practice session. Return to Table of Contents for this issue. | 008_6100659 | {
"id": "<urn:uuid:69ff572a-263d-4173-8b1f-6b851770a54b>",
"dump": "CC-MAIN-2016-22",
"url": "http://coachsci.sdsu.edu/csa/vol102/herm.htm",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049282327.67/warc/CC-MAIN-20160524002122-00148-ip-10-185-217-139.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9469153881072998,
"token_count": 229,
"score": 2.53125,
"int_score": 3,
"uid": "008_6100659_0"
} |
1789 Essay on the Pennsylvania Deitsch, Part 3
In the first and second parts of the essay, An Account of the Manners of the German Inhabitants of Pennsylvania, Benjamin Rush proposed a list of the key characteristics of Pennsylvania’s Deitsch citizens. He then went on to discuss their various religious practices and denominations. Below is the third and final part of Rush’s account. It begins by concluding the description of Deitsch religious sects and ends with a message to legislators regarding the important contributions of these people to the newly formed United States.
An Account of the Manners of the German Inhabitants of Pennsylvania
The German Moravians are a numerous and respectable body of Christians in Pennsylvania. In their village of Bethlehem, there are two large stone buildings where the different sexes are educated in the habits of industry in useful manufactures. The sisters (for by that epithet the women are called) all sleep in two large and neat apartments. Two of them watch over the rest, in turns every night, to afford relief from those sudden indispositions which sometimes occur in the most healthy persons in the hours of sleep. It is impossible to record this fact without pausing a moment to do homage to that religion, which produces so much union and kindness in human souls. The number of women who belong to this sequestered female society amounts sometimes to 120 and seldom less than 100. It is remarkable that notwithstanding they lead a sedentary life and sit constantly in close stove rooms in winter, that not more than one of them upon an average dies in a year. The disease which generally produces this annual death is the consumption. The conditions and ages of the women of the village, as well as of the society that has been mentioned, are distinguished by ribbons of a peculiar kind which they wear on their caps: the widows, by white; the married women, by blue; the single women, above 18 years of age, by pink; and those under that age, by a ribbon of a cinnamon color. Formerly this body of Moravians held all their property in common in imitation of the primitive Christians. But, in the year 1760, a division of the whole of it took place, except a tavern, a tanyard, 2000 acres of land near Bethlehem, and 5000 acres near Nazareth – a village in the neighborhood of Bethlehem. The profits of these estates are appropriated to the support and propagation of the gospel. There are many valuable manufactures carried on at Bethlehem. The inhabitants possess a gentleness in their manners which is peculiarly agreeable to strangers. They inure their children of five and six years old to habits of early industry. By this means they are not only taught those kinds of labor which are suited to their strength and capacities, but are preserved from many of the hurtful vices and accidents to which children are exposed. The Swingfielders are a small society. They hold the same principles as the Friends, but they differ from them in using psalmody in their worship. The German Catholics are numerous in Philadelphia, and have several small chapels in other parts of the state. There is an incorporated charitable society of Germans in Philadelphia, whose objects are their poor or distressed countrymen. There is likewise a German society of laborers and journeymen mechanics who contribute 2 shillings 6 pennies eight times a year towards a fund, out of which they allow 30 shillings a week to each other’s families when the head of it is unable to work; and 71 pounds 10 shillings to his widow as soon as he is taken from his family by death. The Germans of Pennsylvania, including all the sects that have been mentioned, compose nearly one third part of the whole inhabitants of the state. The intercourse of the Germans with each other is kept up chiefly in their own language; but most of their men who visit the capital and the trading or county towns of the state speak the English language. A certain number of the laws of the state are now printed in German, for the benefit of those of those who cannot read English. A large number of German newspapers are likewise circulated through the state, by which knowledge and intelligence have been diffused much to the advantage of the government. There is scarcely an instance of a German of either sex in Pennsylvania who cannot read; but many of the wives and daughters of the German farmers cannot write. The present state of society among them renders this accomplishment of little consequence to their improvement or happiness. If it were possible to determine the amount of all the property brought into Pennsylvania by the present German inhabitants of the state and their ancestors and then compare it with the present amount of their property, the contrast would form such a monument of human industry and economy as has seldom been contemplated in any age or country. I have been informed that there was an ancient prophecy which foretold, that “God would bless the Germans in foreign countries. ” This prediction has been faithfully verified in Pennsylvania. They enjoy here every blessing that liberty, toleration, independence, affluence, virtue, and reputation can confer upon them. How different is their situation here from what it was in Germany! Could the subjects of the princes of Germany, who now groan away their lives in slavery and unprofitable labour, view from an eminence in the month of June the German settlements of Strasburg or Manheim in Lancaster county, or of Lebanon or Bethlehem in the counties of Dauphin and Northampton. Could they be accompanied on this eminence by a venerable German farmer and be told by him that many of those extensive fields of grain, full-fed herds, luxuriant meadows, orchards promising loads of fruit, together with the spacious barns, and commodious stone dwelling houses, which compose the prospects that have been mentioned, were all the product of the labor of a single family and of one generation; and that they were all secured to the owners of them by certain laws. I am persuaded that no chains would be able to detain them from sharing in the freedom of their Pennsylvania friends and former fellow subjects. “We will assert our dignity” – (would be their language) – “we will be men – we will be free – we will enjoy the fruits of our own labors – we will no longer be bought and sold to fight battles in which we have neither interest nor resentment – we will inherit a portion of that blessing which God has promised to the Germans in foreign countries – we will be Pennsylvanians.”
I shall conclude this account of the manners of the German inhabitants of Pennsylvania by remarking that if I have failed in doing them justice, it has not been the fault of my subject. The German character once employed the pen of one of the first historians of antiquity – I mean the elegant and enlightened Tacitus. It is very remarkable that the Germans in Pennsylvania retain in a great degree all the virtues which this author ascribes to their ancestors in his treatise De moribus Germanorum. They inherit their integrity, fidelity, and chastity. But Christianity has banished from them their drunkenness, idleness, and love of military glory. There is a singular trait in the features of the German character in Pennsylvania which shows how long the most trifling custom may exist among a people who have not been mixed with other nations. Tacitus describes the manner in which the ancient Germans built their villages in the following words: “Suam quisque domum spatiis circumdat sive adversus casus ignis remedium, sive inscitia aedificandi. ” [Translation: Each man leaves a space between his house and those of his neighbors, either to avoid the danger from fire or from unskillfulness in architecture. ]
Many of the German villages in Pennsylvania are constructed in the same manner. The small houses are composed of a mixture of wood, brick, and clay, neatly united together. The large houses are built of stone and many of them after the English fashion. Very few of the houses in Germantown are connected together. Where the Germans connect their houses in their villages, they appear to have deviated from one of the customs they imported from Germany.
CITIZENS of the United States! Learn from the account that has been given of the German inhabitants of Pennsylvania, to prize knowledge and industry in agriculture and manufactures, as the basis of domestic happiness and national prosperity. LEGISLATORS of the United States! Learn from the wealth and independence of the German inhabitants of Pennsylvania, to encourage by your example and laws the republican virtues of industry and economy. They are the only pillars which can support the present constitution of the United States.
LEGISLATORS of Pennsylvania! Learn from the history of your German fellow citizens that you possess an inexhaustible treasure in the bosom of the state, in their manners and arts. Continue to patronize their newly established seminary of learning and spare no expense in supporting their public free schools. The vices which follow the want of religious instruction among the children of poor people lay the foundation of most of the jails and places of public punishment in the state. Do not contend with their prejudices in favor of their language: it will be the channel through which the knowledge and discoveries of one of the wisest nations in Europe may be conveyed into our country. In proportion as they are instructed and enlightened in their own language, they will become acquainted with the language of the United States. Invite them to share in the power and offices of government: it will be the means of producing a union in principle and conduct between them and those of their enlightened fellow citizens who are descended from other nations. Above all, cherish with peculiar tenderness those sects among them who hold war to be unlawful. Relieve them from the oppression of absurd and unnecessary militia laws. Protect them as the repositories of a truth of the gospel, which has existed in every age of the church and which must spread hereafter over every part of the world. The opinions respecting the commerce and slavery of the Africans, which have nearly produced a revolution in their favor in some of the European governments, were transplanted from a sect of Christians in Pennsylvania. Perhaps those German sects of Christians among us, who refuse to bear arms for the purpose of shedding human blood, may be preserved by divine providence as the center of a circle, which shall gradually embrace all the nations of the earth in a perpetual treaty of friendship and peace. | 010_7172345 | {
"id": "<urn:uuid:2273abd8-a7ba-475f-b887-744664f03e86>",
"dump": "CC-MAIN-2022-27",
"url": "https://www.hagenbuch.org/1789-essay-pennsylvania-deitsch-part-3/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104189587.61/warc/CC-MAIN-20220702162147-20220702192147-00119.warc.gz",
"language": "en",
"language_score": 0.9752122163772583,
"token_count": 2143,
"score": 3.25,
"int_score": 3,
"uid": "010_7172345_0"
} |
The right hand rule can be used to determine the direction
of the vector
resulting from any
application of the cross product
To use the magnetic portion of the Lorentz Force equation as an example:
F=q(U ⊗ B)
Then, positioning your hand as described above by Withnail, your thumb points in the direction of U, your index finger points in the direction of B, and your middle finger points in the direction of F.
Similarly, then, if we have any equation of the form:
Z=X ⊗ Y
Then X is your thumb, Y is your index finger, and Z is your middle finger. In fact, the rectangular coordinate system most commonly used is defined by this very relation: use the equation above, and you can see that the positive x axis, the positive y axis, and the positive z axis follow this rule, where each axis is one of the vectors X Y Z, respectively. (In a right-handed coordinate system, of course. )
More generally, however, your thumb and index finger define a plane, to which your middle finger points perpendicular. This is to say that, while in many applications of the right hand rule the vectors represented by the index finger and thumb are perpendicular, they need not be at a right angle before you can successfully use the right hand rule. Remember: DO NOT USE YOUR LEFT HAND. Trust me, it doesn't work too well to use the left hand rule when you need to use the right one (which is always, AFAIK), and you'd be surprised as to how easy it is to do this without thinking about it. ;^)
Also, there are two other ways to interpret your hand when it is in this position, both ways are also correct:
If your index finger is X, then your middle finger is Y, and your thumb is Z.
If your middle finger is X, then your thumb is Y, and your index finger is Z.
Here are a few (bad, sorry) diagrams that may help. Note that in each, X, Y, and Z all proceed counterclockwise around the diagram, and, in the diagram, the thumb always points to the right, the index finger always points up, and the middle finger always points toward you (with your palm facing you, of course):
index Y X Z
|_ thumb |_ X |_ Z |_ Y
/ / / /
middle Z Y X | 010_2830400 | {
"id": "<urn:uuid:776c1ca5-f603-4855-8a0a-a5dac09111cd>",
"dump": "CC-MAIN-2017-04",
"url": "http://everything2.com/title/right+hand+rule",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280504.74/warc/CC-MAIN-20170116095120-00112-ip-10-171-10-70.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9300386905670166,
"token_count": 516,
"score": 3.953125,
"int_score": 4,
"uid": "010_2830400_0"
} |
By Proven Winners® ColorChoice®, adapted from The Planter Hunter, by Tim Wood
Photographs courtesy of Proven Winners® ColorChoice®
Boxwood, because of its functionality and deer resistance, is one of the most utilized landscape plants in the world. Unfortunately, boxwood blight, a lethal disease caused by the fungus Calonectria pseudonaviculatum, is threatening this iconic shrub. The disease, well established in Europe, has crossed the big pond and is now killing boxwood in North America.
In the fall of 2011, boxwood blight was detected in North Carolina and Connecticut. Since then, it has been found in Alabama, Delaware, Florida, Georgia, Kentucky, Kansas, Massachusetts, Maryland, Missouri, New Jersey, New York, Ohio, Pennsylvania, Oregon, Tennessee, Virginia, West Virginia and most recently, in Michigan. The fungus is spread by the transport of infected plants, and from infected plants to healthy plants via hedge shears, animals, and human touch. It is a slow but methodical spread that continues to widen. With that spread, plant breeders and researchers have been working to solve this problem. One of the simplest solutions is to use alternative plants that have the same utility as boxwood but are unaffected by the disease. Fortunately, there are species that have great potential to be suitable boxwood substitutes. Species that have the same small, broad, evergreen leaves and dense branching that responds well to being sheared into hedges, globes, and spires. Inkberry holly (Ilex glabra) is an Eastern North America native evergreen that is hardy in zones 5-9. Typically, it is a large plant maturing at 5-6 feet in height. It grows best in moist acid soils, but is adaptable to most average garden soils. Rutgers University lists it as moderately deer resistant, being seldom severely damaged by deer. Recently two new smaller selections have been introduced that look and behave like boxwood. The first selection is called Gem Box® Ilex glabra. Gem Box® inkberry has extremely dense branching, small glossy leaves, but most importantly, unlike many generic versions of the species, it retains its lower foliage as it ages, making it an excellent replacement for boxwood. In the spring, with the initial flush of growth, the foliage exhibits an attractive cast of reddish-burgundy coloration. In the spring, if you look closely, you will find that it has small white flowers, and if you have a male pollinator nearby, you will also get small black fruit later in the summer. Neither the flowers nor the fruit are very noticeable. While the plants are naturally dense and rounded in habit, it responds wonderfully to pruning and can be sheared in globes or hedges with round or squared off edges. Another native evergreen selection is Strongbox® Ilex glabra. It grows as a broadly rounded mound, and keeps its leaves all the way to the ground for a lush, dense look. It can be pruned or shaped as desired, or left to attain its neat natural shape. It's also much faster growing than boxwood, and offers good deer resistance, too. This brand new variety will be available in better garden centers in Spring 2019. And now for something completely different: Juke Box® × Pyracomeles. This remarkable new broadleaf evergreen could easily be mistaken for boxwood. This new plant comes without the threat of boxwood blight because it is an intergeneric hybrid between Pyracantha and Osteomeles. It has no thorns, no flowers and like boxwood, can be sheared and shaped as desired. It is similar to 'Morris Midget' boxwood but with much faster growth. When left unpruned, it forms a thick, mounded evergreen mat, but with a little bit of shearing, it can be formed into a ball, box, or a low hedge. While hardiness on this new cultivar is still being tested, it is listed as hardy down to USDA zone 7, but may be hardy to zone 6 and perhaps even zone 5b. While plant pests and diseases can be disruptive, they can also force us to think creatively and can bring new opportunities. There are so many beautiful and useful plant species in the world, so we have lots of choices. When it comes to replacing boxwood these three selections fit the niche. All articles are copyrighted and remain the property of the author. | 010_2528527 | {
"id": "<urn:uuid:1c76809c-8ff0-4a4f-afaa-06d74aab3ecf>",
"dump": "CC-MAIN-2019-22",
"url": "https://www.gardensmart.tv/?p=articles&title=3_Great_Boxwood_Alternatives",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232259452.84/warc/CC-MAIN-20190526185417-20190526211417-00393.warc.gz",
"language": "en",
"language_score": 0.9534438848495483,
"token_count": 928,
"score": 2.59375,
"int_score": 3,
"uid": "010_2528527_0"
} |
Too many young adults who are already out of school have low levels of financial knowledge so we, as a society, need to come up with other alternatives. Employers could offer financial literacy programs or at least provide resources to help young people avoid some of these costly mistakes. Schools should offer basic financial planning classes. If nothing else, the recession has made us brutally aware of what we don’t know. Here are some of the more common, and costly mistakes, and ways that people can avoid them. 1. Not having an emergency fund. Experts recommend that everyone have a three-month emergency fund—at least. You never know when you’re going to get a flat tire or a leaky pipe—emergencies that happen all of the time but that can become very costly if you’re not ready for them. Having to borrow money on a high interest credit card can cost you hundreds in wasted interest payments. What happens if you lose your job and have to dip into your emergency fund? First, don’t stress. It’s ok to use the emergency fund for rent or food—for needs. It’s not such a good idea to use it for that pair of shoes you really want or a night on the town. During a recession it can be hard to have and maintain an emergency fund. That’s ok, as long as you save what you can. 2. Slow leakers. These are the people who spend money on bottled water and daily Starbucks runs. The people who use their debit card for everything, no matter how small, and then forget to include the little things when they balance their bank account or budget. Even that $2 coffee can lead to overdraft fees. 3. Bad budgeters. These are the people who forget about certain expenses and therefore don’t budget for then. Or, they don’t budget at all, then wonder why they don’t have any money. 4. Minimum wagers. Paying just the minimum on your credit card is another expensive mistake. The bigger the balance, the longer it will take you to pay off and the more you will pay in interest. If possible, only use your credit cards for emergencies and pay off the entire balance on time. If that’s not possible, pay off as much as you can each month. 5. Plastic life. Living off a credit card is one of the worst money mistakes that you can make. If you are living off your credit card this probably means that you are spending more than you’re earning, a big budgetary no-no. If you are out of work and out of money you may have to live off your credit card for a while, but, in this case, you should really tighten your belt and spend as little money as possible. In addition, try to find a credit card with a low interest rate. A credit card is like a loan, meaning that the money will have to be paid back, with interest. 6. No doggy bag. It is possible to have some money leftover from a college or personal loan. As tempting as it may be do not use this money for anything other than paying back what you borrowed. Loans have to be repaid. The longer it takes to repay them the more money you’re going to end up paying in interest. Instead of spending any leftover loan money, simply use it to pay back what you have borrowed. In fact, it’s a good idea to make a loan repayment plan and begin paying back your loan as soon as you possibly can. 7. Too much, too young. Many young people make the mistake of thinking that they need to build credit while they are still in college. While it is always good to have good credit, it is not always necessary to have credit at all. Remember, it’s a lot easier to turn your credit bad than to keep it good. Don’t open a ton of accounts just to build up your credit. In reality, it only takes three months to build credit. No one can be perfect all of the time but if you can avoid making some of these costly mistakes you can avoid wasted time and money. | 004_2981642 | {
"id": "<urn:uuid:faa17984-1ec4-49b9-a7b4-d97b17e75892>",
"dump": "CC-MAIN-2018-05",
"url": "http://www.richdadwisdom.com/2009/11/7-common-expensive-financial-mistakes/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084888135.38/warc/CC-MAIN-20180119204427-20180119224427-00487.warc.gz",
"language": "en",
"language_score": 0.9676549434661865,
"token_count": 868,
"score": 2.546875,
"int_score": 3,
"uid": "004_2981642_0"
} |
A stack overflow is an undesirable condition in which a particular computer program tries to use more memory space than the call stack has available. In programming, the call stack is a buffer that stores requests that need to be handled. The size of a call stack depends on various factors. It is usually defined at the start of a program. Its size can depend on the architecture of the computer on which the program runs, the language in which the program is written, and the total amount of available memory in the system. When a stack overflow occurs as a result of a program's excessive demand for memory space, that program (and sometimes the entire computer) may crash. In Windows, a stack overflow error can be caused by certain types of malware. The risk of malware exploits can be minimized by staying current with all OS (operating system) updates and program patches, making sure you have the latest patches for all of your Web browsers, and avoiding Web sites and embedded e-mail links that increase the risk of malware attack. | 001_6751358 | {
"id": "<urn:uuid:d1deb8d9-e204-4bcf-bd23-26f56e10d02e>",
"dump": "CC-MAIN-2020-16",
"url": "https://whatis.techtarget.com/definition/stack-overflow",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370506580.20/warc/CC-MAIN-20200402014600-20200402044600-00414.warc.gz",
"language": "en",
"language_score": 0.931148886680603,
"token_count": 206,
"score": 3.34375,
"int_score": 3,
"uid": "001_6751358_0"
} |
Little Duck Lake and the surrounding area have a very interesting history. A history tied to the migrating herds of caribou and the fur trade. Little Duck Lake adjoins Nejanilini Lake on the southeast by a short stretch of the Wolverine River and lies approximately 65 miles south of the Nunavut/Manitoba border. It is the start of the barren lands, where the “land of the little sticks” gives way to the tundra. The original inhabitants of Little Duck Lake were the Sayisi Dene, which were part of the Fort Churchill Chipewyan Band. Sayisi Dene translates as “the people of the rising sun” or “people of the east”. They were also known as the Idthen-eldili or “caribou eaters”. Many miles to the south lies the Churchill River system which flows northeast to Hudson Bay, where the City of Churchill is located. The Churchill River was the traditional dividing line between the northern Chipewyan people and the Cree to the south. The open tundra north of Little Duck Lake separated the Sayisi Dene from the Padlimiut or Caribou Inuit.
The Chipewyan and Inuit peoples have traditionally been mortal enemies in the past but both relied heavily upon the caribou herd for their existence and over the years artifacts from both peoples have been found in the Nejanilini and Little Duck Lake area. Caribou Post, a Hudson Bay Co. trading post, was originally built in 1930 on Caribou Lake , which is approximately 50 miles east of Little Duck Lake. In 1941 the post was dismantled and moved by winter road to Little Duck Lake. The Hudson Bay Co. bought furs from the local Dene trappers and transported them by boat down the Wolverine River to the Seal River and then out to the coast of Hudson Bay . At different times the lake also supported both Roman Catholic and Anglican Missions, and in 1943 the US Military established a weather station near the trading post, which was utilized during WW II and then abandoned in 1946. By 1956 the fur volumes had dropped to the point that the Hudson ‘s Bay Co. decided to close the trading post. That same year the Department of Indian Affairs relocated the Dene of Little Duck Lake to Churchill. Although the Sayisi Dene no longer inhabit the area, the old buildings of Caribou Post, ravaged by time and the harsh sub-arctic winters, are still there to be explored by history buffs. Historical information and photographs courtesy of Mr. Ray Englund, Winnipeg , Manitoba . | 006_2088201 | {
"id": "<urn:uuid:d837db40-4ed5-49cf-a28a-a85f16c1a965>",
"dump": "CC-MAIN-2018-34",
"url": "http://www.thelodgeatlittleduck.com/area-history/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221211933.43/warc/CC-MAIN-20180817065045-20180817085045-00535.warc.gz",
"language": "en",
"language_score": 0.9608874917030334,
"token_count": 541,
"score": 3.390625,
"int_score": 3,
"uid": "006_2088201_0"
} |
Fourier Art is a form of computer art created by using Fourier series. Fourier series are used to define curves and surfaces in a parametric form by expressing the coordinates of the points with different series. As an example, a 2D curve in Cartesian coordinates will be as follows:
Where a, b, c and d are the Fourier coefficients, and T is the period of each series. By imposing simple algebraic restrictions over this parameters it is possible to create curves with different kind of symmetry and interesting geometrical properties, as you can see in our gallery. You can also check out this random shape generator to get the main idea. The colouring of the curves is done in different steps and is basically a handmade process. At first, the even-odd rule is used for distinguishing the inside and outside of each curve. Then, the shape is filled with plain colours, as you feel like, and, at the end, different filters are applied for reaching richer textures. Fourier Art also allows you to create beautiful animations by smoothly changing the Fourier coefficients of a curve. This change can be uniform for all the coefficients or modeled by a specific function for each one of them, which offers a great potencial for expression. This idea underlies in the recent development of many real-time music visualizers, in which any shape is able to dance at the music’s rhythm by connecting the changes in intensity and frequency of the sound with the changes in the Fourier coefficients of the different harmonics. The colouring here is done automatically by means of the combination of several shapes for each channel (RGBA) and the use of blend modes. Check out the video section or our YouTube channel to watch more examples. Currently we are working on FourierArt 3D, searching for the restrictions the coefficients must satisfy to create 3D curves and surfaces with a highly symmetry order. | 009_2896505 | {
"id": "<urn:uuid:de1804bc-bca4-4007-957d-fc5d33ee7b57>",
"dump": "CC-MAIN-2019-09",
"url": "http://fourierart.com/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247481428.19/warc/CC-MAIN-20190217010854-20190217032854-00600.warc.gz",
"language": "en",
"language_score": 0.9213652610778809,
"token_count": 395,
"score": 3.59375,
"int_score": 4,
"uid": "009_2896505_0"
} |
Here at ICH, we do a lot of qualitative data collection as part of our research projects, program evaluations, and needs assessments. While we often use traditional methods such as interviews and focus groups, we also use photovoice as a creative and fun alternative to traditional qualitative data collection approaches. What is photovoice? Photovoice is a method that originally came from the world of participatory action research. It was first used by Caroline Wang and Mary Ann Burris in 1992 to empower women in a rural Chinese village and is now used to explore myriad topics in a variety of fields. With photovoice, participants take photos to represent their perspectives about a particular issue, and the photos are used to stimulate discussion, reflection, and action. What are some of the unique advantages of photovoice? Photovoice is a great method for engaging participants and creating a safe space for open discussion. In our experience, photovoice can help you:
- Empower participants and give them a unique mode of expression
- Catalyze dialogue and reflection about personal and community issues
- Understand issues from others’ points of view
- Share participants’ stories in a compelling, visual way with leaders, policymakers, or others
How have we used photovoice at ICH? At ICH, we have used photovoice as part of our evaluations of several programs, including:
- GRO: A gardening program for immigrant and refugee families in the Boston area
- Pathways to Family Success: A program for immigrant parents in Cambridge, MA to help them better understand the U.S. school system and support their children’s education
- Young Men Matter Too! : A sexual health program for young men of color in Springfield and Holyoke, MA
As you can see, photovoice can be used to explore many different topics with many different populations! “I took this picture because this man was walking in the street and smelled the basil. He said that every time he pass by he smells the nice smell of the basil and he needs this green. He likes this green. ”
Photo credit: Amina Osman, Refugee and Immigrant Assistance Center
Want to learn more? For a great introduction to the photovoice method, check out Caroline Wang’s paper entitled “Photovoice: A Participatory Action Research Strategy Applied to Women’s Health” (Journal of Women’s Health 8(2), p. 185-192, 1999). ICH will be presenting our second photovoice webinar in the spring of 2017, which will include a practical, step-by-step guide to conducting photovoice projects. Here’s what participants had to say about our first photovoice webinar, which we presented last spring:
“It was a very informative and well conducted webinar. Thank you so much! ”
“The webinar was well organized and informative. ”
“It was useful and well presented. ”
We hope you’ll join us for the 2017 webinar – keep an eye on our website for more information in the coming months! ! Wang, C., & Burris, M.A.. Chinese Village Women as Visual Anthropologists: A Participatory Approach to Reaching Policymakers. Social Science & Medicine, 42, p. 1391-1400, 1996. | 008_4356947 | {
"id": "<urn:uuid:ff9d8332-b878-46e3-b53d-344b451e7426>",
"dump": "CC-MAIN-2018-47",
"url": "https://icommunityhealth.org/using-photovoice-to-engage-participants-in-qualitative-data-collection/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039742963.17/warc/CC-MAIN-20181115223739-20181116005739-00460.warc.gz",
"language": "en",
"language_score": 0.945672333240509,
"token_count": 703,
"score": 2.515625,
"int_score": 3,
"uid": "008_4356947_0"
} |
GUIZHOU, May 11, Xinhua -- For 18 generations, people in Denglu village in Taijiang county, Guizhou province, have kept their ancestor's oath to guard a primeval forest of Chinese cedar trees. Women parade through a cedar forest in Denglu village in Taijiang county, Guizhou province during last year's Spring Festival. Liu Kaifu / Xinhua
The large, slow-growing evergreens were the precious timber used to build imperial palaces, such as Beijing's Forbidden City, and to furnish imperial houses. However, overcutting has driven the plant species to near extinction in China.
