text
stringlengths 150
542k
| id
stringlengths 47
47
| dump
stringclasses 1
value | url
stringlengths 15
499
| file_path
stringlengths 138
138
| language
stringclasses 1
value | language_score
float64 0.65
1
| token_count
int64 39
159k
| score
float64 2.52
5.03
| int_score
int64 3
5
|
---|---|---|---|---|---|---|---|---|---|
About American Frontiers
About American Frontiers: A Public Lands Journey
America's public lands are a treasured part of our national heritage, representing its grandeur, bountiful promise, and vast natural resources. All citizens share in the rights and the responsibilities of seeing that our public lands are cared for and managed in a way that meets the current and future needs of the American people.
To highlight the beauty, the accessibility, and the benefits of our public lands, the Public Lands Interpretive Association (PLIA), an Albuquerque, New Mexico-based non-profit organization that provides interpretive and educational resources to the public, mapped out a Canada-to-Mexico trek exclusively on public lands, called American Frontiers: A Public Lands Journey.
The Journey, or Trek,involved two groups of travelers: one starting north from the Mexican border and the second headed south from the Canadian. Their route lay entirely on public lands, a feat that has never been accomplished before. The trek began on July 31, 2002 and ended two months later when the two teams met in Wasatch-Cache National Forest near Salt Lake City, Utah on September 27.
Inspired by American Frontiers: A Public Lands Journey, National Geographic Society has designed its Geography Action! 2002 curriculum around the theme of public lands. Aimed at teaching school-aged children the beauty and the benefits of America's public lands, Geography Action! 2002 followed the trekkers along the two-month journey, highlighting the diversity and grandeur of our nation's public lands.
To demonstrate the different ways people get about on our public lands--and to stay within the 60-day limit of the journey--trek participants utilized numerous modes of transportation for this historic border-to-border journey across America. The hiked and backpacked, rode horses, mountain bikes, ATVs and dual sport motorcycles; rafted, canoed, drove pickup trucks, motorboats and 4WD vehicles, and even spent a few leisurely days on a houseboat.
Along the route the two teams attended special events, round table discussions, visited schools and communities to learn about public land issues. And, of course, they saw some of the most spectacular scenery of the American West. Their journal entries eloquently describe the feelings public lands awoke in them and also the daily routine of the long trek. You'll enjoy reading them.
Three years in the making, American Frontiers: A Public Lands Journey has enlisted numerous partners and sponsors including the National Geographic Society, the Department of the Interior, the USDA Forest Service, Bureau of Land Management, USGS, National Environmental Education and Training Foundation, Fire Wise Communities, American Honda, Kodak, the Coleman Company, and many others. For a full list of our sponsors, please look under "Our Sponsors" on the home page.
To learn more about American Frontiers, please spend some time on this website, read the team members' journals, enjoy the photographs
ot follow their route on the maps. For more information about American Frontiers, please contact the Public Lands Interpretive Association, 6501 Fourth Street, NW, Albuquerque, NM 87107 or call our toll-free number 877-851-8946. You can also email to SMaurer@plia.org
Everyone inspired by the Public Lands Journey should pay a visit to our public lands. To find out more about recreation opportunities on public lands, please visit the Public Lands Information Center online. There, you can find detailed recreation information, interactive recreation maps, and a large selection of guidebooks and maps.
All material copyright ©2002 - 2013, Public Lands Interpretive Association except photographs where ownership is otherwise indicated. All rights reserved. | <urn:uuid:b0a31cfd-73e9-4bc0-8d69-4691c2c822f9> | CC-MAIN-2013-20 | http://www.americanfrontiers.net/about/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.915774 | 755 | 2.890625 | 3 |
- Historic Sites
“To A Distant And Perilous Service”
Westward with the course of empire Colonel Jonathan Drake Stevenson took his way in 1846. With him went the denizens of New York’s Tammany wards, oyster cellars, and gin mills—the future leaders of California.
June/July 1979 | Volume 30, Issue 4
Three weeks later, in a millrace on the American River in northern California, John Marshall spotted the flicker of gold. By the end of summer, 1849, the Los Angeles garrison, like every other encampment of the New York volunteers, was abandoned, the harbinger of Anglo-Saxon civilization scattered to the hills, the coastal towns and villages of California half-deserted. The little port of San Francisco had become the focus of world migration. Captain Folsom, the staff quartermaster, having secured appointment as collector of the port, was on his way to becoming a millionaire. The Russ family, purveyors of Moroccan leather and holiday fireworks, had opened a jewelry shop and begun assembling an empire of hotels, beer gardens, office buildings, and residential blocks. Sergeant John C. Pulis, late of Lippitt’s monstrous Company F, had become the first sheriff of San Francisco. Lieutenant Edward Gilbert was editing the Alta California , the leading newspaper in the territory; Captain Naglee (he of the bathtime rebellion) had founded the territory’s first bank; Lieutenant Hewlett had opened a boardinghouse; Captain Frisbee had started a commission agency and was in prospect of marrying the eldest daughter of General Vallejo; Lieutenant Vermeule, the plague of Abel Stearns, had set himself up as a lawyer and would soon be elected a delegate to the California constitutional convention and a member of the state legislature; and the Reverend Mr. Thaddeus M. Leavenworth, chaplain to the regiment, had attained the quasi-judicial position of alcalde of San Francisco and was granting homesteads and auctioning public lands with a Christian generosity that scandalized even his former associates.
As for the colonel, he was well on his way to a second career (and a second marriage and a second family) as a legal counselor, politician, and founder of a grandiose ghost city called New-York-of-the-Pacific, which endures today only in the name of a slough on the edge of San Francisco Bay.
The former New York boys were scattered by then throughout California, styling themselves doctors, lawyers, judges, or capitalists. A few in San Francisco called themselves the “Hounds”—or, on formal occasions, the “Regulators.” They were the first recognizable New York—style drinking-and-marching society in the Far West, and their raucous behavior soon aroused the more orderly citizens of the town to form the prototype of San Francisco’s several committees of vigilance.
For better or worse, the Americanization of California had begun. | <urn:uuid:1dd05bbf-f83d-4605-ba5c-81c1a7767a1d> | CC-MAIN-2013-20 | http://www.americanheritage.com/content/%E2%80%9C-distant-and-perilous-service%E2%80%9D?page=10 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.968023 | 625 | 3 | 3 |
- Historic Sites
George C. Marshall Museum
The museum dedicated to the life of General George C. Marshall also houses many of his papers in the research library.
This museum profiles one of the 20th century's greatest military and diplomatic leaders through exhibits related to the Marshall Era (1880-1960). Marshall led the Allied military through World War II and organized the European Recovery Program (Marshall Plan), which rebuilt Europe when the war was over. The general's papers are housed in the research library. | <urn:uuid:27cdbc2c-b70f-4a92-bc8b-4a053bc38ed6> | CC-MAIN-2013-20 | http://www.americanheritage.com/content/george-c-marshall-museum | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.933736 | 102 | 2.65625 | 3 |
The scientific world is abuzz with news of the ratification of the existence of the subatomic particle called the Higgs boson - or more colloquially, the 'God particle.' This subatomic particle's existence - which was verified recently (with virtually near certainty) by experiments at the Large Hadron Collider in Switzerland - lends credence to several long-standing physical theories such as the so-called Standard Model and the Big Bang Theory.
The nickname God particle is ironic for two reasons. First, generally, the nuclear physicists who deal with these matters - postulating the fundamental physical laws of the universe and then setting about to either verify or refute them - tend not to be regular church-goers. While there are some highly prominent scientists who balance personal, religious beliefs with professional, scientific quests, most probably go along with the thoughts of the world-famous physicist, Stephen Hawking:
I regard the brain as a computer which will stop working when its components fail. There is no heaven or afterlife for broken down computers; that is a fairy story for people afraid of the dark. [Interview in The Guardian, 7/9/12]
Spontaneous creation is the reason there is something rather than nothing, why the universe exists, why we exist. It is not necessary to invoke God... [from his book; The Grand Design, 2010]
So it is a bit ironic that physics' most famous quest has resulted in the discovery of the 'God particle.' Most physicists are quite comfortable having their names associated with famous - even if dead - humans like Newton, Einstein or the afore-mentioned Hawking. One will find few, if any, attributions to deities in the objects that physicists discover and name or the theories they propose.
Second, and more importantly, the discovery that the God particle really exists does not - as the name suggests - imply that God played some role in the creation of the universe. In fact, quite the opposite. The matter is discussed at some length in the July 9 Daily Beast by Lawrence Kraus, a well-known physicist/cosmologist from Arizona State University:
This term [God particle] appeared first in the unfortunate title of a book written by physicist Leon Lederman two decades ago, and while to my knowledge it was never used by any scientist (including Lederman) before or since, it has captured the media's imagination.
What makes this term particularly unfortunate is that nothing could be further from the truth. Assuming the particle in question is indeed the Higgs, it validates an unprecedented revolution in our understanding of fundamental physics and brings science closer to dispensing with the need for any supernatural shenanigans all the way back to the beginning of the universe...If these bold, some would say arrogant, notions derive support from the remarkable results at the Large Hadron Collider, they may reinforce two potentially uncomfortable possibilities: first, that many features of our universe, including our existence, may be accidental consequences of conditions associated with the universe's birth; and second, that creating "stuff" from "no stuff" seems to be no problem at all-everything we see could have emerged as a purposeless quantum burp in space or perhaps a quantum burp of space itself. Humans, with their remarkable tools and their remarkable brains, may have just taken a giant step toward replacing metaphysical speculation with empirically verifiable knowledge. The Higgs particle is now arguably more relevant than God.
So the term God particle was first used by a scientist, but was picked up and popularized by the media. It's catchy and enhances interest in the subject among the public. But like so much else that the media promotes, it is misleading and inappropriate. | <urn:uuid:ed184b23-5659-4b91-97c0-fd818297d417> | CC-MAIN-2013-20 | http://www.americanthinker.com/blog/2012/07/does_the_god_particle_prove_that_god_does_or_does_not_exist.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.959033 | 743 | 2.546875 | 3 |
Acrylic A synthetic fabric often used as a wool substitute. It is warm, soft, holds colors well and often is stain and wrinkle resistant.
Angora A soft fiber knit from fur of the Angora rabbit. Angora wool is often combined with cashmere or another fiber to strengthen the delicate structure. Dry cleaning is reccommended for Angora products.
Bedford A strong material that is a raised corded fabric (similar to corduroy). Bedford fabric wears well and is usually washable.
Boucle A fabric made with boucle yarn(s) in wool, rayon and or cotton causing the surface of the fabric to appear looped.
Brocade An all-over floral, raised pattern produced in a similar fashion to embroidery.
Burnout Process of printing a design on a fabric woven of paired yarns of different fibers. One kind of yarn is burned out or destroyed leaving the ground unharmed.
Cable Knit Patterns, typically used in sweaters, where flat knit columns otherwise known as cables are overlapped vertically.
Cashmere A soft, silky, lightweight wool spun from the Kashmir goat. Cashmere must be dry-cleaned due to its delicate fibers and is commonly used in sweaters, shawls, outerwear, gloves and scarves for its warmth and soft feel.
Chiffon A common evening wear fabric made from silk, cotton, rayon or nylon. It's delicate in nature and sheer.
Chintz A printed and glazed fabric made of cotton. Chintz is known for its bright colors and bold patterns.
Corduroy Cotton fibers twisted as they are woven to create long, parallel grooves, called wales, in the fabric. This is a very durable material and depending on the width of the wales, can be extremely soft.
Cotton A natural fiber that grows in the seed pod of the cotton plant. It is an inelastic fiber.
Cotton Cashmere A blend of cotton and cashmere fibers, typically 85% to 15% respectively, this combination produces an extremely soft yarn with a matte finish.
Crepe Used as a description of surfaces of fabrics. Usually designates a fabris that is crimped or crinkled.
Crinoline A lightweight, plain weave, stiffened fabric with a low yarn count. Used to create volume beneath evening or wedding dresses.
Crochet Looping threads with a hooked needle that creates a wide, open knit. Typically used on sweaters for warm seasons.
Denim Cotton textile created with a twill weave to create a sturdy fabric. Used as the primary material of blue jeans.
Dobby Woven fabric where the weave of the fabric actually produces the garment's design.
Embroidery Detailed needlework, usually raised and created by yarn, silk, thread or embroidery floss.
Eyelet A form of lace in a thicker material that consists of cut-outs that are integrated and repeated into a pattern. Usually applied to garments for warmer seasons.
Faille A textured fabric with faint ribbing. Wears wonderfully for hours holding its shape due to the stiffness of the texture. Used in wedding dresses and women's clothes.
Fil'Coupe A small jacquard pattern on a light weight fabric, usually silk, in which the threads connecting each design are cut, creating a frayed look.
French Terry A knit cloth that contains loops and piles of yarn. The material is very soft, absorbent and has stretch.
Gabardine A tightly woven twill fabric, made of different fibers such as wool, cotton and silk.
Georgette A crinkly crepe type material usually made out of silk that consists of tightly twisted threads. Georgette is sheer and has a flowy feeling.
Gingham Two different color stripes "woven" in pattern to appear checked.
Glen Plaid Design of woven, broken checks. A form of traditional plaid.
Guipure Lace A lace without a mesh ground, the pattern in held in place by connecting threads.
Herringbone A pattern originating from masonry, consists of short rows of slanted parallel lines. The rows are formatted opposing each other to create the pattern. Herringbone patterns are used in tweeds and twills.
Hopsack A material created from cotton or woolthat is loosely woven together to form a coarse fabric.
Houndstooth A classic design containing two colors in jagged/slanted checks. Similar to Glen Plaid.
Jacquard A fabric of intricate varigated weave or pattern. Typically shown on elegant and more expensive pieces.
Jersey A type of knit material usually made from cotton and known to be flexible, stretchy, soft and very warm. It is created using tight stitches.
Knit A knit fabric is made by interlocking loops of one or more yarns either by hand with knitting needles or by machine.
Linen An exquisite material created from the fibers of the flax plant. Some linen contain slubs or small knots on the fabric. The material wrinkles very easily and is a light fabric perfect for warm weather.
Lurex A metallic fiber woven into material to give the garment shine.
LycraTM Lycra is a type of stretch fabric where the fibers are woven into cotton, silk or synthetic fiber blends. These materials are lightweight, comfortable (need trademark symbol) and breathable, and the stretch will not wear away.
Madras Originating from Madras, India, this fabric is a lightweight, cotton material used for summer clothing. Madras usually has a checked pattern but also comes in plaid or with stripes. Typically made from 100% cotton.
Marled Typically found in sweaters, marled yarn occurs when two colored yards are twisted together.
Matelasse A compound fabric made of cotton, wool or other fibers with quilted character and raised patterns.
Matte A matte finish has a lusterless surface.
Merino Wool Wool sheered from the merino sheep and spun into yarn that is fine but strong.
Modal A type of rayon that is made from natural fibers but goes through a chemical treatment to ensure it has a high threshold of breakage. Modal is soft and breathable which is why it's used as a cotton replacement.
Non-iron A treated cotton that allows our Easy Care Shirts to stay crisp throughout the day and does not need ironing after washing/drying.
Nylon A synthetic fiber that is versatile, fast drying and strong. It has a high resistance to damage.
Ombre A color technique that shades a color from light to dark.
Ottoman A firm, lustrous plain weave fabric with horizontal cords that are larger and rounder than those of the faille. Made of wool, silk, cotton and other manufactured fibers.
Paisley A pattern that consists of crooked teardrop designs in a repetitive manner
Placket The piece of fabric or cloth that is used as a concealing flap to cover buttons, fasteners or attachments. Most commonly seen in the front of button-down shirts. Also used to reinforce openings or slits in garments.
Piping Binding a seam with decoration. Piping is similar to tipping or edging where a decorative material is sewn into the seams.
Pointelle An open-work knitting pattern used on garments to add texture. Typically a cooler and general knit sweater.
Polyester A fabric made from synthetic fibers. Polyester is quick drying, easy to wash and holds its shape well.
Ponte A knit fabric where the fibers are looped in an interlock. The material is very strong and firm.
Poplin A strong woven fabric, heavier in weight, with ribbing.
Rayon A manufactured fiber developed originally as an alternative for silk. Rayon drapes well and looks luxurious.
Sateen A cotton fabric with sheen that resembles satin.
Seersucker Slack-tension weave where yarn is bunched together in certain areas and then pulled taught in others to create this summery mainstay.
Shirring Similar to ruching, shirring gathers material to create folds.
Silk One of the most luxurious fabrics, silk is soft, warm and has shine. It is created from female silkworm's eggs.
Silk Shantung A rough plain weave fabric made of uneven yarns to produce a textured effect, made of fibers such silk in which all knots and lumps are retained.
Space dyed Technique of yarn dyeing to produce a multi-color effect on the yarn itself. Also known as dip dyed yarn.
Spandex Also known as Lycra (trademark symbol), this material is able to expand 600% and still snap back to its original shape and form. Spandex fibers are woven with cotton and other materials to make fabrics stretch.
Tipping Similar to edging, tipping includes embellishing a garment at the edges of the piece, hems, collars etc.
Tissue Linen A type of linen that is specifically made for blouses or shirts due to its thinness and sheerness.
Tweed A loose weave of heavy wool makes up tweed which provides warmth and comfortability.
Twill A fabric woven in a diagonal weave. Commonly used for chinos and denim.
Variegated Multi-colored fabrics where colors are splotched or in patches.
Velour A stretchy knit fabric that looks similar to velvet. Very soft to the touch.
Velvet A soft, silky woven fabric that is similar to velour. Velvet is much more expensive than velour due to the amount of thread and steps it takes to manufacture the material.
Velveteen A more modern adaptation of velvet, velveteen is made from cotton and has a little give. Also known as imitation velvet.
Viscose Created from both natural materials and man-made fibers, viscose is soft and supple but can wrinkle easily.
Wale Only found in woven fabrics like corduroy, wale is the long grooves that give the garment its texture.
Windowpane Dark stripes run horizontal and vertical across a light background to mimic a window panes.
Woven A woven fabric is formed by interlacing threads, yarns, strands, or strips of some material. | <urn:uuid:04a048d3-152b-45eb-ac6e-e7717919a899> | CC-MAIN-2013-20 | http://www.anneklein.com/Matte-Jersey-Sleeveless-Drape-Top/90724376,default,pd.html?variantSizeClass=&variantColor=JJQ47XX&cgid=90316517&pmin=25&pmax=50&prefn1=catalog-id&prefv1=anneklein-catalog | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.931941 | 2,146 | 2.53125 | 3 |
Dante Alighieri was the greatest Italian poet and one of the most important
European writers. Dante live through the years of 1265 – 1321. He has a very
unique way of writing and started his works at the age of 35. Dante wrote La
Divina Comedia based on the era he live through and all the knowledge of his
lifetime was imbedded in his works. In this specific work he writes about a journey
which he wishes to better understand the afterlife receive his salvation. Throughout
his journey Virgil was his guide and taught him all about the nine circles of hell
and the punishments that the sinners received in each circle. Dante was a very
powerful writer and his writing has many significant symbols to many different
objects. This story is very complex and interesting to read and understand each
After Dante exits hell with his guide Virgil, he arrives into Purgatory.
Purgatory is the in between where Dante sees sinners being punished. Each sin has
a different punishment depending on the sin. Purgatory is a place where sinners
temporarily get punished in order to purify themselves and be ready for heaven.
There these people learn the mistakes they have made and realize the seriousness
of their sins and prepare to enter heaven/paradise. Virgil guides Dante throughout
purgatory and leads him to paradise where Beatrice will be there to guide him to
A very important character of the Divine Comedy is Virgil. Virgil is Dante’s
guide throughout Purgatory. Virgil is a very helpful guide and is a poet whom
Dante looked up to. Virgil symbolized human reason and taught Dante everything
he knows about the inferno and purgatory. Virgil is in the first realm of hell, limbo.
He is in limbo because he is a pagan and was never baptized. Virgil takes Dante
through each circle and describes each circle, the reason people are there and
describes each punishment. Virgil protects Dante from the leaders of each circle as... | <urn:uuid:f5054873-6adf-4f04-95b1-a3fdb4f478b6> | CC-MAIN-2013-20 | http://www.antiessays.com/free-essays/140615.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.972728 | 420 | 3.265625 | 3 |
St. Anne, Patroness of Detroit
St. Anne was named by the Vatican as the patron saint of the Archdiocese of Detroit. We honor the mother of the Blessed Virgin Mary and prayerfully ask for her intercession.
One may pray to any saint for any intention, but a patron saint is seen as the particular advocate for a chosen place or activity.
St. Anne is the mother of the Blessed Virgin Mary. Though she is not mentioned by name in the Bible, we know of her through early Christian writings, the most important of which is the Protoevangelium of James, written in about 150 A.D.
We are told that Anne, the wife of Joachim, was advanced in years before her prayers for a child were answered. An angel appeared and told her she would conceive a child who "shall be spoken of in all the world."
St. Anne's feast day is celebrated on July 26. She is known as the patron saint of equestrians, housewives, women in labor, cabinet-makers, and miners.
Devotion to St. Anne became popular in the Christian East by the fourth century, and that tradition later spread to the Christian West. When the French began to colonize modern-day Quebec, they brought their devotion to St. Anne with them—asking for her protection in the New World.
This devotion was planted on the banks of the Detroit River by the original French-Canadian settlers. Two days after Antoine de la Mothe Cadillac landed with 51 others in what is now downtown Detroit on July 24, 1701, they celebrated Mass and began construction of a church named after Saint Anne.
Today, Ste. Anne de Detroit Church is the second oldest continually operating parish in the United States. As is now recognized by the Holy See, the church of Detroit was placed under St. Anne's protection from its very founding. | <urn:uuid:8e1cef78-a3fc-4eeb-b94f-f8ec251e2e20> | CC-MAIN-2013-20 | http://www.aod.org/our-archdiocese/history-of-the-archdiocese/patron-saint/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.979712 | 386 | 2.796875 | 3 |
Demands for lower cost manufacturing, lighter components, and recycleability are forcing manufacturers to switch from metal components to plastic. While the assembly processes are different, some of the same concerns apply. Finding a reliable assembly equipment supplier, defining part requirements, getting them involved early, and choosing the right assembly process are the keys to success.
chart outlines the different characteristics, capabilities,
and requirements of a variety of plastic welding processes.
CLICK for the full-size graphic.
Appliance components come in
all shapes and sizes, and each one has its own unique characteristics that
demand an assembly process to fit. Ultrasonic, hot-plate, spin, thermal,
laser, and vibration welding are the most common plastic assembly methods.
Choosing the correct method can be difficult. A supplier who has technical
knowledge in all of the processes is the best choice. They will have knowledge
of all the different process joint designs, can provide assistance in material
selection, and can support once the process is in production.
part requirement before the design of the plastic part is critical.
This will save dollars in tooling costs and help assure that the correct
process to achieve the requirements is chosen. All too often, the plastic
molds are manufactured, the first parts are assembled, and then quality
control determines that the parts will not pass a pressure test. This
is too late; now significant dollars will need to be spent to correct
problem. Requirements such as a need for pressurization, exposure to
extreme cold or heat, cosmetic-part status (requires no blemishes),
and parts assembled
per minute are all factors in determining the correct process and plastic
Each process has unique plastic-joint design requirements to assure
proper weld strength. Assembly equipment suppliers can help design the
weld area joint design. An example of joint design requirements for ultrasonic
assembly is given by Guide to Ultrasonics from Dukane
Charles, IL, U.S.): "Mating services should be in intimate contact around the entire joint. The joint should be in one plane, if possible. A small initial contact area should be established between mating halves. A means of alignment is recommended so that mating halves do not misalign during the weld operation." Obviously,
these joint requirements should all be designed into the part prior to
machining of the injection molds.
What assembly process is correct for a part? As stated earlier, ultrasonic, hot-plate, spin, thermal, vibration, and laser welding are the most common methods used in production today. Each method has unique advantages.
Ultrasonic assembly is a fast, repeatable, and reliable process that allows for sophisticated process control. High-volume small parts that have very tight assembly tolerances lend themselves well to ultrasonic assembly. Ultrasonic systems have the capability of exporting relevant assembly process data for SPC documentation and FDA validation. Ultrasonic welding can be easily integrated into automated systems.
Hot-plate welding can accommodate a wide range of parts sizes and configurations. These machines offer high-reliability hermetic seals and strong mechanical bonds on complex part geometries. The process is fairly simple; the two parts to be jointed are brought in close proximity to a heated platen until the joint area is in a molten state. The platen is removed and the parts are clamped together until the joint cools off and returns to a solid state.
Spin welding is a very cost-effective method for joining large, medium, or small circular parts such as washing machine tubs to agitator components. Water purification filters, thermal mugs, and irrigation assemblies typically are joined using the spin welding process. Careful attention to joint design is critical for parts that require flash-free appearance.
Assemblies that require inserts at multiple points on multiple planes, like computer or vacuum cleaner housings, typically benefit from thermal insertion/staking. Thermal staking is ideal for attachment of non-plastic components to the plastic housing, such as circuit boards and metal brackets. Dates coding, embossing, and degating are other uses for thermal presses. Thermal welding can be a slower assembly process than ultrasonic, so, depending on the volumes of assemblies required, ultrasonic maybe a better choice.
Vibration welding physically moves one of the two parts horizontally under pressure to create heat through surface friction. Compared to ultrasonic welding, vibration welding operates at much lower frequencies, much higher amplitude, and with greater clamping force. The limitation to vibration welding is simply that the joint must be in a single plane in at least one axis in order to allow the vibration motion. Like hot-plate welding, vibration welding is a highly reliable process that can handle large parts in challenging materials or multiple parts per cycle with ease. Chain saw housings, blower and pump assemblies, and large refrigerator bins are examples of potential vibration welding applications. Cycle times for vibration welds are very short, thus they are ideal for high volume and are easily automated.
Laser welding is the newest technology of the processes available today. One benefit of laser welding is that the weld joints produce no flash or particulate outside of the joint. Assemblies that require absolutely no contamination for particulate, like medical filters, are good candidates. A second benefit is that the assembly is not exposed to heat or vibration. Devices that have very sensitive electronic internal components that may be damaged from vibration can now be assembled effectively. Laser welding requires the parts to be transmissive and absorbive, specifically how transparent the parts appear to the laser beam. One material transmits the coherent laser light and the other material absorbs the light and converts it to heat. Parts that appear black to the human eye can be transparent or opaque at the wavelength of the laser light. Clear-to-clear joints and joints that are optically transparent can be readily achieved by use of special coatings. Depending on the part geometry, laser welding can be a slower process then vibration or ultrasonic welding.
Plastic appliance components are the direction of the future - they can be assembled
economically and produce functional products.
This information is provided by Michael Johnston, national sales and
marketing manager, Dukane
Charles, IL, U.S.). | <urn:uuid:134c9c22-8518-4641-bb31-a84d5ca3c9d3> | CC-MAIN-2013-20 | http://www.appliancemagazine.com/editorial.php?article=235&zone=1&first=1 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.917231 | 1,282 | 2.640625 | 3 |
| ||How to Identify and Control Water Weeds and Algae|
"How to Identify and Control Water Weeds and Algae" is the complete guide to identification, treatment options and measuring lakes and ponds to apply product to common aquatic plants. Identifying the type or species of plant(s) to be controlled is the first step in implementing a management strategy. This book is intended for government, commercial and private concerns responsible for maintaining the recreational, aesthetic and functional value of water resources. Recommendations are based upon decades of research in aquatic plant control and water management by industry, universities and government agencies.
Literature files are in PDF file format and require a PDF reader to view. Need to find a hard copy of this book? Please contact us. | <urn:uuid:95cb4cb4-f885-463c-98a0-ad7ebe6588d9> | CC-MAIN-2013-20 | http://www.appliedbiochemists.com/weedbook.htm | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.902463 | 155 | 2.75 | 3 |
On Friday, the Department of Health
and Human Services (HHS) released a new report identifying interventions that can help increase physical activity
in youth aged 3-17 years across a variety of settings. The primary audiences
for the report are policymakers, health care providers, and public health
professionals. APTA submitted comments in December 2012 on the draft report.
Physical Activity Guidelines for
Americans Midcourse Report: Strategies to Increase Physical Activity Among
Youth summarizes intervention strategies based on the evidence from
literature reviews and is organized into 5 settings where youth live, learn,
and play: school, preschool and childcare, community, family and home, and
primary health care.
Key findings of the report suggest that:
Other materials released by HHS include an infographic
highlighting opportunities to increase physical activity throughout the day and
a youth fact sheet summarizing the report's
recommendations for youth aged 6-17 years. More information can be found at www.health.gov/paguidelines/midcourse/.
APTA has long supported HHS' efforts to increase awareness about the
benefits of physical activity. It provided input on the 2008
Physical Activity Guidelines for Americansrelated to the importance of considering physical activity needs
and barriers for people with disabilities. It also served on the Physical
Activity Guidelines Reaction Group. The association also contributes to the Be Active Your Way Blog.
therapists (PTs) and physical therapist assistants (PTAs), especially those who
have patients with wounds, are encouraged to take steps to protect their most
vulnerable patients from carbapenem-resistant Enterobacteriaceae (CRE), a
family of germs that have become difficult to treat because they have high
levels of resistance to antibiotics. In addition to patients at high risks, PTs
and PTAs should take all necessary precautions to prevent the spread of CRE to
According to the Centers for Disease Control and Prevention
(CDC), CRE are resistant to all, or nearly all, antibiotics—even the most
powerful drugs of last-resort. CRE also have high mortality rates, killing 1 in
2 patients who get bloodstream infections from them. Additionally, CRE easily
transfer their antibiotic resistance to other bacteria. For example,
carbapenem-resistant klebsiella can spread its drug-destroying properties to a
normal E. coli bacteria, which makes the E.coli resistant to
antibiotics also. "That could create a nightmare scenario since E. coli
is the most common cause of urinary tract infections in healthy people,"
CRE are usually transmitted
person-to-person, often on the hands of health care workers. Currently,
almost all CRE infections occur in people receiving significant medical
care. However, their ability to spread and their resistance raises the
concern that potentially untreatable infections could appear in otherwise
healthy people, including health care providers.
includes resources for patients, providers, and
facilities. The agency's CRE prevention toolkit has in-depth recommendations to
control CRE transmission in hospitals, long-term acute care facilities, and
is in the process of updating its Infectious Disease Control webpage to ensure that
PTs and PTAs have the information they need to understand their critical role
in helping to halt the spread of CRE. Look for a follow-up article in News
Now when the webpage is launched.
has selected 9 association members to serve on the PTA Education Feasibility
Study Work Group: Wendy Bircher, PT, EdD (NM), Derek Brandes (WA), Barbara
Carter, PTA (WI), Martha Hinman, PT, EdD (TX), Mary Lou Romanello, PT, PhD, ATC
(MD), Steven Skinner, PT, EdD (NY), Lisa Stejskal, PTA, MAEd (IL), Jennifer
Whitney, PT, DPT, KEMG (CA), and Geneva Johnson, PT, PhD, FAPTA (LA). The work group is addressing the motion Feasibility Study
for Transitioning to an Entry-Level Baccalaureate Physical Therapist Assistant
Degree (RC 20-12) from the 2012 House of Delegates. The work group will address
the first phase of the study, finalizing the study plan and identifying
relevant data sources for exploring the feasibility of transitioning the
entry-level degree for the PTA to a bachelor's degree.
APTA supporting staff members
are Janet Crosier, PT, DPT, MEd, lead PTA services specialist; Janet Bezner,
PT, PhD, vice president of education and governance and administration; Doug
Clarke, accreditation PTA programs manager; and Libby Ross, director of
than 200 individuals volunteered to serve on the work group by submitting their
names to the Volunteer Interest Pool (VIP). APTA expects to engage additional
members in the data collection process. | <urn:uuid:984179e4-db53-480f-9340-d6d19260bb41> | CC-MAIN-2013-20 | http://www.apta.org/PTinMotion/NewsNow/2012/8/28/MidlifeFitnessStudy/?blogmonth=3&blogday=11&blogyear=2013&blogid=10737418615 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.907565 | 1,025 | 3.328125 | 3 |
Overview of content related to 'java'
This page provides an overview of 1 article related to 'perl'. Note that filters may be applied to display a sub-set of articles in this category (see FAQs on filtering for usage tips). Select this link to remove all filters.
Perl is a high-level, general-purpose, interpreted, dynamic programming language. Perl was originally developed by Larry Wall in 1987 as a general-purpose Unix scripting language to make report processing easier. Since then, it has undergone many changes and revisions and become widely popular amongst programmers. Larry Wall continues to oversee development of the core language, and its upcoming version, Perl 6. Perl borrows features from other programming languages including C, shell scripting (sh), AWK, and sed. The language provides powerful text processing facilities without the arbitrary data length limits of many contemporary Unix tools, facilitating easy manipulation of text files. Perl gained widespread popularity in the late 1990s as a CGI scripting language, in part due to its parsing abilities. (Excerpt from Wikipedia article: Perl)
See our 'perl' overview for more data and comparisons with other tags. For visualisations of metadata related to timelines, bands of recency, top authors, and and overall distribution of authors using this term, see our 'perl' usage charts.
Ariadne contributors most frequently referring to 'perl': | <urn:uuid:3467d50d-60b1-442f-8fbb-77a31bf0642b> | CC-MAIN-2013-20 | http://www.ariadne.ac.uk/category/buzz/java?article-type=&term=&organisation=&project=&author=clare%20mcclean | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.88681 | 282 | 2.8125 | 3 |
Outmaneuvering Foodborne Pathogens
At various locations, ARS scientists are doing research to make leafy greens and other fresh produce safer for consumers. Produce and leafy greens in the photo are (clockwise from top): romaine lettuce, cabbage, cilantro in a bed of broccoli sprouts, spinach and other leafy greens, green onions, tomatoes, and green leaf lettuce.
If pathogens like E. coli O157:H7 or Salmonella had a motto for survival, it might be: “Find! Bind! Multiply!”
That pretty much sums up what these food-poisoning bacteria do in nature, moving through our environment to find a host they can bind to and use as a staging area for multiplying and spreading.
But ARS food-safety scientists in California are determined to find out how to stop these and other foodborne pathogenic bacteria in their tracks, before the microbes can make their way to leafy greens and other favorite salad ingredients like tomatoes and sprouts.
The research is needed to help prevent the pathogens from turning up in fresh produce that we typically eat uncooked. That’s according to Robert E. Mandrell, who leads the ARS Produce Safety and Microbiology Research Unit. His team is based at the agency’s Western Regional Research Center in Albany, California.
The team is pulling apart the lives of these microbes to uncover the secrets of their success. It’s a complex challenge, in part because the microbes seem to effortlessly switch from one persona to the next. They are perhaps best known as residents of the intestines of warm-blooded animals, including humans. For another role, the pathogens have somehow learned to find, bind, and multiply in the world of green plants.
Sometimes the pathogenic microbes need the help of other microbial species to make the jump from animal inhabitant to plant resident. Surprisingly little is known about these powerful partnerships, Mandrell says. That’s why such alliances among microbes are one of several specific aspects of the pathogens’ lifestyles that the Albany scientists are investigating. In all, knowledge gleaned from these and other laboratory, greenhouse, and outdoor studies should lead to new, effective, environmentally friendly ways to thwart the pathogens before they have a chance to make us ill.
In a greenhouse, microbiologist Maria Brandl examines cilantro that she uses as a model plant to investigate the behavior of foodborne pathogens on leaf surfaces.
A Pathogen Targets Youngest Leaves
Knowing pathogens’ preferences is essential to any well-planned counter-attack. So microbiologist Maria T. Brandl is scrutinizing the little-understood ability of E. coli O157:H7 and Salmonella enterica to contaminate the elongated, slightly sweet leaves of romaine lettuce. With a University of California-Berkeley colleague, Brandl has shown that, if given a choice, E. coli has a strong preference for the young, inner leaves. The researchers exposed romaine lettuce leaves to E. coli and found that the microbe multiplied about 10 times more on the young leaves than on the older, middle ones. One explanation: The young leaves are a better nutrition “buy” for E. coli. “These leaves exude about three times more nitrogen and about one-and-one-half times more carbon than do the middle leaves,” says Brandl.
Scientists have known for decades that plants exude compounds from their leaves and roots that bacteria and fungi can use as food. But the romaine lettuce study, published earlier this year in Applied and Environmental Microbiology, is the first to document the different exudate levels among leaves of the two age classes. It’s also the first to show that E. coli can do more than just bind to lettuce leaves: It can multiply and spread on them.
Research assistant Danielle Goudeau inoculates a lettuce leaf with E. coli O157:H7 in a biological safety cabinet to study the biology of the human pathogen on leafy greens.
Adding nitrogen to the middle leaves boosted E. coli growth, Brandl found. “In view of the key role of nitrogen in helping E. coli multiply on young leaves,” she says, “a strategy that minimizes use of nitrogen fertilizer in romaine lettuce fields may be worth investigating.”
In other studies using romaine lettuce and the popular herb cilantro as models, Brandl documented the extent to which E. coli and Salmonella are aided by Erwinia chrysanthemi, an organism that causes fresh produce to rot.
“When compared to plant pathogens, E. coli and Salmonella are not as ‘fit’ on plants,” Brandl says. But the presence of the rot-producing microbe helped E. coli and Salmonella grow on lettuce and cilantro leaves.
“Soft rot promoted formation of large aggregates, called ‘biofilms,’ of E. coli and Salmonella and increased their numbers by up to 100-fold,” she notes.
The study uncovered new details about genes that the food-poisoning pathogens kick into action when teamed up with plant pathogens such as soft rot microbes.
Brandl, in collaboration with Albany microbiologist Craig Parker, used a technique known as “microarray analysis” to spy on the genes. “The assays showed that Salmonella cells—living in soft rot lesions on lettuce and cilantro—had turned on some of the exact same genes that Salmonella uses when it infects humans or colonizes the intestines of animals,” she says. Some of these activated genes were ones that Salmonella uses to get energy from several natural compounds common to both green plants and to the animal intestines that Salmonella calls home.
Using a confocal laser scanning microscope, microbiologist Maria Brandl examines a mixed biofilm of Salmonella enterica (pink) and Erwinia chrysanthemi (green) in soft rot lesions on cilantro leaves (blue).
A One-Two Punch to Tomatoes
Salmonella also benefits from the presence of another plant pathogen, specifically, Xanthomonas campestris, the culprit in a disease known as “bacterial leaf spot of tomato.” But the relationship between Salmonella and X. campestris may be different than the relation of Salmonella to the soft rot pathogen. Notably, Salmonella benefits even if the bacterial spot pathogen is at very low levels—so low that the plant doesn’t have the disease or any visible symptoms of it.
That’s among the first-of-a-kind findings that microbiologist Jeri D. Barak found in her tests with tomato seeds exposed to the bacterial spot microbe and then planted in soil that had been irrigated with water contaminated with S. enterica.
In a recent article in PLoS ONE, Barak reported that S. enterica populations were significantly higher in tomato plants that had also been colonized by X. campestris. In some cases, Salmonella couldn’t bind to and grow on—or in—tomato plants without the presence of X. campestris, she found.
Listeria monocytogenes on this broccoli sprout shows up as green fluorescence. The bacteria are mainly associated with the root hairs.
“We think that X. campestris may disable the plant immune response—a feat that allows both it and Salmonella to multiply,” she says.
The study was the first to report that even as long as 6 weeks after soil was flooded with Salmonella-contaminated water, the microbe was capable of binding to tomato seeds planted in the tainted soil and, later, of spreading to the plant.
“These results suggest that any contamination that introduces Salmonella from any source into the environment—whether that source is irrigation water, improperly composted manure, or even insects—could lead to subsequent crop contamination,” Barak says. “That’s true even if substantial time has passed since the soil was first contaminated.”
Crop debris can also serve as a reservoir of viable Salmonella for at least a week, Barak’s study showed. For her investigation, the debris was composed of mulched, Salmonella-contaminated tomato plants mixed with uncontaminated soil.
“Replanting fields shortly after harvesting the previous crop is a common practice in farming of lettuce and tomatoes,” she says. The schedule allows only a very short time for crop debris to decompose. “Our results suggest that fields known to have been contaminated with S. enterica could benefit from an extended fallow period, perhaps of at least a few weeks.”
Ordinary Microbe Foils E. coli
While the bacterial spot and soft rot microbes make life easier for certain foodborne pathogens, other microbes may make the pathogens’ existence more difficult. Geneticist Michael B. Cooley and microbiologist William G. Miller at Albany have shown the remarkable effects of one such microbe, Enterobacter asburiae. This common, farm-and-garden-friendly microorganism lives peaceably on beans, cotton, and cucumbers.
In one experiment, E. asburiae significantly reduced levels of E. coli and Salmonella when all three species of microbes were inoculated on seeds of thale cress, a small plant often chosen for laboratory tests.
The study, published in Applied and Environmental Microbiology in 2003, led to followup experiments with green leaf lettuce. In that battle of the microbes, another rather ordinary bacterium, Wausteria paucula, turned out to be E. coli’s new best friend, enhancing the pathogen’s survival sixfold on lettuce leaves.
“It was the first clear example of a microbe’s supporting a human pathogen on a plant,” notes Cooley, who documented the findings in the Journal of Food Protection in 2006.
But E. asburiae more than evened the score, decreasing E. coli survival 20- to 30-fold on lettuce leaves exposed to those two species of microbes.
The mechanisms underlying the competition between E. asburiae and E. coli are still a mystery, says Cooley, “especially the competition that takes place on leaves or other plant surfaces.”
Nevertheless, E. asburiae shows initial promise of becoming a notable biological control agent to protect fresh salad greens or other crops from pathogen invaders. With further work, the approach could become one of several science-based solutions that will help keep our salads safe.—By Marcia Wood, Agricultural Research Service Information Staff.
This research is part of Food Safety, an ARS national program (#108) described on the World Wide Web at www.nps.ars.usda.gov.
To reach scientists mentioned in this article, contact Marcia Wood, USDA-ARS Information Staff, 5601 Sunnyside Ave., Beltsville, MD 20705-5129; phone (301) 504-1662, fax (301) 504-1486.
Listeria monocytogenes on this radish sprout shows up as green fluorescence. The bacteria are mainly associated with the root hairs.
What Genes Help Microbes Invade Leafy Greens?
When unwanted microbes form an attachment, the consequences—for us—can be serious.
That’s if the microbes happen to be human pathogens like Listeria monocytogenes or Salmonella enterica and if the target of their attentions happens to be fresh vegetables often served raw, such as cabbage or the sprouted seeds of alfalfa.
Scientists don’t yet fully understand how the malevolent microbes form colonies that cling stubbornly to and spread across plant surfaces, such as the bumpy leaves of a cabbage or the ultra-fine root hairs of a tender alfalfa sprout.
But food safety researchers at the ARS Western Regional Research Center in Albany, California, are putting together pieces of the pathogen puzzle.
A 1981 food-poisoning incident in Canada, caused by L. monocytogenes in coleslaw, led microbiologist Lisa A. Gorski to study the microbe’s interactions with cabbage. Gorski, with the center’s Produce Safety and Microbiology Research Unit, used advanced techniques not widely available at the time of the cabbage contamination.