Denglu, secluded in a cedar forest about 11 kilometers from a county-level town, has 140 households, many in wooden houses supported by sturdy trunks. Zhang Shengyi, Party chief of the village, said the wood is a symbol of longevity, and residents had maintained a tradition of cedar worship. There are more than 20,000 cedar trees in the forest and nearly every big tree blossoms with red prayer ribbons. During the village's 600-year history, every generation of Zhang clan has pledged to guard the rare trees, swearing an oath and drinking wine with drops of their own blood in a traditional ritual. There is a major economic interest, as traders covet the precious timber. But the residents say they would rather live in poverty than make a fortune from the wood. Zhang said a businessman once offered him 2. 8 million yuan ($439,000) for a single tree, in addition to a brokerage fee of 500,000 yuan and property in the county. But he refused. In 2015, the county government joined residents' efforts to protect the trees after some illegal logging occurred. The government helped identify individual trees that were more than a century old and entrusted the residents to manage the forest. As part of poverty relief efforts, a paved road to the village was built, 4G mobile services were introduced and a primary school was built. The pristine woods and the legendary village are drawing more artists and tourists, and residents hope that the wood will bring them some fortune in a sustainable way. | 005_4666433 | {
"id": "<urn:uuid:835196df-4c23-447c-b40b-fefb5914cf65>",
"dump": "CC-MAIN-2018-22",
"url": "http://english.forestry.gov.cn/index.php?option=com_content&view=article&id=1868:guizhou-residents-protect-cedar-forest&catid=28&Itemid=164",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794864572.13/warc/CC-MAIN-20180521235548-20180522015548-00347.warc.gz",
"language": "en",
"language_score": 0.9724341034889221,
"token_count": 448,
"score": 2.609375,
"int_score": 3,
"uid": "005_4666433_0"
} |
AppearanceThe cattle egret is a stocky heron with an 88–96 cm wingspan; it is 46–56 cm long and weighs 270–512 g. It has a relatively short thick neck, a sturdy bill, and a hunched posture. The non-breeding adult has mainly white plumage, a yellow bill and greyish-yellow legs. During the breeding season, adults of the nominate western subspecies develop orange-buff plumes on the back, breast and crown, and the bill, legs and irises become bright red for a brief period prior to pairing. The sexes are similar, but the male is marginally larger and has slightly longer breeding plumes than the female; juvenile birds lack coloured plumes and have a black bill. The positioning of the egret's eyes allows for binocular vision during feeding, and physiological studies suggest that the species may be capable of crepuscular or nocturnal activity. Adapted to foraging on land, they have lost the ability possessed by their wetland relatives to accurately correct for light refraction by water. DistributionThe cattle egret has undergone one of the most rapid and wide reaching natural expansions of any bird species. It was originally native to parts of Southern Spain and Portugal, tropical and subtropical Africa and humid tropical and western Asia. In the end of the 19th century it began expanding its range into southern Africa, first breeding in the Cape Province in 1908. Cattle egrets were first sighted in the Americas on the boundary of Guiana and Suriname in 1877, having apparently flown across the Atlantic Ocean. It was not until the 1930s that the species is thought to have become established in that area. StatusThis species has a large range, with an estimated global extent of occurrence of 10,000,000 km2. On the other hand, the expansion and establishment of the species over large ranges has led it to be classed as an invasive species. BehaviorThis species gives a quiet, throaty ''rick-rack'' call at the breeding colony, but is otherwise largely silent. HabitatAlthough the cattle egret sometimes feeds in shallow water, unlike most herons it is typically found in fields and dry grassy habitats, reflecting its greater dietary reliance on terrestrial insects rather than aquatic prey. ReproductionThe cattle egret nests in colonies, which are often, but not always, found around bodies of water. The colonies are usually found in woodlands near lakes or rivers, in swamps, or on small inland or coastal islands, and are sometimes shared with other wetland birds, such as herons, egrets, ibises and cormorants. The North American breeding season lasts from April to October. In the Seychelles, the breeding season of the subspecies ''B.i. seychellarum'' is April to October.
The male displays in a tree in the colony, using a range of ritualised behaviours such as shaking a twig and sky-pointing , and the pair forms over three or four days. A new mate is chosen in each season and when re-nesting following nest failure. The nest is a small untidy platform of sticks in a tree or shrub constructed by both parents. Sticks are collected by the male and arranged by the female, and stick-stealing is rife. The clutch size can be anywhere from one to five eggs, although three or four is most common. The pale bluish-white eggs are oval-shaped and measure 45 mm × 53 mm . Incubation lasts around 23 days, with both sexes sharing incubation duties. The chicks are partly covered with down at hatching, but are not capable of fending for themselves; they become capable of regulating their temperature at 9–12 days and are fully feathered in 13–21 days. They begin to leave the nest and climb around at 2 weeks, fledge at 30 days and become independent at around the 45th day. The cattle egret engages in low levels of brood parasitism, and there are a few instances of cattle egret eggs being laid in the nests of snowy egrets and little blue herons, although these eggs seldom hatch. There is also evidence of low levels of intraspecific brood parasitism, with females laying eggs in the nests of other cattle egrets. As much as 30% extra-pair copulations have been noted. The dominant factor in nesting mortality is starvation. Sibling rivalry can be intense, and in South Africa third and fourth chicks inevitably starve. In the dryer habitats with fewer amphibians the diet may lack sufficient vertebrate content and may cause bone abnormalities in growing chicks due to calcium deficiency. In Barbados, nests were sometimes raided by vervet monkeys, and a study in Florida reported the fish crow and black rat as other possible nest raiders. The same study attributed some nestling mortality to brown pelicans nesting in the vicinity, which accidentally, but frequently, dislodged nests or caused nestlings to fall. FoodThe cattle egret feeds on a wide range of prey, particularly insects, especially grasshoppers, crickets, flies, and moths, as well as spiders, frogs, and earthworms. Some text fragments are auto parsed from Wikipedia. | 010_257357 | {
"id": "<urn:uuid:7c702cb4-fe64-4fe5-94ee-a4d145464693>",
"dump": "CC-MAIN-2022-21",
"url": "https://www.jungledragon.com/specie/431/western-cattle-egret.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662520817.27/warc/CC-MAIN-20220517194243-20220517224243-00133.warc.gz",
"language": "en",
"language_score": 0.9596824049949646,
"token_count": 1084,
"score": 3.9375,
"int_score": 4,
"uid": "010_257357_0"
} |
The University of Hawaiʻi at Hilo is in the process of creating a brand new data science program. Data science is a branch of science that deals with studying and analyzing sets of data through statistical measures and applying the process into a variety of fields of study. It is a versatile field because almost every branch of science collects loads of data—big data—and has processes for analyzing all of this information. The program, which will start as a certificate program, is expected to commence in the fall semester of 2018, with hopes of eventually forming into a baccalaureate degree program. The data science certificate would be open to all students, regardless of major or background. - Related chancellor’s message: New program will help produce a generation of big data scientists, July 5, 2017
This summer, UH Hilo kicked off the program by hiring two new professors. Travis Mandel, assistant professor of computer science and Grady Weyenberg, assistant professor of mathematics, are collaborating with existing faculty to design new classes for the program. They will be joined in the near future by the others—experts in mathematics and the natural and social sciences. When the certificate is established, there will be a total of six courses required. Students will take four new data science classes listed under computer science and mathematics and two additional courses will come from a list of applicable classes in the students’ current majors. This program is funded through the National Science Foundation, as a part of the ʻIke Wai Project. ʻIke Wai was established as a UH Systemwide water sustainability research project. The funds allocated to UH Hilo are being used to form the data science program with the hope that data analysis will prove successful to better understand the groundwater systems in place on Hawaiʻi Island.
Right now there are huge amounts of information being collected but not studied. There are not enough people with the right background in data science so there is an infinite need for trained scientists in this field. “Data science is a new buzzword within the past few years that has come about with the explosion of the internet and social media,” says Weyenberg. “Right now there are huge amounts of information being collected but not studied. There are not enough people with the right background in data science so there is an infinite need for trained scientists in this field. ”
Weyenberg recommends this program to any science majors planning on going to graduate school. “The processes learned in these classes will be skills that are used very often in most graduate programs,” he says. “Students that go through this certificate program will have a leg up and experience that will benefit them in their future schooling. ”
For more information on the data science program, go to UH Hilo Stories.
—A UH Hilo Stories article written by Jamie Josephson, a public information intern in the Office of the Chancellor
This article is part of a series on curriculum and projects at UH Hilo focusing on sustainability. Read the previous stories:
- UH Hilo researchers designing sustainable wastewater systems for local industries, October 17, 2017
- Students drive sustainable practices on UH Hilo campus, October 10, 2017
- Energy savings a top priority at UH Hilo, October 3, 2017
- Climate change course challenges UH Hilo students to find solutions, September 11, 2017
- Sustainable agriculture practiced at UH Hilo learning gardens, September 18, 2017 | 010_6049209 | {
"id": "<urn:uuid:64a5b33b-c75f-445e-b081-e070d7dd2601>",
"dump": "CC-MAIN-2019-22",
"url": "https://www.hawaii.edu/news/2017/10/31/uh-hilo-data-science-program/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232255182.37/warc/CC-MAIN-20190519221616-20190520003616-00043.warc.gz",
"language": "en",
"language_score": 0.9434733986854553,
"token_count": 724,
"score": 2.546875,
"int_score": 3,
"uid": "010_6049209_0"
} |
As a follow-up to the excellent Wonders of the Universe app released by Harper Collins, Fragile Earth brings us from the farthest reaches of the Universe back to our own beautiful blue world, whose surface is rapidly transforming due to the effects of climate change and human civilization. With Fragile Earth those changes are brought to light with amazing satellite images and aerial photography, illustrating decades worth of data with a swipe of a finger. Released on April 19 and developed in conjunction with Aimer Media, the iPad/iPhone app is set to become the definitive reference guide for all those interested in science, nature, photography and landscape. Fragile Earth combines some of the most powerful images of the environment, showing before and after scenes of our natural world. Through these thought-provoking portraits from across the globe, the app captures the world’s beauty, vastness and vulnerability. Detailed ecological snapshots depict rivers which have dried up or flooded, erupted volcanoes, glaciers in the process of melting, and cities sprawling outward. Fragile Earth’s innovative swipe function allows users to see years pass under their fingertips – from as far back as 1914 to the present day – by dragging multiple photographic layers across their screen to reveal images of a site before, during and after the landscape has changed. “We set out to create an app that would convey the innate and delicate beauty of the world’s landscape, while highlighting the dramatic shifts that are taking place across the globe,” said Jethro Lennox, Head of Publishing for Collins Geo, a division of HarperCollins UK. “Not only is the Fragile Earth photography stunning, but we’ve also included more than 50 satellite images which provide detailed ecological snapshots from around the globe. This information is invaluable to anyone concerned for the state of the Earth, or those who are merely curious about our environment. ”
Fragile Earth is available for download from the iTunes Store now — and until midnight Saturday, April 28, it’s available for just 99¢ in honor of Earth Week (regular price is USD $2. 99). So be sure to grab your copy today! Photos and additional information provided by Harper Collins and Walker Sands Communications | 001_5115801 | {
"id": "<urn:uuid:e8758a64-ab1f-47c5-882e-9ee8fec38496>",
"dump": "CC-MAIN-2014-23",
"url": "http://news.discovery.com/space/fragile-earth-puts-climate-change-at-your-fingertips-120428.htm",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510274979.56/warc/CC-MAIN-20140728011754-00342-ip-10-146-231-18.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9275748133659363,
"token_count": 452,
"score": 2.53125,
"int_score": 3,
"uid": "001_5115801_0"
} |
Exploring Science provides hands-on homeschool science curriculum for the youngest members of your classroom. This program will give you the tools you need to guide your student as they explore the world of science! “My girls had no idea they were ‘doing’ science. They thought they were playing! They ware learning that water can change shape. ” Review of Exploring Science from Spell OutLoud
Pick and choose the science activities that work for your family with our teacher guides! The Exploring Science Teacher Guide contains thirty-six weekly topics each with an introduction, experiment from Science Play, and nature study. It also has suggestions for additional books and crafts. Two scheduling options are included so that you can choose if you want to do science two days a week or five days a week. Create a beautiful scrapbook full of memories with our student pages! The Exploring Science Student Pages has all the coloring pages, experiment sheets, and activity pages that you will need for your student. With all these tools at your fingertips, you are sure to have an exciting year exploring the world of science with your student. Ages: 4 to 5 years old
Grade: K4 to K5 | 008_5786660 | {
"id": "<urn:uuid:85cd841a-b79a-4355-a3e8-3d0f328ec23a>",
"dump": "CC-MAIN-2019-09",
"url": "https://elementalscience.com/collections/exploring-science",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550249508792.98/warc/CC-MAIN-20190223162938-20190223184938-00414.warc.gz",
"language": "en",
"language_score": 0.9612761735916138,
"token_count": 245,
"score": 3.9375,
"int_score": 4,
"uid": "008_5786660_0"
} |
New Rochelle, NY, April 8, 2014--Use of social media such as Facebook can influence attitudes and behaviors among people of all countries and cultures. Among women in Iran, the duration and amount of daily Facebook activity is associated with their desire to wear a traditional head-covering and their willingness to display pictures of themselves without a veil, according to an article in Cyberpsychology, Behavior, and Social Networking, a peer-reviewed journal from Mary Ann Liebert, Inc., publishers. The article is available free on the Cyberpsychology, Behavior, and Social Networking website. In "The Influence of Social Networking Technologies on Female Religious Veil-Wearing Behavior in Iran," Sean Young, PhD, David Geffen School of Medicine, University of California, Los Angeles, Abbas Shakiba, University of Shahid Chamran (Ahvaz, Iran), Justin Kwok, UCLA, and Mohammad Sadegh Montazeri, University of Semnan, Iran, report the results of a survey of Iranian women. They found significant relationships between several factors and how likely the Iranian women surveyed were to cover themselves with a veil and whether they would post unveiled photos on Facebook.
"This study is an important foray into the impact technology and social media is having on cultural and religious norms," says Brenda K. Wiederhold, PhD, MBA, BCB,BCN, Editor-in-Chief of Cyberpsychology, Behavior, and Social Networking, from the Interactive Media Institute, San Diego, CA. About the Journal
Cyberpsychology, Behavior, and Social Networking is a peer-reviewed journal published monthly online with Open Access options and in print that explores the psychological and social issues surrounding the Internet and interactive technologies, plus cybertherapy and rehabilitation. Complete tables of content and a sample issue may be viewed on the Cyberpsychology, Behavior, and Social Networking website. About the Publisher
Mary Ann Liebert, Inc., publishers is a privately held, fully integrated media company known for establishing authoritative peer-reviewed journals in many promising areas of science and biomedical research, including Games for Health Journal, Telemedicine and e-Health, and Journal of Child and Adolescent Psychopharmacology. Its biotechnology trade magazine, Genetic Engineering & Biotechnology News (GEN), was the first in its field and is today the industry's most widely read publication worldwide. A complete list of the firm's 80 journals, books, and newsmagazines is available on the Mary Ann Liebert, Inc., publishers website. | 007_2861064 | {
"id": "<urn:uuid:f9164ef4-50a4-4b85-a3f9-d50cc8e5bac0>",
"dump": "CC-MAIN-2016-07",
"url": "http://www.eurekalert.org/pub_releases/2014-04/mali-awi040814.php",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701168011.94/warc/CC-MAIN-20160205193928-00009-ip-10-236-182-209.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9199094176292419,
"token_count": 517,
"score": 2.53125,
"int_score": 3,
"uid": "007_2861064_0"
} |
For this church:
As one of his many improvements to the church, the Rev Robert Miles set up a committee to raise money for the erection of the church clock. A plaque in the base of the tower reads:
The clock is mounted on a cast-iron flat bed and has three gear trains (hands, hour strike and quarter chimes) and a pin escapement mechanism. When it was first installed the clock was powered, like most turret clocks of the era, by large weights which descended for most of the height of the tower and had to be laboriously wound up at least once a week. The clock mechanism was brought to ground level for refurbishment, along with the bells, when the tower maintenance was carried out in 1922. In 1976, as part of the 750th anniversary celebrations of the church, the clock was restored and an automatic electric winding mechanism introduced, which is still in use. Another plaque on the wall reads:
and a small plaque on the clock mechanism itself states that the work was carried out by John Smith & Sons of Derby, though that gives the date as 1975. When the clock had first been installed some of the oak beams supporting the ringing room floor had been cut short to make room for the weights. When the mechanism was electrified these beams were not restored. This meant that the floor was supporting the beams rather than vice versa, and the floor eventually began to show signs of weakness. It had to be strengthened in 2003. The clock is located on the top level of the tower. This is rather unusual in that it places it above the level of the bells. This naturally gives it greater visibility, but leads to certain complications in connecting to the bells for the chimes. When the clock was first installed there was only a ring of six bells, and certain shortcuts were taken in connecting the clock to the bells. This means that one of the chiming hammers is on the “wrong” bell, and the Westminster Chimes sound out of tune. The clock faces were originally painted black, but in 1976 they were repainted using a very pale blue. The painting was carried out by a man lowered from the tower parapet on the top of a kitchen table suspended by ropes. The change of colour led to far more controversy than any health and safety implications of the painting method! A few years ago the faces were again showing signs of deterioration and, with help from the Friends of Bingham Parish Church and the wider community, in 2008 they were repainted in a deeper blue, and the figures and hands regilded. This time the workmen used a more conventional access method! There are known to have been other clocks in the church tower before the current one. In 1775 a lightning bolt struck the tower and damaged the clock. In addition there is a line drawing of the church by Samuel Hieronymus Grimm and dating from around 1775 which shows a lozenge-shaped structure about half-way up the tower which looks very like a clock face. This is also visible on Throsby’s drawing of the 1790s. It is just possible to make out a patch on the wall of the tower (to the top right of one of the current windows) would could have been the site of this former clock. There is also a painting of the church dating from 1855. This shows a clock face on the south side of the tower in much the same position as one of the current clock faces; there is, however, no clock face shown on the western side. This suggests that the current clock may be the third clock to have been in Bingham church tower. | 003_2461496 | {
"id": "<urn:uuid:76eefbda-3204-429d-831e-b343d0d4700d>",
"dump": "CC-MAIN-2017-51",
"url": "http://southwellchurches.nottingham.ac.uk/bingham/hclock.php",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948544677.45/warc/CC-MAIN-20171214144324-20171214164324-00548.warc.gz",
"language": "en",
"language_score": 0.9856590032577515,
"token_count": 744,
"score": 2.765625,
"int_score": 3,
"uid": "003_2461496_0"
} |
UN report finds food sources at risk due to worldwide land erosion
A new report by the United Nations (UN) has found that the world's future food needs are at risk due to land erosion across the globe. The report by the UN's Food and Agriculture Organization (FAO), "State of the World's Land and Water Resources for Food and Agriculture, found that 24 percent of the world's land is now considered "highly degraded" due to soil erosion and biodiversity loss. Jacque Diouf, FAO's director-general, told the Washington Post that increased competition over land, coupled with climate change and poor farming practices has left key food-producing systems unable to meet human needs in the future. "The consequences in terms of hunger and poverty are unacceptable," Diouf noted. "Remedial actions need to be taken now. We simply cannot continue on a course of business as usual. "
Top products from Impact Absorbents, such as Straw Wattle for Erosion Control and Ultra GutterGuard, can help farmers mitigate erosion and improve soil productivity. The UN said farmers will have to produce 70 percent more food in order to keep up with the world's expected 9 billion population count by 2050. | 004_6248147 | {
"id": "<urn:uuid:c2052321-2b35-4b67-92d8-1a6734c15f58>",
"dump": "CC-MAIN-2020-50",
"url": "https://spillhero.com/blogs/news/un-report-finds-food-sources-at-risk-due-to-worldwide-land-erosion",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141195417.37/warc/CC-MAIN-20201128095617-20201128125617-00430.warc.gz",
"language": "en",
"language_score": 0.9591077566146851,
"token_count": 249,
"score": 3.546875,
"int_score": 4,
"uid": "004_6248147_0"
} |
Importance of clean and maintainable code
Clean and maintainable code is crucial for the success of any software project. It not only improves the readability and understanding of the codebase but also makes it easier to debug and maintain in the long run. When code is clean and well-organized, it becomes more efficient and less prone to errors. Additionally, clean code promotes collaboration among team members, as it is easier for others to understand and contribute to the project. Therefore, it is essential for developers to prioritize writing clean and maintainable code to ensure the overall quality and longevity of their software. Benefits of writing clean code
Writing clean and maintainable code offers numerous benefits. Firstly, it enhances readability, making it easier for other developers to understand and collaborate on the codebase. Clean code is also easier to debug and maintain, as it follows established conventions and best practices. Additionally, clean code improves the overall quality of the software, reducing the likelihood of bugs and errors. It also promotes code reusability, allowing developers to efficiently use existing code in different projects. Ultimately, writing clean code leads to increased productivity, as it saves time and effort in the long run. Therefore, adopting the best practices for writing clean and maintainable code is crucial for any developer striving for excellence. Overview of the article
In this article, we will provide an overview of the best practices for writing clean and maintainable code. We will discuss the importance of clean code and how it can improve the readability, maintainability, and collaboration of software projects. Additionally, we will explore various techniques and strategies that can be applied to write clean code, such as meaningful naming conventions, modularization, code commenting, and error handling. By following these best practices, developers can create code that is easier to understand, debug, and enhance, leading to more efficient and successful software development projects. Choosing meaningful and descriptive names
When it comes to choosing meaningful and descriptive names for your code, it is important to prioritize clarity and readability. By using names that accurately reflect the purpose and functionality of your variables, functions, and classes, you can make your code more self-explanatory and easier to understand for both yourself and other developers. Avoid using vague or generic names that do not provide any context or convey the intended usage of the code. Additionally, consider the conventions and naming patterns commonly used in the programming language or framework you are working with, as this can help make your code more consistent and cohesive. Taking the time to carefully select meaningful names can greatly enhance the maintainability and comprehensibility of your codebase. Using consistent naming conventions
Using consistent naming conventions is essential for writing clean and maintainable code. By following a set of naming conventions, developers can ensure that their code is easy to read, understand, and maintain. Consistent naming conventions also promote code consistency across the project, making it easier for multiple developers to collaborate and work on the codebase. When naming variables, functions, classes, and other code elements, it is important to choose descriptive and meaningful names that accurately reflect their purpose and functionality. Additionally, using camel case or snake case for naming variables and functions, and following a consistent naming pattern for classes and namespaces, can further enhance code readability and maintainability. By adhering to consistent naming conventions, developers can improve the overall quality of their code and make it easier to debug, refactor, and extend in the future. Avoiding ambiguous or misleading names
When writing code, it is crucial to avoid using ambiguous or misleading names for variables, functions, and classes. Ambiguous or misleading names can make it difficult for other developers to understand the purpose and functionality of the code. To ensure clean and maintainable code, it is important to choose descriptive and meaningful names that accurately reflect the intended purpose of the code elements. This not only improves code readability but also helps prevent bugs and makes the code easier to maintain and debug. By avoiding ambiguous or misleading names, developers can enhance the overall quality and clarity of their code. Using proper indentation and formatting
Using proper indentation and formatting is essential for writing clean and maintainable code. By consistently indenting our code and following a consistent formatting style, we can improve code readability and make it easier for other developers to understand and maintain our code. Indentation helps to visually separate different blocks of code, making it easier to identify the structure and flow of the program. Additionally, following a consistent formatting style, such as placing opening and closing brackets on separate lines or using consistent naming conventions, helps to create a uniform and professional-looking codebase. Overall, by adhering to proper indentation and formatting practices, we can enhance the clarity, maintainability, and collaboration of our codebase. Grouping related code together
Grouping related code together is an essential practice for writing clean and maintainable code. By organizing code into logical groups, it becomes easier to understand and navigate through the codebase. This not only improves readability but also makes it easier to make changes and fix bugs. Grouping related code together also promotes code reusability, as it allows for the creation of modular and reusable components. Overall, by following this best practice, developers can ensure that their code is well-organized, easy to maintain, and scalable. Separating concerns and modularizing code
One of the best practices for writing clean and maintainable code is separating concerns and modularizing code. This involves breaking down the code into smaller, more manageable modules or components, each responsible for a specific functionality or task. By separating concerns, developers can easily understand and maintain different parts of the codebase without having to navigate through a large and complex codebase. Modularizing code also promotes reusability, as individual modules can be easily reused in different parts of the application. Overall, separating concerns and modularizing code improves code organization, readability, and maintainability. Comments and Documentation
Writing clear and concise comments
When it comes to writing clean and maintainable code, one of the key aspects is writing clear and concise comments. Comments play a crucial role in helping other developers understand the purpose and functionality of the code. By providing descriptive comments, developers can easily navigate through the codebase and make necessary modifications without much hassle. Clear comments also aid in the debugging process, as they provide insights into the logic behind the code. Additionally, concise comments ensure that the code remains readable and clutter-free. Therefore, it is essential to prioritize writing clear and concise comments to enhance the overall maintainability of the codebase. Documenting code with meaningful documentation
Documenting code with meaningful documentation is an essential aspect of writing clean and maintainable code. By providing clear and comprehensive documentation, developers can ensure that their code is easily understandable and can be effectively maintained by themselves and others. Meaningful documentation includes comments, inline explanations, and detailed explanations of the code’s purpose, functionality, and any potential pitfalls or considerations. This documentation not only helps developers understand the code but also serves as a valuable resource for future reference and troubleshooting. By prioritizing documentation, developers can enhance the readability, maintainability, and overall quality of their codebase. Updating comments and documentation as code changes
Updating comments and documentation as code changes is an essential practice for writing clean and maintainable code. As code evolves and new features are added, it is crucial to ensure that the comments and documentation accurately reflect the current state of the codebase. By keeping the comments and documentation up to date, developers can easily understand the purpose and functionality of different code segments, making it easier to maintain and debug the code in the future. Additionally, updated comments and documentation improve code readability and make it easier for other developers to collaborate and contribute to the project. Therefore, regularly updating comments and documentation should be a priority for any developer striving to write clean and maintainable code. Handling errors gracefully
Handling errors gracefully is an essential aspect of writing clean and maintainable code. When errors occur, it is important to handle them in a way that does not disrupt the overall functionality of the program. By implementing error handling mechanisms, such as try-catch blocks or error logging, developers can ensure that errors are handled in a controlled manner. This not only improves the user experience by providing informative error messages, but also makes it easier to debug and maintain the codebase. Additionally, handling errors gracefully demonstrates a level of professionalism and attention to detail, which can enhance the overall quality of the software product. Using appropriate error messages
Using appropriate error messages is crucial for writing clean and maintainable code. When encountering errors or exceptions, it is important to provide clear and concise error messages that accurately describe the issue. This not only helps developers understand the problem quickly, but also aids in debugging and troubleshooting. Well-crafted error messages can save valuable time and effort during the development and maintenance phases of a project. By using descriptive error messages, developers can easily identify the root cause of an issue and implement the necessary fixes. Additionally, user-friendly error messages can enhance the overall user experience by guiding users towards resolving the problem or seeking assistance. Therefore, it is essential to prioritize the use of appropriate error messages in order to ensure the readability, maintainability, and usability of the codebase. Implementing error logging and reporting
Implementing error logging and reporting is an essential aspect of writing clean and maintainable code. By having a robust error logging mechanism in place, developers can easily track and identify issues within their codebase. This not only helps in debugging and troubleshooting but also improves the overall stability and reliability of the application. Additionally, error reporting allows developers to gather valuable insights into the common errors occurring in the system, enabling them to proactively address these issues and enhance the user experience. Therefore, it is crucial to incorporate error logging and reporting practices into the development process to ensure the code remains clean, maintainable, and error-free. Testing and Debugging
Writing unit tests for code
Unit tests are an essential part of writing clean and maintainable code. They help ensure that the code behaves as expected and remains stable even after making changes. By writing unit tests, developers can catch bugs early in the development process and have confidence in the reliability of their code. Additionally, unit tests serve as documentation, providing insights into how the code is intended to be used and what its expected outcomes are. With well-written unit tests, developers can easily identify and fix issues, making the codebase more robust and easier to maintain. Using debugging tools effectively
Using debugging tools effectively is crucial for writing clean and maintainable code. Debugging tools help developers identify and fix errors in their code, ensuring that the software functions as intended. By effectively utilizing debugging tools, developers can save time and effort in troubleshooting and debugging processes. They can quickly locate and understand the root cause of issues, leading to faster bug resolutions. Additionally, debugging tools provide valuable insights into the program’s execution flow, allowing developers to optimize their code for better performance. Overall, mastering the use of debugging tools is an essential skill for any developer striving to write clean and maintainable code. Analyzing and fixing bugs
Analyzing and fixing bugs is an essential part of writing clean and maintainable code. Bugs can occur at any stage of the development process and can have a significant impact on the functionality and performance of the software. To effectively analyze and fix bugs, developers need to have a systematic approach. This includes identifying the root cause of the bug, reproducing the issue, and implementing a solution. Additionally, it is important to write clear and descriptive bug reports to facilitate communication between developers and testers. By prioritizing bug fixing and continuously improving the codebase, developers can ensure that the software remains stable and reliable over time. | 001_5057333 | {
"id": "<urn:uuid:9bf2e7ce-44a3-4ed1-8bdd-b6238e5ff24c>",
"dump": "CC-MAIN-2023-40",
"url": "https://ibrahimbelkhiria.com/best-practices-for-writing-clean-and-maintainable-code/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506658.2/warc/CC-MAIN-20230924155422-20230924185422-00614.warc.gz",
"language": "en",
"language_score": 0.9059736728668213,
"token_count": 2416,
"score": 2.953125,
"int_score": 3,
"uid": "001_5057333_0"
} |
Following on from yesterday’s post, Jerry Taylor and Peter Van Doren give five reasons why “green energy” is economically senseless:
- “First, green energy is diffuse, and it takes a tremendous amount of land and material to harness even a little bit of energy…”
- “Second, it is extremely costly…”
- “Third, it is unreliable…”
- “Fourth, it is scarce…. ”
- Finally, … electricity produced by sun or wind cannot be stored because battery technology is not currently up to the task. The fundamental question that green energy proponents must answer is this: if green energy is so inevitable and such a great investment, why do we need to subsidize it? If and when renewable energy makes economic sense, profit-hungry investors will build all that we need for us without government needing to lift a finger. But if it doesn't make economic sense, all of the subsidies in the world won't change that fact. Hence our working definition of Renewable Energy = “unreliable energy produced by means that would be uneconomic without tax breaks and subsidies. ”
[Hat tip TOS Week in Review] | 011_452001 | {
"id": "<urn:uuid:643bb332-81b6-4ce5-b492-c45ffe64bf63>",
"dump": "CC-MAIN-2017-09",
"url": "http://pc.blogspot.com/2011/04/green-energy-is-economically-senseless.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170884.63/warc/CC-MAIN-20170219104610-00374-ip-10-171-10-108.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9471808075904846,
"token_count": 253,
"score": 2.875,
"int_score": 3,
"uid": "011_452001_0"
} |
Explain what the USA PATRIOT Act stands for and discuss its primary purpose
Summarize an article about a recent example of a hate crime (within the last year) on the Internet and include why it was a hate crime, the characteristics that made it a hate crime, and how the police and court responded to the hate crime. Compare the characteristics of intelligence and investigation and describe how the information from each is used. Go to https://research.strayer.edu to locate at least three (3) quality references for this assignment, including the initial article. One must have been published within the last year. Note: Wikipedia and similar websites do not qualify as quality resources. Your assignment must follow these formatting requirements:
This course requires use of new Strayer Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details. Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow SWS or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. | 009_7041978 | {
"id": "<urn:uuid:fa7a62e7-d3be-4956-89e9-04f7b2ef5646>",
"dump": "CC-MAIN-2022-21",
"url": "https://gishomework.com/usa-patriot-act-2/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662534693.28/warc/CC-MAIN-20220520223029-20220521013029-00283.warc.gz",
"language": "en",
"language_score": 0.9122799634933472,
"token_count": 290,
"score": 3.0625,
"int_score": 3,
"uid": "009_7041978_0"
} |
Keywords: heavy metals, clay minerals, surface sediments, Mazatlan Bay, subtropical pacific, Mexico, geochemical behaviour, distribution patterns, water pollution, principal component analysis, PCA, coastal waters
Heavy metals and clay minerals in surface sediments from the Mazatlan Bay, Mexican subtropical Pacific coast
To know the geochemical behaviour of Al, Cd, Cr, Cu, Fe, Li, Mn, Ni and Zn, their sources, distribution patterns and association with sedimentological factors (organic carbon and carbonate contents, grain size and clay mineralogy of the sediments), 29 surface sediment samples were collected from the Mazatlan Bay, Mexico. In addition to the determination of the concentration of these variables by standard methods proposed on the literature, a correlation matrix and two principal component analyses (PCA) were made and a normalisation procedure was performed employing Li and organic C as conservative elements. Three groups of metals were defined according to their geochemical behaviour: Al, Cr, Fe, Li, Mn and Zn; Cd and Cu; Ni. | 004_6394125 | {
"id": "<urn:uuid:fc4b683b-5d8a-4922-816d-ac2d689b05e4>",
"dump": "CC-MAIN-2018-13",
"url": "https://www.environmental-expert.com/articles/heavy-metals-and-clay-minerals-in-surface-sediments-from-the-mazatlan-bay-mexican-subtropical-pacifi-23742",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647406.46/warc/CC-MAIN-20180320111412-20180320131412-00309.warc.gz",
"language": "en",
"language_score": 0.9214724898338318,
"token_count": 223,
"score": 2.5625,
"int_score": 3,
"uid": "004_6394125_0"
} |
Who: Charles Bell
What: Premier Anatomist and Surgeon
When: November 12, 1774 - April 28, 1842
Where: Born in Edinburgh, Scotland
Sir Charles Bell--anatomist, surgeon, physiologist, natural theologian--was the youngest of four sons. While still a student at the University of Edinburgh, he taught anatomy and published A System of Dissection Explaining the Anatomy of the Human Body, which showcased his extraordinarily accurate illustrations. He later published volumes of Anatomy of the Human Body with his brother, well-known surgeon John Bell.
Charles' surgical success at the Edinburgh Royal Infirmary and John's popular anatomy classes--and outspoken criticism of the suffering inflicted by incompetent surgeons--led to jealous opposition from local physicians. Eventually the two brothers were barred from practice and teaching in Scotland, and in 1804 they moved to London and opened a private surgery and school of anatomy. In 1811, Charles published Idea of a New Anatomy of the Brain, now considered the "Magna Carta of neurology. " After John's death in 1820, Charles continued to teach and conduct research. He was also a surgeon at the Middlesex Hospital, helping to found its medical school in 1828. Bell had a special interest in the nervous system. For a time, he assumed that all nerves were sensory. His work caught the eye of Francois Magendie, who had demonstrated that the ventral roots of spinal nerves are motor and the dorsal roots are sensory. After a conflict of priority arose, the two scientists reached an agreement and named the rule of spinal nerve function "Bell-Magendie's Law."1
Bell's scientific endeavors convinced him of the existence and necessity of the Creator. His 1837 publication The Hand; Its Mechanism and Vital Endowments, as Evincing Design affirmed his convictions:
If we select any object from the whole extent of animated nature, and contemplate it fully and in all its bearings, we shall certainly come to this conclusion: that there is Design in the mechanical construction, Benevolence in the endowments of the living properties, and that Good on the whole is the result. 2
From studying the human body, Bell realized how dependent people are on involuntary physical processes. He saw close-minded reliance on reason as not only ignorant, but "worse than ingratitude. "
Now, when a man sees that his vital operations could not be directed by reason--that they are constant, and far too important to be exposed to all the changes incident to his mind, and that they are given up to the direction of other sources of motion than the will, he acquires a full sense of his dependence. . . . When man thus perceives, that in respect to all these vital operations he is more helpless than the infant, and that his boasted reason can neither give them order nor protection, is not his insensibility to the Giver of these secret endowments worse than ingratitude? 3
He was familiar with uniformitarianism, which influenced the development of Darwinism. Bell thought science should be allowed to follow the evidence--even if it leads to a supernatural origin. We cannot resist these proofs of a beginning, or of a First Cause. When we are bold enough to extend our inquiries into those great revolutions that have taken place, whether in the condition of the earth, or in the structure of the animals which have inhabited it, our notions of the "uniformity" of the course of nature must suffer some modification. 4
Bell was made a fellow of the Royal Society in 1826. He later received its first medal, and in 1831 was knighted by King William IV. At age 62, he returned to his homeland as a Professor of Surgery at the University of Edinburgh. His death six years later marked the end of a groundbreaking career in medical science and a humble witness to the intelligent and benevolent handiwork of the Creator.
- The Bell-Magendie Law states that the anterior branch of spinal nerve roots contains only motor fibers and the posterior roots contain only sensory fibers. - Bell, Sir Charles. 1852. The Fourth Bridgewater Treatise on the Power, Wisdom, and Goodness of God as Manifested in the Creation: The Hand; Its Mechanism and Vital Endowments as Evincing Design, 5th ed. London: John Murray, 1. - Ibid, 13-14. - Ibid, 265. * Ms. Dao is Assistant Editor.
Cite this article: Dao, C. 2008. Man of Science, Man of God: Charles Bell. Acts & Facts. 37 (6): 8. | 007_2778919 | {
"id": "<urn:uuid:a5629d55-b44a-4176-9b3f-83544f6c54f5>",
"dump": "CC-MAIN-2018-47",
"url": "https://www.icr.org/article/science-man-god-charles-bell",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039743717.31/warc/CC-MAIN-20181117164722-20181117190722-00474.warc.gz",
"language": "en",
"language_score": 0.9598431587219238,
"token_count": 958,
"score": 3.09375,
"int_score": 3,
"uid": "007_2778919_0"
} |
The Temple Roots of the Liturgy
It is remarkable how few traces of the solemn liturgies of the High Holy Days have left in Christian worship. Christ was more associated with the synagogue type of worship than with that of the temple These two quotations from books written some forty years ago are not untypical of the approach at that time to the origins of Christian Liturgy, namely that they are to be found in the synagogue. In this paper I shall show some of the similarities between the early Christian liturgies and temple rituals
Since the New Testament interprets the death of Jesus as atonement (e. g. 1 Cor.15. 3) and links the Eucharist to his death, there must have been from the start some link between Eucharist and atonement. Since the imagery of the Eucharist is sacrificial, this must have been an Atonement sacrifice in the temple, rather than just the time of fasting observed by the people. It is true that very little is known about the origin of the Christian liturgy or about temple practices, but certain areas do invite further examination. In the Letter to the Hebrews, for example, Christ is presented as the high priest offering the atonement sacrifice, and this surely should be taken as the starting point for any investigation into roots of the Christian Liturgy. In his book The Christian Understanding of Atonement, Dillistone made this observation: From the New Testament there come hints, suggestions, even daring affirmations of a comprehensive cosmic reconciliation. He doubted that this came from Hebrew thought and so suggested: It was not until early Christian witnesses found themselves confronted by pagan systems in which a full theory of cosmic redemption played a prominent part that the effect of the work of Christ upon the cosmos at large began to receive serious consideration. The pre-Christian roots of the idea of Atonement have played a very small part in Christian treatments of the subject; a recent report by the Church of Englands Doctrine Commission dealt with atonement without mentioning Leviticus.
The Eucharist has frequently been linked to the Passover, for the very obvious reason that the Last Supper is linked to that festival, and Paul wrote to the Corinthian church that Christ our Passover has been sacrificed (1. Cor.5. 7). But there are immediate and obvious problems trying to link the Eucharist with Passover to as we recognise it: the Passover was the only sacrifice not offered by a priest (m. Pesahim 5. 5ff on Exod 12. 6), and the essential element was that the offering was whole, (Exod 12. 46), whereas the words of institution in their various forms all emphasise that the bread/body was broken Further, the cup at the Last Supper is linked to the covenant [except the Western text of Luke], and the Letter to the Hebrews links the death of Jesus to the covenant renewed on the Day of Atonement (Heb.9. 11-15). Matthews form of the words My blood of the covenant poured out for many for the aphesis of sins (Mat.26. 28) suggests the same context, since aphesis was the translation for deror, liberty, the characteristic of the Jubilee which was inaugurated on the Day of Atonement (Lxx Lev.25. 10; Isa.61. 1 also Luke 4. 18). Since the great Jubilee at the end of the second temple period was associated with the appearance of Melchizedek and his atonement sacrifice (11Q Melch), we have here a possible contemporary context for the words of institution. And again, there are the words of the early liturgies, which do not use the Exodus imagery of being the Chosen people and being liberated from slavery. We find in the Didache thanksgiving for the gifts of knowledge and eternal life, and for the Sacred Name dwelling in the hearts of those who have received the spiritual food (Didache 9-10). This, as we shall see, is priestly Wisdom imagery. The hope is for the ingathering of the scattered Church into the Kingdom. Bishop Sarapion (mid 4th century Egypt) prayed that his people would become living, i. e. resurrected, and able to speak of the mysteries, that the spiritual food would be the medicine of life to heal every sickness. Make us wise by the participation of the body and the blood. Let us now consider the words of Bishop Sarapions contemporary, St Basil of Caesarea, who died 379CE. In his treatise On the Holy Spirit, he emphasised the unwritten traditions of the Church. Where, he asked, do we find in writing anything about signing with the cross (at baptism), or about turning to the east to pray. Which of the saints has left us in writing the words of invocation (epiklesis) at the offering of the bread of the Eucharist and the cup of blessing? For, as it is well known, we are not satisfied with saying the words which the Apostle and the Gospel have recorded, but, before and after these words we add other words, on the grounds that they have great strength for the mystery. And these words we have received from the unwritten teaching. (On the Holy Spirit 66)
Origen had written something similar a century or so earlier, in his Homily 5 on Numbers. He compared these same Christian practices - praying towards the East, the rites of baptism and the Eucharist - to the secrets of the temple which were guarded by the priests. Commenting on Numbers 4, the instructions for transporting the tabernacle through the desert, he emphasised that the family of Kohath were only permitted to carry the sacred objects but not to see them. Only Aaron the high priest and his sons were permitted to see what was in the holy place; then they had to cover the sacred objects with veils before handing them to others, who were only permitted to carry them. The mysteries of the Church were similar, handed down and entrusted to us by the high priest and his sons. Origen does not say who this high priest was; we assume it was Jesus and his disciples, but Origen could have known a continuity between the Christian mysteries and those of the temple priesthood. Origen had close contact with the Jewish scholars in Caesarea and he knew at least one of what we nowadays call the Dead Sea Scrolls.
The duties of the priests were defined as guarding all matters concerning the altar and what was within the veil (Num.. 3.10; 18. 7 LXX), and as early as the letter of Ignatius to the Philadelphians, we read: Our own high priest is greater (than the priests of old) for he has been entrusted with the Holy of Holies and to him alone are the secret things of God committed (Phil.9). Clement of Alexandria used similar imagery: those who have the truth enter by drawing aside the curtain (Misc.7. 17). He knew that there were among the Hebrews some things delivered unwritten (Misc.5. 10). Origen too spoke often of the unwritten or secret tradition (e. g. Cels.3. 37; 6. 6; Preface to First Princ), the mystery established before the ages (On Mat.7. 2). Of the examples given by Basil, facing the east to pray and signing with a cross at baptism can be identified as customs dating back to the first temple. The Mishnah records that during Tabernacles, a procession would turn back at the eastern gate and face towards the temple saying: Our fathers when they were in this place turned with their backs towards the temple of the Lord and their faces towards the east and they worshipped the sun towards the east; but as for us, our eyes are turned toward the Lord (m. Sukkah 5. 4). This clearly refers to Ezekiels account of men in the temple facing east, holding branches before their faces and worshipping the sun (Ezek. 8. 16-8), presumably in a celebration akin to Tabernacles. The Therapeuts (Philo Cont.Life 27) and the Essenes (Josephus War 2. 128) also worshipped towards the rising sun, and the vision in Revelation 7 describes a great multitude holding palm branches, standing before the angel who came from the sunrise with the seal of the living God. Worshipping towards the east must have been a practice which distinguished the adherents of first temple customs from those favoured by the compilers of the Mishnah.
Signing with a cross was also a custom from the first temple. When Ezekiel received his vision of the destruction of Jerusalem, he saw the six angels of destruction and a seventh, who was instructed to pass through the city and mark a letter tau on the foreheads of those who were faithful to the Lord (Ezek 9. 4). In the old Hebrew alphabet, the tau is a diagonal cross, the sign which was also used when the high priest was anointed on his forehead (b. Horayoth 12a). The anointed high priest was distinguished from the one who only wore the garments of high priesthood (m. Horayoth 3. 4), and, since the true anointing oil had been hidden away in the time of Josiah (b. Horayoth 12a, b Kerittoth 5b), the tradition of anointing the high priest in this way must have been another first temple custom which was not observed during the second temple. Christian customs, then, perpetuated practices which had very ancient roots but had not been current in the second temple. Presumably the Christians also perpetuated the beliefs that accompanied those practices: the belief that the gift of Wisdom was good, for example, and that it made humans like gods (i. e. gave them eternal life), just as the serpent in Eden had said. We are not looking for continuity with the actual temple practices of the first century CE (nor with its scriptures), but with a remembered, perhaps idealised, system that was much older. We are looking for the temple destroyed in the time of Josiah, rather than the second temple which was condemned in the Enoch tradition as impure and polluted (1 En.89. 73). Where had this system been preserved? The Melchizedek Text has a possible reading about people in the last days whose teachers have been kept hidden and secret (as in DJD XXIII 11Q Melch 4-5). The Damascus Document is quite clear: a remnant knew the hidden things in which all Israel has gone astray and the examples given are his holy Sabbaths and his glorious feasts (CD III). These are usually interpreted as a dispute about the calendar and this was certainly a part of the problem. But only a part! There could well have been disputes over the significance and manner of observing those Sabbaths and feasts: They shall keep the Sabbath Day according to its exact interpretation and the feasts and the Day of Fasting according to the finding of the members of the New Covenant in the land of Damascus (CD VI). The problem concerned the Sabbath and especially the Day of Fasting i. e. the Day of Atonement.
This remnant is very similar to the group depicted in the Book of Revelation; the Damascus remnant are called by Name and stand at the end of days i. e. they are the resurrected to wear the sacred Name, just like the redeemed in the holy of holies at the end of the Book of Revelation (Rev. 22. 4), and also like those who participate in the Eucharist of the Didache or Sarapion. The group depicted in the Damascus Document and the Christians were guardians of the true teaching they keep the commandments of God and the visions of Jesus (Rev.12. 17). The writers of CD had similar concerns to those of the early Christians, although, as is well known, there were also important differences. What we seem to have here is a continuity; an awareness of what is behind the Hebrew Scriptures (what I called The Older Testament) that passed into the New Testament and then into the Liturgies.
Basils third example of unwritten tradition is the epiklesis at the Eucharist. The later forms of this prayer, known from the time of Cyril of Jerusalem (Catecheses 23. 7, died 387 CE), call on God the Father to send the Holy Spirit onto the bread and wine, but the earlier forms seem to have been different, calling for the Second Person, the Logos, the change the bread and wine. In Egypt in the middle of the fourth century, Bishop Sarapion prayed: O God of truth, let thy holy Word come upon this bread (epidemesato, literally dwell). . . The Liturgy of Addai and Mari is a problem; although acknowledged as important evidence for early practice, there is no agreement on the original form of the prayers. Dixs reconstruction offers a prayer addressed to the Second person, the Lord who put on our manhood: May there come O my Lord, thy Holy Spirit and rest upon this oblation of thy Servants.. . Later prayers speak of the Spirit being sent but these examples of early practice imply that the divinity addressed came to the bread and wine. There is some confusion in the earliest texts because they can call the Second Person either Word or Spirit, as did Philo for whom the Word and Wisdom were equivalents. Possibly the earliest evidence of all, apart from the New Testament, is the Didache, which concludes with the Maranatha, praying for the Lord to come. Given the temple and priestly context of Basils other unwritten traditions, it is likely that the epiklesis also originated there, in the prayers for the Lord to come to the temple. The tabernacle had been built so that the Lord could dwell there (Exod.25. 8 Lxx appear) and could speak to Moses from between the cherubim on the ark (Exod 25. 22). When the tabernacle was completed, the Glory of the Lord came to fill the tabernacle (Exod.40. 34), as it also came to fill the newly built temple (1 Kgs 8. 11). Ezekiel later saw the Glory leaving the polluted temple (Ezek.11. 23). Isaiah had seen the Lord enthroned in the temple (Isa.6); and the Third Isaiah prayed that the Lord would rend the heavens and come down (Isa.64. 1). Several passages in the later Merkavah texts have suggested to scholars that drawing the Lord down into the temple was a major element of the temple service. Moshe Idel concluded: We can seriously consider the possibility that temple service was conceived as inducing the presence of the Shekinah in the Holy of Holies. So where might the Maranatha prayer have originated? The rituals performed in the Holy of Holies are still as veiled as they ever were, but we can at least place them in their original setting. The tabernacle/temple replicated the days of the creation. Moses began to erect it on the first day of the year, and each stage corresponds to one of the days of creation (Exod.40. 16-33). The veil corresponded to the firmament set in place on the second day, to separate what was above from what was below. Everything beyond the veil corresponded to Day One, beyond the visible world and beyond time. This seems to have been an ancient pattern, but the Hebrew and Greek texts of Exodus are notoriously divergent, and any discussion of the affairs of the holy of holies was forbidden. The creation of the angels on Day One was as sensitive issue, as were their names, and the prohibition in the Mishnah concerned the secrets of the holy of holies which the priests had to guard: the story of the creation, the chapter of the chariot, what is above, beneath, before and hereafter (m Hag 2. 1). The rituals of the holy of holies were thus taking place outside time and matter, in the realm of the angels and the heavenly throne, and those who functioned in the holy of holies were more than human, being and seeing beyond time. Psalm 110 (109), is obscure (perhaps obscured) in the Hebrew. The Greek, however, describes how the king is born as the divine son in the glory of the holy ones, i. e. in the holy of holies, and declared to be the Melchizedek priest. The last words of David describe him as one through whom the Spirit of the Lord has spoken, a man who was anointed and raised up (qwm, anestesan kurios), a word that could also be translated resurrected (2 Sam.23. 1). This is how it must have been understood at the end of the second temple period, because the Letter to the Hebrews contrasts the Levitical priests and Melchizedek; the former have their position due to descent from Levi, but Melchizedek has been raised up (anistatai) with the power of indestructible life (Heb.7. 15-16). The Chroniclers account of Solomons enthronement says that he sat on the throne of the Lord as king, and the people worshipped the Lord and the king (1 Chron.29. 20-23). That the Davidic monarchs had indeed become God and King in the holy of holies, and that this had not been forgotten, is confirmed by Philos extraordinary statement about Moses: he became god and king when he entered the darkness where God was (Moses I.158). In his vision, Ezekiel saw this divine and human figure enthroned, the glory of the Lord in human form (Ezek.1. 26-28), and the later account of the tabernacle in Exodus 25 remembered the king on his cherub throne as the voice of the Lord above the kapporeth, between the cherubim (Exod.25. 22). The holy of holies was the place of the pre-created light of Day One, but in the temple this was in fact the darkness of the divine presence in the holy of holies. Texts which describe what happened before the world was created, or what happened in eternity, are describing rituals in the holy of holies, presumably the secrets from beyond the curtain which Jesus is said to have taught (e. g. Clement Misc.6. 7; 7,17; Origen Cels. 3. 37: Jesus beheld these weighty secrets and made them known to a few: Origen on Mat.7. 2 . . . the mystery established before the ages). Thus Psalm 110 is telling us that the divine son was born in eternity. When Enochs second parable says that the Son of Man was named before the Lord of Spirits, before the sun and signs were created, it indicates a naming ritual in the holy of holies, most likely when the human figure was given the Sacred Name (1 En.48. 2-3). After this he was enthroned and for his people he was Immanuel, God With Us. The reference in Philippians 2 shows that the sequence of the ritual was still known at the end of the first temple period, and used to set the death of Jesus in one particular context. The Servant is exalted and given the Name because he has died. He nevertheless reigns in heaven and receives homage whilst enthroned. In other words, the one who bears the Name is resurrected, just as David had claimed in his last words, and just as the writer to the Hebrews claimed for Melchizedek. There is a similar pattern in Daniel 7, where the human figure goes with clouds - the clouds of incense with which the human figure entered the holy of holies - and is offered before the Ancient of Days (Dan.7. 13). He is then enthroned and given the kingdom of eternity. A similar sequence appears in the second parable of Enoch, where the Man figure goes to the Head of Days and the blood of the Righteous One is offered (1 En.47. 1). The Lord was enthroned on the kapporeth over the ark, the place of atonement. The ascent of the human figure was associated with the offering of blood, but the only blood offering made in the holy of holies itself was the offering on the Day of Atonement. What, then, happened on the Day of Atonement? This was one of the issues on which Israel had gone astray, according to the Damascus Document. It used to be said that the ritual prescribed in Leviticus 16 was a relatively late addition to the lore of the temple, but scholars are now moving towards the view that this was one of the most ancient practices. Few details are given in Leviticus, although the shape of the ritual is clear enough. The high priest took blood into the holy of holies and as he emerged, he sprinkled certain parts of the temple to cleanse it and hallow it from all the uncleannesses (tumot) of the people of Israel (Lev.16. 19). He entered the holy place in great fear, because the Lord would appear to him over the kapporet (Lev.16. 2). Since the temple was a microcosm of the whole creation, atonement was a ritual to cleanse and renew the creation at the beginning of the year. The Mishnah gives more detail of where the blood was sprinkled, and adds that what was left was poured out at the base of the altar (m Yoma 5. 4-6). The high priest also prayed when he was in the temple, but what he said is not recorded. Only the words used outside the temple appear in the Mishnah.