“Very little is known about interactions between Listeria and plants,” says Gorski, whose study revealed the genes that Listeria uses during a successful cabbage-patch invasion.
The result was the first-ever documentation of Listeria genes in action on cabbage leaves. Gorski, along with coinvestigator Jeffrey D. Palumbo—now with the center’s Plant Mycotoxin Research Unit—and others, documented the investigation in a 2005 article in Applied and Environmental Microbiology.
Listeria, Behaving Badly
“People had looked at genes that Listeria turns on, or ‘expresses,’ when it’s grown on agar gel in a laboratory,” says Gorski. “But no one had looked at genes that Listeria expresses when it grows on a vegetable.
“We were surprised to find that when invading cabbage, Listeria calls into play some of the same genes routinely used by microbes that are conventionally associated with plants. Listeria is usually thought of as a pathogen of humans. We hadn’t really expected to see it behaving like a traditional, benign inhabitant of a green plant.
“It’s still a relatively new face for Listeria, and requires a whole new way of thinking about it.”
In related work, Gorski is homing in on genetic differences that may explain the widely varying ability of eight different Listeria strains to successfully colonize root hairs of alfalfa sprouts—and to resist being washed off by water.
In a 2004 article in the Journal of Food Protection, Gorski, Palumbo, and former Albany associate Kimanh D. Nguyen reported those differences. Poorly attaching strains formed fewer than 10 Listeria cells per sprout during the lab experiment, while the more adept colonizers formed more than 100,000 cells per sprout.
Salmonella’s Cling Genes
Colleague Jeri D. Barak, a microbiologist at Albany, led another sprout investigation, this time probing the ability of S. enterica to attach to alfalfa sprouts. From a pool of 6,000 genetically different Salmonella samples, Barak, Gorski, and coinvestigators found 20 that were unable to attach strongly to sprouts.
Scientists elsewhere had already identified some genes as necessary for Salmonella to successfully invade and attach to the guts of animals such as cows and chickens. In the Albany experiments, some of those same genes were disrupted in the Salmonella specimens that couldn’t cling to alfalfa sprouts.
Their 2005 article in Applied and Environmental Microbiology helped set the stage for followup studies to tease out other genes that Salmonella uses when it is living on and in plants.
A deeper understanding of those and other genes may lead to sophisticated defense strategies to protect tomorrow’s salad greens—and us.—By Marcia Wood, Agricultural Research Service Information Staff.
Geneticist Michael Cooley collects a sediment sample to test for E. coli O157:H7. The pathogen was found near fields implicated in the 2006 outbreak of E. coli O157:H7 on baby spinach.
Environmental Surveillance Exposes a Killer
It started as a manhunt for a microbe, but it became one of the nation’s most intensive farmscape searches for the rogue pathogen E. coli O157:H7.
ARS microbiologist Robert E. Mandrell and geneticist Michael B. Cooley of the Produce Safety and Microbiology Research Unit in Albany, California, had already been collaborating in their own small-scale study of potential sources of E. coli O157:H7 in the state’s produce-rich Salinas Valley when, in 2005, they were asked to join another one. The new investigation became a 19-month surveillance—by the two scientists and other federal and state experts—of E. coli in Salinas Valley watersheds.
“It may seem like an obvious concept today,” says Mandrell, “but at the time, there was little proof that E. coli contamination of produce before harvest could be a major cause of food-poisoning outbreaks.”
Mandrell and Cooley aided the California Food Emergency Response Team, as this food-detective squad was named, in tracing movement of E. coli through the fertile valley. This surveillance showed that E. coli O157:H7 can travel long distances in streamwater and floodwater.
In 2006, E. coli O157:H7 strains indistinguishable from those causing human illness associated with baby spinach were discovered in environmental samples—including water—taken from a Salinas Valley ranch.
Wild pigs were added to the list of animal carriers of the pathogen when one of the so-called “outbreak strains” of E. coli O157:H7 was discovered in their dung. The team documented its work in 2007 in PLoS ONE and Emerging Infectious Diseases.
The Albany scientists used a relatively new technique to detect E. coli O157:H7 in water. Developed at the ARS Meat Animal Research Center in Clay Center, Nebraska, for animal hides, the method was adapted by the Albany team for the outdoor reconnaissance.
Because of their colleagues’ work, says Cooley, “We had the right method at the right time.”—By Marcia Wood, Agricultural Research Service Information Staff.
"Outmaneuvering Foodborne Pathogens" was published in the July 2008 issue of Agricultural Research magazine. | <urn:uuid:b366eb1a-184b-4885-b5a6-92a6d0c0f67f> | CC-MAIN-2013-20 | http://www.ars.usda.gov/is/AR/archive/jul08/pathogen0708.htm | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.93 | 3,794 | 3.078125 | 3 |
PROTECTION OF SUBTROPICAL AND TROPICAL AGRICULTURE COMMODITIES AND ORNAMENTALS FROM EXOTIC INSECTS
Location: Subtropical Horticulture Research
Title: Laurel wilt: A global threat to avocado production
| Ploetz, R - |
| Smith, J - |
| Inch, S - |
| Pena, J - |
| Evans, E - |
| Crane, J - |
| Hulcr, J - |
| Stelinski, L - |
| Schnell, R - |
Submitted to: World Avocado Congress
Publication Type: Proceedings
Publication Acceptance Date: November 28, 2011
Publication Date: February 1, 2012
Citation: Ploetz, R.C., Smith, J.A., Inch, S.A., Pena, J.E., Evans, E.A., Crane, J.H., Kendra, P.E., Hulcr, J., Stelinski, L., Schnell, R. 2012. Laurel wilt: A global threat to avocado production. World Avocado Congress. 186-197 In Proceedings VII World Avocado Congress. 5-9 September 2011, Cairns, Australia.
Interpretive Summary: Laurel wilt is a lethal vascular disease of trees in the plant family Lauraceae, including avocado. It is caused by a fungal pathogen (Raffaelea lauricola) that is introduced into host trees by an exotic wood-boring beetle, the redbay ambrosia beetle (Xyleborus glabratus). The beetle was first detected in Georgia in 2002, and since has spread to six states in the southeastern U.S. Laurel wilt poses an imminent threat to commercial avocado production in south Florida, and a future threat to avocado in California, Mexico, Central and South America. Scientists at the USDA-ARS Subtropical Horticulture Research Station, in collaboration with the University of Florida, are conducting multidisciplinary research on the pest complex, including (1) evaluation of fungicides for laurel wilt, (2) screening for disease resistant avocado varieties, (3) determination of pathways for disease transmission, (4) identification of beetle attractants, repellents, and insecticides, and (5) assessment of host preferences. Information from these studies will be used by avocado growers and by state and federal action agencies engaged in monitoring programs for redbay ambrosia beetle.
Laurel wilt kills members of the Lauraceae plant family, including avocado. The disease has invaded much of the southeastern USA, and threatens avocado commerce and homeowner production in Florida, valuable germplasm in Miami (USDA-ARS), and major production and germplasm in California and MesoAmerica. Laurel wilt is caused by a recently described fungus, Raffaelea lauricola, which is vectored by an invasive ambrosia beetle, Xyleborus glabratus. Current research topics include: disease management with fungicides; identifying host resistance; vector mitigation with insecticides and repellents; host ranges of, and interactions with, the pathogen and vector; and transmission of R. lauricola via avocado seed, scion material, root grafts and pruning tools. Although highly resistant avocado cultivars have not been identified, screening work continues on additional cultivars and new germplasm. Effective fungicides (e.g. triazoles) have been identified, but cost-effective disease management will depend on improved measures for xylem loading and retention of these chemicals. Insecticides have been identified that reduce boring activity of X. glabratus and its attraction to avocado and other hosts, but much remains to be learned about their impact on disease management. Although the disease’s host range is generally restricted to American members of the Lauraceae, nonhosts that attract the beetle are known. Raffaelela lauricola rapidly colonizes avocado after infection, but to low levels; tylose and gel induction in the host, rather than xylem obstruction by fungal biomass, are associated with impeded water transport and symptom development. Seed and fruit from laurel wilt-affected avocado trees do not appear to be infected by R. lauricola. | <urn:uuid:f5bb6156-473c-456e-b20e-b29dce901e8a> | CC-MAIN-2013-20 | http://www.ars.usda.gov/research/publications/publications.htm?seq_no_115=280283 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.889233 | 905 | 3 | 3 |
From The Art and Popular Culture Encyclopedia
The fact-value distinction is a concept used to distinguish between arguments that can be claimed through reason alone and those in which rationality is limited to describing a collective opinion. In another formulation, it is the distinction between what is (can be discovered by science, philosophy or reason) and what ought to be (a judgment which can be agreed upon by consensus). The terms positive and normative represent another manner of expressing this, as do the terms descriptive and prescriptive, respectively. Positive statements make the implicit claim to facts (e.g. water molecules are made up of two hydrogen atoms and one oxygen atom), whereas normative statements make a claim to values or to norms (e.g. water ought to be protected from environmental pollution). | <urn:uuid:b5c9bea2-4439-4246-a5bd-da1fb437c875> | CC-MAIN-2013-20 | http://www.artandpopularculture.com/Fact-value_distinction | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.929651 | 155 | 3.140625 | 3 |
The Nature Elephant
The Karen people have always lived naturally in the forest, and, for many generations have relied on elephants to help them.
Because elephants are ideal for carrying heavy loads they are essential for transportation through rural areas, and, more recently, for carrying tourists. The Karen people simply would not survive without them. The Karen people have always used elephants to help carry them through dense parts of the jungle which would be difficult on foot, such as down steep hills to fetch water from the creek, or carrying heavy bags of rice from the fields to the barn. What is little effort for an elephant would be a huge amount of labour
for humans. Because they are so important to the Karen people, elephants are their friends, and are treated with respect.
To manage an elephant and gain its trust requires knowledge, love and understanding. This is why the Karen people look after their elephants so well, and only certain members of the Karen family are trained enough to do this. Some of them call elephant-care a kind of black magic, and this black magic is passed down through families.
Part of the skill of caring for elephants is to ensure the elephant is listened to. Karen legend has it that if a female elephant is ignored, it is likely that her eggs will become infected, and therefore she will not be able to continue the elephant family. This serious consequence acts as a grave warning to those handling elephants. A sense of duty, honor and patience are as important to the elephant as they are to the Karen people as a whole.
The legend of Chang Karen
This is a story about how elephants became so important in the life of the Karen hill tribe. The legend goes that once upon a time, there were two brothers living in the forest. One day, their mother needed to leave home for a business, so instructed the two boys to look after the house, be good, and by no means split open the bamboo tree, as it contained many flies. Being the mischievous boys they were, as soon as their mother was out of sight, they crept up to the forbidden bamboo and cracked it open, curious to see what would happen.
Immediately, the room was filled with flies, two of which flew up into each of the boys' noses. Panicking, the boys didn't know what to do. Soon, they felt their bodies changing. Their legs began to itch, and grow longer and wider. Their heads began to swell, until they felt the size and shape of footballs. Their noses grew longer and their bodies became heavier and more clumsy.
When their mother returned home, she was shocked to see what had happened to her sons. She offered them cooked rice, but they turned it down with a slow shake of their large heads, their noses swinging from side to side. They were still growing, and were too ashamed of their bad behaviour to eat. The mother offered them water, but they did not want to drink it. Soon, when the sons had grown too big for the house, and could now only walk on four legs, they left the house to find grass. This was all they felt like eating.
Very soon the word spread, and people came from all over the valley to see the mutated boys. Their tongues had become too big for them to speak, so the sons had stopped talking. As if to compensate, their ears grew large so they cold hear very, very well. They had become elephant-boys.
One day, some workers came to see if the elephant-boys could help them carry heavy loads. They gave them wood and lead them to their workshops, and the elephant-boys were calm and obedient. The workers realised that what was a huge job for them, was little effort for these giant elephant boys. And life continued this way for many generations. This is the remarkable story of how elephants and humans came to work together in harmony, explaining how they can exist together in the forest.
Elephants and the Karen Hill Tribe people
Deep in the rich forests of northern Thailand, in the bowl of a green valley, lies the Karen hill tribe community. Making the most of their natural surroundings, this tribe has managed to forge an incredibly simple life in the forest using no modern machinery or medicine. They need only the trees, plants, animals, and are especially reliant on the mighty elephant.
The Karen people have a strong bond with elephants: their self-sufficient lifestyles are surprisingly similar, and intertwining. Wild elephants play a very important role in the Karen way of life, as well as the relationships of valley inhabitants, and the magic of the valley. | <urn:uuid:e54319d9-029a-48b0-8d3d-42adb0690b50> | CC-MAIN-2013-20 | http://www.asianelephantsafari.com/news.php | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.98564 | 937 | 3.046875 | 3 |
Why Man U?
AskMen / Getty Images
"Gathering together at Old Trafford must have given these people something of the sense of community that they had previously known in their villages."
Visiting Manchester the other day, I was driving down a nondescript road past dreary shops and offices when I saw the top of a sports stadium poking into the gray sky. It was Old Trafford. Team buses carrying soccer players from more glamorous cities such as Barcelona have been known to echo with cries of disgust as they pull in here.
The home of Manchester United is rainy and underwhelming. The estimated 333 million humans who consider themselves United fans don’t all know that Manchester is a city in England, but many of those who do would probably be surprised to find just how mid-ranking a city it is. Yet when United’s American ruling family, the Glazers, sold club shares in August, United was valued at $2.3 billion. That made it the world’s most valuable sports franchise, ahead of Real Madrid and baseball’s New York Yankees, according to Forbes. In short, United is bigger than Manchester. So why on earth did this global behemoth arise precisely here? And how, in the last 134 years, has United shaped soccer, in England and now the world?
When a soccer club was created just by the newish railway line in 1878, the Manchester location actually helped. The city was then growing like no other on earth. In 1800 it had been a tranquil little place of 84,000 inhabitants, so insignificant that as late as 1832 it didn’t have a member of parliament. The Industrial Revolution changed everything. Workers poured in from English villages, from Ireland, from feeble economies everywhere (my own great-grandparents arrived on the boat from Lithuania). By 1900, Manchester was Europe’s sixth-biggest city, with 1.25 million inhabitants.
The club by the railway line was initially called Newton Heath, because the players worked at the Newton Heath carriage works of the Lancashire and Yorkshire Railway Company. They played in work clogs against other work teams. Jim White’s Manchester United: The Biography nicely describes the L&YR workers as “sucked in from all over the country to service the growing need for locomotives and carriages.” Life in Manchester then was neither fun nor healthy, White writes. In some neighborhoods, average male life expectancy was just 17. This was still the same brutal city where a few decades before, Karl Marx’s pal Friedrich Engels had run his father’s factory. The conditions of the industrial city were so awful it inspired communism. (My own great-grandparents lost two of their children to scarlet fever in Manchester before moving on to much healthier southern Africa.)
Inevitably, most of these desperate early Mancunians were rootless migrants. Unmoored in their new home, many embraced the local soccer clubs. Gathering together at Old Trafford must have given these people something of the sense of community that they had previously known in their villages. That’s how the world’s first great industrial city engendered the world’s greatest soccer brand. Next Page >> | <urn:uuid:223e0d4e-5454-48af-94fe-79e339cdb888> | CC-MAIN-2013-20 | http://www.askmen.com/sports/fanatic/why-man-u.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.974093 | 667 | 2.609375 | 3 |
The CIA, the NSA, the FBI and all other three-letter, intelligence-gathering, secret-keeping agencies mimic and are modeled after secret societies. They gather and filter information by compartmentalizing the organization in a pyramid-like hierarchical structure keeping everyone but the elite on a need-to-know basis. The CIA was born from the WWII intelligence arm, the OSS (Office of Strategic Services), and was funded into permanence by the Rockefeller and Carnegie Foundations, which donated $34 million 1945-48 alone. Nearly every person instrumental in the creation of the CIA was already a member of the CFR, including the Rockefellers and Dulles brothers.
In 1945 when the CIA was still the OSS, they began Operation Paperclip which brought over 700 Nazi scientists directly into the forming CIA, NSA, and other high-level government organizations. Since it was illegal to even allow these Nazis into the US, let alone into top-secret government agencies, the CIA convinced the Vatican to issue American passports for these 700+ Nazi scientists under the pretense that it was to keep them out of the hands of the Russians.
“After WWII ended in 1945, victorious Russian and American intelligence teams began a treasure hunt throughout occupied Germany for military and scientific booty. They were looking for things like new rocket and aircraft designs, medicines, and electronics. But they were also hunting down the most precious ‘spoils’ of all: the scientists whose work had nearly won the war for Germany. The engineers and intelligence officers of the Nazi War Machine. Following the discovery of flying discs (foo-fighters), particle/laser beam weaponry in German military bases, the War Department decided that NASA and the CIA must control this technology, and the Nazi engineers that had worked on this technology. There was only one problem: it was illegal. U.S. law explicitly prohibited Nazi officials from immigrating to America--and as many as three-quarters of the scientists in question had been committed Nazis.” -Operation Paperclip Casefile: New World Order and Nazi Germany
Hundreds of Nazi mind-control specialists and doctors who performed horrific experiments on prisoners instantly had their atrocious German histories erased and were promoted into high-level American jobs. Kurt Blome, for instance, was a high-ranking Nazi scientist who experimented with plague vaccines on concentration camp prisoners. He was hired by the U.S. Army Chemical Corps to work on chemical warfare projects. Major General Walter Schreiber was a head doctor during Nazi concentration camp prisoner experiments in which they starved, and otherwise tortured the inmates. He was hired by the Air Force School of Medicine in Texas. Werner Von Braun was technical director of the Nazi Peenemunde Rocket Research Center, where the Germans developed the V2 rocket. He was hired by the U.S. Army to develop guided missiles and then made the first director of NASA!
“Military Intelligence ‘cleansed’ the files of Nazi references. By 1955, more than 760 German scientists had been granted citizenship in the U.S. and given prominent positions in the American scientific community. Many had been longtime members of the Nazi party and the Gestapo, had conducted experiments on humans at concentration camps, had used slave labor, and had committed other war crimes. In a 1985 expose in the Bulletin of the Atomic Scientists Linda Hunt wrote that she had examined more than 130 reports on Project Paperclip subjects - and every one ‘had been changed to eliminate the security threat classification.’ A good example of how these dossiers were changed is the case of Werner von Braun. A September 18, 1947, report on the German rocket scientist stated, ‘Subject is regarded as a potential security threat by the Military Governor.’ The following February, a new security evaluation of Von Braun said, ‘No derogatory information is available on the subject … It is the opinion of the Military Governor that he may not constitute a security threat to the United States.’” -Operation Paperclip Casefile: New World Order and Nazi Germany
Shortly after Operation Paperclip came Operation Mockingbird, during which the CIA trained reporters and created media outlets to disseminate their propaganda. One of Project Mockingbird’s lead roles was played by Philip Graham who would become publisher of The Washington Post. Declassified documents admit that over 25 organizations and 400 journalists became CIA assets which now include major names like ABC, NBC, CBS, AP, Reuters, Time, Newsweek and more.
In 1953 the Iranian coup classified as Operation AJAX was the CIA’s first successful overthrow of a foreign government. In 1951 Iran Parliament and Prime Minister Dr. Mohammed Mosaddeq voted for nationalizing their oil industry which upset western oil barons like the Rockefellers. On April 4th, 1953, CIA director Allen Dulles transferred $1 million to Iranian General Fazlollah Zahedi to be used “in any way that would bring about the fall of Mosaddeq.” Coup leaders first planted anti-Mosaddeq propaganda throughout the Iranian press, held demonstrations, and bribed officials. Then they began committing terror attacks to blame on Mosaddeq hoping to bring public sentiment away from their hero. They machine-gunned civilians, bombed mosques, and then passed out pamphlets saying, “Up with Mosaddeq, up with Communism, down with Allah.” Zahedi’s coup took place between August 15th and 19th after which the CIA sent $5 million more for helping their new government consolidate power. Soon America controlled half of Iran’s oil production and American weapons merchants moved in making almost $20 billion off Iran in the next 20 years.
“In 1953 the Central Intelligence Agency working in tandem with MI6 overthrew the democratically-elected leader of Iran Dr. Mohammed Mosaddeq. Mosaddeq had been educated in the west, was pro-America, and had driven communist forces out of the north of his country shortly after being elected in 1951. Mosaddeq then nationalized the oil fields and denied British Petroleum a monopoly. The CIA’s own history department at cia.gov details how U.S. and British intelligence agents carried out terror attacks and then subsequently blamed them on Mosaddeq … The provocations included propaganda, demonstrations, bribery, agents of influence, and false flag operations. They bombed the home of a prominent religious leader and blamed it on Moseddeq. They attacked mosques, machine-gunned crowds, and then handed out thousands of handbills claiming that Moseddeq had done it … Dr. Mohammed Moseddeq, who was incarcerated for the duration of his life, fared better than any of his ministers who were executed just days after the successful coup for crimes that MI6 and the CIA had committed.” -Alex Jones, “Terrorstorm” DVD
In 1954 the CIA performed its second coup d’etat overthrow of a foreign democracy; this time it was Guatemala, whose popular leader Jacobo Arbenz Guzman, had recently nationalized 1.5 million acres of land for the peasants. Before this, only 2.2% of Guatemala’s land-owners owned 70% of the land, which included that of United Fruit Co. whose board of directors were friends with the Dulles brothers and wanted to keep Guatemala a banana republic. So once again the CIA sent in propagandists and mercenaries, trained militia groups, bombed the capital, and installed their puppet dictator Castillo Armas, who the gave United Fruit Co. and the other 2.2% land-owners everything back. Military dictators ruled Guatemala for the next 30 years killing over 100,000 citizens. Guatemalan coroners were reported saying they could not keep up with the bodies. The CIA called it Operation Success.
“The CIA has overthrown functioning democracies in over twenty countries.” -John Stockwell, former CIA official
They always follow the same strategy. First, globalist interests are threatened by a popular or democratically elected foreign leader; leaders who help their populations nationalize foreign-owned industries, protect workers, redistribute wealth/land and other such actions loved by the lower and middle-class majority, hated by the super-rich minority. Next, the CIA identifies and co-operates with opposition militia groups within the country, promising them political power in trade for American business freedom. Then they are hired, trained and funded to overthrow the current administration through propaganda, rigged elections, blackmail, infiltration/disruption of opposition parties, intimidation, torture, economic sabotage, death squads and assassinations. Eventually the CIA-backed militia group stages a coup and installs their corporate sympathizer-dictator and the former leaders are propagated as having been radicals or communists and the rest of the world is taught to shrug and view American imperialism as necessary world policing. The CIA has now evolved this whole racket into a careful science which they teach at the infamous “School of the Americas.” They also publish books like “The Freedom Fighter’s Manual” and “The Human Resource Exploitation Training Manual” teaching methods of torture, blackmail, interrogation, propaganda and sabotage to foreign military officials.
Starting in 1954 the CIA ran operations attempting to overthrow the communist North Vietnamese government, while supporting the Ngo Dinh Diem regime in South Vietnam. From 1957-1973 the CIA conducted what has been termed “The Secret War” in Laos during which they carried out almost one coup per year in an effort to overthrow their democracy. After several unsuccessful attempts, the US began a bombing campaign, dropping more explosives and planting more landmines on Laos during this Secret War than during all of World War II. Untold thousands died and a quarter of the Laotian people became refugees often living in caves. Right up to the present, Laotians are killed/maimed almost daily from unexploded landmines. In 1959 the US helped install “Papa Doc” Duvalier, the Haitian dictator whose factions killed over 100,000. In 1961 CIA Operation Mongoose attempted and failed to overthrow Fidel Castro. Also in 1961 the CIA assassinated the Dominican Republic’s leader Rafael Trujillo, assassinated Zaire’s democratically-elected Patrice Lumumba, and staged a coup against Ecuador’s President Jose Velasco, after which US President JFK fired CIA director Allen Dulles. In 1963 the CIA was back in the Dominican Republic and Ecuador performing military coups overthrowing Juan Bosch and President Arosemana. In 1964 another CIA-funded/armed coup overthrew Brazil’s democratically-elected Joao Goulart replacing him with Dictator General Castelo Branco, CIA-trained secret police, and marauding death squads. In 1965 the CIA performed coups in Indonesia and Zaire and installed oppressive military dictators; General Suharto in Indonesia would then go on to slaughter nearly a million of his countrymen. In 1967 a CIA-backed coup overthrew the government of Greece. In 1968 they helped capture Che Guevara in Bolivia. In 1970 they overthrew Cambodia’s popular Prince Sahounek, an action that greatly strengthened the once minor opposition Khmer Rouge party who went on to murder millions. In 1971 they backed a coup in Bolivia and installed Dictator Hugo Banzer who went on torture and murder over 2000 of his political opponents. In 1973 they assassinated Chile’s democratically-elected Salvador Allende and replaced him with General Augusto Pinochet who murdered thousands of his civilians. On and on it goes; The Association for Responsible Dissent put out a report estimating that by 1987, 6 million people worldwide had died resulting from CIA covert ops. Since then there have been many untold millions more.
“Throughout the world, on any given day, a man, woman or child is likely to be displaced, tortured, killed or disappeared, at the hands of governments or armed political groups. More often than not, the United States shares the blame.” -Amnesty International annual report on U.S. Military aid and human rights, 1996
1979-1989 CIA Operation Cyclone, with joint funding from Britain’s MI6, heavily armed and trained over 100,000 Afghani Mujahideen (“holy warriors”) during the Soviet war in Afghanistan. With the help of the Pakistani ISI (Inter-Services Intelligence), billions of dollars were given to create this Islamic army. Selig Harrison from the Woodrow Wilson International Centre for Scholars stated, “The CIA made a historic mistake in encouraging Islamic groups from all over the world to come to Afghanistan. The US provided $3 billion [now many more billion] for building up these Islamic groups, and it accepted Pakistan’s demand that they should decide how this money should be spent … Today that money and those weapons have helped build up the Taliban … [who] are now making a living out of terrorism.”
“The United States has been part and parcel to supporting the Taliban all along, and still is let me add … You have a military government in Pakistan now that is arming the Taliban to the teeth … Let me note; that [US] aid has always gone to Taliban areas … And when people from the outside try to put aid into areas not controlled by the Taliban, they are thwarted by our own State Department … Pakistan [has] initiated a major resupply effort, which eventually saw the defeat, and caused the defeat, of almost all of the anti-Taliban forces in Afghanistan.” -Congressional Rep. Dana Rohrbacher, the House International Relations Committee on Global Terrorism and South Asia, 2000
British Foreign Secretary Robin Cook stated before the House of Commons that “Al Qaeda” is not actually a terrorist group, but a database of international Mujahadden and arms dealers/smugglers used by the CIA to funnel arms, money, and guerrillas. The word “Al Qaeda” itself literally translates to “the database.” Not only did the CIA create the Taliban and Al-Qaeda, they continued funding them right up to the 9/11 attacks blamed on them. For example, four months prior to 9/11, in May, 2001, Colin Powell gave another $43 million in aid to the Taliban.
“Not even the corporate US media could whitewash these facts and so explained it away by alleging that US officials had sought cooperation from Pakistan because it was the original backer of the Taliban, the hard-line Islamic leadership of Afghanistan accused by Washington of harboring Bin Laden. Then the so called ‘missing link’ came when it was revealed that the head of the ISI was the principal financier of the 9/11 hijackers ... Pakistan and the ISI is the go between of the global terror explosion. Pakistan's military-intelligence apparatus, which literally created and sponsored the Taliban and Al Qaeda, is directly upheld and funded by the CIA. These facts are not even in dispute, neither in the media nor in government. Therefore when we are told by the neocon heads of the new world order that they are doing everything in their power to dismantle the global terror network what we are hearing is the exact opposite of the truth. They assembled it, they sponsored it and they continue to fund it. As any good criminal should, they have a middleman to provide plausible deniability, that middleman is the ISI and the military dictatorship of Pakistan.” -Steve Watson, “U.S. Intel Officer: Al Qaeda Leadership Allowed to Operate Freely” (http://www.infowars.net/articles/july2007/160707ISI.htm)
In a late 1980’s Newsweek article, outspoken opponent of President Bush and recently assassinated Pakistani Prime Minister Benazir Bhutto, told George Bush Sr., “you are creating a Frankenstein,” concerning the growing Islamist movement. She also came out in 2007 to say that Osama Bin Laden was already long dead having been murdered by Omar Sheikh. She was murdered herself a month after the interview, only two weeks before the Pakistani 2008 general elections. | <urn:uuid:96c4ba0b-5575-4365-9b5c-1164b7bca6d5> | CC-MAIN-2013-20 | http://www.atlanteanconspiracy.com/2008/09/history-of-cia.html?showComment=1358287968011 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.962873 | 3,320 | 2.859375 | 3 |
Deciphering the function and regulation of AUTS2
University of California, San Francisco
Autism is a neurodevelopmental disorder with complex genetic and environmental causes. Many gene mutations have been associated with autism; however, they explain only a small part of the genetic cause for this disorder. 98% of our genome does not encode for protein and is thus termed noncoding. In this noncoding space are gene regulatory sequences that tell genes when, where and at what amount to turn on or off. Mutations in these gene regulatory elements could thus be an important cause of autism. Despite the potential importance of these noncoding gene regulatory regions in autism susceptibility, very few studies have been performed trying to implicate them in this disorder. This pilot study focuses on a strong autism candidate gene, the autism susceptibility candidate 2 (AUTS2) gene. Mutations in its regulatory elements have been associated with autism and its function is not well known. Using both zebrafish and mice as the model organisms, the project aims to identify noncoding gene regulatory sequences of AUTS2. The fellow will then look to see if any individuals with autism have mutations in the regulatory regions identified. They will also reduce the expression of this gene in zebrafish and look for abnormalities to further clarify its function. This study promises to further our understanding of how differences in the noncoding region of the genome can lead to autism. It also aims to advance our understanding of a gene of unknown function that has been implicated in autism. | <urn:uuid:b119f23a-e8b4-478b-8b57-2472864187b9> | CC-MAIN-2013-20 | http://www.autismspeaks.org/genetics/grants/deciphering-function-and-regulation-auts2 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.944098 | 307 | 2.53125 | 3 |
By Mike Bennighof, Ph.D.
During the 1700s, European armies grew enormously
in size. The Seven Years’ War of 1756
– 1763 heightened the trend, and by
the end of the Napoleonic Wars field armies
had become enormous. Forces of 100,000 or
even more, unheard of a century before, were
not at all unusual by 1815.
The French army introduced the concept of
a corps d’armee, a body of infantry,
cavalry and artillery plus essential services.
The corps could fight alone or in cooperation
with other corps, and included all necessary
combat and administrative elements. By the
end of the Napoleonic wears, all participants
had organized their troops into corps, usually
made up of varying numbers of divisions and
During the years after 1815, some nations
kept their corps structure in place during
peacetime, using them to administer recruiting,
training and other non-combat functions. This
would speed mobilization and keep the staffs
employed. The size and composition of corps
also became regularized, with each usually
having the same number and types of subordinate
By the middle of the 19th century, an army
corps had become defined as the number of
troops that could be deployed from a single
road in less than two hours: roughly 20,000
men. That rule of thumb had been badly exceeded
as extra troops were added: cavalry, engineers,
artillerymen, light infantry, medical services,
supply columns and more.
The Prussian corps organization used in
the 1866 Austro-Prussian War had been introduced
as part of War Minister Albrecht von Roon’s
reforms starting in 1860. In 1859, the Prussian
Army mobilized its four army corps for war
on the side of Austria against France. The
mobilization found many troops untrained,
officers of poor quality and supply services
either insufficient or non-existent.
It also showed just how unwieldy the army’s
corps organization would prove in action.
The German Confederation, which included both
Austria and Prussia along with 36 other german
states, had adopted a corps of four divisions.
Each division consisted in turn of two or
three brigades, each brigade with two regiments
of two battalions each plus one of light infantry.
All told, a German division would go to war
with 10 or 15 battalions, a corps with between
40 and 60.
Roon rationalized this organization; in
battle, he believed, a general was most efficient
with fewer maneuver elements to command. A
new-model Prussian infantry corps would have
two divisions. Each division in turn had two
brigades, and each of them had two regiments.
The regiments would be larger, with three
battalions rather than the former two, as
a regimental colonel was expected to control
all three by line of sight.
A brigade commander only had to control
the two regiments under his command. At the
division level, things got more complex. The
division controlled two brigades, plus an
artillery detachment of four six-gun batteries.
These would usually be parceled out to the
brigades in action. During peacetime the division
was responsible for either a pioneer battalion
or a light infantry battalion; during wartime
these would be held in the corps reserve.
The corps controlled the two infantry divisions,
plus attachments of artillery and cavalry.
This varied from four to seven batteries (six
guns each) and two to five cavalry regiments.
Austria also reformed its corps organization
in 1860, based on the lessons of the 1859
war. An Austrian corps had included two or
three divisions, each in turn of two or three
five-battalion brigades. Each brigade included
the four field battalions of a single regiment
plus a light infantry battalion: usually jägers
but in a few cases grenzers (Croatian border
troops) or volunteer student battalions.
Austrian generals performed poorly in the
1859 war, and the reform commission appointed
after the war recommended using fewer of them.
In particular, it pointed out that the small
brigades made regimental colonels superfluous.
A peacetime regiment had contained four field
battalions and a grenadier battalion; now
they would have three field battalions, a
fourth reserve battalion and in wartime a
fifth training battalion. Two of these three-battalion
regiments would be grouped in a brigade along
with a light infantry battalion and an eight-gun
artillery battery. It was a powerful and flexible
organization, led by a major general (Austria
did not have a “brigadier general”
rank and this was the imperial army’s
equivalent). The larger brigades required
fewer light infantry battalions, allowing
the role to be filled exclusively by jägers.
The organization became less flexible at
the larger echelons. An Austrian corps included
four infantry brigades, a cavalry regiment
and a brigade-sized artillery reserve as well
as engineer, supply and medical units. The
new arrangement required fewer general officers,
which had been the goal. But handling six
maneuver elements proved beyond the capability
of most Austrian corps staffs in 1866, and
the intermediate stage of division headquarters
gave Austria’s Prussian opponents a
decided advantage in flexibility and reaction
speed. Though the Prussian staff was undoubtedly
better organized and more efficient than their
Austrian counterparts, their organization
also gave them a lighter workload.
of 1866: Frontier Battles the units are infantry brigades,
cavalry regiments and artillery batteries,
but players maneuver their units by corps.
The corps are activated by the army command,
or through the initiative of the corps commander.
The Prussians generally activate in a much
more predictable fashion, and can get all
of their units into action thanks to the division
commanders. An Austrian corps is much more
difficult to handle and often only gets into
action piece by piece.
here to order Battles of 1866: Frontier Battles now. | <urn:uuid:7d84fe71-cb98-4aca-863d-b31baad541c3> | CC-MAIN-2013-20 | http://www.avalanchepress.com/PrussianOrganization.php | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.95064 | 1,343 | 3.5625 | 4 |
Viewed against a dangerous and costly backdrop, clear team communication is obviously essential to create a safe, productive and effective work environment on the ramp. Tractor operators and wing walkers need to warn each other of impending dangers. The tractor operator needs to keep the flight deck informed of ground movement. And all ground personnel should at least be able to hear the flight deck and each other during a pushback.
Ramp workers can do much more without the wire, the shouting or the hand signals.
A typical wireless pushback and towing configuration uses a portable transceiver for continuous two-way communication among one or more wing walkers and the tractor operator during aircraft movement. The tractor operator is free to concentrate on correct maneuvering, and all crew members can warn others instantly of impending dangers.
To optimize the flow of communication and minimize chatter, the system is configured so that all team members can hear the pilot, but only the tractor operator can talk directly to the flight deck. Because wireless communication increases coordination and enables real-time verbal warnings, it decreases the risk of accidents, shortens turn-around times, and increases the likelihood of hitting flight slots.
In addition to pushbacks and towing, wireless team communication systems can also be used to improve safety and efficiency during deicing, cargo and maintenance operations. In a deicing configuration, a wireless system connects the driver and the basket, and the system itself can be connected to two-way radios enabling communication with remote users.
Communication between the driver and the basket takes place on open microphone over a 1.9GHz (1.8GHz in the EU) encrypted frequency while also allowing radio monitoring and transmitting with a push to-talk button on the headsets. Systems can be configured to enable multiple deicing crews to communicate while working on the same aircraft - further improving efficiency. Additional configurations are available for maintenance teams and are scalable to almost any size.
Choosing a Wireless Communication System
Wireless headset systems are available in a wide variety of configurations and price ranges. To ensure a system meets the diverse needs of ground support, consider the following factors carefully:
Is the system truly wireless? A number of so-called “wireless” systems actually require a wire from the headset to a radio or belt pack. While these systems allow freedom of movement, a belt pack or radio wire creates many of the same problems inherent in hardwire systems, particularly tangled cords. Moreover, belt packs generally have less than half the transmission range of self-contained systems worn on the head.
Does the system use DECT or Bluetooth technology? Transmission technology can dramatically affect how well wireless systems perform in the field. Systems that employ Bluetooth technology generally have a limited range and are subject to radio frequency interference from nearby devices.
Look for systems that use Digital Enhanced Cordless Telecommunications technology. DECT units generally offer up to 30 times more coverage and are less subject to interference than Bluetooth. DECT transmissions also have multipath capability, meaning the signal will bounce up, over and around objects in order to establish the best possible connection. DECT signals are also digitally encoded to ensure privacy.
Is the system full-duplex or half-duplex? Half-duplex systems allow communication in both directions, but only one direction at a time. That’s a walkie-talkie. On the other hand, full-duplex systems allow communication in both directions simultaneously. Full-duplex capabilities are an important safety consideration because they allow the parties to speak and hear others at the same time.
Is the system radio-compatible? Communication during pushback and towing is generally confined to the flight deck, wing walkers and tractor operator; however, other ground support functions may benefit from the ability to communicate with remote users over a two-way radio. Look for a system with maximum radio-interface flexibility. | <urn:uuid:64b6024d-747e-42b4-94a5-ce98e783c943> | CC-MAIN-2013-20 | http://www.aviationpros.com/article/10603970/wireless-headsets-for-team-communication-improve-ramp-safety?page=2 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.926886 | 784 | 2.578125 | 3 |
Issued from the woods of the Loess Hills a few miles east of
NATCHEZ, MISSISSIPPI, USA
April 29, 2012
|CATTLE EGRETS AMONG CATTLE
As in Mexico, around here if you pass by a pasture you're likely to see Cattle Egrets standing among or on the cows, as shown at http://www.backyardnature.net/n/12/120429eg.jpg.
Cattle Egrets in their breeding plumage, like the ones in the picture, can be distinguished from other white egrets and herons by the patches of light orange-brown on their crests and chests. Nonbreeding Cattle Egrets can be all white, and then their relatively thick, yellow beaks and thicker, shorter necks separate them from similar-sized, white herons and egrets found here, such as Snowy Egrets and juvenile Little Blue Herons.
I remember the first time Cattle Egrets were spotted in the rural part of western Kentucky where I grew up, possibly in 1963. Their appearance was so unusual that a farmer not particularly interested in Nature called my parents and said that a whole flock of big white birds had appeared in his pasture, and we went up to take a look. I was in college before I learned that they were Cattle Egrets, BUBULCUS IBIS.
My ornithology teacher told how the birds were undergoing one of the fastest and most widely ranging expansions of distribution ever seen among birds. Originally Cattle Egrets were native to southern Spain and Portugal, tropical and subtropical Africa and humid tropical and subtropical Asia. In the late 1800s they began expanding their range into southern Africa, and were first sighted in the Americas, on the boundary of Guiana and Suriname, in 1877, apparently having flown across the Atlantic Ocean. They didn't get permanently established there until the 1930s, though, but then they began expanding into much of the rest of the Americas, reaching western Kentucky around the early 60s. The species appears still to be expanding northward in western North America, but in the Northeast it seems to be in decline. Though they can turn up as far north as southern Canada, coast to coast, mostly they breed in the US Southeast.
The Wikipedia expert says that Cattle Egrets eat ticks and flies from cattle. They do that, but anyone who watches our birds awhile sees that mainly as the cattle move around they stir up creatures in the grass, which the egrets prey on. The cows' fresh manure also attracts flies for them.
MATING BOX TURTLES
It's interesting to see how turtles manage it, but for many readers familiar with box turtles in other parts of North America the picture may raise the question of why those in our picture bear different colors and patterns than theirs. What's happening is that Box Turtles are represented by six intergrading subspecies.
Hillary's Gulf Coast location is supposed to be home to the Gulf Coast subspecies, Terrapene carolina ssp. major. However, that subspecies is described as having a brownish top shell, or carapace, sometimes with a few dull spots or rays, but nothing like these bright, yellow lines. I can't say what's going on. Apparently Box Turtle taxonomy is a bit tricky.
RESTING CRANE FLY
That looks like a mosquito but you can see from how much of the leaf he covers that he's far too large to be any mosquito species found here. Also, he lacks the hypodermic-like proboscis mosquitoes use to suck blood. No conspicuous mouthparts are visible on our crane fly because adult crane flies generally hardly eat at all, only occasionally lapping up a bit of pollen or sugar-rich flower nectar. Their maggot-like larvae feed on plant roots. Some species can damage crops.
Oosterbroek's monumental, 2012 Catalogue of the Craneflies of the World -- free and online at http://ip30.eti.uva.nl/ccw/ --recognizes 15,345 cranefly species, 1630 of them just in our Nearctic ecozone, which embraces the US, Canada, Greenland, and most of northern Mexico.
That's why when I shipped the picture to volunteer identifier Bea in Ontario it took more time than usual for her verdict to come in, and she was comfortable only with calling it the genus TIPULA.
Whatever our species, it's a pleasure to take the close shown at http://www.backyardnature.net/n/12/120429cg.jpg.
What are those things below the wings looking like needles with droplets of water at their ends? Those are "halteres," which commonly occur among the Fly Order of Insects, the Diptera. Though their purpose isn't known with certainty, it's assumed that they help control flight, enabling flies to make sudden mid-air changes in direction. From the evolutionary perspective, halteres are modified back wings. Most insects have two pairs, or four, wings, but not the Diptera, as the name implies -- di-ptera, as they say "two-wings" in classical Greek.
ADMIRING THE WHITE OAK
In that picture I'm holding a leaf so you can see its underside, much paler than other leaves' topsides. The tree's gray bark of narrow, vertical blocks of scaly plates is shown at http://www.backyardnature.net/n/12/120429qc.jpg.
I'm accustomed to seeing White Oaks on relatively dry upland soils so I was a little surprised when the tree in the picture showed up on a stream bank growing among Sycamores. In fact, White Oaks are fairly rare around here, completely absent in many upland forests where I'd expect them to be. Years ago I mentioned this in a Newsletter and a local reader responded that in this region White Oaks were wiped out many years ago by people cutting them as lumber and, more importantly, using them in the whisky distilling business. The online Flora of North America says that "In the past Quercus alba was considered to be the source of the finest and most durable oak lumber in America for furniture and shipbuilding."
There beside the stream, last year's crop of our White Oak's acorns had been washed away, but this season's were there in their first stages of growth, as seen at http://www.backyardnature.net/n/12/120429qb.jpg.