Robertson Smith, in his Lectures on the Religion of the Semites (delivered in 1888-89 and first published in 1894) observed: The worship of the second temple was an antiquarian resuscitation of forms which had lost their intimate connection with the national life and therefore had lost the greater part of their original significance, but according to the Jewish Encyclopaedia, atonement was the keystone of the sacrificial system of post exilic Israel. In other words, the extent of our ignorance about the Day of Atonement is the extent of our ignorance about Israels earlier religion, and what we read in the post exilic texts may not be the best source of information about the original rite. There is, for example, no certain reference to Aaron or his priests in any pre-exilic text. Even Ezekiel, who was a priest in the first temple, does not mention him. The Elephantine texts, which give a glimpse of Jewish life in Egypt in the sixth and fifth centuries, often mention priests but never Aaron, nor Levi nor the Levites. Any rites and duties associated with Aaron probably came from the older royal priesthood of Melchizedek. Since there have already been other indications that Basils unwritten traditions, including the epiklesis, had their ultimate origin in the cult of the first temple, it is likely that any misconception about the Day of Atonement will have had serious consequences for understanding the roots of the Christian liturgy. What was the high priest doing when he made atonement? According to Numbers 25. 6ff, the family of Aaron was given the covenant of eternal priesthood because Phineas had been zealous to preserve the covenant. Atonement was acting to protect the covenant of peace, elsewhere described as the eternal covenant or the everlasting covenant between God and every living creature (Gen.9. 16). Isaiah described how the pollution of human sin caused the covenant to collapse (Isa.24. 4-6) with heaven and earth withering away. Atonement renewed it. Aaron protected the people from the consequences of breaking the covenant by burning incense: Take your censer. . . and make atonement for them. . . for wrath has gone forth from the Lord (Num.17. 46 English numbering). More commonly, atonement was effected by blood: I have given blood for you upon the altar to make atonement for your souls. . . (Lev.17. 11). Blood renewed the eternal covenant which had been destroyed by human sin. Since the temple was the microcosm of the creation, the temple ritual to renew the covenant also renewed the creation. Hence the famous words attributed to the high priest Simeon the Just: By three things is the world sustained: by the Law, by the temple service and by deeds of loving kindness (m. Aboth 1. 2). On the Day of Atonement the eternal covenant was renewed, and blood was sprinkled to remove the effects of sin. The blood was brought out from the holy of holies; in temple symbolism, this was new life brought from heaven to renew the earth. But whose life? Two goats were necessary for the Day of Atonement, and the customary rendering of Leviticus 16. 8 is that one goat was for the Lord and the other goat for Azazel. This way of reading the text has caused many problems, not least why any offering was being sent to Azazel. One line in Origens Contra Celsum may provide vital evidence here. He says that the goat sent into the desert represented Azazel. If this was correct, then the sacrificed goat must have represented the Lord. The le meant as the Lord not for the Lord, and Israel did not, after all, make an offering to Azazel. The blood which renewed the creation was new life from the Lord. Since the high priest himself represented the Lord, wearing the Sacred Name on his forehead, we have here a ritual in which the Lord was both the high priest and the victim in the act of atonement. The argument in the Letter to the Hebrews implies that the older practice of substitution had been superseded and that the annual rite was no longer necessary: When Christ appeared as a high priest. . . he entered once for all in to the holy place, taking not the blood of goats and calves, but his own blood thus securing an eternal redemption. . . (Heb.9. 11-12). The high priest had entered heaven with the blood of the great atonement, and the origin of the Parousia expectation was that the high priest would return to complete the atonement and renewal of the creation. Hence Peters speech in Solomons portico: Repent, therefore, and turn again, that your sins may be blotted out, that times of refreshing may come from the presence of the Lord, and that he may send the Christ appointed for you, whom heaven must receive until the time for establishing all that God spoke through the mouth of his holy prophets. . . (Acts 3. 12-23). The story of the Last Supper depicts Jesus renewing the Eternal Covenant. As the great high priest it was his own blood that would renew the covenant and put away sins. None of the other covenants described in the Hebrew Scriptures concerns putting away sin. Hence when the Last Supper was repeated in early worship, they prayed for the return of the high priest to complete the great atonement: Maranatha. As time passed and the Parousia hope faded, the significance of the original epiklesis changed, and what had begun as a temple ritual fulfilled in history, returned to being a ritual. The roots of the Christian Eucharistic Liturgy lie mainly in the Day of Atonement, understood as the renewal of the creation, and this, as we shall see, passed into the words of the Liturgies.
Another root of the Eucharistic Liturgies is found in the temple ritual for the Sabbath, the Shewbread. Twelve loaves made from fine flour were set out in the temple every Sabbath on a table of gold, and incense was set with them. It was described as a most holy portion for the high priests (Aaron and his sons Lev.24. 9), to be eaten in a holy place on the Sabbath. As with the other temple furnishings and rituals, nothing is said about meaning; we have to guess. First, the bread was placed on a table in the temple, the only cereal offering to be taken inside. The Mishnah records that there were two tables in the porch outside the temple; On the table of marble they laid the Shewbread when it was brought in, and on the table of gold they laid it when it was brought out, since what is holy must be raised and not brought down (m. Menahoth 11. 7). In other words, the bread acquired holiness whilst it was in the temple, and, since it was classed as most holy (Lev.24. 9), it would have imparted holiness to the men who consumed it. Others who even came near the holiest things were in danger of death (Num.4. 19). The priests who ate the goat of the sin offering, most holy food, were thereby enabled to bear the iniquity of the congregation and thus make atonement for them (Lev.10. 17). Something similar was said of Aaron when he wore the Name of the Lord on his forehead; he was empowered to bear the guilt of the offerings (Exod.28. 38). Those who ate the Shewbread must have acquired some power. All the cereal offerings had a special significance, although the details are now lost. They are ranked with the sin offering hattath and the guilt offering `asam, and mentioned first in the list, (Num.18. 9; Ezek 44. 29); they had to be stored and eaten in the holy chambers within the temple court (Ezek.42. 13). The Shewbread, like the other cereal offerings, was described as an `azkarah, memorial offering, although how exactly this was understood is not clear. The text of Leviticus 24. 7 implies that the incense on the table was the memorial offering, but the Targums here describe the Shewbread as the Bread of Memorial before the Lord, suggesting that this is how it may have been understood at the end of the second temple period. The extreme holiness of the Shewbread is confirmed by the fact that when the desert tabernacle was moved, the ark and the table of Shewbread were the only items to have three covers (Num.4. 5-8). The lamp, the incense altar and the other sanctuary vessels were wrapped in a blue cloth and a leather cover, but in addition to these, the ark was first covered by the veil, and the table by a scarlet covering. The bread in the temple was an eternal covenant. The regulations in Leviticus are brief and enigmatic; the bread has to be set in place each Sabbath an eternal covenant (Lev.24. 8). The Sabbath itself was described as an eternal covenant, marking the completion of the creation (Exod 31. 16). The rainbow was another sign of the eternal covenant: and when the bow is in the clouds, I will look upon it and remember the eternal covenant between God and every living creature (Gen.9. 16). Might this have been the significance of the bread set before the Lord each Sabbath, a memorial of the eternal covenant? The rainbow came to be seen as a sign of the divine presence; Ezekiel had described the Glory as a rainbow (Ezek.1. 28) and stories were told of a rainbow appearing as the great rabbis were teaching (e. g. b. Hagigah 14b). In the later Merkavah texts, the Servant who bore the Sacred Name was wrapped in a rainbow, as had been the high priest Simeon when he emerged from the sanctuary on the Day of Atonement (b. Sira 50. 7). The heavenly throne in Revelation was wreathed in a rainbow (Rev.4. 3) as was the Great Angel in Johns vision of the Parousia, who returned from heaven wrapped in a cloud and a rainbow, with his face shining like the sun (Rev.10. 1). If the Shewbread was similarly a sign of the eternal covenant, the term lehem panim, bread of face/presence could mean rather more than just bread put out before the Lord? There are several places in the Hebrew Scriptures where panim was used as a circumlocution for the Lord himself, as can be seen from the LXX. Thus My presence will go with you (Exod.33. 14) was translated I myself will go. . . autos and Moses response If your presence will not go with me. . . became If you yourself do not go with me. . . autos. He brought you out of Egypt with his own presence (Deut 4. 37) became He himself led you out autos. The Angel of his presence saved them (Isa.63. 9) became Not an ambassador nor an angel, but he himself saved them. This latter is emphatic; the angel of the Presence was the Lord himself. Perhaps this is how Bread of Presence should be understood; it would certainly explain the great holiness of the Shewbread and the special status of the table on which it rested. So much information about the temple has disappeared and has to be reconstructed from allusions elsewhere. There were, for example, libation vessels kept on the Shewbread table (Exod.25. 29 cf 1 Kgs 7. 50), but there is no record of how these were used in the temple. There had been meals in the temple; the elders who saw the God of Israel on Sinai and ate and drank in safety before him is an encoded reference to this (Exod.24. 11). So too, perhaps, Psalm 23: the table set before the anointed one, who would dwell in the house of the Lord forever, and the belief that the ruler in Israel would come forth from the House of bread, beth lehem (Mic.5. 2). For the rest, we look in the shadows and and listen for echoes. In the Midrash Rabbah we find: Melchizedek instructed Abraham in the laws of the priesthood, the bread alluding to the Shewbread and the wine to libations(R.Gen XLIII. 6). The House of Wisdom is the tabernacle, and Wisdoms table is Shewbread and wine (R.Lev.XI. 9). In this world you offer before me Shewbread and sacrifices, but in the world to come I shall prepare for you a great table (followed by a reference to Ps 23, R.Num.XXI. 21). Another mystery is the investiture described in the Testament of Levi. Levi saw seven angels giving him the insignia of high priesthood and he described the ritual: he was anointed, washed with water and then fed bread and wine, the most holy things, before eventually receiving the incense (T.Levi 8. 1-10). These rituals bear some resemblance to those in Leviticus 8: washing, vesting, crowning and anointing, but there is nothing in T.Levi about smearing blood and eating the boiled flesh of the offerings. Did the Testament of Levi recall the older ritual, the Melchizedek ritual which involved the bread and wine? And if so, who had preserved this knowledge since the destruction of the first temple? Wisdom and her house is a another recurring theme with the Shewbread This suggests it was an element in the cult of the first temple, where Melchizedek was high priest, and Wisdom was the Queen of Heaven, the patroness of the city. The importance of the Shewbread in that cult may account for the later silence in official texts and the consistent echoes elsewhere. The offerings to the Queen had been cakes, libations and incense (Jer.44. 18-19), and the refugees in Egypt after 586BCE, reminded Jeremiah that this cult had been abandoned with disastrous consequences for Jerusalem. Wisdom was remembered for her table. The poem in Proverbs 9 is much interpolated, but it is still clear that Wisdom offers the bread and wine of her table to those who seek the way of insight (Prov.9. 5-6). Ben Sira promises the man who has Wisdom that she will meet him like a mother and welcome him like a wife, feeding him with the bread of understanding and the water of wisdom (Ben Sira 15. 2-3). Wisdom herself promises that those who eat of her will long for more (Ben Sira 50. 21), and we know from elsewhere that the gift of Wisdom brought eternal life (e. g. Wisdom 8. 13). Recall for a moment the Damascus Document, that a remnant had kept the true ways when Israel had gone astray over the Sabbath and the Day of Atonement. The temple ritual for the Sabbath was the renewal of the Shewbread, a high priestly ritual, and the Day of Atonement was the major high priestly ritual. There is a conspicuous silence about both of them, but such fragments as can be recovered correspond to elements in Christian ritual; to liturgies and related writings, and even, at a later period, to church architecture. This may have been a conscious imitation of the temple at a later stage, rather than an unbroken tradition from earliest times, but even this most sceptical position implies an expert knowledge not only of the temple, but of the older traditions which had been th cause of such controversy. It is more likely that the tradition came through from the time when these were still living issues, and gave rise to the original claim that Jesus was the Melchizedek high priest. Now for a few comparisons. First, with the Shewbread, the memorial offering, associated with Wisdom and her invitation: Those who eat me will hunger for more, (b. Sira 24. 21), and with Melchizedek the resurrected high priest. It was eaten by the the high priests who wore the Sacred Name, and was their most holy food. Eusebius wrote: Our Saviour Jesus, the Christ of God, even now today performs through his ministers sacrifices after the manner of Melchizedek (Proof 5. 3). In the Didache they gave thanks over the bread for life and knowledge, and after partaking, gave thanks for the Sacred Name dwelling in their hearts, knowledge, faith and immortality (Didache 9-10). Bishop Sarapion prayed: Make us wise by the participation of the body and the blood. The prothesis prayer of the Coptic Jacobites preserves the Shewbread tradition: Lord Jesus Christ.. . the living bread which came down from heaven. . . make thy face shine upon this bread and upon this cup which we have set upon thy priestly table. To this day the lectionary of the eastern churches prescribes Proverbs 9, Wisdoms invitation to her feast of bread and wine, as the reading for MaundyThrusday. Perhaps the words which Luke and Paul (Luke 22. 19; 1 Cor.11. 24) attributed to Jesus: Do this in remembrance of me were originally Do this as my memorial offering, my `azkarah, and the bread was the new Shewbread
Second, the Day of Atonement, when the high priest, who was the Lord, entered heaven carrying blood which represented the life of the Lord. It was sprinkled on the throne, and then brought out into the visible world to renew the eternal covenant and restore the creation. The ritual represented and anticipated the Day of the Lord, when he would judge those on earth, banish evil and establish his kingdom. A key text was Deuteronomy 32. 43: the Lord emerging from heaven to judge his enemies and atone the land. The Day of Atonement is the only possible source of the both high priest and victim belief associated with the Eucharist. Thus Narsai (Hom XVIIA): The priest. . . celebrating this sacrifice, bears in himself the image of our Lord in that hour. . . Origen interpreted the Eucharist as the Day of Atonement offering: Christ the true high priest who made atonement for you. . . hear him saying to you: This is my blood which is poured out for you for the forgiveness of sins (On Leviticus 9). As early as the Letter of Barnabas, the Day of the Lord was linked to the goat offered on the Day ofAtonement (Barn.7) and Justin knew that the sacrificed goat prefigured the Second Coming (Trypho 40), Cyril of Alexandria wrote: We must perceive the Immanuel in the slaughtered goat. . . the two goats illustrate the mystery (Letter 41). Bishop Sarapions Eucharist was the Day of Atonement; he prayed for the medicine of life. . . and not condemnation. He prayed for angels to come and destroy the evil one and establish the Church, in other words, for the banishing of Azazel and the establishing of the Kingdom. The Liturgies of Addai and Mari, of John Chrysostom and of James all have similar themes: remission of sins, enlightenment, access to the Lord, life in the Kingdom.
A recurring theme is fear and awe, the fear which the high priest felt as he entered the holy of holies on the Day of Atonement. Thus Narsai (Hom XVIIA, late fifth century): The dread mysteries. . . let everyone be in fear and dread as they are performed. . the hour of trembling and great fear. Cyril of Jerusalem speaks of the most awful hour and the most awful sacrifice (Mystagogical Lectures 5. 4,9). The Nestorian Liturgy speaks of the great fearful holy life giving divine mystery, and the priest prays in the words of Isaiah: Woe is me. . for mine eyes have seen the Lord of Hosts and. like Moses before the ark he says I have seen the Lord face to face. Throughout the liturgies, the imagery is of the holy of holies and the angel hosts. Just as the ancient kings had been born in the glory of the holy ones, and were thus raised up, so too the bread and wine was raised up at the moment of consecration. Thus Narsai (Hom XVIIA), having described the awe and stillness in the sanctuary at the moment of consecration, continued: The Spirit which raised him from the dead comes down now and celebrates the mysteries of the resurrection of his body. The consecration was the resurrection: the power of the Godhead comes upon the oblation, and completes the mystery of our Lords resurrection from the dead 9 Narsai Hom XVIIA). Thus the Lord emerging from the holy of holies on the Day of Atonement, accompnaied by the angel hosts, became the procession when the bread and wine from the sanctuary. Narsai again: Thousands of Watchers and ministers of fire and spirit go forth with the resurrected Lord, and the people rejoice when they see the Body setting forth from the midst of the altar. Finally, the setting of the Liturgy. The Altar in a traditional Christian church, is set apart, in an orthodox church literally beyond the veil. It must have derived from the kapporeth, the place of atonement in the temple, where the Lord was enthroned. In the eastern churches, the altar is known as the throne, and in some of their traditions, drawing a curtain across the holy place is still part of the liturgy. Early sources speak of the cherubim of the altar and in Ethioppian churches, there is an ark in the sanctuary. Finally, there is the preparation the bread of the Eucharist in the Orthodox tradition. The priest sacrifices the loaf and then removes the central portion to mix with the wine in the chalice. An exactly similar procedure was used from the Day of Atonement sin offering according to the Letter of Barnabas . Respectively E Werner The Sacred Bridge
London New York 1959 p 11 and W. Oesterley The Jewish
Background to the Christian Liturgy p 87
F.W.Dillistone The Christian Understanding of Atonement Weleyn 1968 p. 47. The Mystery of Salvation 1995 pp 96ff
Although Palm Sunday is clearly a Tabernacles procession, as described in m. Sukkah 4. 5
B Longenekkar The Unbroken Messiah New Testament Studies 41 (1995) pp. 428-441 suggests why the unbroken Passover might have been significant for John.
Acts 6. 7 Many priests joined the Church.
Eusebius History 6. 16 a scroll in a jar near Jericho.
See my The Secret Tradition Journal of Higher Criticism 2. 1 1995 pp. 31-67
LXX Amos 3. 12 refers to those priests in Damascus as a remnant, along with Samaria, of something destroyed. See J.Sawyer Those Priests in Damascus Annual of the Swedish Theological Institute viii. 1970. 7 pp 123-130. CD Ms B also mentions the saving power of the mark described by Ezekiel.
My book of that name, published London 1987
Cf The Acts of Thomas 27, an epiklesis over the anointing oil Come Thou Holy Name of the Christ, with come repeated eight times, after which the anointed see a human form and then at dawn share the bread of the Eucharist.
Compare the reconstructions in G.Dix The Shape of the Liturgy Black London 1945 pp. 178ff and A Gelston The Eucharistic Prayer of Addai and Mari Oxford 1992 pp 49ff. e. g. Justin on Luke 1. 31 the Spirit and the Power of God are the Word, Apol 1. 33: also my The Great Angel, London 1992 p130. Solomon prayed for Wisdom to come to him. The later text probably preserves the original significance of this Wisd. 8. 13). She gave immortality. The older text is sanitised; Solomon went to the great high place at Gibeon and there asked for Wisdom (I Kgs 3. 6-9). M. Idel Kabbalah. New Perspectives. New Haven and London 1988p. 168
Presumably this was the original context of Isa.9. 6-7
A similar sequence appears in 3 En.13-15
This is a possible reading of hqbrwhy cf Ezra 6. 10,17 and B130 of Theodotion where prosechthe or prosenechthe in sacrificial sense,
the whole sequence is that of Dan.7; there is even the textual confusion in 47. 4, where one text tradition has qareba = offered and the other has baseha = come. See R.H. Charles The Book of Enoch 1912 p. 92
E.g. J Milgrom Leviticus New York 1991
W.R.Smith Lectures on the religion of the Semites 3rd edn London 1927 p. 216. A Cowley Aramaic Papyri of the Fifth Century BC. Oxford 1923 p. xxii
It may be significant that Jesuss first Sabbath controversy mentioned the eating of the Shewbread and who was permitted to do this Mark. 2. 23-28. LXX says salt was set with the loaves also. The most holy items were deemed to impart holiness e. g. the altar Exod 29. 37; it vessels Exod 30. 29; the cereal offering eaten in the holy place Lev.6. 17-18 English numbering;
HHence the original significance of the commandment not to bear the Name of the Lord lightly, for the Lord will not hold him guiltless. . . (Exod.20. 7)
The Onkelos and Palestinian Targums agree. Schaefer #396,398
See my The Revelation of Jesus Christ Edinburgh 2000, pp. 180-182, 264
A similar emphasis is found in later Jewish texts. See J Goldin Not by means of an angel and not by means of a messenger in Religions in Antiquity. Essays in Memory of E R Goodenough ed. J Neusner (Supplements to Numen XIV) Leiden 1970
T Onkelos Lev 24. Describes the Shewbread as the most sacred of the oblations. V.A.Hurowitz Solomons Golden Vessels (I Kings 7. 48-50) and the Cult of the First Temple in Pomegranates and Golden Bells, Ed D.P.Wright, D.N.Freedman, A Hurvitz Winona Lake 1995, pp. 151-164, suggests that the P source shows the reformed cult, and that the incorporated older lists of vessels are signs that the original cult was more anthropomorphic. Reading with R.H.Charles
See also H.L.Jansen The Consecration in the Eighth Chapter of the T Levi in The Sacral Kingship. Proceedings of the Eighth International Conference for the History of Religions Rome 1955 , Leiden 1959, pp. 356-365. Mary Douglas The Eucharist; Its Continuity with the Bread Sacrifice of Leviticus Modern Theology 15. 2 (1999) pp. 209-224, draws similar conclusions, using the methods of an anthropologist and on the basis of a different seet of materials. Building on A Marx Les Offrandes Vegetales dans lAncien Testament; du tribut au repas eschatologique, Leiden 1994, that the cereal and animal sacrifices are parallel systems, she demonstrates first why the inner parts of the animal that were offered as the holiest portion, and what goes for the animal, goes for the loaf of bread, p. 223. The vese has a significantly shorter fom in the MT than in 4Q Deutq or the LXX. eg Copts. Armenians
The temple/ church parallels are worked out in the greatest detail in Germanus of Constantinople On the Divine Liturgy (early eighth century). See K.E.McVey The Domed Church as Micrcosm; the Literay Roots of an Architectural Synbol Dumbartn Oaks Papers 37 (1983). PDF File of this article
Back to Jewish Roots of Eastern Christian Mysticism Webpage | 008_6103073 | {
"id": "<urn:uuid:aecc006f-b4be-42a3-baf7-fd7b906435dc>",
"dump": "CC-MAIN-2016-22",
"url": "http://www.marquette.edu/maqom/roots.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049276131.38/warc/CC-MAIN-20160524002116-00196-ip-10-185-217-139.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.965725302696228,
"token_count": 10411,
"score": 3.046875,
"int_score": 3,
"uid": "008_6103073_0"
} |
Gas Simulation Computer Lab
This simulation activity is to be used with the online PhET gas simulator. (website included) This inquiry based activity is perfect for introducing gas laws. Prior knowledge of gas behaviors is not needed. The activity allows students to discover and explore the relationship between pressure, temperature and volume. The simulator requires Java so it cannot be accessed using an Apple device. Students can work independently and should be able to complete in 55 minutes. Students can also complete at home or with a partner if modifications are needed. | 012_4669325 | {
"id": "<urn:uuid:6b8c3ebf-4bc7-473a-a6fe-8d85ea073793>",
"dump": "CC-MAIN-2017-17",
"url": "https://www.teacherspayteachers.com/Product/Gas-Laws-Activity-Simulation-Computer-Lab-2527038",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917119637.34/warc/CC-MAIN-20170423031159-00324-ip-10-145-167-34.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9199901223182678,
"token_count": 106,
"score": 3.109375,
"int_score": 3,
"uid": "012_4669325_0"
} |
This article needs additional citations for verification. (May 2017) (Learn how and when to remove this template message)
In much of a digestive tract such as the human gastrointestinal tract, smooth muscle tissue contracts in sequence to produce a peristaltic wave, which propels a ball of food (called a bolus while in the esophagus and upper gastrointestinal tract and chyme in the stomach) along the tract. Peristaltic movement comprises relaxation of circular smooth muscles, then their contraction behind the chewed material to keep it from moving backward, then longitudinal contraction to push it forward. After food is chewed into a bolus, it is swallowed and moved through the esophagus. Smooth muscles contract behind the bolus to prevent it from being squeezed back into the mouth. Then rhythmic, unidirectional waves of contractions work to rapidly force the food into the stomach. The migrating motor complex (MMC) helps trigger peristaltic waves. This process works in one direction only and its sole esophageal function is to move food from the mouth into the stomach (the MMC also functions to clear out remaining food in the stomach to the small bowel, and remaining particles in the small bowel into the colon). In the esophagus, two types of peristalsis occur:
- First, there is a primary peristaltic wave, which occurs when the bolus enters the esophagus during swallowing. The primary peristaltic wave forces the bolus down the esophagus and into the stomach in a wave lasting about 8–9 seconds. The wave travels down to the stomach even if the bolus of food descends at a greater rate than the wave itself, and continues even if for some reason the bolus gets stuck further up the esophagus. - In the event that the bolus gets stuck or moves slower than the primary peristaltic wave (as can happen when it is poorly lubricated), stretch receptors in the esophageal lining are stimulated and a local reflex response causes a secondary peristaltic wave around the bolus, forcing it further down the esophagus, and these secondary waves continue indefinitely until the bolus enters the stomach. The process of peristalsis is controlled by the medulla oblongata. Esophageal peristalsis is typically assessed by performing an esophageal motility study. Once processed and digested by the stomach, the milky chyme is squeezed through the pyloric sphincter into the small intestine. Once past the stomach, a typical peristaltic wave only lasts for a few seconds, travelling at only a few centimeters per second. Its primary purpose is to mix the chyme in the intestine rather than to move it forward in the intestine. Through this process of mixing and continued digestion and absorption of nutrients, the chyme gradually works its way through the small intestine to the large intestine. In contrast to peristalsis, segmentation contractions result in that churning and mixing without pushing materials further down the digestive tract. Although the large intestine has peristalsis of the type that the small intestine uses, it is not the primary propulsion. Instead, general contractions called mass movements occur one to three times per day in the large intestine, propelling the chyme toward the rectum. Mass movements often tend to be triggered by meals, as the presence of chyme in the stomach and duodenum prompts them. The human lymphatic system has no central pump. Instead, lymph circulates through peristalsis in the lymph capillaries, as well as valves in the capillaries, compression during contraction of adjacent skeletal muscle, and arterial pulsation. The earthworm is a limbless annelid worm with a hydrostatic skeleton that moves by peristalsis. Its hydrostatic skeleton consists of a fluid-filled body cavity surrounded by an extensible body wall. The worm moves by radially constricting the anterior portion of its body, resulting in an increase in length via hydrostatic pressure. This constricted region propagates posteriorly along the worm's body. As a result, each segment is extended forward, then relaxes and re-contacts the substrate, with hair-like setae preventing backwards slipping. A peristaltic pump is a positive-displacement pump in which a motor pinches advancing portions of a flexible tube to propel a fluid within the tube. The pump isolates the fluid from the machinery, which is important if the fluid is abrasive or must remain sterile. - Catastalsis is a related intestinal muscle process. - Aperistalsis refers to a lack of propulsion. It can result from achalasia of the smooth muscle involved. - Basal electrical rhythm is a slow wave of electrical activity that can initiate a contraction. - Ileus is a disruption of the normal propulsive ability of the gastrointestinal tract caused by the failure of peristalsis. - Retroperistalsis, the reverse of peristalsis
Notes and referencesEdit
- "Earthworm - Muscular System". [self-published source? ]
- "Online Etymology Dictionary". etymonline. com. Retrieved 2016-06-30. - Marieb, Elaine N. & Hoehn, Katja "Human Anatomy & Physiology" 8th Ed., Benjamin Cummings/Pearson, 2010[page needed]
- William O. Reece (21 March 2013). Functional Anatomy and Physiology of Domestic Animals. John Wiley & Sons. pp. 451–. ISBN 978-1-118-68589-1. - Quillin KJ (May 1998). "Ontogenetic scaling of hydrostatic skeletons: geometric, static stress and dynamic stress scaling of the earthworm lumbricus terrestris". The Journal of Experimental Biology. 201 (12): 1871–83. PMID 9600869. - Sangok Seok, C.D. Onal; et al. (2010-05-07). "Peristaltic locomotion with antagonistic actuators in soft robotics" (PDF). Massachusetts Institute of Technology. Retrieved 2014-11-20. - Alexander Boxerbaum (2010-05-10). "A New Form of Peristaltic Locomotion in a Robot". YouTube. Retrieved 2014-11-20. - Interactive 3D display of swallow waves at menne-biomed. de
- Peristalsis at the US National Library of Medicine Medical Subject Headings (MeSH)
- Essentials of Human Physiology by Thomas M. Nosek. Section 6/6ch3/s6ch3_9. - Overview at colostate. edu | 010_929016 | {
"id": "<urn:uuid:dcb10943-d0f5-433b-87c8-1a4dcb6bda44>",
"dump": "CC-MAIN-2019-22",
"url": "https://en.m.wikipedia.org/wiki/Peristalsis",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232258862.99/warc/CC-MAIN-20190526065059-20190526091059-00046.warc.gz",
"language": "en",
"language_score": 0.8565195202827454,
"token_count": 1406,
"score": 3.765625,
"int_score": 4,
"uid": "010_929016_0"
} |
The ecological devastation of Malaysia and Indonesia involves illegal logging, slash and burn agriculture, mining, palm oil cultivation, habitat loss, and climate change. Although many aspects of this crisis are well documented, the human consequences are difficult to quantify and remain under-reported. "Mist and Mystery: Borneo’s Vanishing Landscape" will examine the problem through the eyes of its native inhabitants‚ those most directly affected by it. The central character, Wendi Tamariska, is a member of the area’s indigenous Indians known as the Dayak. Some Dayak have maintained that their native lands are not for sale at any price. Others have agreed to partner with companies interested in obtaining the natural resources found within their tribal territory. Supporting the narrative are a variety of personalities, including a cartographer mapping the historical hunting grounds of the Dayak, a veterinarian fighting to save the world’s remaining Bornean orangutans, a shift-worker at a sustainable palm oil processing facility in Sarawak, and an ecotourism guide in the pristine Maliau Basin Conservation Area.
These diverse people each experience the issues connected to Borneo’s deforestation in their own way. By weaving together their stories, this film will outline their challenges and point to a number of realistic and achievable solutions available to help curb the effects of the destruction. | 002_6636905 | {
"id": "<urn:uuid:2279a55b-7c15-469f-93f1-adc5c87ad6ce>",
"dump": "CC-MAIN-2017-43",
"url": "http://pulitzercenter.org/projects/mist-and-mystery-borneos-vanishing-landscape",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187820930.11/warc/CC-MAIN-20171017072323-20171017092323-00835.warc.gz",
"language": "en",
"language_score": 0.9428694248199463,
"token_count": 284,
"score": 2.890625,
"int_score": 3,
"uid": "002_6636905_0"
} |
In diets for rental (renal) and diabetic patients you have to choose food which is helpful for both the diseases. For diabetes patient excessive consumption of protein is harmful. Hence, doctors recommend that renal diabetic patient should consume balanced amount of protein and avoid high-protein diets. They have to eat limited amount or avoid foods that contain high amount of cholesterol. They should also reduce fatty intake and consume foods with low levels of potassium. Diabetes is the main cause of kidney failure. The excess blood sugar damages the nerves and capillaries which support kidney functions. So, along with diet renal diabetic patients should monitor their blood sugar levels daily and should exercise regularly. All diabetic diet rules are applicable for renal diabetic diets. In diabetic diet, control of carbohydrate is the main part. Starches, milk products, fruits, candies, pudding, cakes and sweets are carbohydrate containing foods. It is important to eat recommended amount of carbohydrates, because it affects our blood glucose level more than fats and proteins. Carbohydrate counting is a diabetic meal planning system which is based on counting the servings of carbohydrates in each meal and it helps to control carbohydrate intake throughout the day. The number of servings of carbohydrates can be fixed according to calorie requirements and you can eat only those fixed servings. Renal and diabetic patients should follow few more diet rules. With carbohydrate control they have to limit consumption of potassium, sodium, and phosphorus. Many low carbohydrate foods contain these nutrients. So, in a renal diabetic diet you have to choose foods that are low in sodium, phosphorus and potassium, as well as low in carbohydrates. In renal diabetic diet you can include low potassium and phosphorus fruits like strawberries, blackberries, blueberries, grapes, watermelon, grapes, pineapple, cherries, apple, plums, grapefruit and mandarin oranges. You can include starches that are low in sodium, phosphorus and potassium like bagel, white bread, sandwich bun, pasta, rice, noodles, unsweetened dry cereal, corn-bread, and flour tortilla. Some milk products also recommended for renal diets are plain yogurt, skim milk or fat-free milk, sugar-free ice cream, and sugar free pudding. From this list you have to select proper serving sizes of carbohydrates. Our body needs all nutrients (not only carbohydrates). To get proteins you have to eat meats but avoid meats with high phosphorus. Lean meat, fish, seafood, low cholesterol egg substitute, eggs, and cottage cheese are good for renal diabetic diets. Cottage cheese has high sodium content hence, you have to eat it in limited amount. In this diet you can include vegetables like eggplant, cabbage, cauliflower, carrots, beets, cucumber, onions, snow peas, celery, turnips, and radishes. The foods that should be avoided in this diet are; chocolate milk, sweetened yogurt and ice cream, buttermilk, pudding, gingerbread, pancake, whole grain or whole wheat bread, sugar coated cereals, potato chips, salted crackers, high-sodium meats like hotdogs, sausages, bacon, pepperoni, salami, chesses, nuts, peanut butter etc. You also have to avoid fruits like cantaloupe, bananas, mangos, papaya, oranges and vegetables like okra, spinach, tomatoes, fresh broccoli, baked potatoes and sweet potatoes. You have to limit foods which contain excess sugar like honey, chocolate, syrup, pies and cakes. There are many restrictions in renal diabetic diets but for control of diabetes and kidney disease it is absolutely necessary. | 004_1444906 | {
"id": "<urn:uuid:d92c48bc-61f6-48b8-bf03-94a53b35234c>",
"dump": "CC-MAIN-2021-04",
"url": "https://adviceondiabetes.com/diabetes/diets-for-rental-and-diabetic-patients/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703565376.63/warc/CC-MAIN-20210125061144-20210125091144-00022.warc.gz",
"language": "en",
"language_score": 0.9283751845359802,
"token_count": 730,
"score": 3.171875,
"int_score": 3,
"uid": "004_1444906_0"
} |
-unicellular organisms: one cell divides, reproduce entire organism. multicellular organisms: development from a fertilized cell, growth, repair. Packaged DNA molecules in a cell. -each species has a set number of chromosomes (humans 46, hedgehogs 90). 90% of the cycle; cell growth and copying of chromosomes in preparation for cell division. -g1 phase (first gap; cell growth)
-s phase (synthesis; cell growth and chromosome duplication)
-g2 phase (second gap; cell growth)
G2 of interphase
-nuclear envelope surrounds nucleus. -centrosome has duplicated. -chromatin has duplicated (but not yet condensed). apparatus of microtubules that controls chromosome movement during mitosis. -includes centrosomes, spindle microtubules, and asters. chromatin condenses into sister chromatids; assembly of spindle microtubules begins, centrosomes migrate to opposite poles as spindle microtubules grow out from them. a structure of proteins associated with specific sections of DNA at each centrosome. -a chromosome has 2 kinetochores facing in opposite directions. nuclear envelope fragments; chromatids get kinetochores; some spindle microtubules attach to kinetochores and jerk back and forth; nonkinetochore microtubule attachments also form. -centrosomes at opposite poles. -chromosomes line up at the metaphase plate, the midway point between the spindle's two poles. -kinetochores arranged so for each chromosome, one kinetochore attached towards each pole. sister chromatids separate (cohesion proteins cleaved); each chromosome moves along kinetochore microtubules toward opposite poles. -microtubules shorten by depolymerizing at kinetochore ends. -nonkinetochore microtubules from opposite poles overlap and push against each other, elongating cell. genetically identical daughter nuclei form at opposite ends of the cell; nuclear envelopes form; chromosomes become less dense; spindle dissolves. separation of cytoplasm occurs differently in animal and plant cells. -each new cell gets its share of cytosol, organelles, etc. cytokinesis (animal cell)
cytokinesis occurs by cleavage; a process of forming a cleavage furrow, or contractile ring of actin microfilaments associated with myosin, that pinches the parent cell in two. cytokinesis (plant cell)
cytokinesis occurs by forming a cell plate; coalesced vesicles containing cell wall materials, that eventually grows to fuse with membrane around cell, dividing cell into two. centrosome, centriole, centromere
centrosome: microtubule organizing center that is part of the mitotic spindle. -centriole: this is one of the two bodies marking the location of the centrosome. -centromere: this is the tight point of connection between two sister chromatids (region of specific DNA sequences where chromatids attach most closely). | 002_6293396 | {
"id": "<urn:uuid:5c9aeb73-c546-48e9-bcb6-e8ca1eaae2f8>",
"dump": "CC-MAIN-2014-41",
"url": "http://quizlet.com/8133606/mitosis-flash-cards/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657120057.96/warc/CC-MAIN-20140914011200-00186-ip-10-196-40-205.us-west-1.compute.internal.warc.gz",
"language": "en",
"language_score": 0.8600967526435852,
"token_count": 681,
"score": 3.609375,
"int_score": 4,
"uid": "002_6293396_0"
} |
The Golden Calf was an idol built by Aaron for the Hebrew Israelites after they had left Egypt and formed their own independent nation. The Golden Calf followed after the patterns and pantheon of Egypt, because it was not the worship of the true God, but worship of false gods manifested in an animal-shaped idol. It was built by Aaron by the request of the Israelite community after their leader, Moses had not returned from a prolonged communication with God on Mount Horeb.
The want for "god"
Shortly after Israel had become an independent nation, they settled near Mount Horeb- just as God had predicted several months prior. During this time Moses went up onto the mountain where he received the first parts of the law, which would eventually become part of the Book of Exodus and the Pentateuch. While Moses was convening with the Lord, his brother Aaron lead the nation. Moses remained upon the mountain for nearly forty days and night. When the Israelites saw Moses visit was prolonged they began to believe that the true God, Yahweh, had not really delivered them out of Egypt; fearing Moses had disappeared. They went to Aaron, asking for replacement "gods" so that they would be protectors. Aaron obliged and asked all the Israelites to give their golden earrings they had obtained from Goshen after the Passover. Once Aaron had all the earrings he melt them and cast them into the shape of a calf. This would have resembled the Egyptian pantheon the Israelites were exposed to as slaves. | 003_5453541 | {
"id": "<urn:uuid:c01a3a61-a3ef-4ad1-a977-b6e3df321b16>",
"dump": "CC-MAIN-2017-51",
"url": "http://bible.wikia.com/wiki/Golden_Calf",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948577018.52/warc/CC-MAIN-20171215172833-20171215194833-00709.warc.gz",
"language": "en",
"language_score": 0.9913140535354614,
"token_count": 315,
"score": 3.546875,
"int_score": 4,
"uid": "003_5453541_0"
} |
It’s hard to believe, but according to a recent study, almost two thirds of children are walking around in the wrong size shoes. According to a survey conducted by Blitzresults, 65 per cent of all kids are wearing shoes that are too small for them. Of these, 47 per cent are one size too small and 18 per cent are even two sizes. Only 35 per cent are wearing the correct size and only 11 per cent of those have “room to grow”. They’re shocking statistics to digest, considering a pair of comfy kicks is something we wear every day – get it wrong and you could be causing serious foot deformities in your child before they even learn to run! One of the most common foot deformities caused by improperly fitting shoes is Hallux Valgus – when the big toe starts to angle inwards and causes a swollen lump below the toe. How to measure kid's shoe size51327
How to measure kid's shoe size
To help parents buy shoes that fit their kids properly, it’s important to remember these simple tips:
Go by the longer foot
The right and left feet are rarely the same length. A difference of up to half an inch is normal, which is almost one whole shoe size! When shopping for the perfect pair, parents are encourages to always go by the longer foot. Don’t rely on the shoe size
Shoe manufacturers label shoes with standard sizes. But, there is no mandatory industry standard for shoe sizing, so each brand will vary. Even if you know your child’s size, it’s important to try every shoe on carefully before making the purchase. Give ‘em room
Most parents like to allow room for growth – especially when buying school shoes at the beginning of the year - but usually underestimate the actual room needed. At least half an inch of additional room is optimal as this is the only way kids can roll their foot properly when walking. Do a regular check
According to blitzresults. com expert Tim Lilling, it’s important to measure your child’s foot every two months. "Because the sense of touch isn’t fully developed in children yet, they have a tendency to squeeze their feet into shoes that are much too small, they don’t even notice it,” he says. Unfortunately, many parents still use these "tricks" to judge whether shoes fit and they’re not entirely accurate. 1. Hold shoe to foot - The shoe sole is held up to the child’s foot to estimate the size, but the length on the inside of the shoe can’t be estimated from the outside, and is often much shorter than you’d expect. Use an appropriate measuring device instead. 2. Do the thumb test - The thumb presses on the toe of the shoe to see how much room there is to grow. The problem is that children often draw their toes up by reflex, so the foot is rolled under. It may seem like there’s enough room, although, in reality, the shoes are too small. 3. Do heel test - Using the heel test is just as bad for judging free space in the heel. Many kids push their feet forward until their toes are crammed in. Instead, carefully feel your child´s foot inside the shoe. Place one hand on the front of the shoe, so the child can’t draw their toes up. Then, with the other hand, check the position of the toes. This way you can feel whether there is enough room to grow. 4. Compare size using a stencil -The shape and size of the foot is traced and compared with the shoe sole, but this comparison is usually imprecise. If there is a removable insole, try taking it out and placing the foot on the insole instead, there should be 1/3 inch of space behind the heel and half an inch in front of the toes. 5. Ask them how it feels -Parents ask kids: "Does the shoe fit? " Unfortunately, the answer will likely be wrong. Often, the nerves in kid’s feet are not fully developed yet and their awareness of pain is clearly lower than an adult’s, so, kids don't realise if the shoe fits. Measure their feet instead for a more accurate answer. | 008_1684683 | {
"id": "<urn:uuid:db1b67de-2706-434d-ba4e-b430c8aa4b73>",
"dump": "CC-MAIN-2018-51",
"url": "https://www.kidspot.com.au/health/family-health/real-life/more-than-half-of-kids-are-wearing-the-wrong-shoe-size/news-story/c515d986ed3fcc91bc523cbd80968591",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376827596.48/warc/CC-MAIN-20181216073608-20181216095608-00294.warc.gz",
"language": "en",
"language_score": 0.9504810571670532,
"token_count": 903,
"score": 2.59375,
"int_score": 3,
"uid": "008_1684683_0"
} |
STEMpath: Creating Computer Science Educator Capacity
Every week there's more news about computer science (CS) education in K-12 classrooms. Some states are requiring that every district and school provide CS, others are allowing students to count CS coursework toward graduation, and still more are even tracking enrollment or making CS a graduation requirement for every student. I am heartened by the progress but with each new piece of legislation or policy we are exacerbating a system already strained in its teaching capacity. Expansion of STEM programs across the nation are being stymied by the inability to find qualified talent. The former Executive Director of the Computer Science Teachers Association (CSTA) noted how many might be surprised to learn that most CSTA members do not identify themselves as ʻCS teachersʼ, but rather as ʻteachers of CSʼ – as only 1 in 9 CSTA members have taken a college level course in CS and only 5 – 7% have a degree or certificate in CS. Per Couragion's own primary research, 78% of administrators shared that ʻteachers with appropriate skills and experienceʼ would help take their CS programs to the next level. We are proud to be one of the 'powerhouse education providers' developing and delivering STEMpath - an unprecedented STEM-Computer Science educator certification program. You can read the full press release here for more details. mindSpark Learning, Couragion, Metropolitan State University and Colorado Succeeds are incredible partners in leading this groundbreaking initiative. STEMpath will provide educators with the confidence and skills to teach computer science and computational thinking (CS/CT) in a relevant, holistic manner - beyond the context of coding and robotics. Educators can learn more and apply here. Interested in learning more about our other educator professional learning experiences in partnership with mindSpark Learning. Check out our CS/CT Career Literacy Professional Experience! | 009_3024837 | {
"id": "<urn:uuid:1da4b511-112c-4a50-b13b-2038b8b6fd12>",
"dump": "CC-MAIN-2019-09",
"url": "https://www.couragion.com/stem-crossings/2018/5/2/stempath-creating-computer-science-educator-capacity",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247522457.72/warc/CC-MAIN-20190222180107-20190222202107-00263.warc.gz",
"language": "en",
"language_score": 0.947371244430542,
"token_count": 390,
"score": 2.5625,
"int_score": 3,
"uid": "009_3024837_0"
} |
Special issue of the Lyme Times: Co-infections
A tick can transmit many pathogens in a single bite–not just Lyme disease. People actually rarely get Lyme disease alone–co-infections are the rule, rather than the exception. And these co-infections often complicate diagnosis and treatment. Topics covered in this special issue of the Lyme Times include Babesia, Bartonella, Anaplasma, rickettsial infections, parasites, viruses and fungal infections. Online access to current and past issues of the Lyme Times is available for free to members of LymeDisease. org. Join now and start reading this issue today. | 000_3513549 | {
"id": "<urn:uuid:06e2d52e-2116-4136-b0d6-5a0266a4eb93>",
"dump": "CC-MAIN-2020-10",
"url": "https://www.lymedisease.org/special-issue-lyme-times-co-infections/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875147647.2/warc/CC-MAIN-20200228200903-20200228230903-00012.warc.gz",
"language": "en",
"language_score": 0.91975998878479,
"token_count": 134,
"score": 2.875,
"int_score": 3,
"uid": "000_3513549_0"
} |
Nellie Mae Rowe
Self-taught artist Nellie Mae Rowe gained national fame in the last decade of her life after years spent making art in her free time. Born in Fayetteville, Georgia, Rowe spent most of her life in a farming community outside of Atlanta. The ninth of 10 children, she helped on the family’s rented farm even as a child. However, from an early age, she made dolls and sketched whenever she had a moment. Rowe married her first husband when she was 16. Working with him on a farm until his passing in 1936, she found little time to make art. Following the death of her second husband in 1948, Rowe supported herself by working as a maid. She also significantly increased her artistic output . The prolific artist created drawings, dolls, chewing-gum sculptures, and assemblages made from cast-off objects, including egg cartons, marbles, and assorted trinkets. Artwork filled her yard and house, which she dubbed her “playhouse. ” Although locals had long been aware of Rowe and her unique property, art collectors and curators first took notice in the mid-1970s. Wider recognition soon followed. Rowe’s first solo exhibition took place in 1978 at Alexander Gallery in Atlanta. The following year, she traveled outside Georgia for the only time in her life to view an exhibition of her work at the Parsons/Dreyfus Gallery in New York City. Suffering from cancer in 1982, Rowe was unable to attend the opening of the landmark exhibition Black Folk Art in America, 1930–1980, at the Corcoran Gallery of Art in Washington, D.C. In 1999, the Museum of American Folk Art organized a retrospective of Rowe’s art, which traveled to NMWA in summer 1999. | 007_4567059 | {
"id": "<urn:uuid:0d2855cf-2834-4db3-98b7-86764387057e>",
"dump": "CC-MAIN-2018-43",
"url": "https://nmwa.org/explore/artist-profiles/nellie-mae-rowe",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583509958.44/warc/CC-MAIN-20181015225726-20181016011226-00246.warc.gz",
"language": "en",
"language_score": 0.9810847043991089,
"token_count": 376,
"score": 2.90625,
"int_score": 3,
"uid": "007_4567059_0"
} |
Being number two isn’t all that bad. Less pressure than the number one spot and yet you still have a foot in the limelight. Asteroid 2 Pallas was the second asteroid discovered back in the days when asteroids were so few and novel they were called planets. German astronomer Heinrich Olbers accidentally ran across it while attempting to find another asteroid, Ceres, on March 28, 1802. This week you can see Pallas at its brightest in two decades as it treks from Sextans into Hydra the Water Snake during convenient evening viewing hours. With the asteroid shining at around magnitude 7 – just one level fainter than naked eye visibility – all you need is a pair of binoculars, a map and a clear night. At 338 miles across, Pallas bests Vesta in size by just 12 miles, making it the second largest asteroid after Ceres, the only main belt asteroid also classified as a dwarf planet. Unlike the planets, Pallas orbits the sun in a highly inclined orbit (34. 8 degrees) taking 4. 6 years to complete one spin around the sun. Pallas’ average distance from the sun is 257 million miles, but this month it’s lined up favorably with Earth and only about 115 million miles away. It was last this bright in 1991 and won’t be again until 2028. Being so much smaller than any of the eight planets, Pallas looks exactly like a star through most telescopes. Even the orbiting Hubble Space Telescope, located far above the blurring effects of Earth’s turbulent atmosphere, sees the asteroid as a pixelated object the shape of a flattened sphere with a large, darker “depression” that might be a crater. Don’t expect a mission to the #2 anytime soon; Pallas’ highly tilted orbit makes it extremely difficult, energy and time-wise, to dispatch a probe for in-depth study and photo-taking. That hasn’t stopped astronomers from eking out what they can across the millions of miles that separate us. Pallas receives light from the sun, absorbing some and reflecting the rest back into space. Rocks absorb light according to their internal makeup, imprinting their mineral signatures in the light they reflect back into space. Different rocks, different imprints. Examining Pallas’ light with a spectrograph, which can dissect light like a doctor working a scalpel, we can identify basic minerals on the asteroid’s surface. From these observations, astronomers have learned that Pallas has much in common with the CR group of carbonaceous chondrite meteorites, both of which are very ancient and contain water and carbon. This week Pallas will be near Alphard, an orange-tinted star and the brightest in Hydra, making it easy to find. It rides high in the southeastern sky around 9 p. m. local time. At magnitude 2 (Big Dipper brightness), Alphard stands out in a rather empty region of sky. You can find it by reaching your balled fist to Regulus in Leo and looking a little more than a fist below and to its right. Or you can do the same with Procyon in Canis Minor and look below and left. Next, focus your binoculars on Alphard and use the map to stepping-stone your way to Pallas. The fun begins when you observe the asteroid for a second or third time and watch it move among the stars pulled by the gentle tug of the sun’s gravity. | 005_2833999 | {
"id": "<urn:uuid:e246fb2a-2814-4d7b-b7c2-8545d832e8c4>",
"dump": "CC-MAIN-2018-26",
"url": "http://astrobob.areavoices.com/2014/03/03/asteroid-underdog-pallas-bright-and-close-this-month-heres-how-to-see-it/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267865145.53/warc/CC-MAIN-20180623171526-20180623191526-00585.warc.gz",
"language": "en",
"language_score": 0.9435264468193054,
"token_count": 727,
"score": 3.75,
"int_score": 4,
"uid": "005_2833999_0"
} |
"exchars" may not be over 1200 (set to 1500) for users. "exlimit" was too large for a whole article extracts request, lowered to 1. HTML may be malformed and/or unbalanced and may omit inline images. Use at your own risk. Known problems are listed at https://www.mediawiki.org/wiki/Extension:TextExtracts#Caveats.Sorano is a town and comune in the province of Grosseto, southern Tuscany (Italy). It as an ancient medieval hill town hanging from a tuff stone over the Lente River.