Traditionally early North Americans regarded the inner bark of White Oaks as highly medicinal. Extracts made from soaking the inner bark in water are astringent (puckery) and were used for gargling, and the old herbals describe the extract as tonic, stimulating and antiseptic. Other listed uses include for "putrid sore throat," diphtheria, hemorrhages, spongy or bleeding gums, and hemorrhoids. Many applications suggest adding a bit of capsicum, or hot pepper, to the extract.
Basically the notion seems to be that the bark's tannin -- the puckery element -- does the main medicinal service. Other oaks actually have more tannin than White Oak, but medicines made with them can be too harsh. White Oak extracts seem to have just the right amount.
The same tannin situation exists with regard to the edibility of acorns. The acorns of other oaks contain more tannin so they require more time and effort to make them edible. White Oak acorns have much less tannin, but even still there's enough to make them too bitter for humans to eat without treatment, which traditionally has been leaching acorn pulp in running water.
By the way, instructions for the kitchen leaching of acorn pulp appear at http://www.ehow.com/how_8427141_leach-acorns.html.
AMERICAN HOLLY FLOWERING
American Hollies are a different species from the English Holly often planted as ornamentals. American Holly bears larger leaves and produces fewer fruits. Hollies come in male or female trees (they're dioecious), and you can tell from the flowers in the upper, left of the above picture that here we have a male tree. A close-up of a male flower with its four out-thrusting stamens is at http://www.backyardnature.net/n/12/120429hp.jpg.
On a female flower the stamens would be rudimentary and there'd be an ovary -- the future fruit -- in the blossom's center.
Maybe because people are so used to seeing English Hollies planted up north often it's assumed that they're northern trees. In fact, American Holly is mainly native to the US Southeast, though along the Coastal Plain it reaches as far north as southern Connecticut. Around here it's strictly an understory tree.
The fruits are mildly toxic but you must eat a lot of them to get sick. Birds, deer, squirrels and other animals eat the fruits, which are drupes bearing several hard "stones." No critter seems to relish them, though, saving them mostly to serve as "emergency food" when other foods run out. That might explain why we see hollies holding their red fruits deep into the winter.
"BEGGAR'S LICE" ON MY SOCKS
Several kinds of plants produce stickery little fruits like that and they all can be called Beggar's Lice. When I tracked down the plant attaching its fruits to me, it was what's shown at http://www.backyardnature.net/n/12/120429my.jpg.
Several beggar's-lice-producing plants are similar to that, so before being sure what I really had I had to "do the botany." Here are details I focused on:
Leaves and stems were hairy, and leaves were rounded toward the base, sometimes clasping the stem, as shown at http://www.backyardnature.net/n/12/120429mw.jpg.
A close-up of a "beggar's louse" is shown stuck in my arm hairs at http://www.backyardnature.net/n/12/120429mx.jpg.
That last picture is sort of tricky. For, you expect the thing stuck to you to be a fruit with hooked spines, but the thing in the picture isn't a fruit. It's actually a baglike calyx surrounding much smaller fruit-like things. I crumbled some calyxes between my fingers and part of what resulted is shown at http://www.backyardnature.net/n/12/120429mv.jpg.
The four shiny things are not seeds. Maybe you've seen that the ovary of most mint flowers is divided into four more-or-less distinct parts. Each of those parts is called a nutlet, and that's what you're seeing. But other plant families beside the Mint produce nutlets.
Our beggar's-louse-producing plant is MYOSOTIS DISCOLOR, a member of the Borage Family, the Boraginaceae, which on the phylogenetic Tree of Life is adjacent to the Mint Family. Myosotis discolor is an invasive from Europe that so far has set up residence here and there in eastern and western North America, but so far seems to be absent in the center.
The English name is often given as Changing Forget-me-not, because Myosotis is the Forget-me-not genus, and in Latin dis-color says "two-colored," apparently referring to the fact that the flowers can be white or blue, though all I've seen here are white. But, this rangy little plant you never notice until its calyxes stick to you seems to have nothing to do with Forget-me-nots, unless you look at technical features. I think some editor must have made up the name "Changing Forget-me-not." Our plant very clearly is one of several "Beggar's Lice."
OATS ALONG THE ROAD
A spikelet plucked from the panicle is shown at http://www.backyardnature.net/n/12/120429ov.jpg.
The same spikelet opened to show the florets inside the glumes at http://www.backyardnature.net/n/12/120429ou.jpg.
This is Oat grass, AVENA SATIVA, the same species producing the oats of oatmeal. Oat spikelets differ from those of the vast majority of other grasses by the very large, boat-shaped glumes subtending the florets.
Glumes are analogous to a regular flower's calyx, so in that last picture of a spikelet, the glumes are the two large, green-and-white striped items at the left in the photograph. The vast majority of grass spikelets bear glumes much shorter than the florets above them. Also, notice that the slender, stiff, needlelike item, the awn, arises from a floret inside the spikelet and not from a glum.
Remember that you can review grass flower terminology at http://www.backyardnature.net/fl_grass.htm.
The spikelets of most Oat plants don't bear needlelike awns. You're likely to see both awned and awnless kinds growing as weeds in our area. When I first saw the awns I thought this might be one of the "Wild Oat" species, for several species reside in the Oat genus Avena, and one of those grows wild in the US Southeast. However, florets of the other species bear long, brownish hairs, and you can see that ours are hairless, or "glabrous." The other species' awns also are twisted, but regular Oat awns, when present, are rigid and straight. Both Oat species are native to Eurasia.
How did that Oat plant make its way to the side of our isolated Mississippi backroad? Near where the grass grew there was a large game farm where exotic animals are kept so hunters can pay high fees to kill them. I'm betting that the animals are fed oats. Our plant was in an often-flooded spot downstream from the farm, so maybe an oat grain had washed there.
That's a roadcut through a special kind of very fine-grained clay called loess. The word loess derives from the German Löß. A deep mantel of loess was deposited here at the end of the last Ice Age about 10,000 years ago. Deep loess deposits occur in a narrow band of upland immediately east of the Mississippi River over most of its entire course. The loess region sometimes is called the Loess Hills. Loess profoundly affects the area's ecology. For one thing, the farther east you go from the Mississippi River, the thinner the loess is, the poorer and more acidic the soil becomes, and the more pines you get instead of broadleaf deciduous trees.
Loess is so important here, and so interesting, that years ago I developed a web portal called "Loess Hills of the Lower Mississippi Valley," at http://www.backyardnature.net/loess/loess.html.
I had hoped to engage local folks in an effort to recognize the Loess Hills as a very interesting, scenic and biologically important, distinct region with ecotourism potential, but nothing ever came from it. At that site you can learn how "loess" can be pronounced, how it came to exist here, what's special about it, and much more.
One thing special about loess is that it erodes into vertical-sided roadcuts as in the picture. People such as road engineers who try to create gentle slopes are doomed to failure. I wish my farming Maya friends in the Yucatan, who must deal with very thin, rocky soil, could see the thick mantel of rich loess we have here.
NO MORE EMAILED NEWSLETTERS
From now on, to read the Newsletters you'll just have to remember to check out the most recently issued edition at http://www.backyardnature.net/n/.
Today's Newsletter is there now waiting for readers, with stories about Cattle Egrets, mating Box Turtles, craneflies, flowering holly trees, Beggar's Lice and more.
If you're on Facebook you can find the Facebook Newsletter page by searching for "Jim Conrad's Naturalist Newsletter." The weekly message left there will link to individual pages with images embedded in text. In today's message, for instance, you can click on "Cattle Egrets" and see a regular web page with text and a photo. I've configured my Facebook page to have a subscribe tab but so far one hasn't appeared. My impression is that if you "like" the Newsletter page, each week you'll receive a message with its link. Maybe not. I'm still figuring it out.
So, this is the end of eleven years of weekly delivered emails.
At first I was upset and annoyed, and thought of writing the 2,158 subscribers suggesting that complaints be made to FatCow at email@example.com. However, something interesting has happened.
Last week about a dozen subscribers accepted my invitation to check out the Newsletter's Facebook page. When they "liked" the page, I got to see their pictures, or at least their avatars. There were all kinds of folks, old and young, skinny and fat, white and brown, serious and joking, one fellow on a boat in Maine, a lady in India with a dot, or Bindi, in the middle of her forehead, someone's baby picture... What an amazing thing that all these people were interested in what I'd written!
So, in a way, FatCow.com's treatment has been a gift. It's resensitized me to my readership. Also, it's nudged me into a mental space where now I'm mentally prepared for the whole BackyardNature.net site to be removed permanently, for whatever reason they come up with. That extra sense of independence means a lot to me. Now if need be I'm ready to write Newsletters and just keep them in my computer, or write them in a notebook hidden in my trailer, or write them on leaves that I let float down the Mississippi River. I've already learned how to make ink from oak galls.
So, we're evolving here. I'm yielding when it's clear that the forces against us control critical resources, but I'm ready to experiment with new possibilities as they appear, and I continue to think, feel and write about the world around us, and share when I'm allowed to.
Good luck in your own evolutions. And thanks for these years of weekly inviting me into your lives.
Best wishes to all Newsletter readers,
To subscribe OR unsubscribe to this Newsletter, go to www.backyardnature.net/news/natnat.php.
Post your own backyard-nature observations and thoughts at http://groups.google.com/group/backyard-nature/
All previous Newsletters are archived at www.backyardnature.net/n/.
Visit Jim's backyard nature site at www.backyardnature.net | <urn:uuid:ed524a66-2327-4328-a7fc-f00a0d14d470> | CC-MAIN-2013-20 | http://www.backyardnature.net/n/12/120429.htm | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.959242 | 4,095 | 3.59375 | 4 |
The town´s history
Although written differently, Tölz was mentioned for the first time in the records of 1180. In 1331, it was granted extensive "Marktrechte", e.g. the right to hold a market. In the 13th and 14th century many workshops (e.g. limeburners and raftsmen) settled in this area. A great fire destroyed large parts of the town in 1453, but with generous noble support reconstruction soon began. Thanks to the location at the river Isar, the rafting and also brewery trade the town soon flourished. 22 breweries could be counted in 1721. Tölz became also famous for arts and crafts with the beautiful coloured chests, cases and beds. In 1845, iodine was found close to Tölz. Therefore, market town Markt Tölz became Bad (= the German word for spa resorts) in 1899. In 1906, it was recognized as town and in 1969 it got the rating "Heilklimatischer Kurort", which means that its climate is beneficial to health. What is more, in 2005, it also got the title "Moorheilbad", that means it is acknowledged as mineral and medicinal mud-bath spa.
The town´s coat of arms
The town´s coat of arms.
The town´s flag with the colours black and gold. | <urn:uuid:d411514d-c8d6-4b8e-8dbe-4a8df14e66fe> | CC-MAIN-2013-20 | http://www.bad-toelz.de/en/bad-toelz/stadt-bad-toelz/the-towns-history.html?refID=95 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.975567 | 288 | 2.5625 | 3 |
Yarrow: A Tough Groundcover Option
Image by Flickr / entheos
The white flower heads of the yarrow plant
Get acquainted with this hardy and handy groundcover
People are always looking to cover open rough spots in the lawn and around the property. Our hardy native yarrow (Achillea millefolium) establishes quickly and binds the soil to provide a soft, scented carpet. In the wilds of Western Canada, white flat-topped flower heads rise to 75 cm (30 in.) tall from a mass of ferny leaves.
Buy yarrow plants from a local garden centre or grow them from rooted stem fragments planted in fall or early spring. Many colour varieties are easy to raise from seed, and you can mow the spreading yarrow patch along with the grass.
Yarrow leaves rubbed on the skin or burned in a campfire keep away mosquitoes. A poultice from steeped leaves helps heal sores and reduce muscle pain. | <urn:uuid:e76953cb-2bd1-4921-8818-d81bd78db030> | CC-MAIN-2013-20 | http://www.bcliving.ca/garden/yarrow-a-tough-groundcover-option | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.908327 | 203 | 2.734375 | 3 |
Next: Radiative heat flux Up: Loading Previous: Distributed heat flux Contents
Convective heat flux is a flux depending on the temperature difference between the body and the adjacent fluid (liquid or gas) and is triggered by the *FILM card. It takes the form
where is the a flux normal to the surface, is the film coefficient, is the body temperature and is the environment fluid temperature (also called sink temperature). Generally, the sink temperature is known. If it is not, it is an unknown in the system. Physically, the convection along the surface can be forced or free. Forced convection means that the mass flow rate of the adjacent fluid (gas or liquid) is known and its temperature is the result of heat exchange between body and fluid. This case can be simulated by CalculiX by defining network elements and using the *BOUNDARY card for the first degree of freedom in the midside node of the element. Free convection, for which the mass flow rate is a n unknown too and a result of temperature differences, cannot be simulated.
Next: Radiative heat flux Up: Loading Previous: Distributed heat flux Contents guido dhondt 2012-10-06 | <urn:uuid:47d24057-e332-41de-bbe6-0338e16b49a6> | CC-MAIN-2013-20 | http://www.bconverged.com/calculix/doc/ccx/html/node145.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.9331 | 249 | 3.3125 | 3 |
Guest Author - Heather Thomas
In most wild species, birds display dominance within the flock to determine their place or roll within that flock. Males display and vocalize to win their choice of female. The term “pecking order” comes from natural bird behavior. Dominant behavior is natural and expected in the wild. We must be cautious, as humans, not to project our sense of right and wrong onto our feathered companions.
Similar to birds that still live in the wild, your bird may be only a few generations removed from the wild and will display natural behavior tendencies. Understanding these basic characteristics helps you understand how to interact with your bird and creates a happier flock experience for all.
The Lunging or Biting Bird
One must be cautious to label “bad” behavior as dominant behavior. Lunging and biting are most often caused by fear. Changing a bird’s environment too drastically such as cage placement, a new cage, rearranging the furniture in a room or even something as simple as changing the drapery on the window next to their cage can cause even a friendly bird to become seemingly aggressive. It is important to consider environmental changes before labeling your bird’s behavior as dominant. Typical dominant behavior that manifests itself as biting or lunging would be a bird that loves to sit only on your shoulder and bites you when you attempt to remove them. Protecting a favorite person or place in your home by lunging or biting at others who happen to come too close would also be correctly labeled as dominant behavior.
The Bully Bird
You may have a situation where you keep more than one bird in a cage. If you have a flock that works well together you will be able to tell who the dominant male is but it will not adversely affect your flock. If you have a dominant male that is a bully, you may observe him forcing other birds off of their perch or guarding a food dish and not letting anyone else eat from it. In worst-case scenarios, your bully will single out a victim and force that bird to dwell at the bottom of the cage or even injure and possibly kill this weaker bird. If you have a dominant bully, it is best to remove him from the cage and keep him in a cage by himself or with his mate.
The Anti-Social Bird
As much as you try your bird has no interest in becoming your friend. This bird often flutters around its cage to avoid your hand or takes to flight to escape your reach. I find this behavior often typical of a bird with unclipped wings. There are people who keep birds that believe it is cruel to clip a bird’s wings. I will cover this topic in depth at a later time but here will touch on effects not clipping your bird’s wings has on dominance. By the very act of keeping a bird as a pet, you are choosing to take this wonderful winged creature and transform it into your friend or companion. If you take this action, it changes the purpose of the animal. If you allow your bird to retain the ability of flight, you are permitting your bird to escape your reach and do whatever it wants. This may be fine, if you want a wild bird as a pet. However, if you want a friendly bird, you want a bird dependent on you, a bird that does not fly away just because it wants to.
For a well-mannered bird, keep the flock mentality where you are the dominant bird. If you want a bird that respects you, you must maintain dominance. This is not achieved by cruel discipline. Observe your bird and be consistent with your expectations and interaction within your flock. Do not allow unacceptable dominant behavior to take root in your avian friend. | <urn:uuid:41e51805-6ce5-4e0e-812d-f25764378578> | CC-MAIN-2013-20 | http://www.bellaonline.com/articles/art18014.asp | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.960954 | 762 | 3.40625 | 3 |
(BPT) - Everyone, including moms and doctors, can agree that a good night of sleep is necessary for good health, high energy, and an individual’s overall well-being. Not getting enough good sleep – or rapid eye movement sleep – can affect the mind and body’s ability to react appropriately to outside factors, the National Sleep Foundation reports.
Creating the perfect sleep environment is the first step toward ensuring a good night of sleep. March, the first month of spring, is also National Sleep Awareness Month, and it aims to remind everyone why a good night of zzz’s is so important. One in four adults in the United States experience occasional sleepiness, difficulty falling asleep, or waking up feeling un-refreshed at least a few times per week, according to the National Sleep Foundation.
Fortunately, you can implement these tips this spring, and create a comfortable sleeping environment in your home for both you and your family.
* Eliminate distractions – Electronics. Noises. Lights. Many items, such as laptops, TVs and cellphones, commonly found in bedrooms can cause distractions and prevent a person from entering REM sleep. Remove these items from the room. Also, consider running a fan or white noise machine to create a soft sound barrier, which will help muffle unexpected sounds like a person flushing the toilet or an engine rumbling loudly on the street outside.
* Establish comfort – Creating a sleep-conducive environment is an important factor in making the most out of every minute you sleep. Cuddle up each night with soft linens and create a calming atmosphere in the bedroom. To do this, try adding Downy Infusions Lavender Serenity liquid fabric softener when washing your sheets and sleepwear this season, to make your linens and sleepwear silky, soft and soothing. It will help lull you right into bed. With Downy you can wake up to a great scent and start the day off on the right side of the bed.
* Be routine – The human body reacts favorably to familiar and repeated movements. So consider following a routine every night, whether it’s taking a warm bath, reading a chapter in a book or journaling. The National Sleep Foundation advises against watching TV or using electronics as part of this routine because electronics can hinder quality sleep.
* Stay active – Sleep is needed to give the body energy to get through its daily activities. Conversely, daily activities are needed to tire the body out for a good night of sleep. Consider adding physical activities into your daily schedule so you can settle into bed between the covers each night, tired and ready for a good night of sleep.
Nobody enjoys walking around in a mental fog or having no energy during the day, so be sure to create the perfect sleep environment in your home for you and your family this spring. It will help you get the most out of every minute of your zzz’s. | <urn:uuid:83500816-72c7-4a5a-8edd-7e72cbd48886> | CC-MAIN-2013-20 | http://www.bensoncountynews.com/21745/1979/onlinefeature/17716/creating-the-perfect-sleep-environment-this-spring | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.924329 | 601 | 2.609375 | 3 |
Clinical complications associated with diabetes may include the following:
Cardiovascular disease, in many cases, is caused by atherosclerosis - an excess build-up of plaque on the inner wall of a large blood vessel, which restricts the flow of blood. Heart disease is the leading cause of diabetes-related deaths. Heart disease and stroke are two to four times more common in persons with diabetes.
High blood pressure affects 73 percent of persons with diabetes.
Periodontal (gum) disease occurs with greater frequency in persons with diabetes.
retinopathy or glaucoma (eye disease or blindness)
Blindness due to diabetic retinopathy is a more important cause of visual impairment in younger-onset people than in older-onset people. Males with younger-onset diabetes generally develop retinopathy more rapidly than females with younger-onset diabetes. Diabetes is the leading cause of blindness among adults ages 20 to 74. | <urn:uuid:51f6c283-f9f9-4540-8125-26bbefe1d2f6> | CC-MAIN-2013-20 | http://www.bettermedicine.com/topic/diabetes/living-with-diabetes | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.924855 | 194 | 2.90625 | 3 |
Tuscaloosa, located at the falls of the Black Warrior River in west central Alabama, is the the fifth-largest city in Alabama with a population of 90,468, and the seat of Tuscaloosa County. It is named for the Choctaw chieftain Tuskalusa (meaning Black Warrior), who battled and was defeated by Hernando de Soto in 1540 in the Battle of Mauvila.
Best known as the home of the University of Alabama, Tuscaloosa is also the center of industry, commerce, healthcare, and education for the region commonly known as West Alabama.
The area at the fall line of what would be later known as the Black Warrior River had long been well known to the various Indian tribes whose shifting fortunes brought them to West Alabama. The river shoals at Tuscaloosa represented the southernmost site on the river which could be forded under most conditions. Inevitably, a network of Indian trails converged upon the place, the same network which, in the first years of the 19th Century began to lead a few white frontiersmen to the area.
The pace of white settlement increased greatly after the War of 1812, and a small assortment of log cabins soon arose near the large Creek village at the fall line of the river, which the settlers named in honor of the legendary Chief Tuscaloosa. In 1817, Alabama became a territory, and on December 13, 1819, the territorial legislature incorporated the town of Tuscaloosa, exactly one day before the United States Congress admitted Alabama to the Union as a state.
From 1826 to 1846 Tuscaloosa was the capital of Alabama. During this period, in 1831, the University of Alabama was established. The town's population and economy grew rapidly until the departure of the capital to Montgomery caused a rapid decline in population. Establishment of the Bryce State Hospital for the Insane in Tuscaloosa in the 1850s helped restore the city's fortunes. During the Civil War following Alabama's secession from the Union, several thousand men from Tuscaloosa fought in the Confederate armies. During the last weeks of the War, a brigade of Union troops raiding the city burned the campus of the University of Alabama. Tuscaloosa, too, suffered much damage from the battle and shared fully in the South's economic sufferings which followed the defeat.
The construction of a system of locks and dams on the Black Warrior River by the U.S. Army Corps of Engineers in the 1890s opened up an inexpensive link to the Gulf seaport of Mobile, stimulating especially the mining and metallurgical industries of the region. By the advent of the 20th Century, the growth of the University of Alabama and the mental health-care facilities in the city, along with strong national economy fueled a steady growth in Tuscaloosa which continued unabated for 100 years. Manufacturing plants of large firms such as Michelin and JVC located in town during the latter half of the 20th Century. However, it was the announcement of the addition of the Mercedes-Benz US International assembly plant in 1993 that best personified the new era of economic prosperity for Tuscaloosa.
Geography and climate
According to the U.S. Census Bureau, Tuscaloosa has a total area of 66.7 square miles. 56.2 mi² of it is land and 10.5 mi² of it (15.7%) is water. Most of water within the city limits is in Lake Tuscaloosa, which is entirely in the city limits, and the Black Warrior River.
Tuscaloosa lies approximately 60 miles southwest of Birmingham, at the fall line of the Black Warrior River on the boundary between the Appalachian Highland and the Gulf Coastal Plain approximately 120 miles upriver from its confluence with the Tombigbee River in Demopolis. Consequently, the geography of the area around Tuscaloosa is quite diverse, being hilly and forested to the northeast and low-lying and marshy to the southwest.
The area experiences a typical Southern subtropical climate with four distinct seasons. The Gulf of Mexico heavily influences the climate by supplying the region with warm, moist air. During the fall, winter and spring seasons, the interaction of this warm, moist air with cooler, drier air from the North along fronts create precipitation.
Notable exceptions occur during hurricane season where storms may move from due south to due north or even from east to west during land-falling hurricanes. The interaction between low- and high-pressure air masses is most pronounced during the severe weather seasons in the spring and fall. During the summer, the jet streams flows well to the north of the southeastern U.S., and most precipitation is consequently convectional, that is, caused by the warm surface heating the air above.
Winter lasts from mid-December to late-February; temperatures range from the mid-20s to the mid-50s. On average, the low temperature falls at freezing or below about 50 days a year. While rain is abundant (an average 5.09 in. per month from Dec.-Feb.), measurable snowfall is rare; the average annual snowfall is about 0.6 inches. Spring usually lasts from late-February to mid-May; temperatures range from the mid-50s to the low-80s and monthly rainfall amounts average about 5.05 in. (128 mm) per month. Summers last from mid-May to mid-September; temperatures range from the upper-60s to the mid-90s, with temperatures above 100°F not uncommon, and average rainfall dip slightly to 3.97 in. per month. Autumn, which spans from mid-September to early-December, tends to be similar to Spring terms of temperature and precipitation.
As of the census of 2000 there were 77,906 people, 31,381 households, and 16,945 families residing in the city. The population density was 1,385.2/mi². There were 34,857 housing units at an average density of 619.8/mi². The racial makeup of the city was 54% White and 43% Black or African American. 1.40% of the population were Hispanic or Latino of any race.
There were 31,381 households out of which 23.9% had children under the age of 18 living with them, 35.0% were married couples living together, 15.7% had a female householder with no husband present, and 46.0% were non-families. 35.2% of all households were made up of individuals and 9.3% had someone living alone who was 65 years of age or older. The average household size was 2.22 and the average family size was 2.93.
In the city the population was spread out with 19.8% under the age of 18, 24.5% from 18 to 24, 25.4% from 25 to 44, 18.5% from 45 to 64, and 11.8% who were 65 years of age or older. The median age was 28 years. For every 100 females there were 90.8 males. For every 100 females age 18 and over, there were 87.9 males.
The median income for a household in the city was $27,731, and the median income for a family was $41,753. Males had a median income of $31,614 versus $24,507 for females. The per capita income for the city was $19,129. About 14.2% of families and 23.6% of the population were below the poverty line, including 25.3% of those under age 18 and 13.4% of those age 65 or over.
Government and Politics
Tuscaloosa has a strong-mayor variant, mayor-council form of government, led by a mayor and a seven-member city council. The mayor is elected by the city at-large and serves four-year terms. Council members are elected to single-member districts every four years as well. Neither the mayor nor the members of the city council is term-limited. All elected offices are nonpartisan.
The mayor administers the day-to-day operations of the city, including overseeing the various city departments, over whom he has hiring and firing power. The mayor also acts as ambassador of the city. The mayor sits in city council meetings and has a tie-breaking vote. The current Mayor of Tuscaloosa is Walter Maddox, who was elected to office is September 2005. Prior to Maddox, Alvin A. DuPont had served as mayor for 24 years.
The city council is a legislative body that considers policy and passes law. The council also passes the budget for mayoral approval. Any resolution passed by the council is binding law. The majority of work in the council is done by committee, a usually consisting of a chairman, two other council members, and relevant non-voting city employees.
|3||Cynthia Lee Almond||2005|
|7||William Tinker, III||2005|
Tuscaloosa, as the largest county seat in western Alabama, serves a hub of state and federal government agencies. In addition to the customary offices associated with the county courthouse, namely two District Court Judges, six Circuit Court Judges, the District Attorney and the Public Defender, several Alabama state government agencies have regional offices in Tuscaloosa, such as the Alabama Department of Transportation and the Alabama State Troopers. Also, several federal agencies operate bureaus out of the Federal Courthouse in Tuscaloosa.
Tuscaloosa is located partially in both the 6th and 7th Congressional Districts, which are represented by Spencer Bachus and Artur Davis respectively. On the state level, the city is split among the 5th, 21st, and 24th Senate districts and 62nd, 63rd, and 70th House districts in the Alabama State Legislature.
Despite its image as a college town, Tuscaloosa boasts a diversified economy based on all sectors of manufacturing and service. 25% of the labor force in the Tuscaloosa Metropolitan Statistical area is employed by the federal, state, and local government agencies. 16.7% is employed in manufacturing; 16.4% in retail trade and transportation; 11.6% in finance, information, and private enterprise; 10.3% in mining and construction; and 9.2% in hospitality. Education and healthcare account for only 7.2% of the area workforce with the remainder employed in other services.
The city's industrial base includes Elk Corporation of Alabama, Nucor Steel Tuscaloosa, BF Goodrich Tire Manufacturing, JVC America, Phifer Incorporated, Gulf States Paper Corporation, and the Mercedes-Benz U.S. International, Inc., assembly plant.
Health-care and education serve as the cornerstone of Tuscaloosa's service sector, which includes the University of Alabama, DCH Regional Medical Center, Bryce State Mental Hospital, the William D. Partlow Developmental Center, and the Tuscaloosa VA Medical Center.
The University of Alabama is the dominant institution of higher learning. Enrolling approximately 24,000 students, UA has been a part of Tuscaloosa's identity since it opened its doors in 1831. Stillman College, which opened in 1875, is a historically Black liberal arts college which enrolls approximately 1,200 students. Additionally, Shelton State Community College, one of the largest in Alabama, is located in the city. The school enrolls 8,000 students from all backgrounds and income levels.
The Tuscaloosa City School System serves the city. It is overseen by the Board of Education, which is composed of eight members elected by district and a chairman is elected by a citywide vote. Operating with a $100 million budget, the system enrolls approximately 10,300 students. The system consists of 19 schools: 11 elementary schools, 3 middle schools, 3 high schools (Paul Bryant High School, Central High School, and Northridge High School), and 2 specialty schools (the Tuscaloosa Center for Technology and Oak Hill School for special needs students). In 2002, the system spent $6,313 per pupil, the 19th highest amount of the 120 school systems in the state.
Tuscaloosa is home to a variety of cultural sites and events reflective of its historical and modern role in Alabama and the Southeast in general. Many of these cultural events are sponsored by the University of Alabama. Numerous performing arts groups and facilities, historical sites, and museums dedicated to subjects as varying as American art and collegiate football dot the city. During football season the area known as "The Strip" pulsates with students, alumni, locals and visitors.
The Tuscaloosa Public Library is a city/county agency with nearly 200,000 items on catalog. 46,857 registered patrons use the library on a regular basis — roughly 28 % of the population of the county. There are currently with three branches: the Main Branch on Jack Warner Parkway, the Weaver-Bolden Branch, and the Brown Branch in Taylorville.
Most of the museums in Tuscaloosa are found downtown or on the campus of the University. Downtown is the home of Children’s Hands-On Museum of Tuscaloosa and the Murphy African-American Museum. The Alabama Museum of Natural History and the Paul Bryant Museum are located on the University campus. The Westervelt-Warner Museum of American Art is located in northern Tuscaloosa at Jack Warner's NorthRiver Yacht Club. Moundville Archaeological Park and the Jones Archaeological Museum are located 15 miles south of Tuscaloosa in Moundville.
The University Alabama also currently fields championship–caliber teams in football, men's baseball, men's and women's basketball, women's gymnastics, and women's softball. These teams play in athletics facilities on the University campus, including Bryant-Denny Stadium, Coleman Coliseum, Sewell-Thomas Baseball Stadium, Alabama Softball Complex, and the Ol' Colony Golf Complex.
Stillman College fields teams in football, basketball, and other sports. In the past decade, Stillman has gone through a renaissance of renovations, including a new football stadium.
Shelton State fields men's and women's basketball, baseball, and softball teams, each with on-campus facilities.
Tuscaloosa is part of the Birmingham-Tuscaloosa-Anniston television market, which is the 40th largest in the nation. All major networks have a presence in the market. WBMA-LP is the ABC affiliate, WIAT-TV is the CBS affiliate, WBRC 6 is the Fox affiliate, WVTM-TV is the NBC affiliate, WBIQ 10 is the PBS affiliate, WTTO is the CW affiliate, and WABM is the MyNetworkTV affiliate. Additionally, WVUA-CA, an independent station, is operated by the University of Alabama.
Health and medicine
DCH Regional Medical Center is the main medical facility in Tuscaloosa. Other major medical centers in Tuscaloosa include the 702-bed VA Medical Center and the 422-bed Bryce State Mental Hospital.
The city lies at the intersection of U.S. Highway 11, U.S. Highway 43, and U.S. Highway 82, Alabama State Route 69, Alabama State Route 215, and Alabama State Route 216) and the duplexed (conjoined) I-20 and I-59. Interstate 359 spurs off from I-20/I-59 and heads northward, ending just shy of the Black Warrior River in downtown Tuscaloosa.
Tuscaloosa is served by the Tuscaloosa Transit Authority which operates the Tuscaloosa Trolley System.
The Tuscaloosa Regional Airport, is located on the north side of the Black Warrior River west of downtown Northport.
Barge traffic routinely transports goods along the Black Warrior River from Birmingham and Tuscaloosa to the Alabama State Docks at Mobile, on the coast of the Gulf of Mexico. Via the Tennessee-Tombigbee Waterway, the city is connected to the Ohio River valley.
"Tuscaloosa, Alabama." Wikipedia, The Free Encyclopedia. 26 April 2007, 02:03 UTC . Accessed 30 April 2007. | <urn:uuid:c2ed6c85-f348-40de-9aa5-65969c027430> | CC-MAIN-2013-20 | http://www.bhamwiki.com/w/Tuscaloosa | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.962809 | 3,379 | 3.234375 | 3 |
... Structure and function
2.1 Rate of enzyme mediated
... reactions in one direction.
Rate of enzyme mediated
Main article: Rate of enzyme mediated
Enzymes can increase reaction rate ...
... kinetics describe the rate of enzyme mediated
reactions for many enzymes. It is named for ... To determine the maximum rate of an enzyme mediated
reaction, the substrate concentration ( [S] ) ... , the factors that effect the rate of enzyme mediated
reactions (ie. pH, temperature, etc) are at ...
... Active transport is the mediated
transport of biochemicals , and other atomic / molecular substances, across membranes . Unlike passive transport , this process requires ...
... that action potentials do propagate back into the dendrites once initiated in the axon in most neurons. This backpropagating action potential is mediated
by the activation of voltage-gated ion channels and can interact with synaptic input to alter the synaptic activity.
The structure and branching of ...
... ) is a process of passive transport ( diffusion ) via which molecules diffuse across membranes , with the help of transport proteins ( mediated
Small uncharged molecules can easily diffuse across cell membranes. However, due to the hydrophobic nature of the lipids that make ...
... thousands of other cells.
Types of signalling
Neurons communicate with one another across synapses. This communication is usually chemically mediated
by rapid secretion of neurotransmitter molecules . Pre-synaptic neurons (i.e.the neurons which release the neurotransmitter) may produce in the ... | <urn:uuid:163c0111-7620-496e-a3ea-559db37be0fe> | CC-MAIN-2013-20 | http://www.bio-medicine.org/q-more/biology-definition/mediated/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.865367 | 322 | 3.25 | 3 |
(Redirected from George C. Marshall
George Catlett Marshall (December 31, 1880–October 16, 1959), was an American military leader and statesman best remembered for his leadership in the Allied victory in World War II and for his work establishing the post-war reconstruction effort for Europe, which became known as the Marshall Plan.
Marshall was born into a middle-class family in Uniontown, Pennsylvania. While attending Virginia Military Institute he was initiated into the now dormant Beta('01) chapter of Kappa Alpha Order .
In 1948, he was awarded the Distiguished Achievement Award for his role and contributions during and after WWII.
Marshall was instrumental in getting the U.S. Army and Army Air Corps reorganized and ready for war. Marshall wrote the document that would become the central strategy for all Allied operations in Europe, selected Dwight Eisenhower as Supreme Commander in Europe, and designed Operation Overlord, the invasion of Normandy. Throughout the remainder of the World War II, Marshall coordinated all Allied operations in Europe and the Pacific. He was characterized as the organizer of Allied victory by Winston Churchill. Time Magazine named Marshall Man of the Year in 1944.
After WW II he was sent to China to negotiate a truce and build a coalition government between the Nationalists and Communists fighting the Chinese Civil War. His efforts failed and he was recalled in January 1947.
Marshall 'retired' in November 1945 and was named Secretary of State in 1947. As such, on June 5, 1947 at a speech at Harvard University, he outlined the U.S. government's preparedness to contribute to European recovery. The European Recovery Plan, which became known as the Marshall Plan, helped Europe quickly rebuild and earned Marshall the honor of being named TIME's Man of the Year in 1948 and awarded the Nobel Peace Prize in 1953. In 1949 he resigned from the State Department and was named president of the American National Red Cross. He was named Secretary of Defense in 1950, but retired from politics for good in 1951 after Senator Joseph McCarthy implied he was a traitor and denounced him for making decisions that "aided the Communist drive for world domination". Marshall died on October 16, 1959.
He married Elizabeth Carter Cole of Lexington, Virginia in 1902. She died in 1927. 1930 he married Katherine Boyce Tupper Brown.
After graduating from the Virginia Military Institute in 1901, he entered the U.S. Army, where he was to have a long and distinguished career. Until World War I, he was posted to various positions in the US and the Philippines, and was trained in modern warfare. During the War he had roles as a planner of both training and operations. Between WWI and WWII, he was a key planner and writer in the War Department, spent three years in China, and taught at the Army War College.
He went to France in the summer of 1917 as the director of training and planning for the 1st Infantry Division. In mid-1918, he was promoted to American Expeditionary Forces headquarters, where he was a key planner of American operations. He was instrumental in the design and coordination of the Meuse-Argonne offensive, which forced Germany to sue for peace.
In 1919 he became an aide-de-camp to General John J. Pershing. Between 1920 and 1924, while Pershing was Army Chief of Staff, Marshall worked in a number of positions in the US Army, focusing on training and teaching modern, mechanised warfare.
He was promoted to Brigadier General in October 1936. In 1939 he was selected by Franklin D. Roosevelt to be Army Chief of Staff, a position he held until 1945.
Dates of rank
- Second Lieutenant, United States Army: February 2, 1902
- First Lieutenant, United States Army: March 7, 1907
- Captain, United States Army: July 1, 1916
- Major, National Army: August 5, 1917
- Lieutenant Colonel, National Army: January 5, 1918
- Colonel, National Army: August 27, 1918
- Major, Regular Army (reverted to permanent rank): July 1, 1920
- Lieutenant Colonel, Regular Army: August 21, 1923
- Colonel, Regular Army: September 1, 1933
- Brigadier General, Regular Army: October 1, 1936
- Major General, Regular Army: September 1, 1939
- General, Regular Army, for service as Army Chief of Staff: September 1, 1939
- General of the Army, Army of the United States: December 16, 1944
- General of the Army rank made permanent in the Regular Army: April 11, 1946
Notes about components:
- United States Army: Regular U.S. Armed Forces prior to World War I
- National Army: Combined conscript and regular United States forces during World War I
- Regular Army: Regular volunteer forces after 1930. Considered "career" professionals
- Army of the United States: Combined draft and regular forces of World War II.
Awards and decorations
"We are determined that before the sun sets on this terrible struggle, Our Flag will be recognized throughout the World as a symbol of Freedom on the one hand and of overwhelming force on the other." -- George Marshall (May 29, 1942, Larry I. Bland and Sharon Ritenour Stevens, ed. The Papers of George Catlett Marshall, Vol 3 pp. 212-14.)
"I couldn't sleep nights, George, if you were out of Washington." -President Roosevelt, reported by Henry Stimson, 1943
“...what a joy it must be to [Marshall] to see how the armies he called into being by his own genius have won immortal renown. He is the true 'organizer of victory.’” Winston Churchill, 1945
"A man devoted to the daily study of war on several continents with all the ardour of a certified public accountant." - Alistair Cooke, 1959
"Hitherto I had thought of Marshall as a rugged soldier and a magnificent organizer and builder of armies - the American Carnot. But now I saw that he was a statesman with a penetrating and commanding view of the whole scene." - Winston Churchill
|- style="text-align: center;"
| width="30%" |Preceded by:
Louis A. Johnson
| width="40%" style="text-align: center;" |United States Secretary of Defense
| width="30%" |Succeeded by:
Robert A. Lovett | <urn:uuid:c087f88c-2132-484b-93d8-037376115615> | CC-MAIN-2013-20 | http://www.biologydaily.com/biology/George_C._Marshall | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.969997 | 1,326 | 3 | 3 |
Brookhaven National Laboratory was established in 1947 on the eastern end of Long Island at the former site of the U.S. Army’s Camp Upton. Originally built out of a post-World War II desire to explore the peaceful applications of atomic energy, the Laboratory now has a broader mission: to perform basic and applied research at the frontiers of science, including nuclear and high-energy physics; physics and chemistry of materials; nanoscience; energy and environmental research; national security and nonproliferation; neurosciences and medical imaging; structural biology; and computational sciences. Over its history, Brookhaven Lab has housed three research reactors, numerous one-of-a-kind particle accelerators, and other cutting-edge research facilities responsible for discoveries leading to many advances for science and society as well as seven Nobel Prizes.
Brookhaven was originally conceived, in part, to establish a national laboratory in the Northeastern United States to design, construct and operate large scientific machines that individual institutions could not afford to develop on their own. Throughout the years, Brookhaven’s scientists and visiting researchers have used these unique facilities to make discoveries in biology, physics, chemistry, geophysics, medicine, and materials science.
Since Brookhaven opened its doors, countless innovations and inventions by staff and visiting scientists have contributed to research in many fields. Discoveries made here have shaped our understanding of the atom and the universe, advanced medical imaging techniques, and created new technology and tools for studying microbiology, climate and pollutants, energy storage and more. | <urn:uuid:ed9dbb98-4768-4a07-84b7-372f728fdb7b> | CC-MAIN-2013-20 | http://www.bnl.gov/about/history/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.950635 | 314 | 2.78125 | 3 |
Fun Classroom Activities
The 20 enjoyable, interactive classroom activities that are included will help your students understand the text in amusing ways. Fun Classroom Activities include group projects, games, critical thinking activities, brainstorming sessions, writing poems, drawing or sketching, and more that will allow your students to interact with each other, be creative, and ultimately grasp key concepts from the text by "doing" rather than simply studying.
1. A Year from Now
Where will Bone be and how will she be feeling a year from now? Write a one page description of Bone's life a year after the end of the book from Bone's perspective.
2. The Monster Within
When Bone's anger is described, it seems to grow and even take form. Take one of the descriptions for Bone's anger and rage and draw it.
3. Bone's Poetry
Write a poem as if you are Bone. The poem can be...
This section contains 555 words|
(approx. 2 pages at 300 words per page) | <urn:uuid:7da8e5fb-c5fb-415f-93c4-97d18531f703> | CC-MAIN-2013-20 | http://www.bookrags.com/lessonplan/bastardoutcarolina/funactivities.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.941543 | 210 | 4.3125 | 4 |
Description: Over the last thirty years, scholars have begun to explore the implications of an ancient Jewish and Christian tradition that referred to the “Minor Prophets” as “the Twelve,” “the Twelve Prophets,” or the “Book of the Twelve.” Scholarly work on the Book of the Twelve in the last quarter century has focused on two issues in particular:
1) Developing models regarding how the Book of the Twelve came to be recorded on a single scroll, and
2) Isolating unifying elements that transcend the individual writings and take on new significance when the Book of the Twelve becomes a single collection rather than twelve distinct writings.
Dr. Nogalski’s comprehensive and accessible commentary offers an overview of the ancient traditions concerning the Book of the Twelve that lay the foundation for understanding these recent developments.
Subjects: Bible, Hebrew Bible / Old Testament, Prophetic Literature, Book of the Twelve, Literature, Micah, Nahum, Habakkuk, Zephaniah, Haggai, Zechariah, Malachi
Review by Lena-Sofia Tiemeyer
Read the Review
Citation: Lena-Sofia Tiemeyer, review of James D. Nogalski, The Book of the Twelve, Review of Biblical Literature [http://www.bookreviews.org] (2012).
Adobe Acrobat Reader
All RBL reviews are published in PDF format. To view these reviews, you must have downloaded and installed the FREE version of Adobe Acrobat Reader. If you do not have the Reader or you have an older version of the Reader, you can download the most recent version now. | <urn:uuid:965f2749-d49d-4f5f-9274-82c404b22d4d> | CC-MAIN-2013-20 | http://www.bookreviews.org/bookdetail.asp?TitleId=8462 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.874639 | 355 | 2.84375 | 3 |
Simply begin typing or use the editing tools above to add to this article.
Once you are finished and click submit, your modifications will be sent to our editors for review.
female Finn Dorset sheep that lived from 1996 to 2003, the first successfully cloned mammal, produced by Scottish geneticist Ian Wilmut and colleagues of the Roslin Institute, near Edinburgh. The announcement in February 1997 of the world’s first clone of an adult animal was a milestone in science, dispelling decades of presumption that adult mammals could not be cloned and igniting a debate...
...senior scientific officer at the Animal Breeding Research Organisation (ABRO; renamed Edinburgh Research Station of the Institute of Animal Physiology and Genetics Research in 1985 and finally Roslin Institute in 1993), a government-supported research facility located in Roslin, Scot., just south of Edinburgh. At the ABRO facility, Wilmut studied embryo development and became interested in...
What made you want to look up "Roslin Institute"? Please share what surprised you most... | <urn:uuid:bb811c4a-cf9a-4fdb-8fff-16dccb2e8d8d> | CC-MAIN-2013-20 | http://www.britannica.com/EBchecked/topic/1519387/Roslin-Institute | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.932211 | 211 | 3.03125 | 3 |
RR Lyrae starArticle Free Pass
RR Lyrae star, any of a group of old giant stars of the class called pulsating variables (see variable star) that pulsate with periods of about 0.2–1 day. They belong to the broad Population II class of stars (see Populations I and II) and are found mainly in the thick disk and halo of the Milky Way Galaxy and often in globular clusters. There are several subclasses—designated RRa, RRb, RRc, and RRd—based on the manner in which the light varies with time. The intrinsic luminosities of RR Lyrae stars are relatively well-determined, which makes them useful as distance indicators.
What made you want to look up "RR Lyrae star"? Please share what surprised you most... | <urn:uuid:ca821097-b750-4e33-85da-b6754420e0dc> | CC-MAIN-2013-20 | http://www.britannica.com/EBchecked/topic/511720/RR-Lyrae-star | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.947727 | 171 | 2.921875 | 3 |
The history of the British Isles and its inhabitants, both human and canine, has long been entwined. Breed reveals the enduring and affectionate relationship between the British people and their dogs and explores the very beginnings of pedigree dog breeding in Britain.
This is a "self delivery" pack which has been designed specifically for National Science and Engineering Week 2013. The science behind fingeprints is well known! What is not so well known is the link between fingerprints and footprints. Right Angle Events have launched a new education pack called ‘Toes for Turf’ comprising at least 4 hours of fun teaching material linked to Key Stage 1-4 Mathematics.
We have designed a fantastic scheme especially for National Science & Engineering Week called "Toes For Turf". The science behind fingerprints is well known. What is not so well known is the science behind footprints or "feet prints". This activity enables students to take, classify and "lift" both fingerprints and foot prints. As the research on footprints is meagre, this scheme will allow students to make some discoveries about the correlation or otherwise between fingerprints and feet prints.
We will be running a science club for children from the junior school for 8 weeks before science week. Children will be working on projects designed by local scientists and making posters to show what they've done. A competition will be held and prizes will be given for the best posters and projects. During science week we'll have a science day for the whole school. Local scientists will come to the school and we'll have science themed activities all day.
Imagine you are part of the team planning and designing the first manned mission to Mars. Your job is to investigate just one problem of the mission, and come up with an idea that might solve it. You’re asked to create a poster, no bigger than A1-sized, to explain the problem and your idea. The idea can be anything you like, but it must be based on real-science. The competition is for Years 7, 8, or 9. We can accept both individual and team entries. All Posters must be received by us by 4pm 12th March 2013. You can hand your posters in through participating schools and STEM clubs.
Primary School competition - teams of four to prepare a 5 minute demo and supporting display on the theme of Inventions and Discoveries. Winning team from each school to compete at Chipping Campden School Primary Science Conference on March 18th. An egg race type activity will also form part of the competition. A demo lecture will finish the proceedings. | <urn:uuid:c09c3e42-af4a-4247-a842-b66c9f9e375c> | CC-MAIN-2013-20 | http://www.britishscienceassociation.org/national-science-engineering-week/event-and-national-activities/day/2013-02-02?circle_op=%3C&circle[value]=&circle[location]=&page=0%2C14&qt-popular_pages_in_this_section=1 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.965261 | 520 | 3.28125 | 3 |
Transferable knowledge and a range of intellectual abilities drawn from different modes of inquiry across disciplines are essential components of any liberal education. These courses help students develop important academic capacities for use during their undergraduate career and in the rapidly-changing world they will enter after college.
(one writing-intensive W-1 course in the fall of the first year)
Students will develop writing, reading, speaking, listening, and information literacy skills necessary for collegiate-level academic work.
Students will develop capacities for independent academic work and become self-regulated learners.
(one course from the list of designated courses)
Students will develop a unified understanding of scientific theory and practice in modern natural science.
Students will demonstrate an understanding of the development of science as an intellectual pursuit and of the ways in which scientific ideas are formulated, modified, and come to be accepted.
Students will demonstrate skill in the application of scientific techniques and methods, including the collection, analysis, and interpretation of data, and communication of results.
(one course from the list of designated courses; not required for Class of 2014)
Students will study language as a complex multifunctional phenomenon - as a system for communicating thought and information and as an essential element of human thought processes, perceptions, and self-expression - that allows students to understand different peoples and their communities.
Students will examine the world, their own culture, and their own language through the lens of a foreign language and culture.
Integrated Perspectives Course
(one team-taught interdisciplinary course taken during the sophomore year from the list of designated courses; not required for Class of 2014)
Students will recognize, construct, and evaluate connections among different intellectual methods, ways of learning, and bodies of knowledge. | <urn:uuid:ad6de8ff-b389-41d5-a5b6-03d0efd5448c> | CC-MAIN-2013-20 | http://www.bucknell.edu/x56898.xml | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.931771 | 353 | 3.171875 | 3 |
What is bone cancer?
Bone is the framework that supports the body. Most bones are hollow. Bone marrow is the soft tissue inside hollow bones. The main substance of bone is made up of a network of fibrous tissue onto which calcium salts are laid down. This makes the bone very hard and strong. At each end of the bone is a softer bone-like tissue called cartilage that acts as a cushion between bones. The outside of the bone is covered with a layer of fibrous tissue.
The bone itself contains 2 kinds of cells. Osteoblasts are cells that form the bone. Osteoclasts are cells that dissolve bone. Although we think that bone does not change, the truth is that it is very active. New bone is always forming and old bone dissolving.
The marrow of some bones is only fatty tissue. In other bones the marrow is a mixture of fat cells and the cells that make blood cells. These blood-forming cells make red blood cells, white blood cells, and platelets.
Types of bone tumors
Most of the time when someone is told they have cancer in their bones, the doctor is talking about a cancer that started somewhere else and then spread to the bone. This is called metastatic cancer (not bone cancer). This can happen to people with many different types of advanced cancer, such as breast cancer, prostate cancer, lung cancer, and many others. Under a microscope, theses cancer cells in the bone look like the cancer cells that they came from. If someone has lung cancer that has spread to the bone, the cells there will look and act like lung cancer cells and they will be treated the same way.
To learn more about cancer that has spread to bone, please see the American Cancer Society document Bone Metastasis, as well as the document on the place where the cancer started (Breast Cancer, Lung Cancer (Non-Small Cell), Prostate Cancer, etc.).
Other kinds of cancers that are sometimes called “bone cancers” start in the bone marrow – in the blood-forming cells – not the bone itself. These are not true bone cancers. The most common of these is multiple myeloma. Certain lymphomas (which more often start in lymph nodes) and all leukemias start in bone marrow. To learn more about these cancers, refer to the document for each.
A primary bone tumor starts in the bone itself. True (or primary) bone cancers are called sarcomas. A sarcoma is a cancer that starts in bone, muscle, tendons, ligaments, fat tissue, or some other tissues in the body.
There are different types of bone tumors. Their names are based on the bone or tissue that is involved and the kind of cells that make up the tumor. Some are cancer (malignant). Others are not cancer (benign). Most bone cancers are called sarcomas.
Benign bone tumors do not spread to other tissues and organs. They can usually be cured by surgery. The information here does not cover benign bone tumors.
Bone tumors that are cancer (malignant)
Osteosarcoma: Osteosarcoma (also called osteogenic sarcoma) is the most common true bone cancer. It is most common in young people between the ages of 10 and 30. But about 10% of cases are people in their 60s and 70s. This cancer is rare during middle age. More males than females get this cancer. These tumors start most often in bones of the arms, legs, or pelvis. This type of bone cancer is not discussed in this document, but is covered in detail in our document, Osteosarcoma.
Chondrosarcoma: This is cancer of the cartilage cells. Cartilage is a softer form of bone-like tissue. Chondrosarcoma is the second most common true bone cancer. It is rare in people younger than 20. After age 20, the risk of this cancer keeps on rising until about age 75. Women get this cancer as often as men.
Chondrosarcomas can develop in any place where there is cartilage. It most often starts in cartilage of the pelvis, leg, or arm, but it can start in many other places, too.
Chondrosarcomas are given a grade, which measures how fast they grow. The lower the grade, the slower the cancer grows. When cancer grows slowly, the chance that it will spread is lower and the outlook is better. There are also some special types of chondrosarcoma that respond differently to treatment and have a different outlook for the patient. These special types look different when seen under a microscope.
Ewing tumor: This cancer is also called Ewing sarcoma. It is named after Dr. James Ewing, the doctor who first described it in 1921. It is the third most common bone cancer. Most Ewing tumors start in bones, but they can start in other tissues and organs. This cancer is most common in children and teenagers. It is rare in adults older than 30. This type of bone cancer is not discussed in this document, but is covered in detail in our document, Ewing Family of Tumors.
Malignant fibrous histiocytoma (MFH): This cancer more often starts in the soft tissues around bones (such as ligaments, tendons, fat, and muscle) rather than in the bone itself. If it starts in the bones, it most often affects the legs or arms. It usually occurs in older and middle-aged adults. MFH mostly tends to grow into nearby tissues, but it can spread to distant sites, like the lungs. (Another name for this cancer is pleomorphic undifferentiated sarcoma.)
Fibrosarcoma: This is another type of cancer that starts more often in “soft tissues” than it does in the bones. Fibrosarcoma usually occurs in older and middle-aged adults. Leg, arm, and jaw bones are most often affected.
Giant cell tumor of bone: This type of bone tumor has both benign (not cancer) and malignant forms. The benign form is most common. These don’t often spread to distant sites, but after surgery they tend to come back where they started. Each time they come back after surgery they are more likely to spread to other parts of the body. These tumors often affect the arm or leg bones of young and middle-aged adults.
Chordoma: This tumor usually occurs in the base of the skull and bones of the spine. It is found most often in adults older than 30. It is about twice as common in men than in women. Chordomas tend to grow slowly and usually do not spread to other parts of the body. But they often come back in the same place if they are not removed completely. When they do spread, they tend to go to the lymph nodes, lungs, and liver.
Last Medical Review: 12/05/2012
Last Revised: 01/24/2013 | <urn:uuid:cc6f91ff-3151-4cd9-8163-a7274ef9de2f> | CC-MAIN-2013-20 | http://www.cancer.org/cancer/bonecancer/overviewguide/bone-cancer-overview-what-is-bone-cancer | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.959633 | 1,460 | 3.90625 | 4 |
Biomass plants generate electricity by burning what otherwise would be waste: brushy undergrowth that's been cleared from forests.
The U.S. Forest Service estimates that on California national forest lands alone, there are easily 500,000 acres per year that should be thinned to reduce the risk of catastrophic wildfire.
But to Tom Christoff of the Placer County Air Pollution Control District it's not only about reducing forest fires and producing electricity. He says by burning this waste in controlled emission plant, instead of in smoky piles in the forest:
CHRISTOFF: "The benefits are huge, on the order of 95 percent reduction on particulate matter, 60 to 70 percent reduction on nitrous oxides, and considerable percentrage on carbon monoxide and volatile organic compounds."
Christoff says independent studies showed this would lead to demonstrable health benefits. That's one of the many reasons Placer County is planning to build a 2 megawatt biomass plant on county-owned land just outside Truckee.
Transportation cost is a complicating factor. It's much cheaper to burn the biomass in a pile in the forest than to truck it to a facility, says Kerri Timmer, who works for the state's Sierra Nevada Conservancy.
TIMMER: "And there's at this point no guarantee for what price will be paid for the power that's generated using the material. So it's hard to get all of these commitments lined up to a point where an investor would feel comfortable in putting a lot of money into this up front."
But recent legislation should help. A bill passed this year requires California's three biggest energy producers to purchase 50 megawatts of energy generated from forest biomass power plants.
That's about enough electricity to power 50,000 homes. | <urn:uuid:2314ad22-4574-4c75-acb6-26aa63855876> | CC-MAIN-2013-20 | http://www.capradio.org/181284 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.934738 | 365 | 3.203125 | 3 |
The transportation sector is responsible for an enormous amount of pollution, from fuel extraction and processing to greenhouse gas emissions and smog. Thankfully, old and new technologies alike can help us clean up our footprint as we get from here to there. Here are three options to consider.
1. Cargo Bike
A cool trend in green transportation is the use of cargo bikes (sometimes called pedicabs), mainly in cities. The idea is that pedal power transports people or bins of cargo (see photo above) — meaning goods can be delivered and people can get around without the use of fuel. Some companies that operate locally are even delivering their goods with bike power.
You can create your own cargo bike by hooking a small cart to the back of your bicycle. You can take your recycling to the recycling center or take trips to the store or farmers market and transport your goods home without relying on a vehicle.
To learn much more about this trend, see Cargo Bikes and Pedicabs.
2. Commuter Bicycle
To make your daily commute to work — or even your weekly commute around town to run errands — there are many great bike options. Biking is a win-win: You get great exercise, enjoy fresh air, and can feel great about using a green form of transportation.
If you’ve thought about commuting by bike, but aren’t sure which bicycle is right for you, check out the tips in What the Right Bike Can Do for You.
3. Green Car
If the distance between point A and point B is too great for a bicycle or walking — and mass transit isn’t an option — a car can be a necessity. There have been many great strides made in green car technology over the past decade, and your options (check out Best Green Cars for some of them) now extend far beyond the well-known Prius hybrid. New all-electric vehicles, such as the Nissan Leaf, are getting great expert and driver reviews.
While the upfront cost of a hybrid or electric vehicle may be prohibitive, the car can pay for itself over time in fuel cost savings and maintenance cost savings (think no oil changes for an electric car!). Plus, you can take advantage of a $7,500 federal tax credit for the purchase of many green cars — and be sure to look into what state tax incentives may also be available in your area.
You may have heard some common arguments against green cars. Probably the most common is that if an electric car runs on electricity generated by a coal-fired power plant, it isn’t actually cleaner than a regular gas car. The math has been crunched on this issue, and you can find the answers in the article Why Electric Cars Are Cleaner.
There have also been some recent concerns about the safety of electric and hybrid cars; rumors on this issue were fueled by a Chevy Volt catching on fire. The green cars on the market today actually have excellent safety ratings, and you can read much more about this issue in The Truth About Electric Car Safety.
If you do drive a gas-only car, you can still make driving it as clean as possible by hypermiling (using driving techniques that help you get better gas mileage). Learn how in Save Gas with Hypermiling.
What are your favorite means of green transportation?
Photo by Metro Pedal Power
Read more: Conscious Consumer, Eco-friendly tips, Green, Technology, Transportation, bicycles, Bikes, care2 earth day, cargo bikes, cars, commuting, electric cars, green cars, green transportation, hybrid cars, hybrids, pedicabs, vehicles
Disclaimer: The views expressed above are solely those of the author and may
not reflect those of
Care2, Inc., its employees or advertisers. | <urn:uuid:6a0a6961-4806-438a-bb35-91c953bcb2ce> | CC-MAIN-2013-20 | http://www.care2.com/greenliving/smart-green-transportation-options.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.950781 | 771 | 2.90625 | 3 |
Common Career Technical Core
The Common Career Technical Core (CCTC) is a state-led initiative to establish a set of rigorous, high-quality standards for Career Technical Education (CTE) that states can adopt voluntarily. The standards have been informed by state and industry standards and developed by a diverse group of teachers, business and industry experts, administrators and researchers.
The initiative is being coordinated by the National Association of State Directors of Career Technical Education Consortium (NASDCTEc), which represents the state and territory heads of secondary, postsecondary and adult CTE across the nation. Forty-two states the District of Columbia and Palau participated in the development stage of the CCTC.
The development of the CCTC was a multi-step process that incorporated input from approximately 3,500 individuals representing K-12 education, business and industry and higher education from across the nation.
The process for developing the CCTC was informed by:
• High-quality state and industry standards;
• Input and guidance from educators, business and industry and state leaders; and
• Feedback from the public.
The CCTC includes a set of standards for each of the 16 Career Clusters™ and their corresponding Career Pathways that define what students should know and be able to do after completing instruction in a program of study. The CCTC also includes an overarching set of Career Ready Practices that apply to all programs of study. The Career Ready Practices include 12 statements that address the knowledge, skills and dispositions that are important to becoming career ready.
In June, the NASDCTEc Board of Directors voted in full support and approved the CCTC that defines common expectations for CTE organized by the National Career Clusters™ Framework.
Learn more about the CCTC or share information about the initiative with these resources:
An online database of the CCTC standards provides an opportunity to create reports specific to the needs of the user. In addition, additional resources including performance elements and sample indicators for the CCTC standards are provided as a resource tool in the exploration and understanding of the standards.
A public license has been created for the use of the CCTC standards and is available to review.
Representatives from organizations across the nation have expressed support for the CCTC. Learn who they are and share their statements with others as you work to gain support of and raise awareness about the CCTC in your state.
A summary of the process used to achieve the outcomes of the CCTC. Report highlights the steps used, the participation and recommendations for future revisions and engagements associated with the development of the CCTC.
A summary of the process, methodology and approach used to update the 2008 Knowledge and Skills Statements and prepare for transition for use by the Common Career Technical Core Working Groups in the development of the CCTC.
For additional information about the CCTC, contact email@example.com. | <urn:uuid:8cf81d29-853e-46bd-a28d-360d8ef806be> | CC-MAIN-2013-20 | http://www.careertech.org/career-technical-education/cctc/info.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.947707 | 599 | 2.625 | 3 |
Heat a room from the floor up
Under-floor radiant heating involves underlaying the floor with a hot element or tubing that transfers heat into the room via infrared radiation and convection, making forced or blowing air unnecessary.
According to the U.S. Department of Energy's Energy Savers website, radiant heating "is more efficient than baseboard heating and usually more efficient than forced-air heating because no energy is lost through ducts." It is also flexible as it can run off electricity, gas, oil, wood, solar and other sources or combinations thereof can feed radiant systems. And radiant heating is a good choice for those with severe allergies as no potentially irritating particles get blown around the room.
Several aspects of radiant heating make it more energy efficient. For starters, the uniform heat distribution over the entire surface of a floor heats the lower half of the room, enveloping inhabitants in warmth at a lower overall temperature — in some cases up to five degrees Fahrenheit cooler — than a conventional heating system. "Radiators and other forms of 'point' heating circulate heat inefficiently and hence need to run for longer periods to obtain comfort levels," reports the Residential Energy Services Network (RESNet). "They draw cold air across the floor and send warm air up to the ceiling, where it then falls, heating the room from the top down, creating drafts and circulating dust and allergens." RESNet adds that radiant systems transmit heat on average some 15 percent more efficiently than conventional radiators.
The efficiency gains can be magnified significantly with good insulation and a well-designed system. While tearing out old heating systems and/or replacing decent existing flooring might be overkill for the sake of moving to radiant heat, you can certainly consider it if you are embarking on new building projects or contemplating major renovations. According to TLC Network's Green Living Guide, there are two main types of radiant heating, electric and hydronic. In the former, heated wires installed in the floor radiate heat upward. This type of radiant heat is most commonly used to retrofit a single room — especially a bathroom or kitchen — in an older house or building. Meanwhile, hydronic radiant heating, whereby heated water is forced through tubes under the floor, is more often designed into a new structure from the get-go and is more energy efficient overall.
TLC points out that while radiant heat is definitely more efficient in smaller, snug homes with lower roofs, it might not always be the best solution in homes with bigger rooms: "In some scenarios it can be less energy efficient than forced-air heating."
Contact a reputable heating contractor to see if radiant heating is a sensible way to go. | <urn:uuid:761b4e88-c733-4d9f-80cc-9ddfb64a8ff0> | CC-MAIN-2013-20 | http://www.carolinacountry.com/index.php/country-store/item/uniform-heat-distribution-is-one-advantage-of-under-floor-radiant-heating | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.929592 | 542 | 2.734375 | 3 |
On May 15, the House Agriculture Committee passed its 2013 farm bill. The bill would cut the Supplemental Nutrition Assistance Program (SNAP, formerly known as the Food Stamp Program) by almost $21 billion over the next decade, eliminating food assistance to nearly 2 million low-income people, mostly working families with children and senior citizens.
The bill’s SNAP cuts would come on top of an across-the-board reduction in benefits that every SNAP recipient will experience starting November 1, 2013.
The Supplemental Nutrition Assistance Program’s (SNAP) primary purpose is to increase the food purchasing power of eligible low-income households in order to improve their nutrition and alleviate hunger and malnutrition. The program’s success in meeting this core goal has been well documented. Less well understood is the fact that the program has become quite effective in supporting work and that its performance in this area has improved substantially in recent years.
The Supplemental Nutrition Assistance Program (SNAP, formerly known as the Food Stamp Program) is the nation’s most important anti-hunger program. In 2012, it helped almost 47 million low-income Americans to afford a nutritionally adequate diet in a typical month.
Nearly 72 percent of SNAP participants are in families with children; more than one-quarter of participants are in households with seniors or people with disabilities.
SNAP is the nation’s most important anti-hunger program.
This chartbook highlights some of the key characteristics of the almost 47 million people using the program as well as trends and data on program administration and use.
Related: SNAP is Effective and Efficient
SNAP, the nation’s most important anti-hunger program, helps roughly 35 million low-income Americans to afford a nutritionally adequate diet. WIC — short for the Special Supplemental Nutrition Program for Women, Infants, and Children — provides nutritious foods, information on healthy eating, and health care referrals to about 8 million low-income pregnant and postpartum women, infants, and children under five. The School Lunch and School Breakfast programs provide free and reduced-price meals that meet federal nutritional standards to over 22 million school children from low-income families.
- Introduction to SNAP
The Center designs and promotes polices to make the Food Stamp Program more adequate to help recipients afford an adequate diet, more accessible to eligible families and individuals, and easier for states to administer. We also help states design their own food stamp programs for persons ineligible for the federal program. Our work on the WIC program includes ensuring that sufficient federal funds are provided to serve all eligible applicants and on helping states contain WIC costs. Our work on child nutrition programs focuses on helping states and school districts implement recent changes in how they determine a child's eligibility for free or reduced-priced school meals.
May 17, 2013
Revised May 16, 2013
Updated May 8, 2013
Revised May 1, 2013
Updated May 1, 2013
- View All By Date | <urn:uuid:bc53165f-1d0a-4c12-aaa0-5d50b436cadf> | CC-MAIN-2013-20 | http://www.cbpp.org/research/?fa=topic&id=31 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.942017 | 609 | 3.3125 | 3 |
Religion Subject Guide
guides are designed to help students begin the research process,
find reputable sources, and save time.
the Library Catalog for Books & Other Materials
To locate books
and other materials in CCSF Libraries, select the Library
Catalog from the Library's Homepage. You will notice
many ways to search, such as Title, Author, Subject, Subject Keyword,
Examples of Subject searches include:
Religion, Religion and Politics, Religion and Science, Buddhism, Islam, Islam – United States, Prayer, Aguaruna Indians -- Religion
include books, sample tests, class notes, and other items that instructors
put at the library for class use. The check out time is shorter
than regular circulating books.
To search for
a book on reserve in the Library
Catalog, select either Reserves
by Course or Reserves by Instructor.
When you have
located the materials, write down the Call Number and Title and
present this to a staff person at the Circulation Desk.
the Library Collection
the Library are shelved by call number according to the Library
of Congress classification system. Books are arranged on
the shelves by subject.
areas in the collection to find materials on religion include:
CALL NUMBER RANGE
|Religions. Mythology. Rationalism
|Islam, Bahai Faith. Theosophy, etc
Reference books provide background information and overviews on a given topic. Relevant reference books for religion include:
Man, myth, and magic: the illustrated encyclopedia of mythology, religion, and the unknown. Richard Cavendish, editor in chief. Washington, DC: American Psychological Association, 2000. BF 31 E52 2000 Vols. 1-8 Rosenberg Reference
The Oxford dictionary of world religions. John Bowker, ed. New York: Oxford University Press, 1997. BL 31 084 1997 Rosenberg Reference
Atlas of the world’s religions. Ninian Smart, ed. New York: Oxford University Press, 1999. G 1046 .E4 A8 1999 Rosenberg Reference.
Taking sides. Clashing views on controversial issues in religion. Daniel K. Judd, ed. Guilford, CT: McGraw-Hill, Dushkin, c2003. H61 .T3577 2003 Rosenberg Reference.
The encyclopedia of American religious history. Edward L. Queen. New York, NY: Facts On File, c1996. BL 2525 .Q44, 1996 Rosenberg Reference
Encyclopedia of American religion and politics . Paul A. Djupe and Laura R. Olson. New York: Facts On File, c2003. BL 2525 .D58 2003 Rosenberg Reference.
Electronic Reference Sources from the CCSF Ebooks collection
For more information about eBooks go to: http://www.ccsf.edu/library/ebooks.html
Encyclopedia of religious rites, rituals, and festivals 2004
Encyclopedia of new religious movements 2006
Encyclopedia of women and religion in North America 2006
A popular Dictionary of Buddhism 1997
Who's who in the Old Testament together with the Apocrypha 2002
The Quran : an encyclopedia 2006
for Articles in Periodical Databases
databases group together journal, magazine, and newspaper articles
by subject. They also usually provide abstracts (brief summaries)
and the full text of the articles. Do you need help identifying
the differences between scholarly
journal v. popular magazine articles?
databases are part of the private, passworded Web, so you
will need to have a current CCSF ID card with a barcode to access
those that CCSF subscribes to. All current CCSF Student ID cards should already have a barcode.
More information about obtaining a library bar code.
Infotrac is a brand name for several databases with coverage from 1980 to the present. Most relevant for religion topics is InfoTrac’s Religion & Philosophy database which covers topics in the areas of both religion and philosophy. InfoTrac’s Expanded Academic ASAP and OneFile databases also have useful materials. These databases let you limit your results to articles only from scholarly journals by checking the box "Refereed titles."
Literature Resource Center
Literature Resource Center has traditional reference works, critical information on authors and their works, and current journal articles. It is valuable for biographical information on authors of works relating to religion, and for critical information on both an individual work and an author’s body of work
CQ provides lengthy research reports written by the editorial staff of the Congressional Quarterly Co. There are many reports related to religion. Some examples are Religion in America, Evolution versus Creationism, Prayer and Healing, and Religious Persecution. There are also reports on related moral or ethical issues such as issues of reproductive ethics, teaching values, assisted suicide, designer humans, and the ethics of war.
Ethnic Newswatch is comprised of newspapers, magazines and journals of the ethnic, minority and native press in America. Search here for ethnic aspects of topics related to religion.
Below are some examples of academic/scholarly web sites on Religion.
If you use a search engine, such as Google,
remember to evaluate
the quality of the results.
Web Resources for General Reference
Virtual Religion Index
An extensive and well organized index of Web resources with useful annotations that speed the targeting and process of research. From Rutgers University.
Voice of the Shuttle – Religious Studies Page
Links to resources including general studies, specific religions (Christianity, Judaism, Islam, Buddhism, Sikkism, etc.), nonreligious views (Atheism, Agnosticism), issues of law and religion, society and religion, and religious studies courses and departments. From the University of California, Santa Barbara.
Encyclopedia of Religion and Society
“Full text online of the Encyclopedia, with table of contents, covering the spectrum of religions.” The Encyclopedia of Religion and Society is from the Hartford Institute for Religious Research, and its editorial board is comprised of a number of respected sociologists of religion.
The Internet Sacred Text Archive
“a freely available archive of electronic texts about religion, mythology, legends and folklore, and occult and esoteric topics” Particular focus is on believers’ (defined very broadly) sacred texts, including both primary and secondary materials.
Content Evaluation Guidelines
Advice from the Medical Library Association
Webpages: Techniques to Apply and Questions to Ask
A UC Berkeley - Teaching Library Internet Workshops
Analyzing Information Sources
Developed by Olin-Kroch-Uris Libraries at Cornell University.
and Citing Source
A quick and easy check list to use when determining the quality
of web documents. Prepared by Librarians at CCSF.
help you may contact the Reference Desk by phone at (415)
452-5543 or stop by the East and West reference desks at the Rosenberg
and Citing Information Sources
Electronic Reference Service to CCSF students, faculty, staff and
registered community users. Use this service when you are NOT in
a CCSF library.
and Web Research Workshops
FIfty minute workshops are given throughout the semester on effective
methods in searching for books, articles and information on the
Several useful sources for evaluating the quality of web pages, how
to prepare citations for a "Bibliography" or "Works Cited" list, and
how to avoid plagiarism.
Online Writing Lab
One of the most thorough and easy to navigate writing labs avaialble!
Research and Writing
Hosted by the Internet Public
Process @ CSU
Colorado State University developed these guides which "focus on a
range of composing processes as well as issues related to the situations
in which writers find themselves."
comments or suggestions to:
| Library Home
Copyright Library & Learning Resource Center, City College of San
Last updated September 13, 2007 | <urn:uuid:911bab38-10be-40ec-adec-be604602715f> | CC-MAIN-2013-20 | http://www.ccsf.edu/Library/guides/religion.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.813265 | 1,645 | 2.8125 | 3 |
February is National Teen Dating Violence Awareness & Prevention Month
Did you know that in a recent national survey, 1 in 10 teens reported being hit or physically hurt on purpose by a boyfriend or girlfriend at least once in the 12 months prior to the survey? And nearly half of all teens in relationships say they know friends who have been verbally abused.
Before violence starts, a teen may experience controlling behavior and demands. One partner may tell another what to wear and who to hang out with. Over time, the unhealthy behavior may become violent. That's why adults need to talk to teens now about the importance of developing healthy, respectful relationships.
Dating violence can have a negative effect on health throughout life. Victims of teen dating violence are more likely to do poorly in school, and report binge drinking, suicide attempts, physical fighting, and current sexual activity. Teens who perpetrate dating violence may also carry these patterns of violence into future relationships.
CDC's Division of Violence Prevention is leading the initiative, Dating Matters™: Strategies to Promote Healthy Teen Relationships. Dating Matters™ aims to promote respectful, nonviolent dating relationships among youth in high-risk, urban communities. The comprehensive approach will build upon current evidence-based practice and experience to reduce the burden of teen dating violence in these communities. The initiative will support communities as they implement prevention strategies in schools, with families, and in neighborhoods.
Over the next five years, Dating Matters™ will be implemented in middle schools and neighborhoods across Chicago, Illinois, Baltimore, Maryland, Ft. Lauderdale, Florida, and Oakland, California. For more information about each of these communities, view the Dating Matters™ grantee profiles.
Learn more about CDC's efforts to prevent dating violence:
Get email updates
To receive email updates about this page, enter your email address:
- Centers for Disease Control and Prevention
1600 Clifton Rd
Atlanta, GA 30333
TTY: (888) 232-6348
- Contact CDC-INFO | <urn:uuid:d27e0ac9-9661-4138-8e0c-1155b80b1d6f> | CC-MAIN-2013-20 | http://www.cdc.gov/Features/DatingViolence/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.921505 | 402 | 3.28125 | 3 |
CDC's Office on Disability and Health focuses on the prevention of secondary conditions and health promotion among persons with disabilities. Emphasis is on scientific support for surveillance of disabilities, cost-effectiveness of prevention strategies focused on secondary conditions and health promotion activities, and identifying risk and protective factors for secondary conditions. This is implemented through providing funds to states for public health activities addressing the needs of persons with disabilities. The program emphasizes secondary conditions which cross diagnostic categories, and focus on broader disability areas. This is a relatively new approach to prevention programs for CDC, which historically focused on the primary prevention of disabling conditions. The program is focusing on activities that will enhance the ability to measure performance in this new area. This performance measure reflects a first step toward building a data collection system that will enable CDC to monitor trends related to health and quality of life among people with disabilities.
Performance Goals and Measures
Performance Goal: By 2002, a national network will exist that will provide all states with better access to data on disabilities for their use in analyzing the needs of people with disabling conditions.
|FY Baseline||FY 1999 Appropriated||FY 2000 Estimate|
|0 (1997).||By 1999, the number of states who have begun using the Behavioral Risk Factor Surveillance Survey (BRFSS) disability module will be increased to 15.||By 2000, the number of states who have begun using the Behavioral Risk Factor Surveillance Survey (BRFSS) disability module will be increased to 25.|
Currently, there is not a data collection system in place that could be used to measure outcomes that focus on actual improvements in the quality of life of people with disabling conditions. As a result, the performance measure that has been selected for this program involves the nationwide implementation of a data collection system by the year 2002. We believe that, although challenging, nationwide implementation of the BRFSS' disability module by 2002 is feasible. However, this represents a change in direction for CDC's disabilities program, which previously focused on preventing primary disabilities. As part of on-going strategic planning efforts, the program has refocused its efforts on promoting health and improving quality of life among people with disabilities. 1997 is the first year that CDC has funded states to address these issues. As a result, the program is focusing on activities that will enhance the ability to measure performance in this new area. Tracking of the implementation of this data collection system will be accomplished through a requirement that all CDC state grantees report on whether they are utilizing the module. The cost of this data collection effort will be minimal.
Verification/Validation of Performance Measures: This performance measure will be verified by reviews of the reports required by cooperative agreement recipients.
Links to DHHS Strategic Plan
This objective is closely linked to DHHS Goal 5: Improve public health systems. | <urn:uuid:a529888e-a478-47b2-8761-75809ef8d263> | CC-MAIN-2013-20 | http://www.cdc.gov/program/performance/fy2000plan/2000xiidisabl.htm | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.935769 | 564 | 2.59375 | 3 |
Multistate Outbreak of Human Salmonella Chester Infections (Final Update)
Posted September 9, 2010
This outbreak appears to be over. However, Salmonella is an important cause of human illness in the United States. More information about Salmonella, and steps people can take to reduce their risk of infection, can be found on the CDC Salmonella Web Page.
Persons Infected with the Outbreak Strain of Salmonella Chester, United States, by State
Infections with the Outbreak Strain of Salmonella Chester, by Week of Illness Onset
CDC collaborated with public health officials in many states, the U.S. Department of Agriculture's Food Safety and Inspection Service (USDA/FSIS), and the U.S. Food and Drug Administration (FDA) to investigate a multistate outbreak of Salmonella serotype Chester infections. Investigators used DNA analysis of Salmonella bacteria obtained through diagnostic testing to identify cases of illness that were part of this outbreak.
As of 9:00 AM EDT on August 27, 2010, a total of 44 individuals infected with a matching strain of Salmonella Chester have been reported from 18 states since April 11, 2010. The number of ill people identified in each state with this strain is as follows: AK (1), CA (5), CO (2), GA (8), IL (1), KY (1), MA (2), MN (2), MO (1), NC (1), OK (1), OR (2), SC (2), TN (1), TX (3), UT (3), VA (4), and WA (4). Among those for whom information is available about when symptoms started, illnesses began between April 4, 2010 and June 16, 2010. Case-patients ranged in age from <1 to 88 years old, and the median age was 36 years. Fifty-four percent of patients were female. Among the 43 patients with available hospitalization information, 16 (37%) were hospitalized. No deaths were reported.
The outbreak can be visually described with a chart showing the number of people who became ill each day. This chart is called an epidemic curve or epi curve. For more details, please see the Salmonella Outbreak Investigations: Timeline for Reporting Cases.
Investigation of the Outbreak
A widely distributed contaminated food product might cause illnesses across the United States. The identity of the contaminated product often is not readily apparent. In outbreaks like this one, identification of the contaminated product requires conducting detailed standardized interviews with persons who were ill. It may also require conducting interviews with non-ill members of the public ("controls") to get information about foods recently eaten and other exposures to compare with information from the ill persons. The investigation is often supplemented by laboratory testing of suspected products.
Collaborative investigative efforts of officials in many local, state, and federal public health, agriculture, and regulatory agencies linked this outbreak to Marie Callender’s Cheesy Chicken & Rice single-serve frozen entrées. During June 14-18, 2010, CDC and public health officials in multiple states conducted an epidemiologic study by comparing foods eaten by 19 ill and 22 well persons. Analysis of this study suggested that eating a Marie Callender's frozen meal was a source of illness. Ill persons (89%) were significantly more likely than well persons (14%) to report eating a frozen meal. All ill persons (100%) who ate frozen meals reported eating a Marie Callender's frozen meal. None of the well persons who ate a frozen meal reported eating a Marie Callender's frozen meal. There was insufficient data from this study to implicate a specific frozen meal type. However, many of the ill persons reported eating a Marie Callender's Cheesy Chicken & Rice frozen entrée in the week before becoming ill. Additionally, two unopened packages of Marie Callender’s Cheesy Chicken & Rice single-serve frozen entrées collected from two patients’ homes (one collected in Minnesota on June 18, and one in Tennessee on July 19) yielded Salmonella Chester isolates with a genetic fingerprint indistinguishable from the outbreak pattern.
On June 17, 2010, ConAgra Foods announced a precautionary recall of Marie Callender's Cheesy Chicken & Rice single-serve frozen entrées after being informed by the CDC of a possible association between this product and the outbreak of Salmonella Chester infections.
On June 17, 2010, USDA's FSIS announced ConAgra's recall.
View recalled food package [PDF - 6 pages] posted by FSIS.
Clinical Features/Signs and Symptoms
Most people infected with Salmonella develop diarrhea, fever, and abdominal cramps 12–72 hours after infection. Infection is usually diagnosed by culture of a stool sample. The illness usually lasts 4 to 7 days. Although most people recover without treatment, severe infections can occur. Infants, elderly people, and those with weakened immune systems are more likely than others to develop severe illness. When severe infection occurs, Salmonella may spread from the intestines to the bloodstream and then to other body sites and can cause death unless the person is treated promptly with antibiotics.
More general information about Salmonella can be found here under Salmonella FAQs.
Advice to Consumers
- Salmonella is sometimes present in raw foods (e.g., chicken, produce, and spices) which can be used as ingredients in not-ready-to-eat frozen dinners.
- Consumers should follow the instructions on the package label of the frozen dinner. Conventional ovens are better at cooking foods thoroughly. Microwave ovens vary in strength and tend to cook foods unevenly.
- If you choose to cook the frozen dinner using a microwave, be sure to:
- Cook the food for the time specified for your microwave's wattage.
- Let the food "stand" for the stated time, so cooking can continue.
- Use a food thermometer to make sure that it is fully cooked to an internal temperature of 165 degrees Fahrenheit.
- Individuals who think they might have become ill from eating a Marie Callender's frozen dinner should consult their health care providers.
- Consumers who have Marie Callender's Cheesy Chicken & Rice single-serve frozen entrées in their freezer should discard them or return them to their retailer for a refund.
- Consumers are urged to read and follow the preparation instructions on the label of all frozen entrees. If the package says “Do Not Microwave,” consumers should follow that instruction and use a conventional oven. Consumers should use a food thermometer to make sure the entrees reach at least 165 degrees Fahrenheit.
- General Information: Salmonella
- Description of the Steps In a Foodborne Outbreak Investigation
- CDC's Role During a Multi-State Foodborne Outbreak Investigation
- Two Minnesota cases of Salmonella infection linked to national recall of frozen meals
- Cooking Safely in the Microwave Oven
CDC's Role in Food Safety
As an agency within the U.S. Department of Health and Human Services (HHS), CDC leads federal efforts to gather data on foodborne illnesses, investigate foodborne illnesses and outbreaks, and monitor the effectiveness of prevention and control efforts. CDC is not a food safety regulatory agency but works closely with the food safety regulatory agencies, in particular with HHS's U.S. Food and Drug Administration (FDA) and the Food Safety and Inspection Service within the U.S. Department of Agriculture (USDA). CDC also plays a key role in building state and local health department epidemiology, laboratory, and environmental health capacity to support foodborne disease surveillance and outbreak response. Notably, CDC data can be used to help document the effectiveness of regulatory interventions. | <urn:uuid:e80979e4-dc90-433e-87c7-2ff9f0083129> | CC-MAIN-2013-20 | http://www.cdc.gov/salmonella/chester/index.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.93729 | 1,598 | 2.65625 | 3 |
NOAA scientists agree the risks are high, but say Hansen overstates what science can really say for sure
Jim Hansen at the University of Colorado’s World Affairs Conference (Photo: Tom Yulsman)
Speaking to a packed auditorium at the University of Colorado’s World Affairs Conference on Thursday, NASA climatologist James Hansen found a friendly audience for his argument that we face a planetary emergency thanks to global warming.
Despite the fact that the temperature rise has so far been relatively modest, “we do have a crisis,” he said.
With his characteristic under-stated manner, Hansen made a compelling case. But after speaking with two NOAA scientists today, I think Hansen put himself in a familiar position: out on a scientific limb. And after sifting through my many pages of notes from two days of immersion in climate issues, I’m as convinced as ever that journalists must be exceedingly careful not to overstate what we know for sure and what is still up for scientific debate.
Crawling out on the limb, Hansen argued that global warming has already caused the levels of water in Lake Powell and Lake Mead — the two giant reservoirs on the Colorado River than insure water supplies for tens of millions of Westerners — to fall to 50 percent of capacity. The reservoirs “probably will not be full again unless we decrease CO2 in the atmosphere,” he asserted.
Hansen is arguing that simply reducing our emissions and stabilizing CO2 at about 450 parts per million, as many scientists argue is necessary, is not nearly good enough. We must reduce the concentration from today’s 387 ppm to below 35o ppm.
“We have already passed into the dangerous zone,” Hansen said. If we don’t reduce CO2 in the atmosphere, “we would be sending the planet toward an ice free state. We would have a chaotic journey to get there, but we would be creating a very different planet, and chaos for our children.” Hansen’s argument (see a paper on the subject here) is based on paleoclimate data which show that the last time atmospheric CO2 concentrations were this high, the Earth was ice free, and sea level was far higher than it is today.
“I agree with the sense of urgency,” said Peter Tans, a carbon cycle expert at the National Oceanic and Atmospheric Administration here in Boulder, in a meeting with our Ted Scripps Fellows in Environmental Journalism. “But I don’t agree with a lot of the specifics. I don’t agree with Jim Hansen’s naming of 350 ppm as a tipping point. Actually we may have already gone too far, except we just don’t know.”
A key factor, Tans said, is timing. “If it takes a million years for the ice caps to disappear, no problem. The issue is how fast? Nobody can give that answer.”