Sorano was probably inhabited by Villanovan culture, but the first historical mentions are relative to the 3rd century BC, when it was an Etruscan city under the influence of the more populous nearby Sovana.
Disappearing from history under the Roman domination, it is again known in 862 when a county was founded by Emperor Louis II, under the Aldobrandeschi suzerainty. The Aldobrandeschi were the most powerful feudataries of southern Tuscany for more than four centuries, disappearing in 1312 when Margherita, son of Ildibrandino, died without male heirs. His daughter Adelaide married to Romano di Gentile Orsini, who added the city to the family fiefs. The county of Pitigliano-Sorano fought against the Republic of Siena, but was forced to accept its suzerainty from 1417. It regained a full independence in 1556, when the latter was annexed to the Duchy of Tuscany. The fortress, due to its strategic position, was frequently attacked. . . | 010_4360120 | {
"id": "<urn:uuid:b52d0338-fa0e-49d8-b938-21aa3fe43358>",
"dump": "CC-MAIN-2019-30",
"url": "http://www.pitigliano.net/en/holidays-in-sorano.aspx",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195529664.96/warc/CC-MAIN-20190723193455-20190723215455-00092.warc.gz",
"language": "en",
"language_score": 0.9553751945495605,
"token_count": 360,
"score": 2.5625,
"int_score": 3,
"uid": "010_4360120_0"
} |
My ethics are constantly evolving and hopefully improving. I encourage everyone to follow similar principles when bushwalking. Go hard, go far, go light. Think safe, be safe:
- Research before you go and know the likely conditions (track, weather, shelter, water etc…) that you can expect. - Take gear that is appropriate for expected conditions. - Know how to navigate using a map and compass. - Know what to do in emergencies. - Learn First Aid and know how to handle illness and injuries. - Carry an emergency alert device like a SPOT, PLB or mobile phone. - Know how to cross rivers and streams safely. - Learn to monitor the weather and know when a change conditions are coming. - Be self reliant. Tread softly on the track:
- Go solo when you can! You will love it. - Keep group size small. Four to six people is ideal. - Use existing tracks. - If it is wet or muddy (ie. Tasmania) plough on through – it is part of the experience and reason why you are out there in the first place. - If it is zig-zaggy don’t cut corners. - When there isn’t a track, fan out to limit the impact on one area and prevent new tracks forming. - Likewise for sensitive areas like button grass plains, spread out. - Wear lightweight, soft-soled walking shoes rather than heavy boots. Not only will the bush thank you for it but your feet/legs will too. - Know how to navigate and avoid placing route markers like cairns or blazes. Use proper toilet etiquette:
- When nature calls, do the dead at least 100 metres from campsites and water sources. - Always go down stream from water collection points. - Carry a lightweight trowel or a large aluminium tent stake to dig a hole at least 15cm deep. - Thoroughly bury your crap and toilet paper. - In snow, dig through the snow first, then dig a hole in the ground. - Carry out anything that will not easily decompose. - Don’t spread you germs, use alcohol hand sanitizer. Keep water pure:
- Wash well away from the edge of any water body to prevent soap, detergent or toothpaste from getting into natural water systems. - Don’t let food scraps or oils from cooking utensils get into water sources. - Always swim downstream from where you draw drinking water. If you pack it in, then pack it out:
- Remove all your rubbish. - Carry a zip lock plastic bag. If you find litter left by irresponsible people along the track or around a campsite, show you care for the environment, even if others don’t, by removing it as well. Be safe with fires:
- Respect fuel stove only areas. - Know the weather conditions and fire regulations for the area you are going into. - If you expect that a Total Fire Ban may be declared while you’re out there, take a radio and monitor weather and TFB announcements. - Do not light fires on Total Fire Ban days. - If you do need to build a fire use established fireplaces or existing fire pits. - If you need to build a new fire know your regulations. This will often require a small pit to be dug and an area of cleared ground to be established. - Don’t build stone fire rings around your fire. - Keep fires small. - Fire doesn’t destroy foil or glass, and plastics release toxic gases when burnt. If you pack it in, pack it out. - Completely extinguish your fire before you leave. Use water to extinguish and use your hand to feel for heat. - Scatter you ashes away from your campsite and cover any scar you with local materials to remove all trace. Minimise campsite impact:
- Use designated tent areas where they are established. - If tent platforms are there, use them. - If bush camping, select a site that will negate the need to clear vegetation or remove rocks to enable your shelter to be set up
- Don’t dig run off drains around your shelter. Use a waterproof groundsheet or shelter with a sewn in floor to avoid floods. - If you have to clear ground to create a site, rehabilitate the site before you leave. Protect plants and animals:
- Don’t disturb wildlife. Remember, you are in their home. - Watch where you put your feet. Walk around delicate plants and give snakes a wide berth. - Don’t feed birds and animals. Unnatural food can be harmful to many species and they may become pests. Respect Aboriginal Heritage:
- Many places have spiritual or cultural significance for indigenous people. Treat such places with consideration and respect. - Obtain permission from traditional landowners or the relevant land manager to visit sensitive areas. - Leave Aboriginal relics as you find them. - Don’t touch paintings, rock engravings or burial sites. Respect landholders and managers:
- Obtain permission to enter private property. - Leave gates and slip rails as you find them. If you opened it, close it. - Abide by local rules and regulations. Camp etiquette and respect for others:
- Leave the electronics at home or use head phones. There noises are out of place in the natural environment, particular at night when sound travels further. - Ensure your behaviour and activities don’t disturb others. - Camp as far away from other groups as conditions allow. - Ask permission to use another groups going campfire. - Don’t disturb a fire that people are cooking on. - Respect people’s food – don’t step over it if it’s uncovered. - Don’t exclude others from using facilities like benches, clothes lines etc…
- Do your share of firewood and water collection. - Help clean up before you leave. - Sweep out alpine huts before you leave. | 007_2921631 | {
"id": "<urn:uuid:a7be7a46-d650-4f1a-8c0b-1e2a5034228f>",
"dump": "CC-MAIN-2018-39",
"url": "https://mickbeckers.com/hiking/hiking-ethics/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267155942.15/warc/CC-MAIN-20180919063526-20180919083526-00060.warc.gz",
"language": "en",
"language_score": 0.853314220905304,
"token_count": 1294,
"score": 2.671875,
"int_score": 3,
"uid": "007_2921631_0"
} |
Many people in New York are aware that drinking and driving do not mix. Yet many motorists continue to use alcohol before and while they operate their vehicles. With the number of alcohol-related accidents steadily increasing, drivers should educate themselves on the dangers of alcohol and how its use can affect their driving skills. According to the National Council on Alcoholism and Drug Dependence, Inc., drunk driving was committed by more than 29. 1 million people in 2012. Drunk driving accidents impact two-thirds of motorists at least once in their lifetime. Alcohol affects the central nervous system. It causes a depressing effect on the body’s responses that changes the way people move, think and act. Decreases reaction times
Once people consume alcohol, their ability to react to people and situations diminishes. They may feel like they are in control of their actions and try to act normally, but their movement speeds and their reaction times are often much slower than when sober. Decreased reaction times increase the risk of car accidents because inebriated motorists are not capable of responding fast enough to avoid these situations. Many people who drink do not believe they are intoxicated even when they are feeling buzzed. However, they may have trouble seeing and understanding traffic signs, driver gestures and intent. Intoxicated motorists often end up confused and in car wrecks because they were not able to fully understand their situations on the road. Interferes with judgment
Drunk drivers are unable to think clearly. They may lack the ability to make rational decisions that could potentially keep them from getting into collisions with other motorists. They are also unable to stay focused on driving and the road. They tend to get distracted easily and forget that they must stay aware of several things at once when they are driving instead of only one. There are many reasons why people drink. Whether celebrating something or just relaxing with friends, everyone should practice moderation and good judgment when it comes to alcohol. Those who drink knowing that they must travel elsewhere later on should make alternative arrangements, so they can have someone else who has not had any alcohol do the driving for them. They can also just decide not to drink unless they are somewhere that they plan to stay until the effects of the alcohol completely wear off. If you or someone you know is involved in a car accident where alcohol is a factor, you should talk to an attorney to learn about your options. | 008_790123 | {
"id": "<urn:uuid:7aecfd4a-92c4-4f9a-93bb-6a42722b4a47>",
"dump": "CC-MAIN-2021-39",
"url": "https://www.injurylawofnewyork.com/blog/2017/01/how-alcohol-affects-driving-skills/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780060877.21/warc/CC-MAIN-20210928153533-20210928183533-00420.warc.gz",
"language": "en",
"language_score": 0.9823111891746521,
"token_count": 485,
"score": 2.875,
"int_score": 3,
"uid": "008_790123_0"
} |
The American Dental Association (ADA) as well as the American Academy of Pediatric Dentistry (AAPD) both stress the importance of routine dental screenings for children as young as one year old. Parental guidance can be provided by dentists. The Importance of Pediatric Dentistry.
Because of its profound effect on a child’s physical, mental, and social growth, pediatric dentistry is essential to that child’s health. It aids in preventing cavities, infections, and promotes general dental health, all of which assist in keeping that gleaming smile intact throughout their development. Dental Problems Spotted Before They Get Worse:
Early detection of dental problems, such as cavities as well as gum disease, can prevent more serious concerns down the road. Avoiding Dental Issues:
In order to protect children’s teeth and gums from decay and disease, pediatric dentists provide services such as expert dental cleanings, fluoride treatments, as well as sealants. Learning to Take Care of One’s Teeth:
A child’s visit to the dentist is an excellent opportunity to instill in them the habit of regular brushing and flossing. Supporting a Balanced Diet:
In order to promote dental and general wellness, pediatric dentists can inform parents and children about the effects of certain foods and beverages on teeth and gums. Tracking the Progress of Teeth:
A child’s teeth and jaws can develop normally with the help of regular dental exams, and any potential problems can be addressed early on to keep oral health complications to a minimum. How to Deal with Dental Fear:
Young children benefit from going to the dentist on a regular basis because it helps them develop accustomed to the office and the treatments. Keeping Your Child’s Teeth Clean: What You Need to Know.
Keeping a child’s teeth clean and healthy is essential for their overall oral health. It is the responsibility of parents to encourage their children to develop and maintain proper oral hygiene routines from a young age. Get a head start:
Use a toothbrush with soft bristles along with toothpaste with fluoride to begin teaching proper oral hygiene as soon as the first tooth emerges. Daily tooth brushing and flossing is a must. Insist that your kid brush twice daily and floss once, and be there to check that he or she is doing it right until he or she is old enough to do it on their own. Visiting the Dentist Twice a Year:
When your child’s first tooth comes in, or on their first birthday, make an appointment with the dentist and continue doing so every six months. Cut back on sugary foods and beverages:
To protect their teeth from cavities, you ought to motivate your child to follow a healthy diet, cut back on sugary snacks and drinks, and drink more water. Make Sure Fluoride Gets In There:
To avoid cavities and protect tooth enamel, fluoride is essential. Dental professionals can provide further fluoride treatments, and it is recommended that parents apply toothpaste with fluoride and drink fluoridated water. Sports Mouthguards to Preserve Your Teeth
To avoid dental injuries, have your child always wear a mouthguard while playing sports. Prevent Risky Dental Practices:
A child’s teeth may not develop properly if he or she engages in habits like thumb-sucking or uses a pacifier for a long time. To get help breaking these habits, see a pediatric dentist. Teach Your Kid Stuff:
Motivate your child to take charge of his or her dental health as he or she gets older by teaching him or her the importance of proper oral hygiene and the influence it has on the body as a whole. | 003_4579564 | {
"id": "<urn:uuid:84d9cb3a-d6ea-418a-85fd-c5f69a1f2862>",
"dump": "CC-MAIN-2023-50",
"url": "https://healthworldnews.info/why-pediatric-dentistry-is-important/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100779.51/warc/CC-MAIN-20231208212357-20231209002357-00222.warc.gz",
"language": "en",
"language_score": 0.946176290512085,
"token_count": 787,
"score": 3.46875,
"int_score": 3,
"uid": "003_4579564_0"
} |
Many parts of San Diego County have long histories of problems with beach erosion. This is due to a number of contributing factors. Sand supply from the rivers has been reduced due to dams, flood control projects and watershed development. The jetties at Oceanside harbor trap a large percentage of the sand that would otherwise drift down the coast. But the real cause of the problem is that we have built way too many homes and buildings too close to the ocean. If those homes had been built further back from the edge then shoreline erosion wouldn't be much of a threat. But for now there are temporary fixes that the local government has decided to pay for, namely pumping sand onto the beach in so-called "nourishment" or fill projects. The San Diego Association of Governments (SANDAG) is a regional body with representatives from all city councils and the county supervisors. They are funding a Regional Beach Sand Project to dredge up 1. 4 million cubic yards of sand from offshore and pump it onto 8 area beaches. This is being paid for by local taxpayers with help from the State.
There is concern that all this new sand will cover nearby reefs, possibly ruining the waves that break on them. In response the San Diego Chapter is monitoring and documenting the projects and any changes to the surf. They're using high-tech video technology to measure waves and beach width, and to capture time-lapse images of changes in beach shape and surfing crowds. Go here to read up on their surf monitoring. The portion of the project in Oceanside was just completed a couple weeks ago and I went down to check out the work. They put sand along 4,100 feet of shoreline. I made the short video below to show what it's like. It's pretty clear that beach fill is very much a construction project with lots of earth moving equipment. It should be interesting to see how all this sand disperses and moves around during storms in the upcoming winter season, and to see just how long it sticks around. Update: You can view lots more pictures of this beach and the others at SANDAG's Facebook page. | 008_6818615 | {
"id": "<urn:uuid:325e00f9-9691-4020-9bde-2c34eb90d142>",
"dump": "CC-MAIN-2016-22",
"url": "http://www.surfrider.org/coastal-blog/entry/beach-fill-comes-to-san-diego",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464052868853.18/warc/CC-MAIN-20160524012108-00061-ip-10-185-217-139.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9652966260910034,
"token_count": 434,
"score": 2.953125,
"int_score": 3,
"uid": "008_6818615_0"
} |
We have a huge problem in the modern world: Obesity. Today, nearly 1 in 3 American adults are classified as obese. 60 years ago, that number would have looked closer to 1 in 10. What’s even worse is the statistics on childhood obesity. Over 30% of American youths are considered overweight or obese1. That’s a big issue. If the jump from our parent’s generation wasn’t alarming enough, that high rate among children should definitely set off alarm bells. When we, as adults, eat poorly or don’t exercise, it’s by our own volition. Of course, you can trace it back to our upbringing, or what society has taught us, but ultimately, we know donuts are bad for our health. If we keep eating them, that’s our choice. For children, it’s different. On one hand, they don’t really have much of a choice in their diet. Their parents and schools supply the food, they just eat. On the other hand, they haven’t had any dietary habits, good or bad, ingrained in their brains yet. Most kids are going to willingly eat a bowl of brussels sprouts, but if you threw out all the sugary cereals, they’d get over it due time. So what should we do? Of course, we’ve addressed our own dietary issues. We have the information, and we adjust how we eat. We want the same for our children, but how do we do more than just put good foods on our plates? How can we make them understand why we don’t want them eating like we did as children? I had the pleasure of talking Tom Naughton, who made the documentary Fat Head. He recently wrote a book geared towards the younger crowd called Fat Head Kids, so he’s doing just that. By engaging kids on healthy lifestyles early on, we can cut the obesity epidemic off at the source. Getting to the Root of Obesity
If obesity has gotten so much worse in the past century, what happened? It’s not like our bodies suddenly evolved to hold on to more weight. Our bodies have the same energy needs. Some might blame lack of exercise, but white-collar jobs have existed for many years. Before we came home and surfed the web, we returned from work and gathered around the TV. Before TV, it was the radio or evening newspaper. The same goes for kids. Yes, there was definitely less to distract them from outside play in years gone by, but they’ve always had comic books. Encouraging exercise is crucial, but that’s not the major factor at play. The biggest risk to our children’s health is pretty obvious: poor diet. Specifically, sugar. A study was performed that had kids (aged 5 to 12) maintain a week-long food dairy. From that info, it was found that the average sugar intake was 134 g per day2. How wild is that? Almost 5 times the daily recommended amount for an ADULT. So obviously something is up with current food trends. Back in the good ol’ days, kids just ate differently. It wasn’t a bowl of Cap’n Crunch followed by an Energy Drink on the way to school. It was bacon and eggs and maybe a small cup of orange juice. Of course, we know even juice isn’t great for you. One cup will give you most of your daily intake of sugar with none of the fiber of the whole fruit. But the difference lies in the massive quantity of sugary substances. Maybe you choose a lower sugar cereal for your kids, thinking the granola or wheat puffs are a better bet. They’re then going to school, getting a soda and cookie at lunch. Then they come home, have a sugary snack, maybe another soda, and dessert after dinner. No wonder our kids aren’t too healthy. We’re setting them up for failure. This common scenario has led to some bizarre patterns. In terms of consumption, let’s look at sugar and high fructose corn syrup (HFCS), which are key components of the standard American diet. Sugar and HFCS both consist of glucose and fructose. Glucose comes from starchy foods and our bodies naturally produce it and every cell can use it for fuel. However, fructose is a fruit sugar and is not necessary for life. Fructose can’t be stored the same way normal glucose can be stored, and when people (especially kids) consume lots of calories and fructose, the liver gets overly burdened and converts fructose into fat. Because of the high fructose intake today, we’re seeing a disturbingly high rate of fatty liver in adolescents3. Fatty liver is a condition most commonly associated with older alcoholics, so the rise in child diagnoses is not a good sign. Outside of food, there’s a less obvious factor in childhood obesity: Lack of sleep. It’s a widely accepted idea that lack of sleep leads to weight gain4. What’s less commonly known is the why behind the lack of sleep in youngsters. One idea especially relevant to young boys is low testosterone. This hormone is essential for making sure boys develop muscle and grow up lean and healthy. A good portion of testosterone is only produced while we sleep. So that means low sleep equals lower testosterone. That also means young men aren’t growing up with adequate lean muscle mass, where they get the “skinny fat” build, with unhealthy centric weight and little strength. Insomnia is not an invention of millennials, but they sure do have a lot more things to distract them. Video games, tablets, smart phones, and social media sure aren’t helping our kids get restful nights of rest. When you’re a growing human, you need plenty of sleep just to function right. Just imagine trying to grow without it. In conjunction with the devices comes massive EMF (electro-magnetic fields) exposure, which can interfere with the health of our brain5 and other body systems6 and are even linked to cancer7. Even more reason to limit all screen time and get the kids outside as much as possible. Another massive issue for kids these days, and adults, is toxin exposure. From the womb to the tomb8, we are surrounded by toxins today. If you’ve been following my work for a while you know I’m a huge proponent of cellular detox, as it transformed my life as well as the health of my whole family. Detoxing from the ubiquitous chemicals in our environment like heavy metals, glyphosate, pesticides, and more is essential to good health in our modern toxic world. Learn more about True Cellular Detox™ here and hear about my family’s healing journey in CHTV episode 97. Who is to Blame? Pointing the blame is always tricky. Especially when it’s more of society as a whole, we can’t really point to one person or entity. We might be quick to blame ourselves, the parents, for not knowing how to feed our kids healthy diets, for example. We love our children, so of course if we realize we’re messing up, there’s going to be some guilt. Most of you are probably already feeding them what the world around you is claiming to be healthiest. However, as we know, “they” are often wrong. It is our responsibility to learn what is and isn’t healthy for our kids. If you have the information yet choose to ignore it, then yes, the blame falls on you. But that’s not the case. For decades, we’ve been fed misinformation from so many different sources. First, we’re told fat is bad, then fat is good, then all that matters in protein, and so on. If the “correct” information keeps contradicting itself every couple of years, it’s impossible to determine what is right and what is wrong. Again, it’s hard to direct the blame in a single direction, but a lot of it falls on to government agendas. They initiate programs like limiting availability of fast food, which is great on so many levels, but they fail because it isn’t really that hamburger that’s messing us up. Of course, a Big Mac isn’t good for you, but studies show that living near fast food doesn’t affect weight gain9. That’s probably a pretty shocking realization for a lot of people. I know most of you are probably feeling nauseous just thinking about that fast food joke, but others may be thinking, “Well if I lived next door to a Burger King, I’d eat Whoppers every day. ” You might. That’s not a good thing, but these programs fail to recognize that we need reeducation, not restricted access. If you follow Cellular Healing TV, you know the unhealthiest thing you can get at a burger joint is the soda. We know it’s loaded with sugar, and we crave it, so we know we need to get it out of arm’s reach. Unfortunately, when you move fast food restaurants out of a neighborhood, you aren’t moving sodas. There’s still a gas station down the street selling super-sized fountain drinks. When the government makes these bold moves, they’re scapegoating the wrong foods. Yes, they know how bad soda is for your health, but targeting the burger joint doesn’t turn Coke into the bad guy. People think if they’re not eating fast food, they’re eating healthy, but I have some news for you: your pantry is likely still full of garbage. They also tend to make calories the enemy. You know my motto; I never say, “eat less. ” Eat less often, but it’s “eat better” too. The government, on the other hand, thinks in terms of calories. Since fat has the highest number of calories per gram, that means you can just cut fat to meet their standards. We know that’s not a good thing. Fat is a crucial building block. When you try to cut out fats, even the good ones, your body is going to give you a signal that it’s lacking nutrients. Since it can’t specify, it’s just going to tell you to eat. But you’ve cut out fat, so what macro are you going to go for? Carbs. So your body, still lacking fat, is still going to feel hungry. It’s a vicious cycle. Fat Head Kids: Prevention
As always, when we present huge systematic problems like this, it all boils down to one question: What do we do about it? Put simply, eat better and less often, but that can be difficult when we’ve been ingrained with a certain way of eating for so long. Both Tom and myself agree that we need to go back to following long standing wisdom. If high obesity rates are a new occurrence, clearly the older generations had it right. Why eat your ‘heart healthy” granola when our grandparents lived a robust life eating bacon and eggs for breakfast? We need to return to our roots, and I don’t even mean our primitive roots, although I’m all about ancient healing. I just mean two generations back, when a milkshake was a special treat you drove into town for maybe once a month. Sure, we have a lot more access to healthy veggies now, and that’s great, but let’s return to the building blocks of the past. Probably the biggest challenge to this shift is getting your kids to play along. No, they don’t have too many bad habits yet, but they often don’t understand WHY you’re suddenly changing up breakfast. As I said before, Tom wrote a book for this very purpose. In his book, he uses some great metaphors to simplify the ideas for younger readers. While I won’t give too much of it away, I want to lay out some of the basic concepts so you might use them to help explain it to your kids. For example, Tom compares the body to a space ship. Our metabolism is the chief engineer that sends various signals to and from our brain. One chemical in our body that helps us burn excess fat is leptin. When we have plenty of energy stored, leptin tells our body to burn off that fat. When you put too much sugar into your space ship, it starts to cause damage (high blood sugar). Your chief engineer is too busy putting out the fires to receive the signal to use stored fuel. So, if you consume too much sugar, your body is going to constantly be in this state of sugar dependence for fuel, and you’ll never be able to burn off the fat. Tom also explains the concept of your body being unable to ask for specific nutrients. If you look at an engine, you have a bunch of different fluids to input. There’s gas, oil, anti-freeze, and coolant. Think of these fluids as macronutrients. If your space ship is low on one, all it can do it send a signal saying, “put fluids (which is food in this case) in me. ” That’s a great way to explain to your kids why they can’t eat whatever they want when they get hungry. If your engine needs oil, but you put in more gas, the signal is going to stay on. To put it simply, we need to explain to kids “why” they should do it. Not just “what” to do. Simplifying the concepts is crucial to make sure we’re building good habits from the start and the book is a great guide for teaching. Take Home Solutions
Here’s some other great ideas (and strategies I used with my kiddos) to give children a healthy start:
- Make superfood smoothies for breakfast or travel meals, loaded with nutrients to support healthy growth. Some great add-ins include: grass-fed collagen powder, MCT oil, chia seeds, coconut oil, turmeric powder, bee pollen, colostrum, butter oil, vitamin c powder, aloe vera extract, l-glutamine, d-ribose, Accell therapeutic powder, Paleogreens powder, FBR fiber powder, grass-fed whey protein, probiotic powder and stevia to sweeten. - Have kids order from the “adult” menu restaurant versus the kid’s menu, where they can choose from an array of clean proteins, veggies, and non-GMO starches (ex: wild sockeye salmon with roasted broccoli and sweet potatoes). - Teach them to cook and make meals a joyful time of learning, sharing, and connecting. For great meal ideas the whole family will enjoy, check out the recipes in my Cellular Healing Diet cookbook. - Get them moving! Encourage them to join sports teams or recreational leagues. Bonus points for getting outside, the socialization aspect, and practicing team work. - Limit screen time and have a set bed time. We all need boundaries and can find freedom in discipline. The last bit of advice I want to offer: Strive for good, not perfect. That goes for yourself as well, but it’s even more important for kids. We don’t want to raise children with fear of food. We want them to learn and develop good habits by their own volition. We just need to guide them there. To illustrate, one of Tom’s daughters is very sensitive to wheat. Tom has explained to her why wheat is bad, but what really sets her on the right path is understanding her own body. She doesn’t feel great when she eats bread. Because she has the context of proper nutrition, she can put two and two together and make her own food choices to feel good. A child who doesn’t have all the information might attribute that feeling to the wrong source. If your kid messes up, they’ll learn over time. Offer grace. Be there to discuss when they feel gross after a bad meal out with friends, not to lecture them on their mistake. We want to build healthy, well-adjusted children to live well with strong minds and bodies to take care of our future world. Let’s teach them together. - CHTV Episode 176: Why Our Kids Are Fat
- Dr. Pompa’s Top 10 Toxic Foods
- Sweets and Desserts Recipes
- Dr. Pompa’s Top Sleep and Anxiety Strategies
- CHTV Episode 183: How to Fix Energy Imbalance
- When Detox is Dangerous Part 1: Cellular and Heavy Metal Detox Done Right
- The Dangers of Glyphosate: An Interview with Dr. Stephanie Seneff
- True Cellular Detox™ – A Top 5 Strategy to Create Your Best Health Ever
- CHTV Episode 97: Growing Up Pompa
- Ancient Healing Strategies for Modern Times
- It’s Not Just Gluten – The Glyphosate Threat
- Healing Foods: Dr. Pompa’s Top 10 List
- Collagen ECM
- MCT Oil
- Skinny & Co. Coconut Oil
- Turmeric Root Powder
- Domestic Bee Pollen
- X-Factor Butter Oil
- Vitamin C Powder
- Aloe Vera Extract
- L-Glutamine Powder
- D-Ribose Powder
- Accell Therapeutic
- FBR – Fiber
- Whey Cool
- Probiotic Synergy
- Stevita Stevia
1. “Overweight & Obesity Statistics.” National Institute of Diabetes and Digestive and Kidney Diseases. August 01, 2017. https://www.niddk.nih.gov/health-information/health-statistics/overweight-obesity.