Martin Hoerling, a NOAA meteorologist who is working on ways to better determine the links between climate change and regional impacts, such as drought in the West, pointed out that the paleoclimate data Hansen bases his assertions on are coarse. They do not record year-to-year events, just big changes that took place over very long time periods. So that data give no indication just how long it takes to de-glaciate Antarctica and Greenland.
Hoerling also took issue with Hansen’s assertions about lakes Powell and Mead. While it is true that “the West has had the most radical change in temperature in the U.S.,” there is no evidence yet that this is a cause of increasing drought, he said.
Flows in the Colorado River have been averaging about 12 million acre feet each year, yet we are consuming 14 million acre feet. “Where are we getting the extra from? Well, we’re tapping into our 401K plan,” he said. That would be the two giant reservoirs, and that’s why their water levels have been declining.
“Why is there less flow in the river?” Hoerling said. “Low precipitation — not every year, but in many recent years, the snow pack has been lower.” And here’s his almost counter-intuitive point: science shows that the reduced precipitation “is due to natural climate variability . . . We see little indication that the warming trend is affecting the precipitation.”
In my conversation with Tans and Hoerling today, I saw a tension between what they believe and what they think they can demonstrate scientifically.
“I like to frame the issue differently,” Tans said. “Sure, we canot predict what the climate is going to look like in a couple of dcades. There are feedbacks in the system we don’t understand. In fact, we don’t even know all the feedbacks . . . To pick all this apart is extremely difficult — until things really happen. So I’m pessimistic.”
There is, Tans said, “a finite risk of catastrophic climate change. Maybe it is 1 in 6, or maybe 1 in 20 or 1 in 3. Yet if we had a risk like that of being hit by an asteroid, we’d know what to do. But the problem here is that we are the asteroid.”
Tans argues that whether or not we can pin down the degree of risk we are now facing, one thing is obvious: “We have a society based on ever increasing consumption and economic expectations. Three percent growth forever is considered ideal. But of course it’s a disaster.”
Hoerling says we are living like the Easter Islanders, who were faced with collapse from over consumption of resources but didn’t see it coming. Like them, he says, we are living in denial.
“I think we are in that type of risk,” Tans said. “But is that moving people? It moves me. But I was already convinced in 1972.” | <urn:uuid:f9441dcc-dc2a-4077-aac8-1b49394182e2> | CC-MAIN-2013-20 | http://www.cejournal.net/?p=1590 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.964949 | 1,273 | 2.546875 | 3 |
Sponsor a Child in Guinea
- ChildFund came to Guinea: 2005
- Population below poverty line: 49%
- News about Guinea
- Children’s Voices: Fatoumata From Guinea
- Around the Globe with ChildFund in 31 Days: Protecting Children in Guinea
- Amid Violence, Work in Guinea Continues
- A Family’s Access to Resources Means Hope Read More
Guinea is a significant source of the world’s major minerals including gold, diamonds, iron ore and bauxite but the country’s poor infrastructure and political uncertainty prohibits it from developing its economic potential from these and other resources.
Located in western Africa on the North Atlantic Ocean between Guinea-Bissau and Sierra Leone, Guinea is smaller than the state of Oregon and suffers from a lack of safe water, environmentally damaged mining regions and preventable diseases.
“We’ve brought important knowledge… to local health workers.”
Education and Early Childhood Development
Many children in Guinea are not in school, and for younger children, there is often no foundation for later learning. Our Early Childhood Development (ECD) programs include building ECD Centers and supplying them with materials and tools used to train families about child protection and healthy development.
More than 3340 children have attended school in our ECD Centers and we have educated families in more than 530 homes about how to protect their children and motivate their development.
Healthier Families and Children
Working with the Ministry of Health, we’ve brought important knowledge, including information about HIV and AIDS, to local health workers and have hired and trained 128 community volunteers to educate the community about disease prevention, proper hygiene and more. We also work to make health services affordable.
To provide access to safe water and sanitation facilities, we have provided 29 water systems.
Sponsor a child in Guinea today and make a difference in a child’s life. | <urn:uuid:a4c34d46-da00-4a99-9491-809f3c94a72e> | CC-MAIN-2013-20 | http://www.childfund.org/guinea/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.934246 | 395 | 3.1875 | 3 |
How do you get HIV?
HIV can be passed on when infected bodily fluid, such as blood or semen, is passed into an uninfected person. Semen is the liquid which is released from a man's penis during sex which carries sperm. It can be infected with HIV or AIDS when someone is HIV positive or is carrying the AIDS virus. This can happen during unprotected sex. For example when two people have sex without using a condom when one partner is already infected, or between drug users who inject and share needles.
It can't be transmitted by things like coughing, sneezing, kissing, sharing a toilet seat, swimming pools, sweat and tears. | <urn:uuid:a3e140cd-7f25-48c9-a2f0-a7d0b1954e0d> | CC-MAIN-2013-20 | http://www.childline.org.uk/Explore/SexRelationships/Pages/HIVAIDS.aspx | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.966757 | 136 | 3.125 | 3 |
Why can some people drink heavily and never become alcoholics when other people get addicted so quickly?
Contributing Factors to the Development of Alcoholism
Why some people can use and even abuse alcohol without ever developing alcoholism, and why some people seem unusually susceptible to alcoholism, remains a poorly understood phenomenon.
There is a genetic component to alcoholism, and people who grow up in alcoholic homes are far more likely to become alcoholics themselves. Children born to alcoholic parents, but raised in homes without alcohol abuse or addiction are also predisposed to alcoholism, so we do know that genetics plays an important role. But all people genetically predisposed to alcoholism do not develop dependencies, and some people with no genetic history of alcoholism end up battling the disease for years. It is now accepted that although a genetic predisposition plays an important influence in the development of the disease, that social and environmental factors are in fact the lager influences towards alcohol abuse or alcoholism.
In addition to genetic influences, the Mayo Clinic considers that there are three additional primary influences to alcohol abuse or alcoholism.
Emotional States or Emotional Stressors can Induce Alcohol Abuse and Alcoholism
People may use alcohol excessively in response to frequent or significant emotional disturbances or stresses. When alcohol is used with enough frequency as an emotional management or stress coping tool the risk of dependency or alcoholism increases greatly. There is also likely a bio physical link with stress and alcohol abuse, and stress hormones have been casually linked to increased alcohol consumption and a greater risk for alcoholism.
People who use alcohol to deal with life's problems or stresses are at a greater risk to develop alcoholism.
The Co-Presence of a Corresponding Psychiatric Condition
People suffering through psychiatric conditions like depression, bi polar disorder, borderline personality disorder or anxiety disorders are at a greatly elevated risk to develop alcohol abuse problems or alcoholism. Psychiatric patients often use alcohol or other illicit drugs to self medicate the negative symptoms of an experienced disorder. Unfortunately, while intoxication may bring some temporary relief, the long term effects of alcohol abuse almost always worsen experienced psychiatric symptoms. Alcoholic psychiatric patients are at a great risk for an accelerated progression of both diseases, and require immediate interventions and treatment.
In addition to clinical psychiatric conditions, non clinical, but still significant factors such as low self esteem can also increase the likelihood to alcohol abuse, and ultimately alcoholism. Alcohol is rarely an effective long term coping strategy.
Social Environmental Factors
As a society, largely due to billions of dollars invested in alcohol advertising campaigns, there is a perception of alcohol being associated with glamour, attractiveness and success, and these lingering subconscious perceptions may influence people to try alcohol at a young age and continue to drink more than they should throughout life.
The immediate environment can also increase the probability of alcoholism. People who socialize, or live romantically with a person who drinks to excess, whether dependent or not, are far more likely to also drink heavily, and put themselves at risk for alcohol abuse and alcoholism.
Even the neighborhood around the home seems to influence consumption patterns, and people brought up in or who reside in neighborhoods of heavy abuse are also more likely to use and abuse alcohol themselves.
Nothing about alcoholism is completely understood, and all we know is that the variables that can induce alcohol abuse and ultimately alcoholism are many, and that what may cause alcohol dependence in one, seem to have little influence over another. We all present with an individual risk profile for our susceptibility to the disease, although those people with a genetic history of alcoholism are undoubtedly at an increased risk to develop the disease.
Regardless of the factors that may induce the occurrence of the disease, the treatments are essentially the same, and alcoholics need intervention, intensive treatment, and long term aftercare therapies. Most alcoholics will never be capable of drinking in moderation, and abstinence is the only recommended philosophy of use for people with alcoholic histories.
Page last updated Sep 23, 2012 | <urn:uuid:97c75d00-1e85-4576-b5f7-0d79552f0dbf> | CC-MAIN-2013-20 | http://www.choosehelp.com/alcoholism/alcoholism-why-some-become-drunks-and-others-dont/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.949397 | 790 | 3.28125 | 3 |
Reality in everyday usage means "everything that exists". The term reality, in its widest sense, includes everything that is, whether it is observable, comprehensible, or self-contradictory by science, philosophy, or any other system of analysis. Reality in this sense may include both being and nothingness, whereas existence is often restricted to being (compare with nature).
In the strict sense of Western philosophy, there are levels or gradation to the nature and conception of reality. These levels include, from the most subjective to the most rigorous: phenomenological reality, truth, fact, and axiom.
Other philosophies, particularly those founded in eastern religions like Hinduism and Buddhism have different explications of reality. Conceptions of reality in Buddhism include: dharma, paramattha dhamma, samsara and maya (illusion in Sanskrit).
== Phenomenological reality = | <urn:uuid:82e46460-9d14-4201-8c57-57d49c0ce555> | CC-MAIN-2013-20 | http://www.chordie.com/song.php/songartist/Reality/index.html?filterbox=show&filter= | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.929595 | 183 | 3.15625 | 3 |
|Black-sided Meadow Katydid - Conocephalus nigropleurum|
Order Orthoptera - Crickets, Grasshoppers & Katydids / Family Tettigoniidae
Live adult katydids photographed at Winfield, DuPage County, Illinois. Size = 15mm
Insects | Spiders | Beetles | Butterflies | Moths | True Bugs | Flies | Bees & Wasps
Katydids are large, usually green insects with long antennae and large wings, eminently capable of flight. Most katydids are well-camouflaged in foliage and become virtually invisible amidst greenery the identical color. Family Tettigoniidae contains about 6000 species in 1070 genera.
This from Tree of Life: "Katydids are found on all continents except Antarctica and in an assortment of habitats from tropical forests (Heller 1995) and peat bogs (Vickery and Kevan 1985) to montane alpine zones 'far above the last outposts of trees'. Within these habitats, virtually all tettigoniids are associated with vegetation, particularly during inactive periods when the insects retreat into (or onto) leaves.
Order Orthoptera - Crickets, Grasshoppers & Katydids
There are more than 20,000 species in the order Orthoptera. These diverse insects are found worldwide, although their numbers are concentrated in the tropics.
North American Insects & Spiders
Explore over 7,000 close-up photos and information on over 700 species commonly found in North America. Live insects & spiders photographed in the wild.
Insects and Spiders | Orthoptera Index | Spiders | Beetles | Butterflies | Moths | <urn:uuid:997167fb-2125-4c50-b4ca-9cddd69d2dd4> | CC-MAIN-2013-20 | http://www.cirrusimage.com/orthoptera_katydid_Conocephalus.htm | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.840624 | 359 | 2.765625 | 3 |
ANM uses specific ports for its processes. Figure A-1 illustrates a typical ANM server deployment in a network. This illustration identifies the protocols and ports used by the different network devices in a typical deployment.
•Table A-1 lists the ports used for ANM client (browser) or ANM server and ANM high availability communication.
•Table A-2 lists the ports used for communication between ANM and managed devices.
Figure A-1 ANM Server Deployment
Table A-1 Ports Used by ANM in a Network Deployment1
Default port if ANM is configured for access using HTTP (using anm-installer).
Default port if ANM is configured for access using HTTPS (using default install option).
MySQL Database system (ANM HA installation opens this port to communicate with the peer ANM).
TCP (10444) and TCP (10445)
ANM License Manager (ANM HA installation opens these two ports to communicate with the peer ANM).
Port used by ANM server to communicate to Email Gateway through SMTP.
Port used by ANM server to send out trap notification to external NMS application.
1It is highly recommended that you run ANM on a stand-alone device. However, if you run ANM on a shared device, please note that ANM locally opens the following ports for internal communication: | <urn:uuid:5aaa1e56-80e5-4313-ad72-1ec87e308193> | CC-MAIN-2013-20 | http://www.cisco.com/en/US/docs/net_mgmt/application_networking_manager/2.0/user/guide/UG_ports.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.84681 | 287 | 2.65625 | 3 |
Asthma Outreach and Education
Clean Air Council is currently working in medically under-served communities of Philadelphia to educate asthma patients of all ages, parents, and health care professionals about indoor and outdoor environmental asthma triggers. Asthma is a chronic condition of the lungs that makes people more sensitive to air pollution. Asthma is caused by genetics and exposure to pollution, allergens, and toxins found in indoor and outdoor air.
The Council provides information on basic asthma health, air pollution and health, indoor air quality checklists, and the tools available for reducing pollution in your community. The Council has materials created especially for eduacting children, including an interactive asthma triggers game and coloring books. The Council also works to connect community members with free or low-cost health and asthma management services throughout the city.
In addition to offering materials, the Council can also provide your community group or health care organization with a free workshop on indoor and outdoor air pollution, how it affects health, and the many low- to no-cost strategies for reducing exposure.
Feel free to contact us should you like to schedule a workshop or have any questions about how we can meet the needs of your organization. | <urn:uuid:69711be5-8824-452f-9fdd-5a0d81dae570> | CC-MAIN-2013-20 | http://www.cleanair.org/program/environmental_health/childrens_asthma_outreach | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.948025 | 238 | 3.390625 | 3 |
Study promoter activity using the Living Colors Fluorescent Timer, a fluorescent protein that shifts color from green to red over time (1). This color change provides a way to visualize the time frame of promoter activity, indicating where in an organism the promoter is active and also when it becomes inactive. Easily detect the red and green emissions indicating promoter activity with fluorescence microscopy or flow cytometry.
Easily Characterize Promoter Activity
The Fluorescent Timer is a mutant form of the DsRed fluorescent reporter, containing two amino acid substitutions which increase its fluorescence intensity and endow it with a distinct spectral property: as the Fluorescent Timer matures, it changes color—in a matter of hours, depending on the expression system used. Shortly after its synthesis, the Fluorescent Timer begins emitting green fluorescence but as time passes, the fluorophore undergoes additional changes that shift its fluorescence to longer wavelengths. When fully matured the protein is bright red. The protein’s color shift can be used to follow the on and off phases of gene expression (e.g., during embryogenesis and cell differentiation).
Fluorescent Timer under the control of the heat shock promoter hsp16-41 in a transgenic C. elegans embryo. The embryo was heat-shocked in a 33°C water bath. Promoter activity was studied during the heat shock recovery period. Green fluorescence was observed in the embryo as early as two hr into the recovery period. By 50 hr after heat shock, promoter activity had ceased, as indicated by the lack of green color.
pTimer (left) is primarily intended to serve as a convenient source of the Fluorescent Timer cDNA. Use pTimer-1 (right) to monitor transcription from different promoters and promoter/ enhancer combinations inserted into the MCS located upstream of the Fluorescent Timer coding sequence. Without the addition of a functional promoter, this vector will not express the Fluorescent Timer.
Detecting Timer Fluorescent Protein
You can detect the Fluorescent Timer with the DsRed Polyclonal Antibody.
You can use the DsRed1-C Sequencing Primer to sequence wild-type DsRed1 C-terminal gene fusions, including Timer fusions.
Terskikh, A., et al. (2000) Science290(5496):1585–1588. | <urn:uuid:fee85558-8ff7-41a4-9a52-a042d84e5f3a> | CC-MAIN-2013-20 | http://www.clontech.com/US/Support/Applications/Using_Fluorescent_Proteins/Fluorescent_Timer?sitex=10020:22372:US&PROD=P8nPvudOgjkaPliQSAGLdY9X:S&PROD_pses=ZGACE262323B0BF31E74A84F101A6D7A99D0F95F9A509B9512D72813095A89F2839955DCFA6AFCAB2FAC74EC70C601DDC5197890B7E3626B1A | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.895144 | 499 | 2.6875 | 3 |
Brain Matures a Few Years Late in ADHD
but Follows Normal Pattern
A 2007 press release from the National Institute of Mental Health discusses brain development in ADHD youths. In some cases, brain development is delayed as much as three years. The full release and related video are available on the NIMH site: Brain Matures a Few Years Late in ADHD, but Follows Normal Pattern.
Autistic Spectrum Disorders (ASD):
How to Help Children with Autism Learn
From Dr. Lauer and Dr. Beaulieu's talk
Quick facts about Pervasive Developmental Disorders (PDD)/ Autistic Spectrum Disorders (ASD)
- Autism is a 'spectrum disorder' meaning that it affects children in different ways and at different times in their development.
- Typically, delays and learning problems can emerge in several areas of functioning including social functioning, communication skills, motor skills, and overall intellectual potential.
- Each child has their own learning style that includes specific learning challenges as well as areas of preserved skills and, at times, exceptional abilities.
- Both autism and Asperger's disorder are on the same continuum but are distinct in their expression.
What are the challenges students with PDD/ASD frequently experience?
- Academic difficulties that can often be misinterpreted as learning disabilities.
- Problems with executive functioning skills.
- Difficulty in forming relationships with peers.
- Emotional difficulties due to learning and social problems such as anxiety, depression, low self-esteem.
- Fear of new situations and trouble adjusting to changes.
- May look like or be misconstrued as attention-deficit-hyperactivity disorder (ADHD), Nonverbal Learning Disability (NLD), Oppositional-Defiant Disorder or Obsessive Compulsive Disorder (OCD).
Why choose US to help YOU?
- Our evaluations are conducted by neuropsychologists who have been extensively trained in the early detection of autistic spectrum disorders and in the identification of specific patterns of learning strengths and weaknesses that are often associated with this condition.
- Our evaluations help determine which teaching style is best suited to fit an individuals' specific learning profile; we also offer suggestions regarding compensatory educational approached.
- We work as a team with other learning professionals, advocates and health professionals to enhance the child's potential for success in all settings.
'The design of truly individual treatment plans that exploit strengths and compensate for weaknesses begins with a detailed understanding of how learning is different for children with autism than for those without autism and how learning is different among children with autism.'
— Bryna Siegel, Ph.D., author of Helping Children with Autism Learn
For more information on current research, interventions and programs, follow us on Facebook.
Coming to see you for an evaluation was so helpful and Im so happy that I did this. After struggling for years with ADHD but not knowing thats what it was and almost completely ruining our marriage because of it, your diagnosis helped more than you could know. Now I know that its not just me the diagnosis has turned our lives around and helped me feel more accomplished at work. Thanks again for everything.
Sandy and Bob M. | <urn:uuid:9b0b7a97-4882-4e06-adc0-44f4bbdc3349> | CC-MAIN-2013-20 | http://www.cnld.org/autistic_spectrum_disorders.php | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.951765 | 647 | 3.390625 | 3 |
Download source - 8 Kb
This tutorial is based off of the MSDN Article #ID: Q194873. But, for a beginner, following these MSDN articles can be intimidating to say the least. One of the most often asked questions I see as a Visual C++ and Visual Basic programmer is how to call a VB DLL from VC++. Well, I am hoping to show you exactly that today. I am not going to go over the basic details of COM as this would take too long, so I am assuming you have an understanding of VB, VC++ and a little COM knowledge. It's not too hard to learn; just takes a little time. So let's get started.
The first thing you need to do is fire up Visual Basic 6 (VB 5 should work as well). With VB running, create a new "ActiveX DLL" project. Rename the project to "vbTestCOM" and the class to "clsTestClass". You can do this by clicking in the VB Project Explorer Window on the Project1 item (Step 1), then clicking in the Properties window and selecting the name property (Step 2). Do the same for the Class. Click on the class (Step 3), then the name property and enter the name mentioned above (Step 4). Your project so far should look like the folowing right hand side picture:
Ok, now we are ready to add some code to the VB Class. Click on the "Tools" menu, then select the "Add Procedure" menu item. The Add Procedure window will open up. In this window we need to add some information. First (Step 1) make sure the type is set to Function. Second (Step 2) enter a Function name called "CountStringLength". Finally hit the Ok button and VB will generate the new function in the class.
You should have an empty function with which to work. The first thing we will do is specify a return type and an input parameter. Edit your code to look like this:
Public Function CountStringLength(ByVal strValue As String) As Long
What are we doing here? We are taking one parameter, as a String type in this case, then returning the length through the return type, which is a Long. We specify the input parameter as ByVal, meaning VB will make a copy of this variable and use the copy in the function, rather than the default ByRef, which passes the variable by reference. This way we can be sure that we do not modify the string by accident that was passed to us by the calling program. Let's add the code now.
Public Function CountStringLength(ByVal strValue As String) As Long
If strValue = vbNullString Then
CountStringLength = 0
CountStringLength = Len(strValue)
In the first line of code we are checking to see if the calling program passed us an empty, or NULL, string. If so we return 0 as the length. If the user did pass something other than an empty string, then we count it's length and return the length back to the calling program.
Now would be a good time to save your project. Accept the default names and put it in a safe directory. We need to compile this project now. Go to the File menu and select the "Make vbCOMTest.dll..." menu item.
The compiler will produce a file called surprisingly enough: vbCOMTest.dll. The compiler will also do us the favor of entering this new DLL into the system registry. We have finished the VB side of this project, so let's start the VC++ side of it. Fire up a copy of VC++, then select from the menu, "New Project". The New Project window should appear. Select a "Win32 Console Application" (Step 1), then give it a name of "TestVBCOM" (Step 2). Finally, enter a directory you want to build this project in (Step 3 - your directory will vary from what I have entered).
Click on the "OK" button and the "Win32 Console Application - Step 1 of 1" window will appear. Leave everything on this page as the default, and click the "Finish" button. One final window will appear after this titled "New Project Information". Simply click the "Ok" button here. You should now have an empty Win32 Console project. Press the "Ctrl" and hit the "N" key. Another window titled "New" will appear. Select the "C++ Source File" (Step 1), then enter the new name for this file called, "TestVBCOM.cpp" (Step 2 - make sure the Add to Project checkbox is checked and the correct project name is in the drop down combo box), then click the "Ok" button to finish.
Now we are going to get fancy!
You need to go to your Start Menu in Windows and navigate to the "Visual Studio 6" menu and go into the "Microsoft Visual Studio 6.0 Tools" sub-menu. In here you will see an icon with the name "OLE View". Click on it.
The OLE View tool will open up. You will see a window similar to this one:
Collapse all the trees, if they are not already. This will make it easier to navigate to where we want to go. Highlight the "Type Libraries" (Step 1) and expand it. You should see a fairly massive listing. We need to locate our VB DLL. Now, remember what we named the project? Right, we need to look for vbTestCOM. Scroll down until you find this. Once you have found it, double click on it. A new window should appear - the "ITypeLib Viewer" window. We are only interested in the IDL (Interface Definition Language) code on the right side of the window. Select the entire IDL text and hit the "Ctrl" and "C" buttons to copy it to the clipboard.
You can close this window and the OLE View window now as we are done with the tool. We need to add the contents of the IDL file into our VC++ project folder. Go to the folder you told VC++ to create your project in and create a new text file there (If you are in Windows Explorer, you can right click in the directory and select "New" then scroll over following the arrow and select "Text Document"). Rename the text document to "vbCOMTEST.idl". Then double click on the new IDL file (VC++ should open it if you named it correctly with an IDL extension). Now paste the code in the file by pressing the "Ctrl" and "V" keys. The IDL text should be pasted into the file. So far, so good. Now, this IDL file is not going to do us much good until we compile it. That way, VC++ can use the files it generates to talk to the VB DLL. Let's do that now. Open a DOS window and navigate to the directory you created your VC++ project in. Once in that directory, at the prompt you need to type the following to invoke the MIDL compiler:
E:\VCSource\TestVBCOM\TestVBCOM\midl vbTestCOM.idl /h vbTestCOM.h
Hit the "Enter" key and let MIDL do its magic. You should see results similar to the following:
Close the DOS window and head back into VC++. We need to add the newly generated vbTestCOM.h and vbTestCOM_i.c files to the project. You can do this by going to the "Project" menu, then selecting the "Add to Project" item, and scrolling over to the "Files" menu item and clicking on it. A window titled, "Insert Files into Project" will open. Select the two files highlighted in the next picture, then select the "Ok" button.
These two files were generated by MIDL for us, and VC++ needs them in order to talk to the VB DLL (actually VC++ does not need the "vbCOMTest_i.c" file in the project, but it is handy have in the project to review). We are going to add the following code to the "TestVBCOM.cpp" file now, so navigate to that file in VC++ using the "Workspace" window. Open the file by double clicking it and VC++ will display the empty file for editing.
Now add the following code to the "TestVBCOM.cpp" file:
_clsVBTestClass *IVBTestClass = NULL;
hr = CoInitialize(0);
hr = CoCreateInstance( CLSID_clsVBTestClass,
_bstr_t bstrValue("Hello World");
hr = IVBTestClass->CountStringLength(bstrValue,
cout << "The string is: " << ReturnValue << " characters in
length." << endl;
hr = IVBTestClass->Release();
cout << "CoCreateInstance Failed." << endl;
If all the code is entered in correctly, then press the "F7" key to compile this project. Once the project has compiled cleanly, then press the "Ctrl" and the "F5" keys to run it. In the C++ code, we include the MIDL created "vbTestCOM.h" file, the "Comdef.h" file for the _bstr_t class support and the "iostream.h" file for the "cout" support. The rest of the comments should speak for themselves as to what's occurring. This simple tutorial shows how well a person can integrate VB and VC++ apps together using COM. Not too tough actually. | <urn:uuid:a5fbb498-1ce4-4861-9a4d-ac9d31394472> | CC-MAIN-2013-20 | http://www.codeproject.com/Articles/21/Beginner-s-Tutorial-Calling-Visual-Basic-ActiveX-D?fid=104&df=90&mpp=10&sort=Position&spc=None&select=1378774&tid=816225&PageFlow=FixedWidth | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.878738 | 2,064 | 2.796875 | 3 |
1854-89 THREE DOLLARS INDIAN HEAD
In 1853 the United States negotiated the "Gadsden Purchase"settlement of a boundary dispute with Mexico that resulted in the U.S. acquiring what would become the southern portions of Arizona and New Mexico for ten million dollars. The following year Commodore Matthew Perry embarked upon his famed expedition to re-open Japan to the Western world and establish trade. Spreading beyond its borders in many ways, a few years earlier the United States had joined the worldwide move to uniform postage rates and printed stamps when the Congressional Act of March 3, 1845 authorized the first U.S. postage stamps, and set the local prepaid letter rate at five cents. This set the stage for a close connection between postal and coinage history.
Exactly six years later, the postage rate was reduced to three cents when New York Senator Daniel S. Dickinson fathered legislation that simultaneously initiated coinage of the tiny silver three-cent piece as a public convenience. The large cents then in circulation were cumbersome and unpopular, and the new denomination was designed to facilitate the purchase of stamps without using the hated "coppers."
This reasoning was carried a step further when the Mint Act of February 21, 1853 authorized a three-dollar gold coin. Congress and Mint Director Robert Maskell Patterson were convinced that the new coin would speed purchases of three-cent stamps by the sheet and of the silver three-cent coins in roll quantities. Unfortunately, at no time during the 35-year span of this denomination did public demand justify these hopes. Chief Engraver James Barton Longacre chose an "Indian Princess" for his obverse not a Native American profile, but actually a profile modeled after the Greco-Roman Venus Accroupie statue then in a Philadelphia museum. Longacre used this distinctive sharp-nosed profile on his gold dollar of 1849 and would employ it again on the Indian Head cent of 1859. On the three-dollar coin Liberty is wearing a feathered headdress of equal-sized plumes with a band bearing LIBERTY in raised letters. She's surrounded by the inscription UNITED STATES OF AMERICA. Such a headdress dates back to the earliest known drawings of American Indians by French artist Jacques le Moyne du Morgue's sketches of the Florida Timucua tribe who lived near the tragic French colony of Fort Caroline in 1562. It was accepted by engravers and medalists of the day as the design shorthand for "America."
Longacre's reverse depicted a wreath of tobacco, wheat, corn and cotton with a plant at top bearing two conical seed masses. The original wax models of this wreath still exist on brass discs in a Midwestern collection and show how meticulous Longacre was in preparing his design. Encircled by the wreath is the denomination 3 DOLLARS and the date. There are two boldly different reverse types, the small DOLLARS appearing only in 1854 and the large DOLLARS on coins of 1855-89. Many dates show bold "outlining" of letters and devices, resembling a double strike but probably the result of excessive forcing of the design punches into the die steel, causing a hint of their sloping "shoulders" to appear as part of the coin's design. The high points of the obverse design that first show wear are the cheek and hair above the eye; on the reverse, check the bow knot and leaves.
A total of just over 535,000 pieces were issued along with 2058 proofs. The first coins struck were the 15 proofs of 1854. Regular coinage began on May 1, and that first year saw 138,618 pieces struck at Philadelphia (no mintmark), 1,120 at Dahlonega (D), and 24,000 at New Orleans (O). These two branch mints would strike coins only in 1854. San Francisco produced the three-dollar denomination in 1855, 1856, and 1857, again in 1860, and apparently one final piece in 1870. Mintmarks are found below the wreath.
Every U.S. denomination boasts a number of major rarities. The three-dollar gold coinage of 1854-1889 is studded with so many low-mintage dates that the entire series may fairly be called rare. In mint state 1878 is the most common date, followed by the 1879, 1888, 1854 and 1889 issues. Every other date is very rare in high grade, particularly 1858, 1865, 1873 Closed 3 and all the San Francisco issues. Minuscule mintages were the rule in the later years. Proof coins prior to 1859 are extremely rare and more difficult to find than the proof-only issues of 1873 Open 3, 1875 and 1876, but many dates are even rarer in the higher Mint State grades. This is because at least some proofs were saved by well- heeled collectors while few lower-budget collectors showed any interest in higher-grade business strikes of later-date gold. Counterfeits are known for many dates; any suspicious piece should be authenticated.
The rarest date of all is the unique 1870-S, of which only one example was struck for inclusion in the new Mint's cornerstone. Either the coin escaped, or a second was struck as a pocket piece for San Francisco Mint Coiner J.B. Harmstead. In any event, one coin showing traces of jewelry use surfaced in the numismatic market in 1907. It was sold to prominent collector William H. Woodin, and when Thomas L. Elder sold the Woodin collection in 1911, the coin went to Baltimore's Waldo C. Newcomer. Later owned by Virgil Brand, it was next sold by Ted and Carl Brandts of Ohio's Celina Coin Co. and Stack's of New York to Louis C. Eliasberg in 1946 for $11,500. In Bowers and Merena's October 1982 sale of the U.S. Gold Collection, this famous coin sold for a record $687,500.
The three-dollar denomination quietly expired in 1889 along with the gold dollar and nickel three-cent piece. America's coinage was certainly more prosaic without this odd denomination gold piece, but its future popularity with collectors would vastly outstrip the lukewarm public reception it enjoyed during its circulating life. | <urn:uuid:ce5e0d75-e5f8-4ce2-8b94-86d9527d0dd4> | CC-MAIN-2013-20 | http://www.coinsite.com/CoinSite-PF/PParticles/$3goldix.asp | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.963839 | 1,295 | 3.671875 | 4 |
Creature Feature: American Beech (Fagus grandifolia)
By Emma Dean, CG Science Editor
Though once believed to have a range that covered what would be the continental United States until the glacial period, American beech currently maintains a slightly lesser native geographic habitat, which is still quite impressive. American beech covers the eastern U.S. and Canada from Florida to Quebec, as well as Utah.
Indigenous to North America, European colonists recognized the tree as a relative of the European beech and gathered the beechnuts to extract the oil which is similar to olive oil. The beechnuts, which persist through winter, can become somewhat of a litter problem, but not the leaf litter due to the fact that after turning a lovely bronze color, the leaves stay on the tree throughout winter. As autumn ends and winter begins, the leaves become less bronze and resemble thin, curled parchment paper.
Due to a shallow root system, grass does not sprout beneath the tree. This is not entirely noticeable because the short trunk allows the branches to nearly touch the ground. Its roots are unique, also, in that they routinely develop root suckers, which is when the root system is the site of new growth that then grows upward and out of the ground to form new branches and essentially a clone of the original tree. Entire beech groves have been known to grow from the roots of a single tree.
American beech is notorious for having incredibly smooth, light grey bark even as it advances in age. Though not necessarily beneficial for the tree, American beech is also notorious for being a favorite for carved initials and dates which are preserved indefinitely.
- American beech is a larval host as well as a nectar source for Early Hairstreak.
- American beech is at home in the following states: Alabama, Arkansas, Connecticut, Delaware, Florida, Georgia, Illinois, Indiana, Kentucky, Louisiana, Massachusetts, Maryland, Maine, Michigan, Minnesota, Missouri, Mississippi, North Carolina, New Hampshire, New Jersey, New York, Ohio, Oklahoma, Pennsylvania, Rhode Island, South Carolina, Tennessee, Texas, Utah, Virginia, Vermont, Wisconsin, West Virginia and also Washington D.C.
- This beech is often associated with the extinct Passenger Pigeon, which consumed beechnuts and roosted in its branches.
- A few minor pest issues that affect American beech include powdery mildew, aphids, canker and beech bark disease.
- Though it has a slow growth rate, American beech will grow to a height between 50-70 feet.
- The general lifespan for an American beech is 300-400 years. | <urn:uuid:03be70af-a8d8-4a7c-a3fd-96a187a05983> | CC-MAIN-2013-20 | http://www.collegegreenmag.com/creature-feature-american-beech-fagus-grandifolia | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.9437 | 553 | 3.53125 | 4 |
Accreditation is a form of independent, professional certification that focuses on schools and programs in a particular field. Accreditation of universities in the USA therefore assures you and your parents that the school adheres to high quality standards. Which means the programs are delivered by qualified faculty and are constantly updated to follow the changes and meet the needs of the relevant industry or working world. Attending an accredited school or program is often thought to make you more competitive on the job market.
University accreditation in the USA takes place at different levels. At the highest level, governmental and other agencies govern and recognize the accrediting bodies. For instance, the US Department of Education, the Council for Higher Education Association (CHEA) and the Association of Specialized and Professional Accreditors (ASPA) grant power to associations that oversee accreditation at the regional, institutional or program level.
Regional: The US Department of Education recognizes 6 distinct higher educational regions, each of which is overseen by a different accrediting body. This is the type of accreditation most commonly referred to and is for a university as a whole, not for individual programs. Accreditation by these regional agencies isn't automatic: this is voluntary accreditation.
Institutional: Depending on the kind of university or college it is (e.g., private, public, Christian, etc.) it may also be accredited by institute-type specific agencies. America's universities are extremely different in character, size, location and in the programs they offer. Therefore a school may be accredited by one or more organizations.
Specialized: Specialized accreditation focuses on specific areas of study and individual university programs. This is sometimes called professional accreditation, because it means specific programs meet the national standards for that field of study. Universities in the USA cover a huge range of programs, and each institution usually has a page on its website listing both institutional and individual program accreditation.
When assessing quality, international students can also look at whether a school or program has any memberships in, or endorsements by, professional associations which reflect certain standards of quality, but this is not the same as official accreditation. For instance, the American Association of State Colleges and Universities does not accredit programs, but is a national organization committed to maintaining and promoting the quality of America's higher education system.
Regional Accrediting Agencies for Universities in the USA
Middle States Association of Colleges and Schools, Commission on Higher Education
New England Association of Schools and Colleges, Commission on Institutions of Higher Education
North Central Association of Colleges and Schools, The Higher Learning Commission
Northwest Commission on Colleges and Universities
Southern Association of Colleges and Schools, Commission on Colleges
Western Association of Schools and Colleges, Accrediting Commission for Senior Colleges and Universities
Why Accreditation? The goal of university accreditation in the USA is to ensure that education provided by institutions of higher education meets acceptable levels of quality. Accrediting agencies have no legal control over institutions or programs; they promote certain standards and approve or renew membership of institutions that apply and meet the accreditation standards or criteria. Certain licensing programs may require that you've been through a course of study with specialized accreditation, because it ensures that you have been taught by faculty qualified to teach in that field. The US Secretary of Education and CHEA each maintain and publish a list of nationally recognized accrediting agencies, and most institutions attain eligibility for Federal funds by holding accredited or pre-accredited status with one of the recognized accrediting agencies.
Take a Virtual Tour of a featured
Campus e-tours allow students to view the facilities and student life at featured Universities in the USA, giving you the opportunity to see what the University looks like, as well as facts about the campus, courses, etc. Once you’ve completed your tour you can read the in-depth profile to get more detailed information, or click the Request FREE Info link to request specific information such as scholarships and financial aid directly from that institution.
Click here to view Virtual Tours of Featured Universities in the USA
Request FREE Info!
Request FREE info directly from featured
Featured institutions want to send you more information on their
to receive free information directly from the school. To see a complete list of featured schools,
Note: Your request is sent directly to the institution and is not maintained on this website. Your privacy is completely protected. | <urn:uuid:88118f3e-d711-4509-8010-9954e8e6100c> | CC-MAIN-2013-20 | http://www.collegesintheusa.com/University-Accreditation-in-the-USA.cfm | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.942056 | 890 | 2.859375 | 3 |
A bachelor's degree earned in the United States usually takes a minimum of four years. Degrees are earned by taking a combination of required courses which meet liberal arts distribution requirements (humanities, social sciences, and natural sciences), a required number of courses in the major field of study (called a "major"in the United States), and the balance of courses as electives. Each course taken is assigned a value called "points" (also called "credits" or "units"). To earn a bachelor's degree, one must earn a minimum of 124 points (usually more) and, at the same time, meet the distribution and major requirements. Advisement on course selection is available in each school at the time of registration.
Undergraduate studies are offered in three divisions of the University. Each division offers a distinct program of studies. The divisions that offer the undergraduate (B.A. or B.S.) degree are:
College (CC) - Study of the liberal arts and sciences leading to
the B.A. degree traditionally, but not exclusively, for students just out
of secondary school, usually between the ages of 17 and 22. With an enrollment
of approximately 4,000, Columbia College is the smallest college in the
2. Fu Foundation School of Engineering and Applied Science (SEAS) - Offers the B.S. degree in engineering and applied science fields.
3. School of General Studies (GS) - Offers the B.A. or B.S. degree to students who have had a break of a year or more in their education since high school.
All other divisions of the University are graduate schools and, as such, offer degrees beyond the bachelor's degree, usually master's or doctoral degrees.
Master's degrees take from one to three years to earn depending on the course work and research/writing requirements.
Ph.D. requirements may vary but usually require one to two years of course work beyond the master's degree, comprehensive examinations, a major original contribution to research in the field of study, and oral defense of one's research. The research and writing requirement can take from two to five years beyond the course work. A Ph.D. candidate should plan on a minimum of four and an average of six years of study to complete the degree requirements. It is not unusual for a student to be at Columbia seven or eight years to complete a doctorate.
To be admitted to these schools, the applicant must have completed a degree considered in the United States to be equivalent to a U.S. bachelor's degree with a strong academic record. There are also other admissions requirements. The Columbia schools and programs that offer graduate degrees are:
|College of Physicians and Surgeons||Program in Physical Therapy|
|Fu Foundation School of Engineering and Applied Science||School of Continuing Education|
|Graduate School of Architecture, Planning, and Preservation||College of Dental Medicine|
|Graduate School of Arts and Sciences||School of International and Public Affairs|
|Graduate School of Business||School of Law|
|Graduate School of Journalism||School of Nursing|
|Institute of Human Nutrition||School of Social Work|
|Mailman School of Public Health||School of the Arts|
|Program in Occupational Therapy|
The School of Continuing Education offers, in addition to its masters' degree program, opportunities for non-degree study at Columbia to qualified applicants. Both undergraduate and graduate level courses from the University's arts and sciences course offerings may be taken for credit. This option is particularly appropriate for international students who wish to visit at Columbia for a semester or two.
To qualify for an I-20 to be in F-1 student status in the U.S., students must register for at least 12 points of credit-bearing coursework each semester. This is usually equivalent to four courses each semester.
Of particular interest to international students is the School of Continuing Education's American Language Program. The ALP is one of the oldest English as a Second Language programs in the United States and offers a carefully integrated sequence of courses to students, business and professional people, and international visitors who wish to improve their command of English.
There are two institutions which are affiliated with, located adjacent
to, and bear the name of Columbia University. They are administered separately
and applications for admission must be made directly to these institutions.
Barnard College, Columbia University An undergraduate liberal arts college for women affiliated with Columbia University. For more information, write to Barnard College Admissions, 111 Milbank,3009 Broadway, New York, NY 10027, U.S.A.
Teachers College, Columbia University A graduate school for students interested in education, offering only the master's and doctoral degrees. For more information, write to Teachers College Admissions, 146 Horace Mann, 551 West 120 Street, New York, NY 10027, U.S.A. | <urn:uuid:139cb27b-d4c2-4365-afcf-895d3c1e5636> | CC-MAIN-2013-20 | http://www.columbia.edu/cu/isso/admit/admit_tx.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.943447 | 1,006 | 2.578125 | 3 |
In the American electoral system, a primary election is an election that determines the nominee for each political party, who then competes for the office in the general election. A presidential primary is a state election that picks the delegates committed to nominate particular candidates for president of the United States. A presidential caucus, as in Iowa, requires voters to meet together for several hours in face-to-face meetings that select county delegates, who eventually pick the delegates to the national convention. No other country uses primaries; they choose their candidates in party conventions.
Primaries were introduced in the Progressive Era in the early 20th century to weaken the power of bosses and make the system more democratic. In presidential elections, they became important starting in 1952, when the first-in-the-nation New Hampshire Primary helped give Dwight D. Eisenhower the Republican nomination, and knocked Harry S. Truman out of the Democratic race because of his poor showing. In 1964, Lyndon B. Johnson ended his reelection campaign after doing poorly in New Hampshire.
After 1968, both parties changed their rules to emphasize presidential primaries, although some states still use the caucus system.
In recent decades, New Hampshire holds the first primary a few days after Iowa holds the first caucus. That gives these two states enormous leverage, as the candidates and the media focus there. New Hampshire and Iowa receive about half of all the media attention given all primaries.
The primary allows voters to choose between different candidates of the some political parties, perhaps representing different wings of the party. For example, a Republican primary may choose between a range of candidates from moderate to conservative. Gallup's 2008 polling data indicated a trend in primary elections towards more conservative candidates, despite the more liberal result in the general election.
In recent years the primary seasons has come earlier and earlier, as states move up to earlier dates in the hope it will give them more leverage. For example, Barry Goldwater won the 1964 nomination because he won the last primary in California. The logic is faulty--in highly contested races the later primaries have more leverage. Thus in 2008 California gave up its traditional last-in-the-nation role and joined 20 other states on Super Tuesday. Neither the candidates not the voters paid it much attention. Michigan and Florida moved up their primaries in defiance of national Democratic Party rules and were penalized. The result is the primary season is extended, and is far more expensive, and no state gets an advantage--except for Iowa and New Hampshire, which now have dates in early January.
In late 2009 the two national parties are meeting to find a common solution.
- Duncan, Dayton. Grass roots: one year in the life of the New Hampshire presidential primary (1991) 436 pages; on 1988 campaign
- Johnson, Haynes, and Dan Balz. The Battle for America 2008: The Story of an Extraordinary Election (2009), excellent history of 2008 primaries
- Kamarck, Elaine C. Primary Politics: How Presidential Candidates Have Shaped the Modern Nominating System (2009) excerpt and text search | <urn:uuid:c66cbd20-f2be-4f73-902d-7b0198351323> | CC-MAIN-2013-20 | http://www.conservapedia.com/Primary_election | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.951015 | 615 | 4.03125 | 4 |
2 Products Found
|Results per page: 24 48 72||
In terms of ecologically friendly flooring, bamboo is one of the top contenders. Not only is bamboo flooring made from totally renewable resources, but it also is available in a wide variety of design options. For those who desire the look of hardwood flooring but are concerned about the environmental consequences of harvesting trees, bamboo offers the perfect solution. While bamboo is not technically wood flooring, its appearance is close enough to fool even the most discerning eye.
Why is Bamboo Flooring Considered Environmentally Friendly?
Although bamboo is actually a type of grass, it is harder than red oak. It reaches full maturity in just 3 to 5 years rather than several decades and re-growth appears naturally without the need for replanting. Harvesting bamboo is actually somewhat required because it is so hardy that leaving it to its own devices would put a strain on the environment. It would be a terrible shame to waste the harvested material, so people have designed many ways to put it to good use from thatched roofs to flooring material.
Bamboo also has no requirements for irrigation, fertilizers, or pesticides when grown in its natural environment. Bamboo is naturally resistant to insects and pests. The lack of need for harsh chemicals during its growth only does more to keep the carbon footprint down.
How is Bamboo Flooring Manufactured?
There are several steps involved in creating a material suitable for flooring from bamboo. Upon harvest, the bamboo is boiled to remove its natural starches and moisture which could become a wonderful environment for termites if not remedied. The outer skin is then removed and the stalk is cut into strips for flooring. These strips are then boiled again to make them even harder or carbonized; the longer the carbonation process, the darker the color of the final product.
When the strips are ready they are formed into flooring either by gluing strips together or gluing a single layer of bamboo strips on top of another solid surface, resulting in either solid bamboo flooring or engineered bamboo flooring respectively. The flooring also goes through other processes to strengthen it further by applying laminate materials to increase scratch resistance.
What are the design options with bamboo flooring?
- Bamboo flooring is available in widths ranging from 3 ž inches to 7 inches and thicknesses of 5/8 inches and 9/16 inches.
- Finish options for bamboo flooring are available from unfinished and natural from the FSC Unfinished Bamboo collection to nearly black and a choice of either horizontal or vertical graining as found in the FSC Designer collection.
- The two edge types of bamboo flooring are micro-beveled edges and square edges. Bamboo is also available in floating floor styles and nail or glue down styles.
How Durable is Bamboo Flooring?
Bamboo is naturally hard and durable, and the process it goes through during the manufacture of flooring only increases this strength. While one should avoid sliding furniture across the floor or allowing water to stand, bamboo flooring will do well in most any low moisture room. Bamboo flooring from the EcoBamboo Collection to the FSC Prestige Collection will be an investment in beauty and durability that is sure to add value to any home with minimal environmental impact. | <urn:uuid:d0d737e4-1962-4d64-87de-fe82bc79661a> | CC-MAIN-2013-20 | http://www.contempofloorcoverings.com/floors/bamboo-flooring.html?bamboo_usage=Light+Commercial&bamboo_width=7+inch | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.949857 | 681 | 2.78125 | 3 |
By Karen Kaplan
5:53 PM EST, January 30, 2013
Attention dieters: Many of the “facts” you think you know about obesity and weight loss are wrong.
So says a report published in Thursday’s edition of the New England Journal of Medicine. An international team of dietitians, doctors and other experts examined more than a dozen ideas about obesity that are widely believed to be true but aren’t actually supported by reliable medical evidence. It’s not just dieters who buy into these mistaken notions, the study authors note – much of this incorrect conventional wisdom is espoused by physicians, academic scientists, government agencies and (gulp) the media.
Seven of these errant ideas were classified as “myths,” meaning they are “beliefs held to be true despite substantial refuting evidence.” Another six were categorized as “presumptions,” or “beliefs held to be true for which convincing evidence does not yet confirm or disprove their truth.”
Without further ado, let’s get to the myth-busting:
Eating a little less or exercising a little more will lead to large weight loss over time, as long as those behaviors are sustained. This myth is based on the idea that 3,500 calories are equal to one pound. That equation was based on short-term experiments. In the long-term, the body compensates in various ways that slow down weight loss. For instance, the equation predicts that a person who burns 100 extra calories per day will lose more than 50 pounds over five years; in reality, that exercise regimen will cause a person to shed only about 10 pounds (assuming calorie intake remains the same).
It’s important to set realistic weight-loss goals so dieters don’t get frustrated. Studies that have examined this reasonable-sounding assumption have found that having realistic goals has no impact on the amount of weight lost. Indeed, some studies have found that those who set the most ambitious goals lost the most weight, even if they fell short of their initial expectations.
Slow, gradual weight loss is easier to sustain than large, rapid weight loss. In fact, clinical trials have found that people who jump-start their diets by dropping a lot of weight in the beginning (by consuming only 800 to 1,200 calories per day, for instance) had the best results in long-term studies.
In order to help someone lose weight, you must gauge their readiness to stick to a diet. Experimental evidence shows that readiness isn’t related to diet results.
School P.E. classes help reduce and prevent childhood obesity. While there is certainly some amount of physical education that would help fight childhood obesity, P.E. classes in their current form have not been shown to reduce BMI or obesity in kids on a consistent basis.
Babies who are breast-fed are less likely to become obese. If you think this is true, you’re in good company – the World Health Organization presented this “fact” in one of its reports. But a randomized, controlled clinical trial that followed 13,000 children for more than six years found “no compelling evidence” that breastfeeding staves off obesity, according to the New England Journal of Medicine report. (The authors did note that breastfeeding has other benefits and should be encouraged anyway.)
You can burn 100 to 300 calories by having sex. In fact, having sex burns calories at about the same rate as walking at a pace of 2.5 mph. “Given that the average bout of sexual activity lasts about 6 minutes,” the authors write, a man in his early to mid-30s might burn 21 calories. But wait, it gets worse: Considering that this man could burn 7 calories just watching TV, the true benefit of having sex is only 14 additional calories burned.
The report also says that these widely accepted ideas are just as likely to be false as true:
* Eating breakfast instead of skipping it will help prevent obesity.
* Long-term eating and exercise habits are set in early childhood.
* Regardless of what else you do, eating more fruits and vegetables will lead to weight loss (or less weight gain).
* Yo-yo dieting will take months or years off your life.
* Snacking will make you gain weight.
* The availability of sidewalks, parks and other aspects of the “built environment” influence the prevalence of obesity.
How’s that for a reality check? You can read the full article for yourself here.
Return to the Booster Shots blog.
Follow me on Twitter @LATkarenkaplan
Copyright © 2013, Los Angeles Times | <urn:uuid:47ca9e67-4f25-4611-86c4-df5f69a47bd0> | CC-MAIN-2013-20 | http://www.courant.com/health/boostershots/la-heb-weight-loss-myths-20130130,0,7359705,print.story | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.957613 | 977 | 2.796875 | 3 |
What They Are and How to Learn More about the Appellate Courts and the Justices Who Serve on Them
Every four years, more than a third of California’s 99 court of appeal justices face California voters for retention. In addition, several of the seven justices on the California Supreme Court face retention elections every four years. These are not contested elections; no one may run against the justices. Instead, the voters simply decide whether the justice shall continue to serve. If a majority of voters cast "yes" votes for a particular justice, that justice remains for another term. The Code of Judicial Ethics requires all judges "to be faithful to the law regardless of partisan interests, public clamor or fear of criticism . . . ." The retention election system, adopted by California voters as part of the State Constitution, is designed specifically to foster judges’ independence from improper external pressures.
Because supreme court justices hold statewide offices, voters everywhere in California decide whether to retain them. In contrast, because court of appeal justices serve in districts, voters in each district alone decide whether to retain them. California’s 99 court of appeal justices are divided among six districts, centered in San Francisco, Los Angeles, Sacramento, San Diego, Fresno, and San Jose.
Supreme and appellate court justices generally do not actively campaign for retention. The only promise they can make voters is to decide appeals impartially and according to the law, without fear or favor toward any individual or group. However, they do seek to provide helpful information to voters. The justices have worked closely and actively with the Secretary of State’s Office to help the public learn more about the appellate courts, who the appellate justices are, and what they do.
As a consequence, voters everywhere in California can easily get biographical information on every justice who appears on the ballot. As to supreme court justices, the information is contained in the statewide ballot pamphlet sent to all voters by the Secretary of State. As to court of appeal justices, the official statewide voter pamphlet does not contain biographical sketches, but does refer voters to an Internet website and a toll-free telephone hotline so they may obtain justices’ biographies, either on-line or through receipt of the Judicial Information Bookleton request. The Secretary of State’s Internet website and Judicial Information Booklet also include brief descriptions of the appellate courts and how they differ from trial courts.
To gain access to these materials, voters may go to the Secretary of State’s Internet website at http://www.ss.ca.gov/ or call the telephone hotline at 1(800) 345-VOTE.
While supreme and appellate court justices perform their roles quietly and without fanfare, the public can find much of their work published in law books titled "California Reports," "California Appellate Reports" and "California Reporter." Each of California’s 58 counties has a public law library containing these books, as do law schools and most law offices. Recently issued opinions are available on the same day they are filed at 'Opinions' which is maintained by the Administrative Office of the Courts (AOC), State of California.
Adding to the data supplied by the Secretary of State, the Judicial Branch’s website that you are currently reading from also contains biographical information about all the appellate court justices, as well as informative articles entitled "How Appellate and Supreme Court Justices are Selected" and "What Appellate Justices Do." | <urn:uuid:19b4e4f2-853a-4b46-baf8-25a9494b759b> | CC-MAIN-2013-20 | http://www.courts.ca.gov/selfhelp/4192.htm | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.941553 | 706 | 2.609375 | 3 |
Boston's Arnold Arboretum:
A Place for Study and Recreation--
By looking at Boston's Arnold Arboretum: A Place for Study and Recreation, students discover how the first arboretum in the United States became part of the burgeoning urban park movement in the second half of the 19th century. Those interested in learning more will find that the Internet offers a variety of interesting materials.
Frederick Law Olmsted National Historic Site
Frederick Law Olmsted National Historic Site is a unit of the National
Park System. Visit the park's Web
pages for a detailed history of Olmsted as well as information about
the Olmsted Archives that has historic documentation for Olmsted-designed
landscapes. Also featured on the site is the Olmsted Center for Landscape
Preservation (OCLP) providing technical assistance to historic properties
in cultural landscape research, planning, stewardship and education.
National Park Service (NPS) Historic Landscape Initiative
Learn more about the National Park Service (NPS) Historic Landscape Initiative. This program promotes responsible preservation practices that protect our nation's irreplaceable legacy--designed landscapes such as parks and gardens, as well as vernacular historic landscapes such as farms and industrial sites.
The Arnold Arboretum of Harvard University
Visit the Arnold Arboretum website for more information about this research and educational institution. It manages a collection of hardy trees, shrubs, and vines located on 265 acres in Boston, Massachusetts and associated herbarium and library collections. The grounds were planned and designed by the Arboretum's first director, Charles Sprague Sargent, in collaboration with the landscape architect, Frederick Law Olmsted as part of Boston's Emerald Necklace park system.
Visit Some of the Parks Created by Frederick Law Olmsted
The Cultural Landscape Foundation
The Cultural Landscape Foundation is the only not-for-profit foundation in America dedicated to increasing the publicís awareness of the importance and irreplaceable legacy of cultural landscapes. Visit their website for more information on what cultural landscapes are and what they represent. Also learn about endangered landscapes and grassroots efforts to preserve them.
Library of Congress
Visit the American Memory Collection Web page to search through the archives for the writings of Frederick Law Olmsted, pictures from his personal collection, and information on his various parks. Also search for information on the industrialization of America, the reactionary movements to the consequences, and Arnold Arboretum. Of special note are the environmental and landscape photographs of Arnold Arboretum.
American Journal of Botany
Browse the American Journal of Botany, a journal devoted to the study of plants, for a variety of articles on botany.
The Industrial Revolution
Visit the ThinkQuest Junior Web pages on the Industrial Revolution to explore this time period that helped spark the park movement in America. The site provides important facts about the Industrial Revolution, it offers fun things to do related to the facts learned, and it recommends other sources of information related to the revolution.
For Further Reading
Students (or educators) wishing to learn more about Frederick Law Olmsted, Charles Sprague Sargent, or the Arnold Arboretum may want to read: Ida Hay, Science in the Pleasure Ground: A History of Arnold Arboretum (Boston: Northeastern University Press, 1995); Witold Rybczynski, A Clearing in the Distance: Frederick Law Olmsted and America in the Nineteenth Century (New York: Scribner, 1999); S. B. Sutton, Charles Sprague Sargent and the Arnold Arboretum (Cambridge: Harvard University Press, 1970); and Cynthia Zaitzevsky, Frederick Law Olmsted and the Boston Park System (Cambridge: Belknap Press, 1982). | <urn:uuid:663377cb-a977-4210-a2cf-52cf8120193b> | CC-MAIN-2013-20 | http://www.cr.nps.gov/nR/twhp/wwwlps/lessons/56arnold/56lrnmore.htm | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.885052 | 790 | 2.921875 | 3 |
What Is Mead?
Mead, also known as honey wine, is regarded as the oldest of fermented beverage and has stood the test of time. From the dawn of pre-history to today mead has long been regarded as a delicacy, often referred to as the "nectar of the gods". The earliest archaeological evidence for the production of mead dates to around 7000 BC where pottery vessels containing a mixture of mead, rice and other fruits along with organic compounds of fermentation were found in Northern China.
Crafted Artisan Meadery uses the finest raw, unfiltered, unpastuerized honey as well as fruits, spices, herbs, and other natural ingredients to create an experience that is solely "mead". Some of our meads are aged on oak and others not...oak does wonders to an already complex mead. Our use of honey might make you think that mead is only sweet. While mead can be made as sweet as a dessert wine it can also be made dry...and anywhere in between. Yes, you'll find a little of "traditional wine" and even a little of "craft beer" elements but mead is an experience all it's own. Where other beverages work within the confines of industry standards and style categories mead can be broken down into a few broad categories that allow us to be as creative and unique as we want...there are no rules.
Traditional Traditional mead is purely Honey, Water, and Yeast. Traditionals allow the chosen honey to be showcased and the drinker to explore the characteristics of that honey. Tupelo, Clover, Orange Blossom, the list is long...there is a wide array of varietal honey available each with it's own unique flavor and aroma characteristics.
Melomel Melomels are mead crafted using fruit, honey, water and yeast. Fresh and local: any fruit can be used but we tend to stick to fruits that we can source locally to ensure the freshest and best product possible. We build relationships with our vendors and often times find ourselves hauling a trailer load of cider or blueberries back from their family operations. Ask us, we'd love to share with you how to find these great local farms.
Metheglin Metheglins are mead crafted using spices and/or herbs, honey, water and yeast. Cinnamon, vanilla and hibiscus are just a few examples of the countless ingredients we can use. The name "metheglin" finds it origins in the welsh translation "medicine" where these herbal elixirs were seen as have healing powers. We can't vouch for medicinal qualities but can say that a good metheglin is tough to beat.
Pyment Pyments are mead crafted using wine grapes, honey, water, and yeast. While being a type of melomel pyments are worth noting for their combination of elements of both wine and mead. While using red or white grapes honey is used to create something that is truly unique.
Cyser Cysers are mead crafted using apple cider, honey, and yeast. Being in Northeast Ohio we are in a prime location for some of the best tasting and freshest apple cider around. With our local sources we are usually able to begin a cyser fermentation within a day or two of the cider being pressed. With the number of apple and honey varieties available there is an endless array of flavors to create. | <urn:uuid:9f61095d-0f35-4cbb-862b-20ac132b3c03> | CC-MAIN-2013-20 | http://www.craftedmead.com/what-is-mead/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.962861 | 706 | 2.59375 | 3 |
Join Us on
Add To Favorites
Discover the beauty, and functionality, of ancient Native American pottery! These replicas are a wonderful way to learn more about a culture.
Pottery in any culture is an age-old practice that was originally practical and eventually became seen as an art form. Ancient Native American pieces are beautifully decorated ceramics that are not only functional but a pleasure to look at as well. Choose a style of pottery from one Native nation to replicate.
Based on the style of the pot, choose an armature such as a recycled container or crumpled aluminum foil. Cover this basic form with a thin Crayola® Model Magic® layer.
Add embellishments to your pot by creating ropes, leather cords, feathers, and beads, as appropriate to the culture and time period, and affixing them to your pot. For even edges, cut the compound with Crayola Scissors.
One way to make beads is to cut a long piece of fishing line. Make small Model Magic balls and wrap them around the fishing line about half-way down the length. Leave enough fishing line uncovered so you can use it to wrap around the lip of the pot later. Try making different shapes of beads and alternating colors to get different patterns. Another way to make beads is by wrapping the Model Magic compound around short pieces of plastic straws. You can then string your beads any way you like.
At the end of a string of beads on Native pottery, there are often large decorative feathers. Roll out Model Magic compound into feathers. Combine different colors for multicolor feathers. Then take a craft stick or other modeling tool to etch in the feather’s vein and the edges. Press the feather on the fishing line at the end of your beads. Cut off any fishing line that sticks out on the bottom. Wrap the extra fishing line around the lip of the pot and tie a knot.
You can hide the fishing line by covering the lip with cords or other decorative elements. Adorn your pot with a beautiful rope by braiding three long pieces of Model Magic compound and then wrapping the braid around the lip.
Add leather-like cords by rolling out long pieces of Model Magic compound and pressing them a little flat. Then twist and hang them on your pot. Model Magic® dries to the touch overnight and dries completely in 2 to 3 days.
Study Native American use of animal hides for homes and clothing.
Add To Favorites
How do people communicate when the landscape is as barren and forbidding as Arctic tundra? Make a stone message board In
Make a realistic replica of a Hopi messenger from the spirit world. Incorporate natural objects to explore this traditio
Tell bigger-than-life raven stories from the Tlingit, Salish, and Haida nations. Build a miniature theatre to set the st
Interview relatives about your family history. Write and illustrate the story of your family's past on a scroll you can
Create an original pop-art repetitive portrait based on a study the life and work of Andy Warhol.
Picasso’s art career spanned many decades and included a variety of styles and influences. Create a portrait collage ins
Update an ancient craft with contemporary designs and art materials. These holiday ornaments are light and unbreakable,
Our crayons have been rolling off the assembly line since 1903, and you can see how it’s done.
Visit us »
Be the first to know! | <urn:uuid:67bf451a-fd43-4295-971e-25c07fdc2b9d> | CC-MAIN-2013-20 | http://www.crayola.com/lesson-plans/native-pottery-replicas-lesson-plan/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.923685 | 726 | 2.84375 | 3 |
Dinosaur Bones "Buried" By Evolutionists!
A recent presentation at the 2012 Western Pacific Geophysics meeting in Singapore showed C-14 dates of soft tissue found in dinosaur bones to be in the range from 22,000 - 39,000 years old. Previously, it has been assumed that dinosaurs died out over 65 million years ago, so these new findings are astonishing and should have made international news. But shortly after the presentation was made at the meeting, the abstract was removed from the meeting’s website!
So it appears that instead of making international news, these findings have been buried. First, let’s look at what was actually being presented.
The organic matter (collagen) and hard carbonate bone mineral (bioapatite) in the bone samples were analyzed. The samples came from several species of dinosaurs (acrocanthosaur, hadrosaurus, triceratops and apatosaurus) taken from various sites in Texas, Colorado, Arkansas and Montana. The samples were meticulously handled and cleaned to avoid possible contamination. The carbon-14 (C-14) levels in these samples were measured using Accelerator Mass Spectrometry (AMS). The resultant C-14 ages obtained from these samples were consistently in the 22,000 - 39,000 years range. The fact that the samples were from a variety of species and sites all giving consistent results greatly reduces the chance that the results are from contamination.
The theoretical upper limit for C-14 dating is ten times the half-life, or about 57,000 years. The proposed practical upper limit for C-14 dating is between 40,000 - 50,000 years. While some samples fell close to the 40,000 year upper limit, 16 out of 20 (80%) were aged at 35,000 years or younger, well within the acceptable upper C-14 dating limits.
While other researchers have found soft tissue in dinosaur bones and C-14 dates in these ranges, this current study has been the most comprehensive. The fact that there is any collagen at all remaining in these bone samples is amazing, considering that they are supposed to be older than 65 million years. Protein just doesn’t hang around that long! And that there is any C-14 in them also is reason to possibly question conventional wisdom. But why have we not heard about any of this in the news? Shouldn't there have been at least a 15-second blip from one of the media outlets? But the media have been silent and the abstract pulled from the meeting proceedings. The sacred cow of evolution once again remains intact.
We truly are living in an age of great deception. “And for this cause God shall send them strong delusion, that they should believe a lie.” (2 Thessalonians 2:11)
This article, by Creation Moments board member Dr. Don Clark, is based on an interview broadcast by Broken Road Radio. To hear the interview and many others on biblical creation topics, go to http://brokenroadradio.com/morning-show-september-17-2012/ | <urn:uuid:6cb92412-144d-4c9c-b1c1-b3638ba84556> | CC-MAIN-2013-20 | http://www.creationmoments.net/resources/blog/201210/dinosaur-bones-buried-evolutionists | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.963144 | 636 | 3.09375 | 3 |
[Note: in Japan, it is customary to refer to a person with their last name first. We have retained this practice in the below excerpt from Kurosawa’s text.]
The gate was growing larger and larger in my mind’s eye. I was location-scouting in the ancient capital of Kyoto for Rashomon, my eleventh-century period film. The Daiei management was not very happy with the project. They said the content was difficult and the title had no appeal. They were reluctant to let the shooting begin. Day by day, as I waited, I walked around Kyoto and the still-more-ancient capital of Nara a few miles away, studying the classical architecture. The more I saw, the larger the image of the Rashomon gate became in my mind.
At first I thought my gate should be about the size of the entrance gate to Toji Temple in Kyoto. Then it became as large as the Tengaimon gate in Nara, and finally as big as the main two-story gates of the Ninnaji and Todaiji temples in Nara. This image enlargement occurred not just because I had the opportunity to see real gates dating from that period, but because of what I was learning, from documents and relics, about the long-since-destroyed Rashomon gate itself.
“Rashomon” actually refers to the Rajomon gate; the name was changed in a Noh play written by Kanze Nobumitsu. “Rajo” indicates the outer precincts of the castle, so “Rajomon” means the main gate to the castle’s outer grounds. The gate for my film Rashomon was the main gate to the outer precincts of the ancient capital--–--–Kyoto was at that time called “Heian-Kyo.” If one entered the capital through the Rajomon gate and continued due north along the main thoroughfare of the metropolis, one came to the Shujakumon gate at the end of it, and the Toji and Saiji temples to the east and west, respectively. Considering this city plan, it would have been strange had the outer main gate not been the biggest gate of all. There is tangible evidence that it in fact was: The blue roof tiles that survive from the original Rajomon gate show that it was large. But, no matter how much research we did, we couldn’t discover the actual dimensions of the vanished structure.
As a result, we had to construct the Rashomon gate to the city based on what we could learn from looking at extant temple gates, knowing that the original was probably different. What we built as a set was gigantic. It was so immense that a complete roof would have buckled the support pillars. Using the artistic device of dilapidation as an excuse, we constructed only half a roof and were able to get away with our measurements. To be historically accurate, the imperial palace and the Shujakumon gate should have been visible looking north through our gate. But on the Daiei back lot such distances were out of the question, and even if we had been able to find the space, the budget would have made it impossible. We made do with a cut-out mountain to be seen through the gate. Even so, what we built was extraordinarily large for an open set.
When I took this project to Daiei, I told them the only sets I would need were the gate and the tribunal courtyard wall where all the survivors, participants and witnesses of the rape and murder that form the story of the film are questioned. Everything else, I promised them, would be shot on location. Based on this low-budget set estimate, Daiei happily took on the project.
Later, Kawaguchi Matsutaro, at that time a Daiei executive, complained that they had really been fed a line. To be sure, only the gate set had to be built, but for the price of that one mammoth set they could have had over a hundred ordinary sets. But, to tell the truth, I hadn’t intended so big a set to begin with. It was while I was kept waiting all that time that my research deepened and my image of the gate swelled to its startling proportions.
When I had finished Scandal for the Shochiku studios, Daiei asked if I wouldn’t direct one more film for them. As I cast about for what to film, I suddenly remembered a script based on the short story “Yabu no naka” (“In a Grove”) by Akutagawa Ryunosuke. It had been written by Hashimoto Shinobu, who had been studying under director Itami Mansaku. It was a very well-written piece, but not long enough to make into a feature film. This Hashimoto had visited my home, and I talked with him for hours. He seemed to have substance, and I took a liking to him. He later wrote the screenplays for Ikiru (1952) and Shichinin no samurai (Seven Samurai, 1954) with me. The script I remembered was his Akutagawa adaptation called “Male-Female.”
Probably my subconscious told me it was not right to have put that script aside; probably I was—without being aware of it–wondering all the while if I couldn’t do something with it. At that moment the memory of it jumped out of one of those creases in my brain and told me to give it a chance. At the same time I recalled that “In a Grove” is made up of three stories, and realized that if I added one more, the whole would be just the right length for a feature film. Then I remembered the Akutagawa story “Rashomon.” Like “In a Grove,” it was set in the Heian period (794-1184). The film Rashomon took shape in my mind.
Since the advent of the talkies in the 1930s, I felt, we had misplaced and forgotten what was so wonderful about the old silent movies. I was aware of the aesthetic loss as a constant irritation. I sensed a need to go back to the origins of the motion picture to find this peculiar beauty again; I had to go back into the past.
In particular, I believed that there was something to be learned from the spirit of the French avant-garde films of the 1920s. Yet in Japan at this time we had no film library. I had to forage for old films, and try to remember the structure of those I had seen as a boy, ruminating over the aesthetics that had made them special.
Rashomon would be my testing ground, the place where I could apply the ideas and wishes growing out of my silent-film research. To provide the symbolic background atmosphere, I decided to use the Akutagawa “In a Grove” story, which goes into the depths of the human heart as if with a surgeon’s scalpel, laying bare its dark complexities and bizarre twists. These strange impulses of the human heart would be expressed through the use of an elaborately fashioned play of light and shadow. In the film, people going astray in the thicket of their hearts would wander into a wider wilderness, so I moved the setting to a large forest. I selected the virgin forest of the mountains surrounding Nara, and the forest belonging to the Komyoji temple outside Kyoto.
There were only eight characters, but the story was both complex and deep. The script was done as straightforwardly and briefly as possible, so I felt I should be able to create a rich and expansive visual image in turning it into a film. Fortunately, I had as cinematographer a man I had long wanted to work with, Miyagawa Kazuo; I had Hayasaka to compose the music and Matsuyama as art director. The cast was Mifune Toshiro, Mori Masayuki, Kyo Machiko, Shimura Takashi, Chiaki Minoru, Ueda Kichijiro, Kato Daisuke and Honma Fumiko; all were actors whose temperaments I knew, and I could not have wished for a better line-up. Moreover, the story was supposed to take place in summer, and we had, ready to hand, the scintillating midsummer heat of Kyoto and Nara. With all these conditions so neatly met, I could ask nothing more. All that was left was to begin the film.
However, one day just before the shooting was to start, the three assistant directors Daiei had assigned me came to see me at the inn where I was staying. I wondered what the problem could be. It turned out that they found the script baffling and wanted me to explain it to them. “Please read it again more carefully,” I told them. “If you read it diligently, you should be able to understand it because it was written with the intention of being comprehensible.” But they wouldn’t leave. “We believe we have read it carefully, and we still don’t understand it at all; that’s why we want you to explain it to us.” For their persistence I gave them this simple explanation:
Human beings are unable to be honest with themselves about themselves. They cannot talk about themselves without embellishing. This script portrays such human beings–the kind who cannot survive without lies to make them feel they are better people than they really are. It even shows this sinful need for flattering falsehood going beyond the grave—even the character who dies cannot give up his lies when he speaks to the living through a medium. Egoism is a sin the human being carries with him from birth; it is the most difficult to redeem. This film is like a strange picture scroll that is unrolled and displayed by the ego. You say that you can’t understand this script at all, but that is because the human heart itself is impossible to understand. If you focus on the impossibility of truly understanding human psychology and read the script one more time, I think you will grasp the point of it.
After I finished, two of the three assistant directors nodded and said they would try reading the script again. They got up to leave, but the third, who was the chief, remained unconvinced. He left with an angry look on his face. (As it turned out, this chief assistant director and I never did get along. I still regret that in the end I had to ask for his resignation. But, aside from this, the work went well.)
During the rehearsals before the shooting I was left virtually speechless by Kyo Machiko’s dedication. She came in to where I was still sleeping in the morning and sat down with the script in her hand. “Please teach me what to do,” she requested, and I lay there amazed. The other actors, too, were all in their prime. Their spirit and enthusiasm was obvious in their work, and equally manifest in their eating and drinking habits.
They invented a dish called Sanzoku-yaki, or “Mountain Bandit Broil,” and ate it frequently. It consisted of beef strips sautéed in oil and then dipped in a sauce made of curry powder in melted butter. But while they held their chopsticks in one hand, in the other they’d hold a raw onion. From time to time they’d put a strip of meat on the onion and take a bite out of it. Thoroughly barbaric.
The shooting began at the Nara virgin forest. This forest was infested with mountain leeches. They dropped out of the trees onto us, they crawled up our legs from the ground to suck our blood. Even when they had had their fill, it was no easy task to pull them off, and once you managed to rip a glutted leech out of your flesh, the open sore seemed never to stop bleeding. Our solution was to put a tub of salt in the entry of the inn. Before we left for the location in the morning we would cover our necks, arms and socks with salt. Leeches are like slugs—they avoid salt.
In those days the virgin forest around Nara harbored great numbers of massive cryptomerias and Japanese cypresses, and vines of lush ivy twined from tree to tree like pythons. It had the air of the deepest mountains and hidden glens. Every day I walked in this forest, partly to scout for shooting locations and partly for pleasure. Once a black shadow suddenly darted in front of me: a deer from the Nara park that had returned to the wild. Looking up, I saw a pack of monkeys in the big trees about my head.
The inn we were housed in lay at the foot of Mount Wakakusa. Once a big monkey who seemed to be the leader of the pack came and sat on the roof of the inn to stare at us studiously throughout our boisterous evening meal. Another time the moon rose from behind Mount Wakakusa, and for an instant we saw the silhouette of a deer framed distinctly against its full brightness. Often after supper we climbed up Mount Wakakusa and formed a circle to dance in the moonlight. I was still young and the cast members were even younger and bursting with energy. We carried out our work with enthusiasm.
When the location moved from the Nara Mountains to the Komyoji temple forest in Kyoto, it was Gion Festival time. The sultry summer sun hit with full force, but even though some members of my crew succumbed to heat stroke, our work pace never flagged. Every afternoon we pushed through without even stopping for a single swallow of water. When work was over, on the way back to the inn we stopped at a beer hall in Kyoto’s downtown Shijo-Kawaramachi district. There each of us downed about four of the biggest mugs of draft beer they had. But we ate dinner without any alcohol and, upon finishing, split up to go about our private affairs. Then at ten o’clock we’d gather again and pour whiskey down our throats with a vengeance. Every morning we were up bright and clear-headed to do our sweat-drenched work.
Where the Komyoji temple forest was too thick to give us the light we needed for shooting, we cut down trees without a moment’s hesitation or explanation. The abbot of Komyoji glared fearfully as he watched us. But as the days went on, he began to take the initiative, showing us where he thought trees should be felled.
When our shoot was finished at the Komyoji location, I went to pay my respects to the abbot. He looked at me with grave seriousness and spoke with deep feeling. “To be honest with you, at the outset we were very disturbed when you went about cutting down the temple trees as if they belonged to you. But in the end we were won over by your wholehearted enthusiasm. ‘Show the audience something good.’ This was the focus of all your energies, and you forgot yourselves. Until I had the chance to watch you, I had no idea that the making of a movie was a crystallization of such effort. I was very deeply impressed.”
The abbot finished and set a folding fan before me. In commemoration of our filming, he had written on the fan three characters forming a Chinese poem: “Benefit All Mankind.” I was left speechless.
We set up a parallel schedule for the use of the Komyoji location and open set of the Rashomon gate. On sunny days we filmed at Komyoji; on cloudy days we filmed the rain scenes at the gate set. Because the gate set was so huge, the job of creating rainfall on it was a major operation. We borrowed fire engines and turned on the studio’s fire hoses to full capacity. But when the camera was aimed upward at the cloudy sky over the gate, the sprinkle of the rain couldn’t be seen against it, so we made rainfall with black ink in it. Every day we worked in temperatures of more than 85º Fahrenheit, but when the wind blew through the wide-open gate with the terrific rainfall pouring down over it, it was enough to chill the skin.
I had to be sure that this huge gate looked huge to the camera. And I had to figure out how to use the sun itself. This was a major concern because of the decision to use the light and shadows of the forest as the keynote of the whole film. I determined to solve the problem by actually filming the sun. These days it is not uncommon to point the camera directly at the sun, but at the time Rashomon was being made it was still one of the taboos of cinematography. It was even thought that the sun’s rays shining directly into your lens would burn the film in your camera. But my cameraman, Miyagawa Kazuo, boldly defied this convention and created superb images. The introductory section in particular, which leads the viewer through the light and shadow of the forest into a world where the human heart loses its way, was truly magnificent camera work. I feel that this scene, later praised at the Venice International Film Festival as the first instance of a camera entering the heart of a forest, was not only one of Miyagawa’s masterpieces but a world-class masterpiece of black-and-white cinematography.
And yet, I don’t know what happened to me. Delighted as I was with Miyagawa’s work, it seems I forgot to tell him. When I said to myself, “Wonderful,” I guess I thought I had said “Wonderful” to him at the same time. I didn’t realize I hadn’t until one day Miyagawa’s old friend Shimura Takashi (who was playing the woodcutter in Rashomon) came to me and said, “Miyagawa’s very concerned about whether his camera work is satisfactory to you.” Recognizing my oversight for the first time, I hurriedly shouted “One hundred percent! One hundred for camera work! One hundred plus!”
There is no end to my recollections of Rashomon. If I tried to write about all of them, I’d never finish, so I’d like to end with one incident that left an indelible impression on me. It has to do with the music.
As I was writing the script, I heard the rhythms of a bolero in my head over the episode of the woman’s side of the story. I asked Hayasaka to write a bolero kind of music for the scene. When we came to the dubbing of that scene, Hayasaka sat down next to me and said, “I’ll try it with the music.” In his face I saw uneasiness and anticipation. My own nervousness and expectancy gave me a painful sensation in my chest. The screen lit up with the beginning of the scene, and the strains of the bolero music softly counted out the rhythm. As the scene progressed, the music rose, but the image and the sound failed to coincide and seemed to be at odds with each other. “Damn it,” I thought. The multiplication of sound and image that I had calculated in my head had failed, it seemed. It was enough to make me break out in a cold sweat.
We kept going. The bolero music rose yet again, and suddenly picture and sound fell into perfect unison. The mood created was positively eerie. I felt an icy chill run down my spine, and unwittingly I turned to Hayasaka. He was looking at me. His face was pale, and I saw that he was shuddering with the same eerie emotion I felt. From that point on, sound and image proceeded with incredible speed to surpass even the calculations I had made in my head. The effect was strange and overwhelming.
And that is how Rashomon was made. During the shooting there were two fires at the Daiei studios. But because we had mobilized the fire engines for our filming, they were already primed and drilled, so the studios escaped with very minor damage.
After Rashomon I made a film of Dostoevsky’s The Idiot (Hakuchi, 1951) for the Shochiku studios. This Idiot was ruinous. I clashed directly with the studio heads, and then when the reviews on the completed film came out, it was as if they were a mirror reflection of the studio’s attitude toward me. Without exception, they were scathing. On the heels of this disaster, Daiei rescinded its offer for me to do another film with them.
I listened to this cold announcement at the Chofu studios of Daiei in the Tokyo suburbs. I walked out through the gate in the gloomy daze, and, not having the will even to get on the train, I ruminated over my bleak situation as I walked all the way home to Komae. I concluded that for some time I would have to “eat cold rice” and resigned myself to this fact. Deciding that it would serve no purpose to get excited about it, I set out to go fishing at the Tamagawa River. I cast my line into the river. It immediately caught on something and snapped in two. Having no replacement with me, I hurriedly put my equipment away. Thinking this was what it was like when bad luck catches up with you, I headed back home.
I arrived home depressed, with barely enough strength to slide open the door to the entry. Suddenly my wife came bounding out. “Congratulations!” I was unwittingly indignant: “For what?” “Rashomon has the Grand Prix.” Rashomon had won the Grand Prix at the Venice International Film Festival, and I was spared from having to eat cold rice.
Once again an angel had appeared out of nowhere. I did not even know that Rashomon had been submitted to the Venice Film Festival. The Japan representative to Italiafilm, Giuliana Stramigioli, had seen it and recommended it to Venice. It was like pouring water into the sleeping ears of the Japanese film industry.
Later Rashomon won the American Academy Award for Best Foreign Language Film. Japanese critics insisted that these two prizes were simply reflections of Westerners’ curiosity and taste for Oriental exoticism, which struck me then, and now, as terrible. Why is it that Japanese people have no confidence in the worth of Japan? Why do they elevate everything foreign and denigrate everything Japanese? Even the woodblock prints of Utamoro, Hokusai and Sharaku were not appreciated by Japanese until they were first discovered by the West. I don’t know how to explain this lack of discernment. I can only despair of the character of my own people.
Excerpted from Something Like an Autobiography, trans., Audie E. Bock. Translation Copyright ©1982 by Vintage Books. Reprinted by permission of Vintage Books, a division of Random House. | <urn:uuid:7db29226-63a3-4e2a-9fff-87120625a08c> | CC-MAIN-2013-20 | http://www.criterion.com/current/posts/196-akira-kurosawa-on-rashomon | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.982666 | 4,863 | 2.703125 | 3 |
St. Francis, Animals and the Environment
Dr. Marcellino D'Ambrosio
You often see a garden statue of him with a bird on his shoulder. Yes, St. Francis of Assisi did have a special relationship with animals. He preached to the birds, pacified a wolf, and put together an animal cast for what is regarded as the very first live nativity scene.
But he had no interest in “the environment.” No feeling for it whatsoever.
Instead, he was in love with creation. And that’s because he was in love with the Creator, who he regarded not as some cosmic force or distant, detached monarch, but as “Father.” He so much loved God his Father that he had great affection for anything related to God – the sacraments, the Church, its very imperfect ministers, broken down country chapels, and all of God’s marvelous works of art – human beings first and foremost, but also the animals and even the inanimate objects that adorn the heavens and the earth.
The fondness for and kinship St. Francis felt with “brother son and sister moon” was truly a gift. But it is gift that we all receive when we receive the Holy Spirit since it is one of the seven gifts mentioned in Isaiah 11:2-3. At least this is how St. Thomas Aquinas and many after him explained this beautiful, supernatural gift of piety. The natural virtue of piety was extolled by the Greeks and Romans – a love of those who gave you life, first and foremost your parents and after them, your fatherland. This entailed also a respect and affection for all that is connected with your parents and dear to them as well– your grandparents, uncles and aunts, and in the case of your country, its flag, its national anthem, its history and its heros. The term for piety towards one’s country is “patriotism” which actually has at its root, the term “pater” or “father.”
St. Francis loved his home town of Assisi. But his deeper patriotism was for the Kingdom of God. His affection for the Kingdom included respect and reverence for all the King’s creatures and subjects, whether they be great or small.
Now, this does not mean that Francis saw all creatures as his equals, as some animal rights advocates today seem to do. One animal rights philosopher, Peter Singer, goes so far as to teach that adult whales and chimpanzees are actually superior to human fetuses and infants in both dignity and value. He would save the whales but allow both abortion and infanticide.
St. Francis would be appalled at such a concept. Biblical person that he was, he understood that woman and man are God’s supreme masterpieces, made in His image and likeness, unlike the animals. Human beings are given dominion over the rest of creation in Genesis 2 not to exploit however, but to cultivate, care for, and perfect. God entrusts Adam and Eve not with “the environment,” but with “the Garden” – a place of beauty in which we are made to walk with God.
So St. Francis loves the birds, but also presses them into the service of the gospel. He saves the wolf of Gubbio from the wrath of angry townspeople, but rebukes it for its ferocity and calls men and wolf to live everafter in harmony. And the animals of the nativity scene? They are companions of the infant who is the Word made flesh.
So the authentic biblical and Catholic approach to “the environment” is not to see it coldly and scientifically as “the environment.” But rather, in the fashion of St. Francis, to approach it as the expression of the Father’s beauty, as the gift of the Father’s love, as an icon, a window to the new creation. Reckless exploitation would never fit with such a vision. But neither would some secular environmentalism.
Follow Us -
Join us on Facebook
Join us on Twitter
Dr. Marcellino D’Ambrosio writes from Texas. For more information on his resources and his pilgrimages to Italy and the Holy Land, visit www.crossroadsinitiative.com or call 1.800.803.0118.
Click here to download and print, click here!
For more Catholic resources to feed your faith, visit the Crossroads Initiative Homepage.
To sign up for our free weekly e-mail with Dr. D'Ambrosio's commentary on the Sunday readings, liturgical feasts, updates on where Dr. D will be speaking, a chance to WIN a FREE CD and MORE, CLICK HERE!
Personal Prayer: Pathway to Joy
Marcellino D'Ambrosio, Ph.D.
Everyone knows that personal prayer is important. You can't expect to deepen a relationship with God talking with Him only once a week! But how, in the midst of the busy, noisy life we all lead, can we develop a pattern of daily prayer that really works? And if we are successful in carving out some moments for prayer, what do we do? How should we spend that time in way that would be most fruitful?
Dr. Marcellino D'Ambrosio has taught spiritual theology academically, but, more importantly, he's had plenty of practice applying that tradition to everyday life. With a family of seven, a business, and a non-profit corporation to run, he knows the challenges that a busy, active life can pose to the Christian who wants to pray. In this talk, he lays down principles and gives practical suggestions on how busy laypeople can develop a prayer life that leads to joy and personal transformation.
CD - $8.95
The Seven Deadly Sins - 3 CD Set
What are the Seven Deadly Sins? There are books written about them and movies made about them, but what are they?
From about the fifth century, Christian spiritual writers identified seven patterns of sin that, if not broken, would lead to spiritual death. In this fascinating series by Dr. Marcellino D'Ambrosio, we learn the destructive, addictive dynamics of these seven vices and how they infiltrate, and ultimately take over people's lives. Most importantly, we find out how to get free of the chains forged by these sins and the necessary qualities to cultivate to make us immune to them in the future.