2. And, K. J Morgan. “Amount and food sources of total sugar intake by children ages 5 to 12 years. ” The American Journal of Clinical Nutrition. March 01, 1981. http://ajcn.nutrition.org/content/34/3/404.abstract.
3. Schwimmer, Jeffrey B., Reena Deutsch, Tanaz Kahen, Joel E. Lavine, Christina Stanley, and Cynthia Behling. “Prevalence of Fatty Liver in Children and Adolescents.” Pediatrics. October 01, 2006. http://pediatrics.aappublications.org/content/118/4/1388.short.
4. Patel, Sanjay R., and Frank B. Hu. “Short Sleep Duration and Weight Gain: A Systematic Review.” Obesity. September 06, 2012. http://onlinelibrary.wiley.com/doi/10.1038/oby.2007.118/full.
5. Pall, M. L. “Microwave frequency electromagnetic fields (EMFs) produce widespread neuropsychiatric effects including depression. ” Journal of chemical neuroanatomy. August 21, 2015. https://www.ncbi.nlm.nih.gov/pubmed/26300312.
6. De Vocht, F. “”Dirty electricity”: what, where, and should we care? ” Journal of exposure science & environmental epidemiology. March 24, 2010. https://www.ncbi.nlm.nih.gov/pubmed/20336048.
7. Baan, Robert, Yann Grosse, Beatrice Lauby-Secretan, Fatiha El Ghissassi, Veronique Bouvard, Lamia Benbrahim-Tallaa, Neela Guha, Farhad Islami, Laurent Galichet, and Kurt Straif. “Carcinogenicity of radiofrequency electromagnetic fields. ” The Lancet Oncology. June 22, 2011. http://www.thelancet.com/journals/lanonc/article/PIIS1470-2045(11)70147-4/abstract.
8. “Body Burden: The Pollution in Newborns.” Environmental Working Group. July 14, 2005. http://www.ewg.org/research/body-burden-pollution-newborns#. WYS_-YjyvIU. 9. Marlow, Michael L., and Alden F. Shiers. “The relationship between fast food and obesity. ” Taylor & Francis. February 2, 2012. http://www.tandfonline.com/doi/abs/10.1080/13504851.2011.648316. | 009_3785824 | {
"id": "<urn:uuid:4078b73a-6a9e-4197-9a07-8b435ebd7a33>",
"dump": "CC-MAIN-2019-09",
"url": "https://drpompa.com/fasting-diet/why-our-kids-suffer-from-obesity/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247497858.46/warc/CC-MAIN-20190221010932-20190221032932-00168.warc.gz",
"language": "en",
"language_score": 0.9394457340240479,
"token_count": 4398,
"score": 2.578125,
"int_score": 3,
"uid": "009_3785824_0"
} |
Are X-Rays Necessary? X-rays are a form of energy similar to radio waves and sunshine. Commonly they are used to view the bony structures of the body to rule out pathology, and in particular to Chiropractors, a means of biomechanical analysis. Other forms of diagnostic imaging include: MRI (Magnetic Resonance Imaging ) which use strong radio waves and magnets to create the picture CT scans (Computerized Axial Tomography) is a 3D X-ray. These can provide more information on bone and soft tissue. These scans are often used by medical practitioners however are not as useful to Chiropractors as a full spine X-ray. The reason being that the spine is a weight bearing structure and hence needs to be analysed in such a manner. Your Gonstead Chiropractor will take a FULL SPINE X-ray in a weight bearing (standing) position to accurately 'see' your spine's condition. Does Everyone Require X-rays? Unfortunately without X-rays we cannot visualise the bony structures, i. e. vertebrae, of the spine. So if a subluxation is the cause of your problem then an X-ray is essential in determining the most precise way to correct it. However in certain circumstances an X-ray may not be taken. Children's bodies are constantly developing and changing, therefore X-rays are only taken in select cases. Also, pregnant women will not be X-rayed. PLEASE NOTIFY YOUR CHIROPRACTOR EVEN IF YOU SUSPECT YOU ARE PREGNANT. Benefits of an X-ray:
- Rules out pathology
- Important visual record of the spine
- Determines the biomechanical status of each spine
- Identifies areas of spinal decay/degeneration
- Confirms examination findings
- Informs the Chiropractor the direction of misalignment. This allows maximal correction of the subluxation, quickly allowing the patients to return to optimal health. Minimising Exposure to X-rays:
- Only the necessary views are taken
- The latest up-to-date equipment is utilised
- Regular mandatory government inspection and testing of site
- Sensitive high speed film shortens the exposure time
- Highly accurate electronic timing
- Luminescent screens amplify the image
- Filters and collimation limit the beam to areas required
- Shields protect sensitive body parts, for example gonads and eyes
- Pre X-ray measurement to decrease the amount of X-rays required minimising the number of exposures required. | 007_4589286 | {
"id": "<urn:uuid:d0bfb10d-6514-4233-9d14-094fcba50fdf>",
"dump": "CC-MAIN-2018-43",
"url": "https://discoverchiropractic.com.au/x-ray-analysis/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583508988.18/warc/CC-MAIN-20181015080248-20181015101748-00185.warc.gz",
"language": "en",
"language_score": 0.8923174738883972,
"token_count": 539,
"score": 3.140625,
"int_score": 3,
"uid": "007_4589286_0"
} |
Blockchain was first used for Bitcoin. But despite Bitcoin’s popularity, blockchain managed to emerge as a separate body. It has proved that it could minimise the need for broker services across a large scale of businesses and trades. From then on, blockchain has continued to redefine the way we transact. From centralised to decentralised, we are able to cut off the middleman and conduct person-to-person transactions. We may never know how else can it develop our lives and technologies in future. If we maximize it, blockchain has all the capacity to change the way we buy and sell, deal with the government and verify the legitimacy of certain important documents, and even not-so-important ones, for that matter. It has also been now used in creating decentralised apps or DApps to entertain people. Dappsite for example, is a website dedicated to showcase all DApps. All these are possible because of the open space in the internet and the power of cryptography. This way, transactions are easier, faster and a lot safer. The possibilities that blockchain offers us is limitless. In the future, it may very well exceed all our expectations. | 006_313457 | {
"id": "<urn:uuid:621bcaae-9abc-4b8c-bd89-84525a37e296>",
"dump": "CC-MAIN-2021-17",
"url": "https://forum.ethereum.org/discussion/19006/blockchain-limitless",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039508673.81/warc/CC-MAIN-20210421035139-20210421065139-00094.warc.gz",
"language": "en",
"language_score": 0.943895697593689,
"token_count": 237,
"score": 2.53125,
"int_score": 3,
"uid": "006_313457_0"
} |
Anna Pavlovna of Russia
||This article includes a list of references, but its sources remain unclear because it has insufficient inline citations. (March 2013)|
|Anna Pavlovna of Russia|
|Portrait by Jan Baptist van der Hulst, 1837|
|Queen consort of the Netherlands
Grand Duchess of Luxembourg
Duchess of Limburg
|Tenure||7 October 1840 – 7 March 1849|
|Spouse||William II of the Netherlands|
|Issue||William III of the Netherlands
Prince Ernest Casimir
Sophie, Grand Duchess of Saxe-Weimar-Eisenach
|Russian: Anna Pavlovna
Dutch: Anna Paulowna
|House||House of Orange-Nassau (by marriage)
House of Holstein-Gottorp-Romanov (by birth)
|Father||Paul I of Russia|
|Mother||Sophie Dorothea of Württemberg|
18 January 1795|
Saint Petersburg, Russia
|Died||1 March 1865
The Hague, Netherlands
|Burial||Nieuwe Kerk, Delft|
Anna Pavlovna of Russia (Russian: Анна Павловна; St. Petersburg, 18 January 1795 – The Hague, 1 March 1865) was a queen consort of the Netherlands. In the Netherlands, due to nineteenth century Dutch transliteration conventions, she is better known as Anna Paulowna.
She was born in 1795 at Gatchina Palace, the eighth child and sixth daughter of Paul I of Russia and Empress Maria Feodorovna (born Sophie Dorothea of Württemberg), and thus was Her Imperial Highness Grand Duchess Anna Pavlovna of Russia. Anna was raised by her mother at the summer residence of the Romanovs, Tsarskoye Selo. She spent her childhood there with her two younger brothers, Nicholas (1796-1855) and Michael (1798-1849). Anna received a broad education, including foreign languages and maths. She was good at handicrafts and painting. In 1809, after failing to secure her elder sister Ekaterina, Emperor Napoleon I of France asked for Anna’s hand in marriage. Her mother managed to delay her reply long enough for Napoleon to lose interest and marry Archuduchess Marie Luise, the eighteen-year-old daughter of the Austrian emperor. On 21 February 1816 at the Chapel of the Winter Palace in St Petersburg, she married the Prince of Orange, who would later become King William II of the Netherlands. The marriage had been suggested by her brother the Tsar Alexander I in 1815, as a symbol of the alliance created after the Congress of Vienna. As it had been decided that no member of the Romanov family should be forced to marry against their will, William was invited to Russia before the wedding so that Anna could get to know him and consent to marry him, which she did. At the time of their marriage, it was agreed that Prince Willem’s children should be raised as Protestants, although Anna herself remained Russian Orthodox. Alexander Pushkin celebrated the marriage in a special poem entitled To the Prince of Orange. The couple remained in Russia for one year. Anna Pavlovna was shocked over the differences between Russia and her new home country, especially when it came to the class system and the separation between the classes, which was much less strict in the Netherlands, where the distance between royalty and the public was not as great as in Russia, and she had difficulties adjusting herself to this. The couple lived in Brussels until the Belgian revolution forced them to leave in 1830. Anna liked Brussels much more than the North, as it reminded her more of her native country. She founded a school where poor women and girls were educated in sewing (1832), and a hospital for soldiers wounded in the Belgian revolution (1830). Her marriage was stormy. From the beginning, Anna considered herself superior in rank to William. In 1829, several pieces of her jewellery were stolen, and she suspected her spouse of stealing them, as he was at the time in debt and mixing with people she considered to be questionable. The adultery of her spouse created conflicts between them. They lived separated until 1843. Anna did, however, act as a mediator between her husband and her father-in-law and tried to ease the tension between them during political conflicts. Otherwise, she was not politically active, despite her strong political convictions. As a person, she was described as intelligent, sensitive, loyal to her family and with a violent temperament. During her time in Holland, she studied the Dutch language, history and culture, and founded more than fifty orphanages. On 7 October 1840, on the abdication of her father-in-law, William I of the Netherlands, she became Queen Consort of the Netherlands. She was the 343rd Dame of the Royal Order of Queen Maria Luisa on 1 February 1842. As a Queen, Anna is described as dignified, arrogant and distant towards the public. She did in fact learn to speak better Dutch than her often French-speaking spouse, but she upheld a strict etiquette and never became very popular as queen. She valued pomp, etiquette and formal ceremonies and rituals. Anna Pavlovna corresponded with her mother and brothers in Russia and treasured the memory of her birth country: she founded a Russian boys' choir, where the members were to be dressed in traditional Russian costume, and it has been said of her that she remained a Russian Grand Duchess more than she ever became Queen of the Netherlands.
As a queen dowager, she left the royal palace, retired from court life and lived a discreet life. She did not get along with her daughter-in-law and had plans to return to Russia after a conflict with her son, King William III, in 1855, but in the end, she did not. Anna and William II of the Netherlands had five children:
- William III of the Netherlands (1817–1890). Married firstly Sophie of Württemberg and secondly Emma of Waldeck and Pyrmont
- William Alexander Frederick Constantine Nicholas Michael "Sasha" of the Netherlands (1818–1848). - William Frederick Henry "the Navigator" of the Netherlands (1820–1879). Married firstly Amalia of Saxe-Weimar-Eisenach and secondly Marie of Prussia, but had no issue. - Prince William Alexander Ernst Frederick Casimir of the Netherlands Dutch: Willem Alexander Ernst Frederik Casimir (Brussels (per one source) or Soestdijk Palace (per another), 21 May 1822 – Brussels, 22 October 1822). - Wilhelmina Marie Sophie Louise of the Netherlands (1824–1897). Married Karl Alexander, Grand Duke of Saxe-Weimar-Eisenach.
The genus of trees Paulownia was coined by a Dutch botanist named Siebold to honour Anna Pavlovna. The common name of Paulownia tomentosa is Royal Paulownia,(also known as Empress Tree, Princess Tree, and Foxglove Tree.
- 18 January 1795 - 21 February 1816: Her Imperial Highness Grand Duchess Anna Pavlovna of Russia
- 21 February 1816 - 7 October 1840: Her Imperial and Royal Highness The Princess of Orange
- 7 October 1840 - 7 March 1849: Her Majesty The Queen of the Netherlands, Grand Duchess of Luxembourg, Duchess of Limburg
- 7 March 1849 - 1 March 1865: Her Majesty The Queen Dowager of the Netherlands, Dowager Grand Duchess of Luxembourg, Dowager Duchess of Limburg
- Media related to Anna Pavlovna of Russia at Wikimedia Commons
Anna Pavlovna of RussiaBorn: 18 January 1795 Died: 1 March 1865
Title last held byWilhelmine of Prussia
|Queen consort of the Netherlands
Grand Duchess consort of Luxembourg
Duchess consort of Limburg
Sophie of Württemberg | 002_740064 | {
"id": "<urn:uuid:aeb8590a-c2d8-4b0f-93b9-b22350d3953b>",
"dump": "CC-MAIN-2014-23",
"url": "http://en.wikipedia.org/wiki/Anna_Pavlovna_of_Russia",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997902579.5/warc/CC-MAIN-20140722025822-00195-ip-10-33-131-23.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9668397903442383,
"token_count": 1685,
"score": 2.640625,
"int_score": 3,
"uid": "002_740064_0"
} |
5 to 6 Years
Early Years Program
Mondays & Wednesdays. 9:00am – 12:00pm
Welcome to our program for our youngest learners, where the emphasis is on play, teamwork, and fun. Every week we’ll explore and create. Activities include:
- Art For active little hands and minds. - Letters and Numbers A hands-on, play-based approach to start decoding letters and numbers. - Science Exciting science experiments that encourage asking possibly the most important question at this age: “Why? ”
- PE Get active, get physical. Learn teamwork and the tricky art of maybe not quite winning every time. - Weekly Storytelling Mrs. Rebecca captivates attention and ignites imagination in her storytelling sessions. | 006_595879 | {
"id": "<urn:uuid:35e5e93a-dd5c-48c6-bf6d-c199b18a2ec8>",
"dump": "CC-MAIN-2018-34",
"url": "http://urbanhomeschoolers.com/5-6-years/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221209884.38/warc/CC-MAIN-20180815043905-20180815063905-00082.warc.gz",
"language": "en",
"language_score": 0.9112967252731323,
"token_count": 161,
"score": 2.5625,
"int_score": 3,
"uid": "006_595879_0"
} |
As moms, we all want to raise respectful children. We want our kids to be respectful of us as their parents but also of other people and the world around them. Because respect is about more than being polite. It’s also about kindness, empathy, consideration, and showing gratitude. When your child is being disrespectful by talking back or not listening it’s natural to get upset. But it’s important to remember kids aren’t born knowing what it means to be respectful. It’s our job as their parents to teach them. Here are some ways you can begin to teach kids respect at home. How to Teach Kids Respect
1. Demonstrate Respect
The number one way to teach kids respect is to show it to them. Demonstrating respect means behaving respectfully not only when you’re interacting with other adults but also when you interact with your children. When your child is behaving disrespectfully, it is natural to want to return that disrespect but consider the lesson that teaches. We’re in charge of our kids, right? They’re the ones that are supposed to be respectful! A nice idea, but how will they ever learn respect if you, the guiding adult in their life, respond to them with a barrage of anger, yelling, sarcasm, or other disrespectful interactions? If you’re struggling to keep interactions with your child respectful, you are not alone. I am the first to admit this is something I struggle with when my children are disregarding or defying my every rule and request. The most important step to a respectful interaction is to stay calm. Don’t overreact. Think through what you want to say before addressing a misbehavior. A calm parent is much more likely to give and receive respect from their child. Our kids are watching us all of the time. They see how we treat others, friends, family members, store clerks, bank tellers, and waiters. It’s important that our behavior demonstrates what it means to be polite and respectful. Role modeling proper behavior is a crucial part of any plan to teach kids respect. 2. Model Good Listening
Another important aspect of teaching respect is modeling listening skills. When your child is speaking to you, put down your phone. Or turn off the television. Or set aside whatever it is you are doing that is keeping your child from receiving your full attention. I understand this isn’t always possible. My own daughter would like my undivided attention 24 hours a day. But I wouldn’t get anything else done. Having said that, there are certainly times when she tries to talk to me and I am distracted. Times when she genuinely needs and deserves my full attention. I am working to be better at giving it to her. It’s what I want from her, isn’t it? We all want our kids to listen attentively when we talk to them. And following that, learn the lessons and rules we are trying to teach them. Giving someone our full attention sometimes seems like a lost art. But think of when you’re speaking to someone about something important and they are busy checking Facebook or texting. It’s frustrating and discourteous. And it makes you feel as if they don’t respect you. To teach kids respect we need to show them what respect looks and feels like. 3. Insist on Good Manners
If your kids interrupt, talk back, yell, or otherwise behave disrespectfully at home without consequences those behaviors will become their norm. As with teaching all types of good behavior, it’s important to make your expectations clear. Then you can prompt and remind your kids as necessary. You can begin to teach kids respect from a very young age. Toddlers can learn to say “please” and “thank you”. Preschoolers can learn basic manners for eating meals and speaking to adults in social situations. Teaching kids to interact respectfully with other people is an ongoing process and you can start as soon as your child is old enough to communicate with others. Behaving respectfully also means learning not to yell, hit or throw tantrums. Young children need time, practice and a lot of patience and reminders while they develop the impulse control necessary to avoid these behaviors. But it starts with teaching them about being kind and respectful of others. Skills that Last a Lifetime
We may start out wanting to teach kids respect in order to improve behavior at home or at school. But learning to treat other people with respect is a skill that will benefit your child for their entire life. Teaching basic respect also forms the foundation for teaching other important values like kindness, open-mindedness, generosity and many other qualities it’s important to teach our children as we nurture them through childhood and beyond. | 003_522004 | {
"id": "<urn:uuid:c0b3c8b1-c288-40b7-b353-ebd560c1e93f>",
"dump": "CC-MAIN-2018-05",
"url": "http://www.organizedmom.net/how-to-teach-kids-respect/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084891546.92/warc/CC-MAIN-20180122232843-20180123012843-00266.warc.gz",
"language": "en",
"language_score": 0.9614136219024658,
"token_count": 996,
"score": 3.40625,
"int_score": 3,
"uid": "003_522004_0"
} |
The United States district courts are the trial courts of the federal court system. Within limits set by Congress and the Constitution, the district courts have jurisdiction to hear nearly all categories of federal cases, including both civil and criminal matters. Every day hundreds of people across the nation are selected for jury duty and help decide some of these cases. There are 94 federal judicial districts, including at least one district in each state, the District of Columbia and Puerto Rico. Three territories of the United States -- the Virgin Islands, Guam, and the Northern Mariana Islands -- have district courts that hear federal cases, including bankruptcy cases. Federal Courts in American Government
The three branches of the federal government — legislative, executive, and judicial — operate within a constitutional system known as "checks and balances. " This means that although each branch is formally separate from the other two, the Constitution often requires cooperation among the branches. Federal laws, for example, are passed by Congress and signed by the President. The judicial branch, in turn, has the authority to decide the constitutionality of federal laws and resolve other disputes over them, but judges depend upon the executive branch to enforce court decisions. Federal Courts & Congress
The Constitution gives Congress the power to create federal courts other than the Supreme Court and to determine their jurisdiction. It is Congress, not the judiciary, that controls the type of cases that may be addressed in the federal courts. Congress has three other basic responsibilities that determine how the courts will operate. First, it decides how many judges there should be and where they will work. Second, through the confirmation process, Congress determines which of the President's judicial nominees ultimately become federal judges. Third, Congress approves the federal courts' budget and appropriates money for the judiciary to operate. The judiciary's budget is a very small part — substantially less than one percent — of the entire federal budget. Federal Courts & the Executive Branch
Under the Constitution, the President appoints federal judges with the "advice and consent" of the Senate. The President usually consults senators or other elected officials concerning candidates for vacancies on the federal courts. The President's power to appoint new federal judges is not the judiciary's only interaction with the executive branch. The Department of Justice, which is responsible for prosecuting federal crimes and for representing the government in civil cases, is the most frequent litigator in the federal court system. Several other executive branch agencies affect the operations of the courts. The United States Marshals Service, for example, provides security for federal courthouses and judges, and the General Services Administration builds and maintains federal courthouses. | 005_1502717 | {
"id": "<urn:uuid:e754c5ec-3883-45f1-9a18-d8f6e7be0880>",
"dump": "CC-MAIN-2015-11",
"url": "http://www.waed.uscourts.gov/educational-outreach",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936461416.42/warc/CC-MAIN-20150226074101-00031-ip-10-28-5-156.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9449114203453064,
"token_count": 524,
"score": 4.03125,
"int_score": 4,
"uid": "005_1502717_0"
} |
Individual differences |
Methods | Statistics | Clinical | Educational | Industrial | Professional items | World psychology |
This article was originally an undergraduate project entitled: Recovery from Acquired Brain Injury, written by Mostly Zen (Thomas Michael) for Headway West Midlands and Newman College of Higher Education.
This article was based on the report; Recovery from Acquired Brain Injury which was intended as a general guide to head injury and recovery for the non specialist (social rehabilitation workers with no formal psychology/medical training). It may also be useful to psychologists who have little training in biology. Please edit and improve this article as this is the purpose of the Psychology Wiki. However, the material reads well in the current format, so rather than move the material to separate articles or add much greater detail, it may be better to link to articles which discuss aspects of this material in more depth. Mostly Zen 20:43, 8 July 2006 (UTC)
The effect of injury on the brain is a complex subject involving a great deal of biological, cognitive and social functioning. Specialists in the rehabilitation of people with Acquired Brain Injury may not have much training or knowledge in neuron biology or brain function. Likewise, researchers in those areas may have little or no experience of working with people who are survivors of head injury. Psychologists may be very knowledgeable in the areas of cognitive functioning, but have less experience in biology or social rehabilitation. Sharing knowledge among these key areas can enhance our understanding of brain injury, and enable us to help people with brain injuries to make as full a recovery as possible, as well as to adapt and cope with those injuries which are irreparable at present. For this reason the report was originally written, and is presented here on the Psychology Wiki for the same purposes. The cross referencing of the Psychology Wiki can help readers to understand unfamiliar terms and also allows them to explore those terms in greater depth. Primary & Secondary Causes of Brain InjuryEdit
Acquired Brain Injury has a variety of causes. The most common include trauma to the head caused by traffic accidents, falls and assaults, but there are many other causes including strokes, drug overdoses and anoxia (lack of oxygen due to drowning for example). Briefly, the brain can be damaged by any of the following:
- In trauma, the brain is violently shaken, which can cause multiple small shear type injuries across many areas of the brain, as the brain is very delicate and collides with the rough interior of the skull. - Initial injuries can lead to swelling which causes secondary damage, as the brain encased within the skull has no room to allow for this expansion. - Swelling can cut off the supply of oxygen to neurons (brain cells), which can then die in a matter of minutes. - Damage to the blood vessels in the brain lining from initial trauma can also cause neuron death due to lack of oxygen. - Blood vessels also serve as a radiator to cool the brain, overheating can cause neuron death. - Lack of blood and oxygen trigger a chemical reaction called ischemic cascade, which is responsible for most neuron death. - Damaged and dead neurons can release the neurotransmitters stored within their vesicles, which can over stimulate other neurons leading to further damage. Medical advancements in preventing secondary injuries such as anoxia and ischemic cascade have lead to people surviving brain injury far more frequently than was the case in the past. This increase in frequency of survival is the reason why services such as Headway are in increasing demand. Immediate post trauma care may have become very effective in helping brain injured people to survive, but it is then necessary for the family, carers and the survivors themselves to adapt to living with the injury and attempting to recover as best as is possible – a process that will take many years or possibly the rest of their lives. - Main article: Causes of acquired brain injury
Biological Mechanisms of Damage & RecoveryEdit
Damage to Neurons & SynapsesEdit
Neurons are the brain cells themselves, and synapses are the connections between them. Neurons send messages to each other via the synapses, and form a network of connections which allow the various areas of the brain to communicate with one another. In an uninjured brain these messages allow us to function normally, moving, talking and thinking in our everyday social lives. By the time we are 21 we have nearly one hundred billion neurons. As we age, we lose approximately 100,000 of these a day through natural causes, leaving us with about 97% of our neurons left alive if we reached 100 years old. In the above diagram (figure i), an actual neuron is shown using a scanning electron microscope. The simplified figure shows the neuron (yellow) and the two cells in our brains which support the neuron. The Astrocyte (red) feeds the neuron oxygen and nutrients, and the Myelin cells (blue) insulate the neuron in much the same way that plastic coatings insulate electrical wires. When a person suffers a brain injury, many neurons are destroyed and many, many more connections between the neurons are severed (because there are more connections than neurons this is always the case). This damage to the neural network is responsible for the physical, emotional, behavioural and cognitive difficulties that brain injured people suffer from. In the above diagram (figure ii), a damaged neuron is shown using an optical microscope, and damaged neurons and neural connections are shown for comparison with the healthy diagrams above. Plasticity & NeurogenesisEdit
Plasticity is the extent to which the brain can reorganise itself in terms of its neural connections (it can be reshaped, like plasticene). Synaptic plasticity is the forming of new connections both between individual neurons and between different areas of the brain. In this article, plasticity is used as an abbreviation for synaptic plasticity. Plasticity is an on-going process that occurs in all people and can be thought of as the process which allows us to learn and grow. There are limits to plasticity however, as the brain specializes its functions into different areas, responsible for movement, vision, speech etc. If these areas are damaged, other areas can only take over their function to a limited extent. The above new synapse is visible using green fluorescence. As new axons re-grow, they connect with the dendrites of other neurons, making new connections (blue lines). Axons re-grow at about 1mm per day until they reach about 1cm, so damage to areas greater in size than this cannot be bridged by plasticity. Also, the presence of chemicals in brain scar tissue inhibits plasticity. 1&2
The other half of Plasticity is Neurogenesis. This is the recent discovery that new neurons can grow in the adult human brain. 3 Although part of plasticity, it is a separate process from synaptic plasticity and so is referred to separately throughout this article. - A - Neurogenesis in the hippocampus of an adult rat (the new neurons are green). - B - The simplified process is that stem cells produce progenitor cells, which in turn can develop into new Neurons (yellow) as well as Myelin & Astrocyte cells (blue and red respectively). - C - In the network of neurons that makes up the brain, these new neurons may make new connections to older existing neurons (blue lines). Although most Neurogenesis studied involves the hippocampus (a memory centre) recent research has shown Neurogenesis in the neocortex of macaque monkeys. 4 The neo-cortex is responsible for higher brain function, including more human functions. How much Recovery is Possible? Edit
There are two important extremes to avoid when we are discussing brain recovery. The first is the over optimistic extreme that people with ABI can make a 100% full recovery. This kind of thinking can artificially raise people’s hopes, setting them up for future disappointment. It is also harmful in that it will prevent a brain injured person from being able to accept his or her injury and the long term effects which it will have on his or her life. It is important though to also avoid the other extreme, of pessimism. The pessimistic view is often encountered more frequently in clients and can be a sign of accompanying psychological problems such as depression. The brain injured person may feel that he or she is ‘broken’ and beyond repair, which will be harmful to their chances of recovering some function that has been lost. Studies have shown that depression is far more common in patients with brain injury than those with other serious injuries. 5 Hence depression must be dealt with, as practice and determination are necessary to regain any level of function. The two extremes are illustrated on the diagrams below, as well as the uncertain nature of recovery. Clients displaying either of these extreme views may have trouble with insight into the nature of their injury (which may or may not be an effect of the injury itself). They may also have trouble accepting their injury even if they understand what and how the injury is and how it affects them. Either extreme is a hindrance to what recovery is possible. Different individuals recover to differing extents. This is indicated in the above figure with the question marks. Hopefully the information in this report should be helpful and enable clients to maximise any recovery that they are still able to make. Unfortunately, the more time that has passed since the injury was inflicted, the less likely further recovery is possible. This means that most recovery will be in the initial years following the accident. The brain remains plastic throughout our lives though and so some additional recovery should remain possible. Also, as client’s age, some recovery that they may have made may be reversed due to cognitive decline in their later years, although much of this appears to be due to inactivity in terms of both exercise and mental simulation. 6 However, the brain remains plastic throughout our lives (even though it is less so as we get older) and the factors which improve brain health in later sections are also invaluable in preventing cognitive decline in later life. Theoretical Models of Recovery: Restoration & CompensationEdit
These are two ways in which people can recover from brain injury. Restoration is recovery of function as it was prior to the accident, whereas Compensation is an adaptive reaction, the person changes his or her behaviour to accommodate the effects of the injury in their lives. From a work session at Headway West Midlands, clients listed effects of ABI in seven broad categories. The table below shows how clients could potentially restore lost ability in these areas, or learn to cope with the injury if restoration is not possible. - Helping client to remember for themselves through memory games, practice mnemonics etc…
- Keeping a diary
- Having a personal organiser/bleeper
- Keeping a daily routine
- Speech therapy and every day practice. - Recovery of Left Hemisphere (speech areas)
- Context gesticulation and sign language. - Learning limited speech with Right Hemisphere? - Physiotherapy, exercise
- Regaining use of right hand
- Wheelchair, stick or frame
- Learning to use Left hand
- Planning and awareness practice
- Personal organiser or diary, keeping a routine. - Behaviour workshops (e. g. Anger Management)
- Considering affect on others
- Avoiding situations in which behavioural problems normally occur. (e. g. Pub)
- Taking best action to recover in other areas will help person to feel better. - Learning to accept and cope with long term issues is vital to recovery
- Practice use as much as possible. - Stimulation through arts etc…
- Sensory Aids, hearing etc
- Having a carer do cooking
- Making others aware
More recent and less severe injuries are more likely to recover via Restoration, returning to levels of cognitive ability as good or nearly as good as before. Conversely, injuries sustained a longer time ago, or those that are more severe, will be much less likely to repair fully, and so a Compensation strategy should be adopted. Although these old and/or severe injuries may not fully heal through current methods, enabling people with ABI to learn to cope practically and emotionally with their injury is a vital part of recovery. Note that the extent of recovery discussed in the previous section may apply separately to each of the areas above. For example, full recovery emotionally and behaviourally may be possible, combined with only partial recovery of movement & speech. Also, compensation in some areas can lead to emotional restoration, i. e. as the person accepts their injuries they can be happier and live their lives less burdened. The above diagram show how limited, diffuse injury, such as axon tears from an impact type injury in which the brain is shaken, may heal more readily (through plasticity). More severe injuries from anoxia, poisoning, or open head wounds may destroy a great many neurons in a given area, which may be too large to be bridged by new axons (which grow up to 1cm on average). Understanding the extent of a brain injured persons injury is vital to understanding how much restoration of function is possible, and how much of their recovery must be due to compensation. Practical methods to enhance recoveryEdit
This section will be of most practical use to Headway staff and clients. It is split into Educational, Physical and Psychological sub-sections and uses terminologies explained in the earlier sections. It is important to realise that none of these factors will help clients to regain brain function on their own. Combinations of physical (exercise, nutrition & drug use), psychological (emotional & acceptance) and educational (stimulation & social rehabilitation) will be required to make as full a recovery as possible. Environmental stimulation is vital for the development of the brain in young children. There are certain critical periods during which, without environmental stimulation, children cannot ever learn speech for example. Research with animals has shown that environmental stimuli increase the rate of neurogenesis in the brain. 7 & 8 Further research has shown that learning skills enhances this neurogenesis still further. 9
Because brain injury itself stimulates neurogenesis and plasticity, we need to expose people with brain injury to as wide a range of environmental stimuli as possible, preferably as soon after injury as they are ready. There are 5 important factors10 involved in plasticity, these are:
- 1) Stimulation – Environmental & Education input is vital for new connections. - 2) Frequency – Frequent stimulation (daily practice) is more effective. - 3) Duration – Too short and learning is not encoded and too long causes boredom. - 4) Intensity – Optimum arousal is the correct balance between boredom and stress. - 5) Consistency – The same exercises or stimulation are consistently repeated. The best time for stimulation and re-education would seem to be almost immediately post-trauma. Unfortunately this is generally not possible as the patient may be struggling to recover from physical injuries, recently come out of coma etc… However it is important to begin stimulation, practicing skills and re-education as soon as possible, so this may have implications for post traumatic care on the NHS, and also to make medical professionals, carers and clients aware of services such as Headway at an early stage. Exercise has been shown to stimulate brain plasticity in mammals. 12 It has also been shown to increase information processing ability in the brain, and to be a protective factor in reducing cognitive decline in old age. 13
Exercise naturally releases endorphins (our bodies natural painkillers). Endorphins are mimicked by Opiate type drugs, which have also been shown to stimulate neurogenesis in rats. 14 This suggests that the endorphins released during exercise may in fact stimulate neurogenesis in our brains, as the endorphins have similar biological function as the opiates. Endorphins are better for us in fact, because opiates (e. g. heroin) are dangerously addictive. Some people even claim to be addicted to the natural endorphin high that exercise can give. Apart from this, exercise is good for our general health by being stress relieving and good for our heart and circulation. Improved circulation is indirectly beneficial to the brain by ensuring adequate flow of nutrients and oxygen. This will differ from conventional physiotherapy following a physical injury to the body. In this case, it is the stimulation to the injured areas of the brain (and connected areas), rather than the limb itself which is important in recovery. The way in which the physiotherapy is carried out however, may be indistinguishable from normal physiotherapy. Research has been carried out with Squirrel Monkeys11 in which the part of their brain which controls their right hand was deliberately damaged (similar to stroke injury). As expected, the monkey’s control of that hand was severely impaired. The researchers then split the monkeys into two groups. One group was allowed to use either hand, and tended to use their unimpaired hand (compensation) showing little recovery of their weaker hand when forced to use it. The other group were forced to use their weaker hand, and seemed to show quite good recovery of function over 12 weeks (restoration). When the parts of their brain were scanned afterwards, the part of the brain responsible for controlling the arm and elbow seemed to have taken over some of the hand control in the improved monkeys. This means that although people with ABI might not want to use weaker limbs or practice skills that they find difficult, that restoration of function may only be possible through practice. Many clients may have problems with movement which make vigorous exercise difficult if not impossible. Alternative forms of exercise such as swimming, gardening or even walking briskly for as little as 30 minutes a day can still be very beneficial however. Clients should be encouraged to exercise whenever possible. This section is covered in far greater detail in Appendix 2. CARBOHYDRATES: Responsible for our energy levels throughout the day, the best carbohydrates to eat are those with a low or moderate glycaemic index, such as fruits, whole grains, and sweet potatoes. These give our body and brain a slow trickle of energy throughout the day which should aid concentration. PROTEINS: Proteins build our bodies but also make the neurotransmitters that send messages between our neurons. There are more neurotransmitters than can be discussed in detail here but two important ones are Serotonin (5HT) and Dopamine (DA). Foods which provide building blocks for these neurotransmitters are discussed in the appendix. FATS: Saturated fats and artificial hydrogenated oils have been shown to be harmful to the plasticity of the brain15 which will impede brain repair following ABI. This means it is especially important that people with ABI reduce these fats from their diet, apart from the fact that these fats lead to furring of the arteries in all people, which increases risk of stroke. VITAMINS & MINERALS: Vitamin C is especially important in the brain, where it is present ten times more concentrated than the rest of the body. Vitamin C is a powerful anti oxidant, which helps to reduce damage to neurons from free radicals, and may even have a role in protecting the brain from trauma damage. 16
Drugs & AlcoholEdit
It is beyond the scope of this report to examine the effects of drugs and alcohol in much detail, however the appendices contain a client work session plan on the three most commonly used recreational drugs. Clients and carers should be made aware that substances that are detrimental to physical health are also detrimental to the health of our brains. Psychological factors can inhibit recovery of brain function, and in many cases psychological factors may be the most difficult aspect of the injury for the affected person to deal with. Long term studies (over 50 years) with brain injured veterans from World War II have shown that people with ABI are more than 50% more likely to suffer from depression than veterans with other injuries (who also suffer depression more frequently than the rest of the population). 17 In addition, people with ABI suffer from sleep disturbances far more frequently than the rest of the population18, due to disturbed chemical processes which naturally occur during sleep. Disturbed sleep is also a major cause of depression. Both depression and poor sleep cause people trouble in concentration, memory and moods. Some of the cognitive affects attributed to head injury may in fact be due to accompanying psychological causes, even if the cause of these problems was the initial physical injury. Depression causes people to have a negative outlook on life, and may cause depressed people with ABI to adopt the negative extreme of feeling ‘broken’ and to feel that any recovery is impossible. One does encounter this with Headway clients, some of whom even go so far as to say they wish they had died in their accident. These clients need help to accept the injury in their lives. On the positive side, some clients report that they feel they are a changed or better person since their accident, as they no longer engage in negative or harmful behaviours which they used to prior to injury. Treatment for depression is somewhat outside the scope of this report, but counselling for the client, enabling them to accept the affects of their injury and gain insight into how they can cope with the injury and get on with their lives. Counselling may also be needed due to personality changes following the injury, as well as social and relationship difficulties which may be faced trying to cope with the change. Medication may also be useful as current theories suggest that depression is either due to, or a cause of diminished plasticity in the brain19 especially the hippocampus which is associated with memory function. Possible Future therapeutic & medical interventionEdit
This section will not yet be of practical use, as the therapies described are still being researched and developed. Whilst most testing at this stage is being conducted on animals, at some point human volunteers will be needed to test these therapies. It is likely in the next 10-20 years or so, that clients with ABI will be approached to undergo these new techniques that are being pioneered, which is why this section has been included. Future forms of medical intervention will likely focus on increasing Neurogenesis in the brain. This will take one of the following forms:
- 1) Transplanting neurons or stem cells (using therapeutic cloning or otherwise). - 2) Increasing the rate of neurogenesis (or preventing its inhibition) through medical drugs. In transplantation there are two possibilities. The first is transplanting an adult neuron from a donor. Researchers have managed to transplant neurons from one animal’s brain into another, and have also observed the growth of new axons to form synapses between transplanted neurons and original ones. For example, pig neurons have been successfully transplanted into a rat brain. 20 In theory the same process should be possible transplanting neurons from a human donor brain into an injured brain. However the idea of having someone else’s brain cells in your head may be more unsettling than the idea of having a donor’s kidney for example. The second possibility of transplantation is that of transplanting stem cells. Stem cells are undifferentiated cells, which we all have in our bodies. They can become any type of cell in the body, and become the correct type of cell by the presence of nearby mature cells signalling what type of cell is required. Neural stem cells are what cause natural neurogenesis, the type stimulated by exercise and mental stimulation. Transplantation of these naturally occurring cells to the damaged areas in the brain could greatly speed recovery. Stem cells also occur in different parts of our bodies, such as in our bone marrow. In the above diagram, transplanted stem cells taken from bone marrow are observed to differentiate into different types of brain cell and fuse with existing cells. 21
Much controversy surrounds stem cells because of one method of producing them known as therapeutic cloning. This involves making a clone embryo using the patients DNA. Recently a scientist called Hwang Woo-suk was found to have fraudulently claimed to have created stem cells from cloned embryos. 22 Had this been true it would have been very important for treatment of patients with paralysis and brain injury. Apart from fraudulent claims, many people are opposed to therapeutic cloning on the basis that they consider the embryos to be human beings and see using them to harvest stem cells as killing. Whether future stem cell therapies use cloned stem cells or stem cells from bone marrow remains to be seen. Hamsters see again (23)
As cannabis is a commonly used drug in our society, it is hardly surprising that some people with ABI use the drug. The author was asked to research the effects of the drug because certain clients at Headway West Midlands are known to use it. Research in the area has found several different results. A study in 2005 has shown that Cannabinoids (cannabis like drugs) actually promote neurogenesis in the adult hippocampus (a memory area), and that anti anxiety and anti-depressant effects may be due to this neurogenesis. 24 However, another study in 2001 showed that cannabinoids inhibit the growth of new synapses (plasticity) in the hippocampus. 25 What overall effect these two conflicting effects cause is unknown, but it is widely known that cannabis inhibits memory formation. Future medicines derived from the drug may be beneficial in short term doses (due to the increased neurogenesis) but counterproductive if taken for long periods (due to inhibiting plasticity and memory). Other affects of cannabinoids are that they are potent anti oxidants (like Vitamin C) except easily able to cross the blood brain barrier. However, since cannabis is normally smoked, the harmful affects of smoking will likely overwhelm and positive affect. Again the possibility of future medicines is here. Unwanted Side EffectsEdit
Artificially increasing plasticity, both synaptic plasticity and neurogenesis could have undesirable side effects, as could implantation of neurons or stem cells. The new cells and the connections between them are not certain to form connections as desired to restore lost function, although in combination with stimulation and re-education therapies this seems more likely. Unintended changes in plasticity may be a cause of conditions such as schizophrenia, according to recent theories of the illness. Many new connections may be formed that were not intended, which may cause changes in that persons personality, an effect which is also caused by head injury, and one which carers find very difficult to deal with emotionally. Clearly the risks must be balanced with the benefits. Primary & Secondary causes of Brain InjuryEdit
Biological Mechanisms of Damage & RecoveryEdit
- Life & Death of a Neuron: http://helpforheadaches.com/articles/nihsheets/life-neuron.htm
- Plasticity: http://en.wikipedia.org/wiki/Plasticity_(brain)
- 2011 Paper from Brain Journal on Plasticity: http://brain.oxfordjournals.org/content/134/6/1591.full
How much recovery is possible? Edit
Factors known to influence recovery in clear layman language:
Depression as extreme view: http://www.adap.net/tbi/depression.pdf
Theoretical Models of Recovery: Restoration & CompensationEdit
- Restoration vs. Compensation Note that the term Restoration is sometimes referred to as Restitution elsewhere. Practical methods to enhance RecoveryEdit
- Educational – Stimulation
- Physical – Exercise (Neurogenesis) http://www.fi.edu/brain/exercise.htm
- Nutrition – Brain Health: http://sln.fi.edu/brain/pyramid.htm
- Mental health link to Diet Change http://news.bbc.co.uk/1/hi/health/4610070.stm
- Psychological – Depression http://news.bbc.co.uk/1/hi/health/3370411.stm
Possible Future therapeutic / medical interventionEdit
- Nanotech helps blind hamsters see: http://news.bbc.co.uk/1/hi/sci/tech/4801728.stm
- Cambridge Centre for Brain Repair: http://www.brc.cam.ac.uk/
- Foetal stem cells: http://en.wikipedia.org/wiki/Plasticity_(brain)0
These references are all cited in the main article. - Tan, Andrew M.; Zhang, Weibing; Levine, Joel M. (2005) NG2: a component of the glial scar that inhibits axon growth. Journal of Anatomy. 207(6):717-725, December 2005
- Fawcett, James. W & Asher, Richard. A. (1999) The Glial Scar and Central Nervous System Repair. Brain Research Bulletin Vol 49 No 6. pp 377-391. Elsevier Science Inc.
- Eriksson, P. S., E. Perfilieva, T. Bjork-Eriksson, A. M. Alborn, C. Nordberg, D. A. Peterson and F. H. Gage. 1998. Neurogenesis in the adult human hippocampus. Nature Medicine 4:1313-1317. - Gould, Elizabeth *; Reeves, Alison J.; Graziano, Michael S. A.; Gross, Charles G. (1999) Neurogenesis in the Neocortex of Adult Primates. Science. 286(5439):548-552, October 15, 1999. - Ricardo E. Jorge, MD; Robert G. Robinson, MD; David Moser, PhD; Amane Tateno, MD; Benedicto Crespo-Facorro, MD; Stephan Arndt, PhD. (2004) Major Depression Following Traumatic Brain Injury. Arch Gen Psychiatry. 2004;61:42-50. - Sitskoorn, Margriet M. (2005). The plasticity of the brain: The effect of behaviour. Psycholoog. Vol 40(5) May 2005, 262-267. - Kempermann G, Kuhn HG, Gage FH. 1997. More hippocampal neurons in adult mice living in an enriched environment. Nature 386: 493-495. - Kempermann G, Brandon EP, Gage FH. (1998) Environmental stimulation of 129/SvJ mice causes increased cell proliferation and neurogenesis in the adult dentate gyrus. Curr Biol. 1998 Jul 30-Aug 13;8(16):939-42. - Gould, Elizabeth; Beylin, Anna; Tanapat, Patima; Reeves, Alison; Shors, Tracey J. (1999) Learning enhances adult neurogenesis in the hippocampal formation. Nature Neuroscience. Vol 2(3) Mar 1999, 260-265. - EDUCATION Continuous stimulation is better than hard core 4 hours a week
- Frost, S. B; Barbay, S; Friel, K. M; Plautz, E. J; Nudo, R. J. (2003). Reorganization of Remote Cortical Regions After Ischemic Brain Injury: A Potential Substrate for Stroke Recovery. Journal of Neurophysiology. Vol 89(6) Jun 2003, 3205-3214. - Kleim J.A, Jones T. A & Schallert T (2003) Motor Enrichment and the Induction of Plasticity before or after Brain Injury. Neurochemical Research. 28(11):1757-1769, Kluwer Academic Publishers.
- Cotman, C. W & Engesser-Cesar, C. (2002) Exercise Enhances and Protects Brain Function. Exercise & Sport Sciences Reviews. 30(2):75-79, April 2002. 2002 The American College of Sports Medicine
- Persson AI, Harlan T, Bull C, Zarnegar P, Ekman R, Terenius L, Eriksson PS. (2003) Mu- and delta-opioid receptor antagonists decrease proliferation and increase neurogenesis in cultures of rat adult hippocampal progenitors. European Journal of Neuroscience, 2003 Mar;17(6):1159-72
- Wu A, Molteni R, Ying Z, Gomez-Pinilla F. (2003) A saturated-fat diet aggravates the outcome of traumatic brain injury on hippocampal plasticity and cognitive function by reducing brain-derived neurotrophic factor. Neuroscience. 2003;119(2):365-75. Medline
- Rice, Margaret E. (2000). Ascorbate regulation and its neuroprotective role in the brain. Trends Neurosci. (2000) 23, 209–216
- Holsinger, Tracey MD; Steffens, David C. MD; Phillips, Caroline MS; Helms, Michael J. MS; Havlik, Richard J. MD, MPH; Breitner, John C. S. MD, MPH; Guralnik, Jack M. MD, PhD; Plassman, Brenda L. PhD (2002) Head Injury in Early Adulthood and the Lifetime Risk of Depression. Archives of General Psychiatry. 59(1):17-22, January 2002. - Clinchot, Daniel M; Bogner, Jennifer; Mysiw, W. Jerry; Fugate, Lisa; Corrigan, John. (1998). Defining Sleep Disturbance after Brain Injury. Journal of Physical Medicine & Rehabilitation. 77(4):291-295, July/August 1998. - Kempermann, Gerd; Kronenberg, Golo. (2003) Depressed new neurons--adult hippocampal neurogenesis and a cellular plasticity hypothesis of major depression. Biological Psychiatry. Vol 54(5) Sep 2003, 499-503. - Deacon T, Whatley B, LeBlanc C, Lin L, Isacson O. (1999) Pig fetal septal neurons implanted into the hippocampus of aged or cholinergic deafferented rats grow axons and form cross-species synapses in appropriate target regions. Cell Transplant. 1999 Jan-Feb;8(1):111-29. Medline
- James M. W, Clas B. J, Angelica T & Helen M. B. (2003) Stable reprogrammed heterokaryons form spontaneously in Purkinje neurons after bone marrow transplant. Nature Cell Biology 5, 959 - 966 (2003). Published online. Web page accessed 28/02/06
- Journal Retracts Hwan Woo-Suk Research Papers. Web page accessed 15/03/06
- Hamsters See again! - Need BBC article link
- Wen Jiang, Yun Zhang, Lan Xiao, Jamie Van Cleemput, Shao-Ping Ji, Guang Bai and Xia Zhang. (2005). Cannabinoids promote embryonic and adult hippocampus neurogenesis and produce anxiolytic- and antidepressant-like effects. J. Clin. Invest. 115:3104-3116 (2005). - Kim, Daniel & Thayer, Stanley A. (2001) Cannabinoids Inhibit the Formation of New Synapses between Hippocampal Neurons in Culture. The Journal of Neuroscience, 2001, 21:RC146:1-5
- Medley,A. & Worthington, A. (2007) Keeping up with our clients:Self-regulation in brain injury. Clinical Psychology Forum, 175, 37-40
(Unless otherwise noted, all diagrams were illustrated by the author)
Photographs of staff and clients taken from Headway West Midlands website: http://en.wikipedia.org/wiki/Plasticity_(brain)1 Web page accessed 16/03/06
- Figure (i): a – Actual Neuron (scanning electron microscope image)
Professor Willman’s personal pages at Viterbo University website http://en.wikipedia.org/wiki/Plasticity_(brain)2 Web page accessed 23/02/06
- Figure (ii): a – Damaged Neuron
Neurostructural Research Laboratories http://en.wikipedia.org/wiki/Plasticity_(brain)3 Web page accessed 25/02/06
- Figure (iii): a – Actual New Synapse
MIT Open-courseware: Department of Brain & Cognitive Sciences http://en.wikipedia.org/wiki/Plasticity_(brain)4 Web page accessed 23/02/06
- Figure (iv): a – Actual Neurogenesis
Scandinavian Life Science Journal: Neurogenesis in rat hippocampus. http://en.wikipedia.org/wiki/Plasticity_(brain)5 Web page accessed 20/02/06
- ‘Simplified’ parts of above 4 diagrams adapted from pictures from:
NIH Publication No.02-3440d National Institute of Neurological Disorders & Stroke http://helpforheadaches.com/articles/nihsheets/life-neuron.htm Web page accessed 18/02/06
- Figure (ix) The Wholeo Dome
From Wholeo Online by Caroling www. wholeo. net Web page accessed 22/02/06
- Figure (x)
Transplanted cells fuse with existing neurons Nature Journal Online http://en.wikipedia.org/wiki/Plasticity_(brain)7 Web page accessed 28/02/06 | 008_5753187 | {
"id": "<urn:uuid:5e98ee0b-8fd0-46b0-9d3e-047bb52eeff5>",
"dump": "CC-MAIN-2016-36",
"url": "http://psychology.wikia.com/wiki/Brain_injury:Recovery",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982296571.15/warc/CC-MAIN-20160823195816-00153-ip-10-153-172-175.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9277988076210022,
"token_count": 7806,
"score": 2.734375,
"int_score": 3,
"uid": "008_5753187_0"
} |