Beyond the Birds and the Bees
"The Talk." It's one of the most daunting prospects parents face. Communicating the richness of Catholic teaching on sexuality in a faithful and effective way can be an overwhelming responsibility. But does it have to be so?
In this thoroughly revised version of Beyond the Birds and the Bees, Greg and Lisa Popcak empower you with the tools needed to move well beyond "the Talk" by offering a comprehensive guide to raising sexually whole and holy children. Using the riches of Blessed John Paul II's Theology of the Body, the Popcaks help you safely navigate your children from infancy through the teenage years and beyond.
Building Our House on Rock: The Sermon On The Mount
Jesus’ Sermon on the Mount ends with the parable of the builders on rock or sand. Doing what Jesus asks results in building a life that endures; not doing it results in disaster. The choice is ours, and it’s a scary one. How can we read these words so that we can know what Jesus meant and do it? | <urn:uuid:8d7c0d8f-2e3c-47c2-83e9-05a17f5f46e5> | CC-MAIN-2013-20 | http://www.crossroadsinitiative.com/library_article/1334/St._Francis__Animals_and_the_Environment.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.959403 | 1,571 | 2.703125 | 3 |
Indonesia is known for being prone to natural disasters of all kinds, ranging from climatic (floods, drought) to geologic (earthquakes, landslides, tsunamis, volcanoes, etc.), biological (avian influenza) to man-made (deforestation, mining, conflicts). With an already high level of food insecurity, households' vulnerability to shocks is high as the assets and structures of communities are jeopardized by these complex emergencies and a general lack of disaster risk reduction and management. Over the past five years, more than 1,500,000 people have been directly affected by natural disasters, primarily in West Sumatera, West Java, Central Java, West Nusa Tenggara, East Nusa Tenggara and Papua. Following the tsunami of 2004, the government of Indonesia has become more aware of the risks, both real and potential, affecting the provinces, and has taken steps to build the capacity of its staff in disaster risk reduction.
Emergency preparedness and response has also become a priority for the Indonesian Church, specifically the national Caritas office—KARINA—and a growing number of dioceses. Various disasters over the past five years offered opportunities for the dioceses in those areas to contribute to the disaster responses and increase their response and management capacities. This has provided Catholic Relief Services Indonesia with greater opportunity to work with and support the local Church and other organizations to improve their capacity in emergency response programming.
Latest Stories From Indonesia
View all stories »»
See all the different ways your support helps people around the world after disasters strike. »»
The latest eruption from Indonesia's Mount Merapi volcano killed 70 people and forced thousands to flee from their homes. »»
When Sumatran villagers were left homeless after an earthquake, a CRS program helped them build 11,000 houses in just a few months. »»
|Population:||248,645,008 (July 2012 est.)|
|Size:||735,358 sq. mi.; slightly less than three times the size of Texas|
|People Served:||863 (2012 est.)|
Since 1957, Catholic Relief Services has been helping rural communities in Indonesia alleviate human suffering, eradicate poverty and become self-reliant. Over the past five years, CRS in Indonesia has responded to various disasters and helped more than 60,000 people rebuild their lives. Our response to the West Sumatera earthquake in 2009 through cash grant for transitional shelter has been widely appreciated by the local government and donor community as the most effective strategy to provide timely, appropriate, accountable and high quality interventions.
PartnersKARINA (Caritas Indonesia)
CORDAID and Caritas Australia
United Nations Office for the Coordination of Humanitarian Affairs | <urn:uuid:148006ce-2cf9-4b2a-a5c6-7bc1a406a114> | CC-MAIN-2013-20 | http://www.crs.org/countries/indonesia | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.937576 | 568 | 3.03125 | 3 |
CTComms sends on average 2 million emails monthly on behalf of over 125 different charities and not for profits.
Take the complexity of technology and stir in the complexity of the legal system and what do you get? Software licenses! If you've ever attempted to read one you know how true this is, but you have to know a little about software licensing even if you can't parse all of the fine print.
By: Chris Peters
March 10, 2009
A software license is an agreement between you and the owner of a program which lets you perform certain activities which would otherwise constitute an infringement under copyright law. The software license usually answers questions such as:
The price of the software and the licensing fees, if any, are sometimes discussed in the licensing agreement, but usually it's described elsewhere.
If you read the definitions below and you're still scratching your head, check out Categories of Free and Non-Free Software which includes a helpful diagram.
Free vs Proprietary:
When you hear the phrase "free software" or "free software license," "free" is referring to your rights and permissions ("free as in freedom" or "free as in free speech"). In other words, a free software license gives you more rights than a proprietary license. You can usually copy, modify, and redistribute free software without paying a fee or obtaining permission from the developers and distributors. In most cases "free software" won't cost you anything, but that's not always the case – in this instance the word free is making no assertion whatsoever about the price of the software. Proprietary software puts more restrictions and limits on your legal permission to copy, modify, and distribute the program.
Free, Open-Source or FOSS?
In everyday conversation, there's not much difference between "free software," "open source software," and "FOSS (Free and Open-Source Software)." In other words, you'll hear these terms used interchangeably, and the proponents of free software and the supporters of open-source software agree with one another on most issues. However, the official definition of free software differs somewhat from the official definition of open-source software, and the philosophies underlying those definitions differ as well. For a short description of the difference, read Live and Let License. For a longer discussion from the "free software" side, read Why Open Source Misses the Point of Free Software. For the "open-source" perspective, read Why Free Software is Too Ambiguous.
Public domain and copyleft.
These terms refer to different categories of free, unrestricted licensing. A copyleft license allows you all the freedoms of a free software license, but adds one restriction. Under a copyleft license, you have to release any modifications under the same terms as the original software. In effect, this blocks companies and developers who want to alter free software and then make their altered version proprietary. In practice, almost all free and open-source software is also copylefted. However, technically you can release "free software" that isn't copylefted. For example, if you developed software and released it under a "public domain" license, it would qualify as free software, but it isn't copyleft. In effect, when you release something into the public domain, you give up all copyrights and rights of ownership.
Shareware and freeware.
These terms don't really refer to licensing, and they're confusing in light of the discussion of free software above. Freeware refers to software (usually small utilities at sites such as Tucows.com) that you can download and install without paying. However, you don't have the right to view the source code, and you may not have the right to copy and redistribute the software. In other words, freeware is proprietary software. Shareware is even more restrictive. In effect, shareware is trial software. You can use it for a limited amount of time (usually 30 or 60 days) and then you're expected to pay to continue using it.
End User Licensing Agreement (EULA).
When you acquire software yourself, directly from a vendor or retailer, or directly from the vendor's Web site, you usually have to indicate by clicking a box that you accept the licensing terms. This "click-through" agreement that no one ever reads is commonly known as a EULA. If you negotiate a large purchase of software with a company, and you sign a contract to seal the agreement, that contract usually replaces or supersedes the EULA.
Most major vendors of proprietary software offer some type of bulk purchasing and volume licensing mechanism. The terms vary widely, but if you order enough software to qualify, the benefits in terms of cost and convenience are significant. Also, not-for-profits sometimes qualify for it with very small initial purchases.
Some of the benefits of volume licensing include:
Lower cost. As with most products, software costs less when you buy more of it.
Ease of installation. Without volume licenses, you usually have to enter a separate activation code (also known as a product key or license key) for each installed copy of the program. On the other hand, volume licenses provide you with a single, organisation-wide activation code, which makes it much easier to find when you need to reinstall the software.
Easier tracking of licenses. Keeping track of how many licenses you own, and how many copies you've actually installed, is a tedious, difficult task. Many volume licensing programs provide an online account which is automatically updated when you obtain or activate a copy of that company's software. These accounts can also coordinate licensing across multiple offices within your organisation.
To learn more about volume licensing from a particular vendor, check out some of the resources below:
Qualified not-for-profits and libraries can receive donated volume licenses for Microsoft products through TechSoup. For more information, check out our introduction to the Microsoft Software Donation Program, and the Microsoft Software Donation Program FAQ. For general information about the volume licensing of Microsoft software, see Volume Licensing Overview.
If you get Microsoft software from TechSoup or other software distributors who work with not-for-profits, you may need to go to the eOpen Web site to locate your Volume license keys. For more information, check out the TechSoup Donation Recipient's Guide to the Microsoft eOpen Web Site.
Always check TechSoup Stock first to see if there's a volume licensing donation program for the software you're interested in. If TechSoup doesn't offer that product or if you need more copies than you can find at TechSoup, search for "volume licensing not-for-profits software" or just "not-for-profits software." For example, when we have an inventory of Adobe products, qualifying and eligible not-for-profits can obtain four individual products or one copy of Creative Suite 4 through TechSoup. If we're out of stock, or you've used up your annual Adobe donation, you can also check TechSoup's special Adobe donation program and also Adobe Solutions for Nonprofits for other discounts available to not-for-profits. For more software-hunting tips, see A Quick Guide to Discounted Software Programs.
Pay close attention to the options and licensing requirements when you acquire server-based software. You might need two different types of license – one for the server software itself, and a set of licenses for all the "clients" accessing the software. Depending on the vendor and the licensing scenario, "client" can refer either to the end users themselves (for example, employees, contractors, clients, and anyone else who uses the software in question) or their computing devices (for example, laptops, desktop computers, smartphones, PDAs, etc.). We'll focus on Microsoft server products, but similar issues can arise with other server applications.
Over the years, Microsoft has released hundreds of server-based applications, and the licensing terms are slightly different for each one. Fortunately, there are common license types and licensing structures across different products. In other words, while a User CAL (Client Access License) for Windows Server is distinct from a User CAL for SharePoint Server, the underlying terms and rights are very similar. The TechSoup product pages for Microsoft software do a good job of describing the differences between products, so we'll focus on the common threads in this article.
Moreover, Microsoft often lets you license a single server application in more than one way, depending on the needs of your organisation. This allows you the flexibility to choose the licenses that best reflect your organisation's usage patterns and thereby cost you the least amount of money. For example, for Windows Server and other products you can acquire licenses on a per-user basis (for example, User CALs) or per-device basis (for example, Device CALs).
The license required to install and run most server applications usually comes bundled with the software itself. So you can install and run most applications "out of the box," as long as you have the right number of client licenses (see the section below for more on that). However, when you're running certain server products on a computer with multiple processors, you may need to get additional licenses. For example, if you run Windows Server 2008 DataCenter edition on a server with two processors, you need a separate license for each processor. SQL Server 2008 works the same way. This type of license is referred to as a processor license. Generally you don't need client licenses for any application that's licensed this way.
Client Licenses for Internal Users
Many Microsoft products, including Windows Server 2003 and Windows Server 2008, require client access licenses for all authenticated internal users (for example, employees, contractors, volunteers, etc.). On the other hand, SQL Server 2008 and other products don't require any client licenses. Read the product description at CTXchange if you're looking for the details about licensing a particular application.
User CALs: User CALs allow each user access to all the instances of a particular server product in an organisation, no matter which device they use to gain access. In other words, if you run five copies of Windows Server 2008 on five separate servers, you only need one User CAL for each person in your organisation who access those servers (or any software installed on those servers), whether they access a single server, all five servers, or some number in between. Each user with a single CAL assigned to them can access the server software from as many devices as they want (for example, desktop computers, laptops, smartphones, etc.). User CALs are a popular licensing option.
Device CALs: Device CALs allow access to all instances of a particular server application from a single device (for example, a desktop computer, a laptop, etc.) in your organisation. Device CALs only make sense when multiple employees use the same computer. For example, in 24-hour call centres different employees on different shifts often use the same machine, so Device CALs make sense in this situation.
Choosing a licensing mode for your Windows Server CALs: With Windows Server 2003 and Windows Server 2008, you use a CAL (either a User CAL or a Device CAL) in one of two licensing modes: per seat or per server. You make this decision when you're installing your Windows Server products, not when you acquire the CALs. The CALs themselves don't have any mode designation, so you can use either a User CAL or a Device CAL in either mode. Per seat mode is the default mode, and the one used most frequently. The description of User CALs and Device CALs above describes the typical per seat mode. In "per server" mode, Windows treats each license as a "simultaneous connection." In other words, if you have 40 CALs, Windows will let 40 authenticated users have access. The 41st user will be denied access. However, in per server mode, each CAL is tied to a particular instance of Windows Server, and you have to acquire a new set of licenses for each new server you build that runs Windows. Therefore, per server mode works for some small organisations with one or two servers and limited access requirements.
You don't "install" client licenses the way you install software. There are ways to automate the tracking of software licenses indirectly, but the server software can't refuse access to a user or device on licensing grounds. The licenses don't leave any "digital footprint" that the server software can read. An exception to this occurs when you license Windows Server in per server mode. In this case, if you have 50 licenses, the 51st authenticated user will be denied access (though anonymous users can still access services).
Some key points to remember about client licensing:
The licensing scenarios described in this section arise less frequently, and are too complex to cover completely in this article, so they're described briefly below along with more comprehensive resources.
You don't need client licenses for anonymous, unauthenticated external users. In other words, if someone accesses your Web site, and that site runs on Internet Information Server (IIS), Microsoft's Web serving software, you don't need a client license for any of those anonymous users.
If you have any authenticated external users who access services on your Windows-based servers, you can obtain CALs to cover their licensing requirements. However, the External Connector License (ECL) is a second option in this scenario. The ECL covers all use by authenticated external users, but it's a lot more expensive than a CAL, so only get one if you'll have a lot of external users. For example, even if you get your licenses through the CTXchange donation program, an ECL for Windows Server 2008 has an £76 administrative fee, while a User CAL for Windows Server 2008 carries a £1 admin fee. If only a handful of external users access your Windows servers, you're better off acquiring User CALs. Also, an ECL only applies to external users and devices. In other words, if you have an ECL, you still have to get a CAL for all employees and contractors.
Even though Terminal Services (TS) is built into Windows Server 2003 and 2008, you need to get a separate TS CAL for each client (i.e. each user or each device) that will access Terminal Services in your organisation. This TS license is in addition to your Windows Server CALs.
Microsoft's System Centre products (a line of enterprise-level administrative software packages) use a special type of license known as a management license (ML). Applications that use this type of licensing include System Center Configuration Manager 2007 and System Center Operations Manager 2007. Any desktop or workstation managed by one of these applications needs a client management license. Any server managed by one of these applications requires a server management license, and there are two types of server management licenses – standard and enterprise. You need one or the other but not both. There are also special licensing requirements if you're managing virtual instances of Windows operating systems. For more information, see TechSoup's Guide to System Center Products and Licensing and Microsoft's white paper on Systems Center licensing.
Some Microsoft server products have two client licensing modes, standard and enterprise. As you might imagine, an Enterprise CAL grants access to more advanced features of a product. Furthermore, with some products, such as Microsoft Exchange, the licenses are additive. In other words, a user needs both a Standard CAL AND an Enterprise CAL in order to access the advanced features. See Exchange Server 2007 Editions and Client Access Licenses for more information.
With virtualisation technologies, multiple operating systems can run simultaneously on a single physical server. Every time you install a Microsoft application, whether on a physical hardware system or a virtual hardware system, you create an "instance" of that application. The number of "instances" of particular application that you can run using a single license varies from product to product. For more information see the Volume Licensing Briefs, Microsoft Licensing for Virtualization and the Windows Server Virtualization Calculator. For TechSoup Stock products, see the product description for more information.
There are a lot of nuances to Microsoft licensing, and also a lot of excellent resources to help you understand different scenarios.
About the Author:
Chris is a former technology writer and technology analyst for TechSoup for Libraries, which aims to provide IT management guidance to libraries. His previous experience includes working at Washington State Library as a technology consultant and technology trainer, and at the Bill and Melinda Gates Foundation as a technology trainer and tech support analyst. He received his M.L.S. from the University of Michigan in 1997.
Originally posted here.
Copyright © 2009 CompuMentor. This work is published under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 License.
The latest version of Microsoft Office Professional Plus is an integrated collection of programs, servers, and services designed to work together to enable optimised information work. | <urn:uuid:c337bcd8-6aa1-4f2d-8c48-b916442ebbee> | CC-MAIN-2013-20 | http://www.ctt.org/resource_centre/getting_started/learning/understanding_licenses | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.910602 | 3,479 | 3.234375 | 3 |
- Our Story
- In Memory
Vaccination and Immunotherapy for Alzheimer’s Disease
Vaccination against amyloid is a promising approach for the development of Alzheimer’s disease (AD) therapeutics. Approximately half of the investigational new therapeutics in human clinical trials for AD are active or passive immunotherapeutics.
Active vaccination involves the injection of an antigen and relies on the production of antibodies in the vaccinated patient. Four human clinical trials of active vaccination currently are under way. Passive immunization is also a promising strategy that involves the production of antibodies outside of the patient and injection of these antibodies. There are currently 12 clinical trials of passive immunization. You can check for Alzheimer therapeutics in human clinical trials by visiting www.clinicaltrials.gov and searching for key words “Alzheimer’s and immunotherapy.”
Thinking out of the box
The development of vaccinations as a strategy for treating or preventing Alzheimer’s is an example of thinking out of the box. Vaccinations commonly are associated with infectious diseases, like influenza, small pox and polio, which appear to have little in common with neurodegenerative diseases, like Alzheimer’s. Moreover, the brain is an immunoprivileged site with little access to antibodies, so it seems unlikely antibodies would be protective in the brain.
Researchers were pleasantly surprised when Dale Schenk and co-workers at Elan Inc. reported that vaccination of transgenic mouse models of AD against the amyloid Aß peptide prevented amyloid deposition in young animals and removed pre-existing amyloid deposits in older animals. Subsequent work showed that immunization against Aß prevented or reversed many other pathological features and prevented cognitive dysfunction in transgenic mice and non-human primates. This vaccine (Elan AN1792) was tested in human clinical trials, where it showed similar beneficial effects of removing amyloid deposits and slowing cognitive decline in patients with significant levels of anti-Aß antibodies, but the clinical trial was halted because 6 percent of the patients developed meningoencephalitis, an inflammatory side effect.
Second-generation vaccines and passive immunization
To circumvent the unwanted inflammatory side effects, second-generation active vaccines have been developed and passive immunization strategies have been explored. The second-generation vaccines use small pieces of the amyloid Aß sequence to avoid activating the T-cells responsible for meningoencephalitis, while passive immunization bypasses the human immune response by directly supplying antibodies. These newer strategies have shown the same beneficial effects in transgenic mice and passive immunization has shown some promise in a subset of patients in human trials, but they have raised new questions about their effectiveness and potential new side effects. Elan/Wyeth reported preliminary results from clinical trials of their monoclonal antibody, Bapineuzimab, that demonstrated only a small benefit in a subgroup of patients who lack the apoE4 genotype. They also failed to observe an improved benefit with an increased dose of antibody and reported side effects, like a buildup of fluid in the brain. Results of active vaccination human clinical trials with second-generation vaccines remain to be reported.
Third-generation vaccines and antibodies: Thinking perpendicular to the box
Both second-generation vaccines and antibodies suffer from a common problem. They both target linear amino acid sequences found in normal human proteins (the amyloid precursor protein) and in the amyloid deposits themselves. Making antibodies against normal human proteins can cause autoimmune side effects, in which the immune system is attacking normal human cells in addition to the Alzheimer’s pathology. Fortunately, it is difficult to make antibodies against self-proteins because of immune suppression of auto antibodies. Third-generation vaccines seek to overcome these problems of autoimmune side effects and autoimmune suppression by using antibodies that target structures specific to the amyloid aggregates and that do not react with normal human proteins.
Cure Alzheimer’s Fund has been supporting two projects that seek to develop third-generation immunotherapeutics. Dr. Charles Glabe’s laboratory is developing active vaccines and monoclonal antibodies that recognize conformations of the amyloid peptide that only occur in the pathological amyloid oligomer aggregates, while Dr. Rob Moir’s lab is working on cross-linked amyloid peptides (CAPs) that are only found in disease-related aggregates. Dr. Glabe’s strategy relies on the fact that when the Aß peptide aggregates into ß-sheet oligomers, it creates new antibody recognition sites, known as epitopes, that are not found on native proteins. The surprising finding is that these oligomer-specific antibodies recognize amyloid oligomers from other diseases that involve amyloids formed from sequences unrelated to Aß. This means the same antibodies also may be effective for other amyloid-related neurodegenerative diseases, like Parkinson’s disease.
The explanation for why the antibodies are specific for amyloid oligomers that involve several individual peptide strands arranged in a sheet and yet recognize these sheets when they are formed from other amino acid sequences is simple and elegant (Figure 1). It is now known that most pathological amyloids aggregate into simple and very regular structures where the peptide strands are arranged in parallel and where the amino acid sequence is in exact register. This is like a sheet of paper upon which the same sentence is written on each line. The individual amino acids line up and down the sheet in homogeneous tracts, known as “steric zippers.” The steric zippers do not occur in normal protein structures and the oligomer-specific antibodies are thought to recognize these steric zipper patterns on the surface of the sheets. Since all proteins are made up using the same 20 amino acids, any sequence in this parallel, in-register structure gives rise to the same steric zippers regardless of the linear sequence, which can explain why the antibodies recognize the oligomers formed by different proteins.
Dr. Moir’s group is working on CAPs, where Aß is cross-linked by oxidation of a tyrosine residue at position 10 of the peptides’ sequence. Aß is oxidized after it is produced from the amyloid precursor protein as a consequence of the abnormally high level of oxidative activity in a brain with AD and the peptides’ propensity to bind redox active metals. Excessive CAPs generation is associated with the disease state and is not a normal feature of Aß biology. The cross-linking at tyrosine 10 that gives rise to CAPs may serve to align the peptides in a parallel, in-register fashion and promote the generation of still-larger oligomeric aggregates that display steric zippers on their surface.
Dr. Moir and Dr. Rudy Tanzi’s labs found that natural antibodies to CAPs are reduced in the blood of patients with AD. More recently, evidence published by Tony Weiss-Coray’s group at Stanford University supports the idea that antibodies that recognize steric zippers and CAPs may be important for protecting against Alzheimer’s disease. The levels of these antibodies that target the zippers and CAPs were among the highest in young, normal humans; levels dropped with aging and with AD. Furthermore, the results of a recent study supported by Baxter Biosciences of patients that received human antibodies purified from normal individuals (IVIg) reported that antibody treatment reduced the risk of being diagnosed with AD by 42 percent over the five-year study period. This is one of the most remarkable reports of prevention of AD by any therapy. Although the normal human antibodies that target amyloid primarily recognize the steric zippers and CAPs, these antibodies are present at relatively low levels. It is reasonable to imagine that an even greater protective effect might be achieved by boosting the levels of these protective antibodies by either active vaccination or passive immunization.
Figure 1 shows how the same steric zipper patterns are formed on parallel, in-register oligomers from completely different sequences. A segment of the Aß sequences is shown in the upper left corner and a random sequence is shown in the upper right. Each amino acid is designated by a capital letter. Typical antibodies recognize the linear sequence (from left to right) indicated in the horizontal boxes, which is unique to each sequence. When the peptides aggregate to form pathological oligomers, they line up in a parallel, in-register fashion, shown below. This gives rise to steric zippers that run up and down the sheet perpendicular to the sequence, shown in vertical boxes. Aggregation-dependent, disease-specific antibodies recognize the steric zippers from many different amyloid sequences. Zippers from F and V amino acids are shown in boxes, but there are potentially 20 different zippers; one for each of the 20 amino acids.
The fact that a completely random sequence can form the same type of steric zipper as is found in Aß amyloid in Alzheimer’s disease means we can use a non-human, random peptide sequence as a vaccine to produce a protective immune response that has a very low potential for autoimmune side effects. Vaccines based on non-human peptides, like diphtheria and pertussis toxin, are so safe they routinely are given to infants. There is no reason to expect that a vaccine for AD that targets the disease-specific steric zippers wouldn’t be as safe and free of side effects. A goal of the research funded by Cure Alzheimer’s Fund is to do the preclinical investigations that are a necessary prelude to getting these third-generation vaccines and monoclonal antibodies that target disease-specific epitopes into human clinical trials. | <urn:uuid:063831fb-bde6-43d4-95fe-4286849bf7d1> | CC-MAIN-2013-20 | http://www.curealzfund.org/2009/10/vaccination-and-immunotherapy-alzheimer%E2%80%99s-disease?page=70 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.940551 | 2,013 | 2.890625 | 3 |
Aliphatic alcohols occur
naturally in free form (component of the cuticular lipids) but more usually in esterified
(wax esters) or etherified form (glyceryl ethers). Several alcohols belong to aroma
compounds which are found in environmental or food systems (see the website: Flavornet).
They are found with normal, branched (mono- or isoprenoid), saturated or unsaturated of various chain length and sometimes with secondary or even tertiary alcoholic function. An unusual phenolic alcohol is found as a component of glycolipids in Mycobacteria. Some cyclic alcohols have been described in plants.
A classification according to the carbon-chain structure is given below.
1 - Normal-chain alcohols
The carbon chain may be fully saturated or unsaturated (with double and/or triple bonds), it may also be substituted with chlorine, bromine or sulfate groups. Some acetylenic alcohols have been also described.
Among the most common, some are listed below
9-methyl-1-hendecanol (anteisolauryl alcohol)
11-methyl-1-tridecanol (anteisomyristyl alcohol)
14-methyl-1-pentadecanol (isopalmityl alcohol)
13-methyl-1-pentadecanol (anteisopalmityl alcohol)
16-methyl-1-heptadecanol (isostearyl alcohol)
15-methyl-1-pentadecanol (anteisostearyl alcohol)
Free fatty alcohols are not commonly found in epicuticular lipids of insects, although high molecular weight alcohols have been reported in honeybees (Blomquist GJ et al., Insect Biochem 1980, 10, 313). Long-chain alcohols also have been reported in the defensive secretions of scale insects (Byrne DN et al., Physiol Entomol 1988, 13,267). Typically, insects more commonly produce lower molecular weight alcohols. Honeybees produce alcohols of 17–22 carbons, which induce arrestment in parasitic varroa mites (Donze G et al., Arch Insect Biochem Physiol 1998, 37, 129). Two female-specific fatty alcohols, docosanol (C22) and eicosanol (C20), which have been found in epicuticle of Triatoma infestans (a vector of Chagas disease in South America), are able to trigger copulation in males (Cocchiararo-Bastias L et al., J Chem Ecol 2011, 37, 246). Hexadecyl acetate is found in the web of some spiders (Pholcidae) to attract females (Schulz S, J Chem Ecol 2013, 39, 1).
Long-chain alcohols (C18, C24, C28) from the femoral glands in the male lizard Acanthodactylus boskianus play a role in chemical communication as a scent marking pheromone (Khannoon ER et al., Chemoecology 2011, 21, 143).
Various fatty alcohols are found in the waxy film that plants have over their leaves and fruits. Among them, octacosanol (C28:0) is the most frequently cited.
Policosanol is a natural mixture of higher primary aliphatic alcohols isolated and purified from sugar cane (Saccharum officinarum, L.) wax, whose main component is octacosanol but contains also hexacosanol (C26:0) and triacontanol or melissyl alcohol (C30:0). Policosanol is also extracted from a diversity of other natural sources such as beeswax, rice bran, and wheat germ (Irmak S et al., Food Chem 2006, 95, 312) but is also present in the fruits, leaves, and surfaces of plants and whole seeds. A complex policosanol mixture has been identified in peanut (Cherif AO et al., J Agric Food Chem 2010, 58, 12143). More than 20 aliphatic alcohols were identified (C14-C30) and four unsaturated alcohols (C20-24). The total policosanol content of the whole peanut samples varied from 11 to 54 mg/100 g of oil.
This mixture was shown to have cholesterol-lowering effects in rabbits (Arruzazabala ML et al., Biol Res 1994, 27, 205). Octacosanol was also able to suppress lipid accumulation in rats fed on a high-fat diet (Kato S et al., Br J Nutr 1995, 73, 433) and to inhibit platelet aggregation (Arruzazabala ML et al., Thromb Res 1993, 69, 321). The effectiveness of policosanol is still questionable but it has been approved as a cholesterol-lowering drug in over 25 countries (Carbajal D et al., Prostaglandins Leukotrienes Essent Fatty Acids 1998, 58, 61), and it is sold as a lipid-lowering supplement in more than 40 countries. More recent studies in mice question about any action on improvement of lipoprotein profiles (Dullens SPJ et al., J Lipid Res 2008, 49, 790). The authors conclude that individual policosanols, as well as natural policosanol mixtures, have no potential for reducing coronary heart disease risk through effects on serum lipoprotein concentrations. Furthermore, sugar cane policosanol at doses of 20 mg daily has shown no lipid lowering effects in subjects with primary hypercholesterolemia (Francini-Pesenti F et al., Phytother Res 2008, 22, 318). It must be noticed that, for the most part, positive results have been obtained by only one research group in Cuba. Outside Cuba, all groups have failed to validate the cholesterol-lowering efficacy of policosanols (Marinangeli C et al., Crit Rev Food Sci Nutr 2010, 50, 259). Independent studies are required before evaluating the exact value of the therapeutic benefits of that mixture.
An unsaturated analogue of octacosanol, octacosa-10, 19-dien-1-ol was synthesized and was as effective as policosanol in inhibiting the upregulation of HMGCoA reductase (Oliaro-Bosso S et al., Lipids 2009, 44, 907). This work opens promising perspectives for the design of new antiangiogenic compounds (Thippeswamy G et al., Eur J Pharmacol 2008, 588, 141). An unsaturated analogue of octacosanol, octacosa-10, 19-dien-1-ol was synthesized and was as effective as policosanol in inhibiting the upregulation of HMGCoA reductase (Oliaro-Bosso S et al., Lipids 2009, 44, 907). This work opens promising perspectives for the design of new antiangiogenic compounds.
1-Octanol and 3-octanol are components of the mushroom flavor (Maga JA, J Agric Food Chem 1981, 29, 1).
Many alcohols in the C10 to C18 range, and their short-chain acid esters are potent sex or aggregation pheromones. They are mainly found as components of specialized defensive glands, pheromone glands or glands of the reproductive system.
A series of C22 up to C28 saturated n-alcohols, with even carbon numbers predominating, and a maximum at C26 and C28, has been identified in the cyanobacterium Anabaena cylindrica (Abreu-Grobois FA et al., Phytochemistry 1977, 16, 351). Several authors have reported high contents of the 22:0 alcohol in sediments where an algal origin is plausible. For example, the major alcohol in a sample of the lacustrine Green River Shale of Eocene age is also 22:0 which comprises over 50% of the alcohols present (Sever JR et al., Science 1969, 164, 1052)
Long-chain alcohols are known as major surface lipid components (waxes) with chains from C20 up to C34 carbon atoms, odd carbon-chain alcohols being found in only low amounts. Very long-chain methyl-branched alcohols (C38 to C44) and their esters with short-chain acids were shown to be present in insects, mainly during metamorphosis. A series of long-chain alkanols (more than 23 carbon atoms) were identified in settling particles and surface sediments from Japanese lakes and were shown to be produced by planktonic bacteria being thus useful molecular markers (Fukushima K et al., Org Geochem 2005, 36, 311).
Cutin and suberin contain as monomer saturated alcohols from C16 to C22 up to 8% of the total polymers. C18:1 alcohol (oleyl alcohol) is also present.
Long-chain di-alcohols (1,3-alkanediols) have been described in the waxes which impregnate the matrix covering all organs of plants (Vermeer CP et al., Phytochemistry 2003, 62, 433). These compounds forming about 11% of the leaf cuticular waxes of Ricinus communis were identified as homologous unbranched alcohols ranging from C22 to C28 with hydroxyl group at the carbon atoms 1 and 3.
In the leaf cuticular waxes of Myricaria germanica (Tamaricaceae) several alkanediols were identified (Jetter R, Phytochemistry 2000, 55, 169). Hentriacontanediol (C31) with one hydroxyl group in the 12-position and the second one in positions from 2 to 18 is the most abundant diol (9% of the wax). Others were far less abundant : C30-C34 alkanediols with one hydroxyl group on a primary and one on a secondary carbon atom, C25-C43 b-diols and C39-C43 g-diols. Very-long-chain 1,5-alkanediols ranging from C28 to C38, with strong predominance of even carbon numbers, were identified in the cuticular wax of Taxus baccata (Wen M et al., Phytochemistry 2007, 68, 2563). The predominant diol had 32 carbon atoms (29% of the total).
Long-chain saturated C30-C32 diols occur in most marine sediments and in a few instances, such as in Black Sea sediments, they can be the major lipids (de Leeuw JW et al., Geochim Cosmochim Acta 1981, 45, 2281). A microalgal source for these compounds was discovered when Volkman JK et al. (Org Geochem 1992, 18, 131) identified C30-C32 diols in marine eustigmatophytes from the genus Nannochloropsis.
Two nonacosanetriols (7,8,11-nonacosanetriol and 10,12,15-nonacosanetriol) have been isolated from the outer fleshy layer (sarcotesta) of the Ginkgo biloba "fruit" (Zhou G et al., Chem Phys Lipids 2012, 165, 731). They exhibited slight activity of antithrombin and moderate activities of platelet aggregation in vitro.
The chief lipid fraction in the uropygial gland excretion of the domestic hen is a diester wax. The unsaponifiable fraction consists of a series of three homologous compounds, which have been named the uropygiols and identified as 2,3-alkanediols containing 22-24 carbon atoms. These fatty alcohols are esterified by saturated normal C22-C24 fatty acids (Haahti E et al., J Lipid Res 1967, 8, 131).
- Unsaturated alcohols
Some fatty alcohols have one double bond (monounsaturated). Their general formula is:
The unique double bond may be found in different positions: at the C6: i.e. cis-6-octadecen-1-ol (petroselenyl alcohol), C9 i.e cis-9-octadecen-1-ol (oleyl alcohol) and C11 i.e cis-11-octadecen-1-ol (vaccenyl alcohol). Some of these alcohols have insect pheromone activity. As an example, 11-eicosen-1-ol is a major component of the alarm pheromone secreted by the sting apparatus of the worker honeybee. In zooplankton, the cis-11-docosen-1-ol (22:1 (n-11) alcohol) is not only present in high proportion in wax esters (54 to 83%) but may be also predominant in free form (75-94% of free alcohols) in ctenophores (Graeve M et al., Mar Biol 2008, 153, 643). This presence is unexplained because pathways for conversion and catabolism of fatty alcohols in ctenophores are still unknown.
Some short-chain unsaturated alcohols are components of mushroom flavor, such as 1-octen-3-ol, t2-octen-1-ol, and c2-octen-1-ol (Maga JA, J Agric Food Chem 1981, 29, 1).
An acetoxy derivative of a 16-carbon alcohol with one double bond, gyptol (10-acetoxy cis-7-hexadecen-1-ol), was described to be a strong attractive substance secreted by a female moth (Porthetria dispar, "gypsy moth").
A fatty alcohol with two double bonds, bombykol (tr-10,cis-12-hexadecadien-1-ol), was also shown to be excreted as a very strong attractive substance by the female of silk-worm (Bombyx mori).
This first discovery of a pheromone
was made by Butenandt A et al. (Z Naturforsch 1959, 14, 283) who was
formerly Nobel laureate (in 1939) for his work in sex hormones. Another pheromone,
8,10-dodecadienol (codlemone), is secreted by the codling moth Cydia
pomonella, has been used for monitoring and mating in apple and pear
orchards in the USA and Europe. This molecule was also used to monitor the
population of the pea moth Cydia nigricana. Likewise, 7,9-dodecadienol,
the female pheromone of the European grapewine moth Lobesia botrana, was
used to control this important pest in vineyards.
A fatty triol with one double bond, avocadene (16-heptadecene-1,2,4-triol) is found in avocado fruit (Persea americana) and has been tested for anti-bacterial and anti-inflammatory properties. These properties are likely related with the curative effects of avocado described for a number of ailments (diarrhea, dysentery, abdominal pains and high blood pressure). Several others heptadecanols with one primary and two secondary alcohol functions and with one double or triple bond have been identified in the leaves of Persea americana (Lee TH et al., Food Chem 2012, 132, 921). One or two of these alcohol groups may be acetylated. These compounds may be related to the known antifungal activity of Persea leaves.
Long-chain alkenols (C37 to C39) with 2 to 4 double bonds, the reduced form of the alkenones, have been described in the benthic haptophyte Chrysotila lamellosa (Rontani JF et al., Phytochemistry 2004, 65, 117). al., 1986). C30 to C32 alcohols having one or two double bonds are significant constituents of the lipids of marine eustigmatophytes of the genus Nannochloropsis (Volkman JK et al., Org Geochem 1992, 18, 131). These microalgae could be partially the source of the alkenols found in some marine sediments.
Two chlorinated derivatives of unusual alcohols were described in a red alga Gracilaria verrucosa (Shoeb M et al., J Nat Prod 2003, 66, 1509). Both compounds have a C12 aliphatic chain chlorinated in position 2 and with one double bond at carbon 2 (compound 1 : 2-chlorododec-2-en-1-ol) or two double bonds at carbon 2 and 11 (compound 2 : 2-chlorododec-2,11-dien-1-ol).
- Acetylenic alcohols
Natural acetylenic alcohols and their derivatives have been isolated from a wide variety of plant species, fungi and invertebrates. Pharmacological studies have revealed that many of them display chemical and medicinal properties.
Monoacetylenic alcohols : were isolated from culture of Clitocybe catinus (Basidiomycetes) and the study of their structure revealed the presence of two or three hydroxyl groups (Armone A et al., Phytochemistry 2000, 53, 1087). One of these compounds is shown below.
Acetylenic alcohols have been also described in a tropical sponge Reniochaline sp (Lee HS et al., Lipids 2009, 44, 71). One of the two described in that species is shown below, it exhibited a significant growth effect against human tumor cell lines.
Polyacetylenic alcohols : Several examples with different chain lengths, unsaturation degrees, and substitution have been reported from terrestrial plants and marine organisms. Food plants of the Apiaceae (Umbellifereae) plant family such as carrots, celery and parsley, are known to contain several bioactive bisacetylenic alcohols. The main plant sources of these compounds are Angelica dahurica, Heracleum sp and Crithmum maritimum (falcarindiol, falcarinol), red ginseng (Panax ginseng) (panaxacol, panaxydol, panaxytriol), Cicuta virosa (virol A), and Clibadium sylvestre (cunaniol). All these compounds display antibiotic or cytotoxic activities.
Polyacetylenes have been isolated from the stems of Oplopanax elatus (Araliaceae), plant used in Korean and Chinese traditional medicine for anti-inflammatory and analgesic purposes (Yang MC et al., J Nat Prod 2010, 73, 801). Among the most efficient in inhibiting the formation of nitric oxide in LPS-induced cells is a seventeen-carbon diyne diol with an epoxy cycle, oploxyne A. Other parent compounds without the epoxy group were also described.
J. Sci. Food Agric. 2003,
83, 1010). Falcarinl
has potent anticancer properties on primary mammary epithelial cells and was
compared with that of
b-carotene. These results might be important in developing
new cancer treatments with simple and common vegetables. At high concentrations,
falcarinol is capable to induce contact dermatitis.
Falcarinol, a seventeen-carbon diyne fatty alcohol (1,9-heptadecadiene-4,6-diyn-3-ol), was first isolated from Falcaria vulgaris (Bohlmann F et al., Chem Ber 1966, 99, 3552) as well as from Korean ginseng (Takahashi et al., Yakugaku Zasshi 1966, 86, 1053). It was also isolated from carrot (Hansen SL et al.
Falcarinol protects the
vegetable from fungal diseases, it showed biphasic activity, having stimulatory
effects between 0.01 and 0.05 µg per ml and inhibitory effects between 1 and 10
µg per ml, whereas b-carotene
showed no effect in the concentration range 0.001–100 µg per ml (Hansen SL
et al., J Sci Food Agric 2003, 83, 1010). Experiments with
macrophage cells have shown that falcarinol (and its C-8 hydroxylated
derivative, falcarindiol) reduced nitric oxide production, suggesting that these
polyacetylenes are responsible for anti-inflammatory bioactivity (Metzger
BT et al., J Agric Food Chem 2008, 56, 3554). Falcarindiol was first
reported as phytochemicals in carrots (Daucus carota) (Bentley RK et
al., J Chem Soc 1969, 685). Besides falcarinol, falcarindiol, and
falcarindiol 3-acetate, nine additional bisacetylene alcohols were identified in
Daucus carota (Schmiech L et al., J Agric Food Chem 2009, 57, 11030).
Experiments with human intestinal cells demonstrate that aliphatic C17-polyacetylenes (panaxydol, falcarinol, falcarindiol) are potential anticancer principles of carrots and related vegetables (parsley, celery, parsnip, fennel) and that synergistic interaction between bioactive polyacetylenes may be important for their bioactivity (Purup S et al., J Agric Food Chem 2009, 57, 8290). Compounds very similar to falcarinol and extracted from Panax japonicus are potent a-glucosidase inhibitors (Chan HH et al., Phytochemistry 2010, 71, 1360). These inhibitors may potentially reduce the progression of diabetes by decreasing digestion and absorption of carbohydrates.
The water dropwort (Oenanthe crocata), which lives near streams in the Northern Hemisphere, contains a violent toxin, cicutoxin, resulting in convultions and respiratory paralysis (Uwai K et al., J Med Chem 2000, 43, 4508).
The biochemistry and bioactivity of polyacetylenes are presented in a review (Christensen LP et al., J Pharm Biomed Anal 2006, 41, 683) as well methods for the isolation and quantification of these compounds.
Many other polyacetylenic alcohols were found in primitive marine organisms,
such as sponges and ascidians. These invertebrates have no physical defenses and
thus they have developed efficient chemical mechanisms such as polyacetylenic
metabolites to resist predators and bacteria.
A C36 linear diacetylene alcohol named lembehyne was found in an Indonesian marine sponge (Haliclona sp) (Aoki S et al., Tetrahedron 2000, 56, 9945) and was later able to induce neuronal differentiation in neuroblastoma cell (Aoki S et al., Biochem Biophys Res Comm 2001, 289, 558).
Several polyacetylenic alcohols with 22 carbon atoms were isolated and identified in lipid extract from a Red Sea sponge, Callyspongia sp (Youssef DT et al., J Nat Prod 2003, 66, 679). Their physical study revealed the presence of 4 triple bonds and one, two or three double bonds. The structure of one of these Callyspongenols is given below.
Several di- and
tri-acetylenic di-alcohols with a chain of 26 up to 31 carbon atoms, named strongylodiols,
have been isolated from a Petrosia Okinawan marine sponge (Watanabe K
et al., J Nat Prod 2005, 68, 1001). Some of them have cytotoxic
Several polyacetylenic alcohols with 21 carbon atoms were isolated from a marine ascidian (Polyclinidae) and were determined to have two triple bonds combined with a conjugated dienyne group (Gavagnin M et al., Lipids 2004, 39, 681). Some of them have an additional hydroxyl group or only three double bonds. The structure of one of these molecules is given below.
Several brominated polyacetylenic diols with cytotoxic properties were isolated from a Philippines sponge Diplastrella sp (Lerch ML et al., J Nat Prod 2003, 66, 667). One of these molecules is shown below.
A comprehensive survey of acetylenic alcohols in plant and invertebrates with information on their anticancer activity has been released by Dembitsky VM (Lipids 2006, 41, 883).
- Sulfated alcohols
Long-chain di-hydroxy alcohols in which both the primary and secondary hydroxyl groups are converted to sulfate esters and one to five chlorine atoms are introduced at various places have been discovered in the alga Ochromonas danica (Chrysophyceae, Chrysophyta) where they constitute 15% of the total lipids (Haines TH, Biochem J 1969, 113, 565). An example of these chlorosulfolipids is given below. There may be several types of chlorine addition : one at R4, two at R3 and R5 or R1 and R2, five at R1 to R5 and six at R1 to R6.
Similar molecules with a 24 carbon
chain was also described in Ochromonas malhamensis (review in Dembitsky
VM et al., Prog Lipid Res 2002, 41, 315 and in Bedke DK et
al., Nat Prod Rep 2011, 28, 15). It was suggested that the
chlorosulfolipids replace sulfoquinovosyl diglyceride, since when the later is
high the former is low and vice versa. They have been associated with the human
toxicity of the mussel-derived lipids (Diarrhetic Shellfish Poisoning).
Several of these chlorosulfolipids have also been identified from more than 30 species of both freshwater and marine algae belonging to green (Chlorophyceae), brown (Phaeophyceae), red (Rhodophyceae) macrophytic algae (Mercer EI et al., Phytochemistry 1979, 18, 457), and other microalgal species (Mercer EI et al., Phytochemistry 1975, 14, 1545).
Some fatty alcohols, such as dodecanol (lauryl or dodecyl alcohol), are used for the manufacture of detergents after sulphonation (by action of SO3 gas). The salt sodium laurylsulfate (or sodium dodecylsulfate) is a detergent and strong anionic surfactant, used in biochemistry and in the composition of cosmetic products (shampoos, toothpastes).
2 - Branched-chain alcohols
In 1936, Stodola et al. characterized an optically active substance recovered on saponification of ‘‘purified waxes’’ of Mycobacterium tuberculosis, determined its global formula and proposed to name it phthiocerol (Stodola FH et al., J Biol Chem 1936, 114, 467). In 1959, after several chemical studies, its structure was determined as a mixture of C36 and C34b-glycols. It has been proposed that the term phthiocerol be reserved for the original 3-methoxy congener (phthiocerol A) and that the term phthioglycol be used to refer to the family of compounds (Onwueme KC et al., Prog Lipid Res 2005, 44, 259).
Among the most important saturated isopranols found in plants or in geological sediments are those having two (tetrahydrogeraniol), three (farnesanol), or four (phytanol) isoprenoid units. Pristanol (2,6,10,14-tetramethyl-1-pentadecanol) is tetramethylated but with only three complete isoprenoid units.
B - Unsaturated polyisoprenoids (prenols or polyprenols)
They have the following general structure :
These molecules consist of several up to more than 100 isoprene residues linked head-to-tail, with a hydroxy group at one end (a-residue) and a hydrogen atom at the other (w-end).
- 1. all trans forms : They have the following structure:
Some important members of the series are as follows:
Number of isoprene unit
Number of carbons
Long-chain trans-polyprenol (n>8) have been
characterized from Eucommia ulmoides.
Geraniol (from rose oil) is a monoterpene (2 isoprene units). It has a rose-like odor and is commonly used in perfumes and as several fruit flavors. Geraniol is also an effective mosquito repellent. Inversely, it can attract bees as it is produced by the scent glands of honey bees to help them mark nectar-bearing flowers and locate the entrances to their hives.
Farnesol is a sesquiterpene (3 isoprene units). It is the prenol that corresponds to the carbon skeleton of the simplest juvenile hormone described for the first time in insects in 1961 (Schmialek PZ, Z Naturforsch 1961, 16b, 461; Wigglesworth VB, J Insect Physiol 1961, 7, 73). It is present in many essential oils such as citronella, neroli, cyclamen, lemon grass, rose, and others. It is used in perfumery to emphasize the odors of sweet floral perfumes. It is especially used in lilac perfumes. As a pheromone, farnesol is a natural pesticide for mites. The dimorphic fungus Candida albicans has been shown to use farnesol as quorum-sensing molecule (Hornby JM et al., Appl Environ Microbiol 2001, 67, 2982).
Geranylgeraniol is a diterpene (4 isoprene units). Geraniol and geranylgeraniol are important molecules in the synthesis of various terpenes, the acylation of proteins and the synthesis of vitamins (Vitamins E and K). The covalent addition of phosphorylated derivatives of typical isoprenoids, farnesyl pyrophosphate and geranylgeranyl pyrophosphate, to proteins is a process (prenylation) common to G protein subunits. These isoprenylated proteins have key roles in membrane attachment leading to central functionality in cell biology and pathology.
Solanesol, discovered in tobacco leaves in 1956 (Rowland RL et al., J Am Chem Soc 1956, 78, 4680), may be an important precursor of the tumorigenic polynuclear aromatic hydrocarbons of smoke but is also a possible side chain for plastoquinone. Solanesol is also present in the leaves of other Solanaceae plants including tomato, potato, eggplant and pepper. It has useful medicinal properties and is known to possess anti-bacterial, anti-inflammation, and anti-ulcer activities (Khidyrova NK et al., Chem Nat Compd 2002, 38, 107). Industrially, solanesol is extracted from Solanaceae leaves (about 450 tons in 2008) and used as an intermediate in the synthesis of coenzyme Q10 and vitamin K analogues.
Spadicol was discovered in the spadix (inflorescence) of the Araceae Arum maculatum (Hemming FW et al., Proc R Soc London 1963, 158, 291). Its presence is likely related to its presence in the ubiquinone as the side-chain.
Phytol is a partially saturated diterpene, a monounsaturated derivative of geranylgeraniol which is part of the chlorophyll molecule :
- 2. ditrans-polycis-prenols, such as the bacteria prenol and betulaprenol types. In general, bacteria, as all prokaryotic cells, possess ditrans-polycis-prenols containing between 10 and 12 units, the most abundant being undecaprenol (trivial name bactoprenol).
Betulaprenols with n = 3-6 were
isolated from the woody tissue of Betula verrucosa (Wellburn AR et
al., Nature 1966, 212, 1364), and bacterial polyprenol with n = 8 were
isolated from Lactobacillus plantarum (Gough DP et al., Biochem J
1970, 118, 167). Betulaprenol-like species with 14 to 22 isoprene units have
been discovered in leaves of Ginkgo biloba (Ibata K et al., Biochem J
1983, 213, 305).
Polyisoprenoid alcohols are accumulated in the cells most often as free alcohols and/or esters with carboxylic acids. A fraction of polyisoprenoid phosphates has also been detected, and this form is sometimes predominant in dividing cells and Saccharomyces cerevisiae (Adair WL et al., Arch Biochem Biophys 1987, 259, 589).
- 3. tritrans-polycis-prenols, of the ficaprenol type.Some of the earliest samples were obtained from Ficus elastica, giving rise to the trivial names ficaprenol-11 and ficaprenol-12 (Stone KJ et al. Biochem J 1967, 102, 325).
In plants, the diversity of polyprenols is much broader, their chain length covers the broad spectrum of compounds ranging from 6 up to 130 carbon atoms (Rezanka T et al., J Chromatogr A 2001, 936, 95).
- 4. dolichol types, the a
terminal is saturated.
Most eukaryotic cells contain one type of polyisoprenoid alcohols with one a-saturated isoprenoid unit (2,3-dihydro polycis-prenols) which have been called dolichol by Pennock JF et al. (Nature 1960, 186, 470), a derivative of prenols. Most of these carry two trans units at the w-end of the chain.
Dolichols (fro the Greek dolikos: long) have the general structure :
Dolichols isolated from yeast or
animal cells consist mainly of seven to eight compounds, those with 16, 18, or
19 isoprenoid units being the most abundant (Ragg SS, Biochem Biophys Res
Comm 1998, 243, 1).
Dolichol amount was shown to be increased in the brain gray matter of elderly (Pullarkat RK
et al., J Biol Chem 1982, 257, 5991). Dolichols with 19, 22 and 23
isoprenoid units were described as early as 1972 in marine invertebrates (Walton
MJ et al., Biochem J 1972, 127, 471). Furthermore, the pattern of their distribution may be
considered as a chemotaxonomic criterion. It has been reported that a high
proportion of dolichols is esterified to fatty acids. As an example, 85-90% of
dolichols are esterified in mouse testis (Potter
J et al., Biochem Biophys Res Comm 1983, 110, 512). In addition, dolichyl
dolichoate has been found in bovine thyroid (Steen
L. et al., Biochim Biophys Acta, 1984, 796, 294).
They are well known for their important role as glycosyl carrier in a phosphorylated form in the synthesis of polysaccharides and glycoproteins in yeast cells, and animals. Dolichyl phosphate is an obligatory intermediate in the biosynthesis of N-glycosidically linked oligosaccharide chains. Conversely, they have been identified as the predominant isoprenoid form in roots (Skorupinska-Tudek K et al., Lipids 2003, 38, 981) and in mushroom tissue (Wojtas M et al., Chem Phys Lipids 2004, 130, 109). Similar compounds (ficaprenols) have the same metabolic function in plants.
The repartition of the various types of polyisoprenoid alcohols between plants and animals and their metabolism have been extensively discussed (Swiezewska E et al., Prog Lipid Res 2005, 44, 235). Biosynthesis of polyisoprenoid alcohols and their biological role have been reviewed in 2005 (Swiezewska E et al., Prog Lipid Res 2005, 44, 235).
3 - Phenolic alcohols
Among the simple phenolic alcohols, monolignols are the source materials for biosynthesis of both lignans and lignin. The starting material for production of monolignols (phenylpropanoid) is the amino acid phenylalanine. There are two main monolignols: coniferyl alcohol and sinapyl alcohol. Para-coumaryl alcohol is similar to conipheryl alcohol but without the methoxy group.
Conipheryl alcohol is found in both gymnosperm and angiosperm
plants. Sinapyl alcohol and para-coumaryl alcohol, the other two lignin
monomers, are found in angiosperm plants and grasses. Conipheryl esters (conypheryl
8-methylnonanoate) have been described in the fruits of the pepper, Capsicum
baccatum (Kobata K et al., Phytochemistry 2008, 69, 1179). These
compounds displayed an agonist activity for transient receptor potential
vanilloid 1 (capsaicin receptor) as the well known capsaicinoids present in
these plant species.
Complex phenolic alcohols (phenolphthiocerol) were shown to be components of Mycobacterium glycolipids which are termed glycosides of phenolphthiocerol dimycocerosate (Smith DW et al., Nature 1960, 186, 887) belonging to the large family of "mycosides". The chain length differs according to the homologues, 18 and 20 carbon atoms in mycosides A, and B, respectively. One of these phenolphthiocerols is shown below.
An analogue component but with a ketone group instead of the methoxy group, a phenolphthiodiolone, has been detected in mycoside A (Fournie JJ et al., J Biol Chem 1987, 262, 3174).
An alcohol with a furan group, identified as 3-(4-methylfuran-3-yl)propan-1-ol, has been isolated from a fungal endophyte living in a plant, Setaria viridis (Nakajima H et al., J Agric Food Chem 2010, 58, 2882). That compound was found to have a repellent effect on an insect, Eysarcoris viridis, which is a major pest of rice.
Some cyclic alkyl polyols have been reported in plants. Among the various form present in an Anacardiaceae, Tapirira guianensis, from South America, two displayed anti-protozoal (Plasmodium falciparum) and anti-bacterial (Staphylococcus spp) activities (Roumy V et al., Phytochemistry 2009, 70, 305). The structure shown below is that of a trihydroxy-alcohol containing a cyclohexene ring.
As emphasized by the
authors, external application of the active plant extract or of the
purified compounds could represent an accessible therapeutic alternative to
classical medicine against leishmaniasis.
aldehydes are found in free form, but also in the form of vinyl ether (known as alk-1-enyl
ether) integated in glycerides and phospholipids (plasmalogens).
The free aldehydes can be as fatty acids saturated or unsaturated. They have a general formula CH3(CH2)nCHO with n=6 to 20 or greater. The most common is palmitaldehyde (hexadecanal) with a 16 carbon chain. Normal monoenoic aldehydes are analogous to the monoenoic fatty acids.
It must be noticed that an aldehyde function may be found at a terminal (w) position while an acid function is present at the other end of the carbon chain (oxo fatty acids). These compounds have important signaling properties in plants.
Long-chain aldehydes have been described in the waxes which impregnate the matrix covering all organs of plants (Vermeer CP et al., Phytochemistry 2003, 62, 433). These compounds forming about 7% of the leaf cuticular waxes of Ricinus communis were identified as homologous unbranched aldehydes ranging from C22 to C28 with a hydroxyl group at the carbon 3. Long-chain 5-hydroxyaldehydes with chain lengths from C24 to C36, the C28 chain being the most abundant, were identified in the cuticular wax of Taxus baccata needles (Wen M et al., Phytochemistry 2007, 68, 2563). Long-chain aliphatic aldehydes with chain-length from C22 to C30 are also present in virgin olive oils, hexacosanal (C26) being the most abundant aldehyde (Perez-Camino MC et al., Food Chem 2012, 132, 1451).
Aldehydes may be produced during decomposition of fatty acid hydroperoxides following a peroxidation attack. Several aldehydes (hexanal, heptanal..) belong to aroma compounds which are found in environmental or food systems (see the website: Flavornet). Aldehydes (mono- or di-unsaturated) with 5 to 9 carbon atoms are produced by mosses (Bryophyta) after mechanical wounding (Croisier E et al., Phytochemistry 2010, 71, 574). It was shown that they were produced by oxidative fragmentation of polyunsaturated fatty acids (C18, C20). Trans-2-nonenal is an unsaturated aldehyde with an unpleasant odor generated during the peroxidation of polyunsaturated fatty acids. It participates to body odor and is found mainly covalently bound to protein in vivo (Ishino K et al., J Biol Chem 2010, 285, 15302).
Fatty aldehydes may be determined easily by TLC or gas liquid chromatography (follow that link). The most common method for the determination of aldehydes involves derivatization with an acidic solution of 2,4-dinitrophenylhydrazine to form corresponding hydrazones followed by HPLC separation and UV–VIS detection. An optimized derivatization procedure for the determination of aliphatic C1-C10 aldehydes has been described (Stafiej A et al., J Biochem Biophys Meth 2006, 69, 15).
Other short-chain aldehydes (octadienal, octatrienal, heptadienal) are produced via a lipoxygenase-mediated pathway from polyunsaturated fatty acids esterifying glycolipids in marine diatoms (D'Ippolito G et al., Biochim Biophys Acta 2004, 1686, 100). Heighteen species of diatoms have been shown to release unsaturated aldehydes (C7:2, C8:2, C8:3, C10:2, and C10:3) upon cell disruption (Wichard T et al., J Chem Ecol 2005, 31, 949).
Several short-chain aldehydes were shown to induce deleterious effects on zooplankton crustaceans and thus limiting the water secondary production (birth-control aldehydes) (D'Ippolito G et al., Tetrahedron Lett 2002, 43, 6133). In laboratory experiments, three decatrienal isomers produced by various diatoms were shown to arrest embryonic development in copepod and sea urchins and have antiproliferative and apoptotic effects on carcinoma cells (Miralto A et al., Nature 1999, 402, 173). Later, the copepod recruitment in blooms of planktonic diatom was shown to be suppressed by ingestion of dinoflagellate aldehydes (Nature 2004, 429, 403). It was demonstrated that diatoms can accurately sense a potent 2E,4E/Z-decadienal and employ it as a signaling molecule to control diatom population sizes (Vardi A et al., PLoS Biol 2006, 4, e60). This aldehyde triggered a dose-dependent calcium transient that has derived from intracellular store. Subsequently, calcium increase led to nitric oxide (NO) generation by a calcium-dependent NO synthase-like activity, resulting in cell death in diatoms.
Myeloperoxidase-derived chlorinated aldehydes with plasmalogens has been reported. Thus, the vinyl-ether bond of plasmalogens is susceptible to attack by HOCl to yield a lysophospholipid and an
Both these chloro-fatty aldehydes have been detected in neutrophils activated
with PMA (Thukkani
AK et al., J Biol Chem 2002, 277, 3842) and in human atherosclerotic
AK et al., Circulation 2003, 108, 3128). Furthermore,
2-chlorohexadecanal was shown to induce COX-2 expression in human coronary
artery endothelial cells (Messner
MC et al., Lipids 2008, 43, 581). These data suggest that
2-chlorohexadecanal and possibly its metabolite 2-chlorohexadecanoic acid, both produced during leukocyte activation, may alter vascular endothelial cell
function by upregulation of COX-2 expression.
Long after the demonstration of the presence of iodinated lipids in thyroid (besides iodinated aminoacids), it was shown that the major iodinated lipid formed in thyroid when incubated in vitro with iodide was 2-iodohexadecanal (Pereira A et al, J Biol Chem 1990, 265, 17018). In rat and dog thyroid, 2-iodooctadecanal was determined to be more abundant that the 16-carbon aldehyde. These compounds, which are thought to play a role in the regulation of thyroid function, were recently shown to be formed by the attack of reactive iodine on the vinyl ether group of PE plasmalogen. This attack generates an unstable iodinated derivative which breaks into lysophosphatidylethanolamine and 2-iodo aldehydes (Panneels V et al, J Biol Chem 1996, 271, 23006).
In some bacteria, aldehyde analogs of cyclopropane fatty acids were described.
Several fatty aldehydes are known to have pheromone functions. Studies in African and Asian countries have shown that the use of 10,12-hexadecadienal could be effective for control of the spiny bollworm Earias insulana, a cotton pest. The sex pheromone of the navel orange worm, Amyelois transitella, 11,13-hexadecadienal, is usually used in the control of this citric pest.
A branched saturated aldehyde (3,5,9-trimethyldodecenal, stylopsal) has been identified as a female-produced sex pheromone in Stylops (Strepsiptera), an entomophagous endoparasitic insect (Cvacka J et al., J Chem Ecol 2012, 38, 1483).
Several isoprenoid aldehydes are important in insect biology as pheromones and in botany as volatile odorous substances. Some examples are given below:
These three terpenic aldehydes are produced in large amounts by
the mandibular glands of ants and may function as defensive repellents (Regnier
FE et al., J Insect Physiol 1968, 14, 955). In contrast, the same molecules
have a role of recruiting pheromones in honeybees
Citral, a mixture of the tautomers geranial (trans-citral) and neral (cis-citral) is a major component (more than 60%) of the lemongrass (Cymbopogon flexuosus) oil. Lemongrass is widely used, particularly in Southeast Asia and Brazil, as a food flavoring, as a perfume, and for its medicinal properties (analgesic and anti-inflammatory). It was found that citral is a major suppressor of COX-2 expression and an activator of PPARa and g (Katsukawa M et al., Biochim Biophys Acta 2010, 1801, 1214).
It was demonstrated that damaged leaves released 2-hexenal, among other C6-volatile aldehydes, produced from the catalytic activity of hydroperoxide lyase (Turlings TC et al., Proc Ntl Acad Sci USA 1995, 92, 4169). These compounds, considered as signal molecules, can trigger several responses in neighboring plants and may also act as antimicrobial agents (Farmer EE, Nature 2001, 411, 854).
One important constituent of this group of aldehydes is retinal, one active form of vitamin A involved in the light reception of animal eyes but also in bacteria as a component of the proton pump.
Retinal exist in two forms, a cis and a trans isomer. On illumination with
white light, the visual pigment, rhodopsin is converted to a mixture of a protein (opsin)
and trans-retinal. This isomer must be transformed into the cis form by retinal isomerase
before it combines again with opsin (dark phase). Both isomers can be reduced to retinol (vitamin A) by a NADH dependent alcohol dehydrogenase.
Retinol is stocked in retina mainly in an acylated form.
Cinnamic aldehyde (cinnamaldehyde) is the key flavor compound in cinnamon essential oil extracted from Cinnamomum zeylanicum and Cinnamomum cassia bark. Investigations have revealed than that benzyl aldehyde activates the Nrf2-dependent antioxidant response in human epithelial colon cells (Wondrak GT et al., Molecules 2010, 15, 3338). Cinnamic aldehyde may therefore represent a precious chemopreventive dietary factor targeting colorectal carcinogenesis. | <urn:uuid:545660ca-1ae5-41b7-b614-1a9c88f961c3> | CC-MAIN-2013-20 | http://www.cyberlipid.org/simple/simp0003.htm | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.881417 | 10,975 | 3.0625 | 3 |
The immune system
immune; immunity; disease; bacteria; viruses; white; cells; lymph; germs; mucous; mucus; glands;
What is immunity?
Immunity (say im-yoon-it-i) means that you are protected against something. There are different kinds of immunity. This topic is about how different parts of our bodies work together to keep us from getting sick. Immunity to some diseases is passed on from our mothers before we are born. Immunisation (having your 'shots') helps our body's immune defence system protect us from diseases .
body's immune system
Every body has an inbuilt immune system which protects it from diseases and germs. This system has a lot of different parts which work together to keep out any harmful germs, and attack and destroy any which manage to get inside your body
- Every day your body is exposed to millions of germs, and you do not get sick from them because of your immune system.
- Every time you do get sick because of a germ, your immune system works to get rid of it and then it remembers how to fight the infection if the same germ comes again.
- Usually the older you get, the more germs you become immune to.
So, let's have a look at the immune system, starting from the outside of the body.
The skin is the first line of defence in your immune system.
You know how you put plastic wrap over leftovers to keep them fresh enough for later? Well, your skin is like a plastic wrap to keep germs from getting into your body.
- The epidermis (outside layer of skin) has special cells which warn the body about incoming germs.
- Glands in the skin also make substances that can kill some bacteria (anti-bacterial chemicals). This means you don't get infections on your skin unless your skin is damaged, such as by a cut or a graze.
Your nose, mouth and eyes are the next point of attack.
- The mucous membranes which line the mouth, throat, lungs and bowel, act like a barrier to germs, just as the skin does.
- Saliva in the mouth and the tears which wash your eyes have special enzymes (chemicals) in them which break down the cell walls of many bacteria and viruses.
- The mucous that is made in your nose, throat and lungs traps bacteria, viruses and dust.
- Acid in your stomach kills most germs, and starts to digest your food.
- Lymph (limf) is a clear fluid that is very similar to blood plasma, the clear liquid in blood, but it carries only white blood cells, not red blood cells.
- The lymph flows through all the parts of the body picking up fluid around cells and carrying it back to large veins near the heart. It also carries white blood cells to the places that they are needed.
- Some bacteria or viruses that have entered the body are collected by the lymph and passed on to the lymph nodes where they are filtered out and destroyed. Lymph nodes are sometimes called glands.
Your doctor can often tell if you have an infection by checking out the lymph nodes (glands) in your neck and under your arms to see if they're swollen. If they are, it shows that they are working to get rid of bacteria or viruses.
In your blood you have red blood cells and white blood cells, and in lymph there are white blood cells.
There are several different types of white cells which work together to seek out and destroy bacteria and viruses.
All of them start off in the bone marrow, growing from 'stem cells'.
The disease-fighting white blood cells are specialists. Some of the white blood cells are:
- Neutrophils (say new-tro-fills), which move around the body in the blood and seek out foreign material (things that don't belong in your body).
- Macrophages (say mak-row-far-jes) are the biggest blood cells. Some live in different parts of the body and help to keep it clean, eg. in the lungs. Others swim around cleaning up other white blood cells that have been damaged while doing their jobs, eg. cleaning up pus that has been caused by neutrophils when they work to clear out bacteria from a wound.
- Lymphocytes (say lim-fo-sites) work on bacterial and viral infections
There are two different types:
- B cells produce antibodies. Each cell watches out for a particular germ, and when that germ arrives, the cell starts to produce more antibodies which begin the process of killing that germ. Antibodies attach themselves to the germs so that other cells can recognise that these germs need to be destroyed.
- T cells look for cells in your body that are hiding invaders (germs) or body cells that are different to normal healthy cells (such as cells that could develop into a cancer) and kill them.
does your immune system know which cells to attack?
Your body has lots of friendly bacteria around it which help your body work properly - eg. some bacteria inside your bowel help you to digest your food and break it up into the different things that are needed in various parts of the body.
- These friendly bacteria live on the surfaces of the body, such as on our skin or inside the bowel.
- They do not try to invade the body, so the immune system does not try to get rid of them.
- Other germs which cause illness, try to enter the body.
- Antibodies, which are made by the lymphocytes, attach to the invaders so that the other white blood cells can destroy them. They 'tag' them so they can be easily noticed.
As well as attacking germs, your immune system recognises and destroys other cells which do not belong in your body.
- The cells in your own body are marked with a special system called Human Leukocyte Antigen or HLA (say Hew-man lew-ko-site anti-jen).
- Your immune system can recognise these markings as 'you'. Any cells which do not have the right markings are 'not you' and are therefore attacked.This happens if, for example, you have a blood transfusion with the wrong types of blood cells. Your body's immune system recognises that these cells do not belong in your body, so it destroys them.
How you know your immune system is working
You know your immune system is working:
- if you get better after you are sick
- if cuts heal without getting infected
- if you don't catch the same diseases over and over again
- when you get swollen glands
- when you get swelling and soreness around a cut.
Your immune system is in there working to get rid of any infection.
When things go wrong with the immune system
Sometimes the immune system will make a mistake.
- It may attack your own body as if it were the enemy, eg. insulin dependent diabetes (the type that most often starts in children and young people) is caused by the immune system attacking the cells in the pancreas that make insulin.
- Allergies are caused by the immune system over-reacting to something that is not really a threat, like when pollen triggers hay fever or asthma.
- If tissue is transplanted from one person to another - eg. a skin or organ transplant - then the immune system will attack the new part. The immune system has to be suppressed by drugs to allow the transplant to work.
- When the immune system is damaged, such as when people have a serious illness called AIDS, they get lots of infections and are much more likely to get cancers. Their body cannot recognise the infection or abnormal cells very well and the immune system does not destroy them as well as usual.
The immune system is absolutely amazing. It deals with millions of bacteria and viruses every day to keep us healthy.
Keeping up to date with immunisations can help your body to build immunity to some serious diseases too.
We've provided this information to help you to understand important things about staying healthy and happy. However, if you feel sick or unhappy, it is important to tell your mum or dad, a teacher or another grown-up. | <urn:uuid:ce2ffe26-b35c-4206-9d9e-c664fdbda89f> | CC-MAIN-2013-20 | http://www.cyh.sa.gov.au/HealthTopics/HealthTopicDetailsKids.aspx?p=335&np=152&id=2402 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.949602 | 1,713 | 3.59375 | 4 |
Radon, a silent killer in homes
DeKALB – Many homeowners take precautions to protect themselves. They lock their doors at night, turn off and unplug appliances and regularly test their smoke detectors.
Radon isn’t something many homeowners consider a danger in their homes, but it could be harming them the most.
Radon is a colorless, odorless naturally occurring gas found in uranium in soil. The gas often seeps through cracks in a house’s foundation or other areas exposed to soil. The health risks associated with radon are not immediate but rather a result of continuous exposure over a long period of time.
If you have any technical difficulties, either with your username and password or with the payment options, please contact us by e-mail at firstname.lastname@example.org | <urn:uuid:19f471cc-541f-46da-bb37-61497f73e921> | CC-MAIN-2013-20 | http://www.daily-chronicle.com/2013/02/27/radon-a-silent-killer-in-homes/aqv83ut/?list-comments=1 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.946226 | 168 | 2.546875 | 3 |
When it comes to solar power, the real dilemmas are efficiency and cost. On the one hand, efficiency has steadily improved over the last couple decades to the point where it’s approaching the utility prices of other power generation methods. Exotic technologies promise even greater gains. However, the price of solar-generated power still remains at least five times as expensive as coal-power, the chief source of power in the U.S. (compared to the leading candidate, nuclear, which is approximately 1.5 to 2 times as expensive).
While solar adoption from a cost standpoint is unattractive, there's much debate over whether commercial adoption is needed to spur further research to propel solar into the realm of cost competitiveness. While many nations like the U.S. and China have modestly taken this position, adopting solar at a moderate rate, one nation has fallen head over heels for solar -- Spain.
Spain is allowing solar and wind power plants to charge as much as 10 times the rates of coal power plants, making it possible for solar power installations to earn utilities big money. On average, recent rate increases have raised solar charges to over 7 times the rates of coal or natural gas rates. The costs are added onto consumers' power bills.
The results are mixed; while Spanish power bills are at record highs, the number of deployments is soaring. Spain has 14 GW of solar power, or the equivalent capacity of nine average nuclear reactors, under construction -- the most of any nation. Florida’s FPL Group Inc. and French Electricite de France SA are among the many jumping to build in Spain.
Gabriel Calzada, an economist and professor at Rey Juan Carlos University in Madrid, states, "Who wouldn’t want to enter a business that’s paid many times more than the market rate, and where the customer is guaranteed for life?"
By 2009, 42 percent of Spaniards energy bills -- approximately 95 euros ($127) on average -- will be provided by alternative energy. Spanish law requires power distributors to buy all clean energy produced in the first 25 years of the plants' lives. The government also recently raised the rate of Spain believes this sacrifice will pay off as fossil fuel resources become depleted and emissions standards tighten.
Karsten von Blumenthal, an industrial analyst at Hamburg-based SES Research GmbH states, "The guarantee is more attractive than what other countries offer. Actually the U.S. has better space for solar, in the deserts of California and Nevada."
The U.S. meanwhile is also advancing thanks in part to President Obama's solar initiatives passed earlier this year as part of the federal stimulus legislation. Over 6 GW of capacity is planned for the U.S.
Fred Morse, an official at the Washington- based Solar Energy Industries Association trade group and author of the first report to the White House on solar power (1969), says that the U.S. needs to adopt more incentives if it hopes to catch Spain. He states, "The incentives, if implemented promptly and effectively, should greatly facilitate the financing of these plants."
One promising benefit of the Spanish solar boom is that it is increasing the number of plants utilizing new, potentially more efficient technologies like solar thermal or sterling engines. Spain is limiting the number of photovoltaic plants (solar panel-based designs), but is giving out unlimited licenses for solar thermal and other alternative plants.
quote: 1 - Solar Tech is improving very quickly. In another 3~5 years, it SHOULD be just as cheap as coal.
quote: 4 - If many people buy their own, it reduces the drain on the electrical system
quote: 2 - If its cheap, unlike a power plant (coar / nuke) Anyone can buy it and install it on their roof or their yard. Remember on DT - they're's tech that'll allow your windows to be solar collectors.
quote: 5 - if everyone has one, it can help re-charge their electric cars. Because AS OF NOW, eletric cars STILL require power from Coal / Nuke plants which generate pollution / waste.
quote: Assuming 0,45 cents per KW Here,
quote: But the pleasure to not give the moneyto them... doesn´t have a price... | <urn:uuid:23a90b54-7af3-418f-b87f-445b0ed0e428> | CC-MAIN-2013-20 | http://www.dailytech.com/article.aspx?newsid=15102&commentid=443095&threshhold=1&red=4522 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.943513 | 874 | 2.734375 | 3 |
In digital imaging, there are 256 levels, or tonal values, ranging from black to white. Black is level 0. White is level 255. Of course, not all images (e.g. extreme foggy, misty, atmospheric shots) contain the full tonal range from black to white, but most do.
The histogram (Levels) is a graphical representation of the tonal values in an image. Ideally, it should range from 0 to 255, with a good spread of tonal values throughout.
If the histogram is bunched up towards the left, it indicates the image is under-exposed. Note the crushed shadow detail.
If bunched up towards the right, it's over exposed. Note the blown-out highlights.
If the black and white points are set incorrectly, the image will have a dull, flat, washed-out appearance. Here they're wrongly set to 20/230.
Unless under instructions from a repro bureau or printer, you should not set the black/white points to anything other than 0/255. The printer may well adjust them later for technical reasons to do with repro, but don't try to guess what's required. It's true that some leeway is acceptable (e.g. up to 5% is usually OK), but your images will lack visual impact if the black/white points are incorrect, so don't do this as a matter of course.
In the vast majority of cases, it's best to set them to 0/255. | <urn:uuid:52488de0-c8c9-4c17-af7d-5a2c271456dc> | CC-MAIN-2013-20 | http://www.davepattison.com/digital-imaging/exposure.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.931286 | 313 | 2.859375 | 3 |
The robot can be outfitted with multiple attachments such as a cell-sprayer that can spray pesticides or fertilizers and can even weed areas intertwined with the crops. It’s able to do so with the help of strategically positioned cameras that take pictures of the ground, which are then sent to an onboard computer that analyzes the images and identifies both the crops and weeds (programmed with 20 known species per geographic area).
Once the unwanted plants are identified, it can then spray an herbicide through a row of nozzles placed next to the cameras positioned behind the bot. The cameras look for the corresponding image and either open or close the nozzles based on the weeds' location. With a large range of add-on tools, this robot makes a perfect plant-nursing platform that’s able to keep plants healthy, one column at a time.
Robots are even being employed to harvest crops, further maximizing the efficiency associated with robotic farmers. One such robot is known as the Robotic Strawberry Harvester from Robotic Harvesting LLC. The mechanical farmhand is autonomous in the true sense of the word and is self-propelled, navigating and harvesting, and as the name suggests, is excellent in picking ripe strawberries. Robot harvesting outfitted the robot with a camera array capable of taking "stereovision" photos both above and below the plants leaves to collect data on fruit (whether it’s ripe or not), flower count, plant pathogens (diseases), and other items of interest.
The camera system can be reprogrammed to identify and collect data on a number of crops in 3D space (giving the robot the capability to see like humans) not just strawberries, and uses specialized software to discern whether the fruit is ripe. Once identified, the robot uses a three-pronged outfitted robotic arm to pick the fruit, which is then placed on a convenient tiny conveyor belt that drops the fruit off in a collection basket on top of the robot.
This may not seem like much, but the robot is capable of picking the fruit (tested in a controlled environment) in as little as two seconds. While you most likely won't see a fully functional efficient farm being run entirely by robots anytime in the next few years, it’s safe to say it certainly is a possibility in the near future. As more and more people populate the planet, using robotic farmers is certainly a viable option in cultivating, nurturing, and harvesting increased food crops in an efficient manner. | <urn:uuid:d0ae3c16-2656-45c7-a6e9-21c6c9e32b92> | CC-MAIN-2013-20 | http://www.designnews.com/author.asp?section_id=1386&doc_id=254959&page_number=2 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.945709 | 514 | 3.078125 | 3 |
Living with Diabetes
Diabetes is a condition that affects everyone from children right up to adults. It is referred as a chronic condition since a person who has it can go through many changes in their lives as it can affect their entire body. Over time, diabetes can cause blindness, stroke, and amputations among other things.
There are two types of diabetes; Juvenile or Type 1 diabetes and adult-onset diabetes also known as Type 2 diabetes. The more common form of diabetes is Type 2 and those who have this type of diabetes are faced many difficulties and complications to their liver, muscle and even fat cells. In the case of Type 1 diabetics, they are required to use insulin to be able to combat the effects of diabetes.
A simple blood sugar test can determine if you have diabetes or not. The doctor usually checks the level of your glucose to determine if you are diabetic. There are also telltale signs that one is diabetic as well. The symptoms of diabetes include an increase in thirst; feeling tired all the time, headaches, and weight loss and in some cases blurred vision and even dry mouth.
There is a treatment for diabetes and one can easily keep it under control if proper measures are taken. One must first keep their blood glucose in check all the time and one way to achieve this is by eating healthy foods for diabetics. One can also combat the symptoms of diabetes by keeping up with an exercise regimen and it would also help to keep their weight under control as well. | <urn:uuid:9a5aede2-83a0-4dea-ac64-71fa514ed29c> | CC-MAIN-2013-20 | http://www.diabetescondition.com/living-with-diabetes/living-with-diabetes/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.973689 | 305 | 2.9375 | 3 |
The environmental impact of electric vehicles has been in the media for some time. Now comes news that electric vehicles can also impact running the home.
An exhibit at the Georgian College Auto Show, in Barrie, Ontario, demonstrates the integration of electric vehicles into the home by using the latest Smart Grid technologies. The display, which is run by Nissan and PowerStream, shows how an electric vehicle such as the Nissan LEAF can help power the home by converting energy stored in the car’s batteries to residential use through a system called Vehicle to Home (V2H).
With energy stored in its 24kW lithium-ion battery, a fully charged Nissan LEAF can provide enough electricity to run a typical residential Canadian home for a full day. The LEAF to Home electricity-supply system is gathering attention as a new form of infrastructure, as well as contributing factor to energy saving and alternative energy use. PowerStream, Ontario’s second-largest community-owned company, began working on the project after taking delivery of Nissan’s fully-electric LEAF vehicle.
“The PowerStream/Nissan display proves how smart connections between the grid, the home and the car can help us improve the way energy is managed, consumed – and conserved,” said Markham Mayor Frank Scarpitti, who is chairman of the board at PowerStream. “The collaboration between Nissan and PowerStream illustrates the dramatic changes underway in technology and how two industry leaders can collaborate to benefit consumers.”
Studies have shown that cutting off one household from the network when power demands are their highest can significantly contribute towards the stable supply of power throughout the grid. The Nissan/PowerStream V2H system demonstrates leading-edge technologies and the future capabilities of Smart Grid and the benefit to consumers.
CNW Group/Nissan Canada
Nissan Canada and PowerStream demonstrate the Nissan ‘LEAF to Home’ charging system for first time in Canada at the Georgian College Auto Show in Barrie.
Earlier this week in Japan, Nissan introduced the EV Power Station, an electric-vehicle charging station developed by Nichicon Corporation. The EV Power Station can fully recharge the LEAF’s high-capacity batteries in as little as four hours, approximately half the time required by conventional chargers.
“The public debut of V2H in Canada today will drive new advancements and collaboration in the auto industry of tomorrow,” said Nissan Canada president Allen Childs. “V2H will foster literal connections, such as those between vehicles, infrastructure, the Internet, and the nation’s electrical grid, and the connections and relationships between engineers who are developing the next generation vehicle technology.” | <urn:uuid:a3056064-de84-4cd5-8595-470809b3ce0d> | CC-MAIN-2013-20 | http://www.digitaljournal.com/article/325910 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.940562 | 555 | 2.9375 | 3 |
What you will learn
In this Maya tutorial we'll learn how to begin Maya's powerful Ocean features. Using Maya Oceans, we'll be able to achieve quality results within a matter of minutes. We'll begin this project by learning the basics of creating a Maya Ocean and what it is actually made of. We'll then learn about attributes we need to set early in the project. Then we'll learn how to control the noisiness of waves and their length. After that, we'll create line graphs to change each wave's height, turbulence and peak. We'll finish the tutorial by adding foam and editing the color information of the shader. | <urn:uuid:ad8f3e02-5642-4b38-8de0-b8623965e056> | CC-MAIN-2013-20 | http://www.digitaltutors.com/11/training.php?pid=200&autoplay=1 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.947473 | 130 | 2.734375 | 3 |
Beginning in October 2006, some beekeepers began reporting losses of 30-90 percent of their hives. While colony losses are not unexpected during winter weather, the magnitude of loss suffered by some beekeepers was highly unusual.
This phenomenon, which currently does not have a recognizable underlying cause, has been termed "Colony Collapse Disorder" (CCD). The main symptom of CCD is simply no or a low number of adult honey bees present but with a live queen and no dead honey bees in the hive. Often there is still honey in the hive, and immature bees (brood) are present.
ARS scientists and others are in the process of carrying out research to discover the cause(s) of CCD and develop ways for beekeepers to respond to the problem.
Why should the public care about honey bees?
Bee pollination is responsible for $15 billion in added crop value, particularly for specialty crops such as almonds and other nuts, berries, fruits, and vegetables. About one mouthful in three in the diet directly or indirectly benefits from honey bee pollination. While there are native pollinators (honey bees came from the Old World with European colonists), honey bees are more prolific and the easiest to manage for the large scale pollination that U.S. agriculture requires. In California, the almond crop alone uses 1.3 million colonies of bees, approximately one half of all honey bees in the United States, and this need is projected to grow to 1.5 million colonies by 2010.
The number of managed honey bee colonies has dropped from 5 million in the1940s to only 2.5 million today. At the same time, the call for hives to supply pollination service has continued to climb. This means honey bee colonies are trucked farther and more often than ever before.
Honey bee colony health has also been declining since the 1980s with the advent of new pathogens and pests. The spread into the United States of varroa and tracheal mites, in particular, created major new stresses on honey bees.
Is there currently a crisis in food production because of CCD?
While CCD has created a very serious problem for beekeepers and could threaten the pollination industry if it becomes more widespread, fortunately there were enough bees to supply all the needed pollination this past spring. But we cannot wait to see if CCD becomes an agricultural crisis to do the needed research into the cause and treatment for CCD.
The cost of hives for pollination has risen this year. But much of that is due to growing demand. Some of the price increase may also be due to higher cost of gas and diesel and other increases related to energy and labor costs. Commercial beekeepers truck hives long distances to provide pollination services, so in particular they must deal with rising expenses.
Varroa mites (one is visible on the back of this bee) are a major threat to honey bee health and are becoming resistant to two compounds (coumaphos and fluvalinate) used to control them. Beekeepers now have a simple assay to determine whether mites are resistant and thus ensure use of appropriate control measures. Click the image for more information about it.
Are there any theories about what may be causing CCD?
Case studies and questionnaires related to management practices and environmental factors have identified a few common factors shared by those beekeepers experiencing CCD, but no common environmental agents or chemicals stand out as causative. There are three major possibilities that are being looked into by researchers.
Pesticides may be having unexpected negative effects on honey bees.
A new parasite or pathogen may be attacking honey bees. One possible candidate being looked at is a pathogenic gut microbe called Nosema. Viruses are also suspected.
A perfect storm of existing stresses may have unexpectedly weakened colonies leading to collapse. Stress, in general, compromises the immune system of bees (and other social insects) and may disrupt their social system, making colonies more susceptible to disease.
These stresses could include high levels of infection by the varroa mite (a parasite that feeds on bee blood and transmits bee viruses); poor nutrition due to apiary overcrowding, pollination of crops with low nutritional value, or pollen or nectar scarcity; and exposure to limited or contaminated water supplies. Migratory stress brought about by increased needs for pollination might also be a contributing factor.
Has CCD ever happened before?
The scientific literature has several mentions of honey bee disappearancesóin the 1880s, the 1920s and the 1960s. While the descriptions sound similar to CCD, there is no way to know for sure if the problems were caused by the same agents as today's CCD.
There have also been unusual colony losses before. In 1903, in the Cache Valley in Utah, 2000 colonies were lost to an unknown "disappearing disease" after a "hard winter and a cold spring." More recently, in 1995-96, Pennsylvania beekeepers lost 53 percent of their colonies without a specific identifiable cause.
What about cell phonesódo they have anything to do with CCD?
The short answer is no.
There was a very small study done in Germany that looked at whether a particular type of base station for cordless phones could affect honey bee homing systems. But, despite all the attention that this study has received, it has nothing to do with CCD. Stefan Kimmel, the researcher who conducted the study and wrote the paper, recently e-mailed The Associated Press to say that there is "no link between our tiny little study and the CCD-phenomenon ... anything else said or written is a lie."
Newly emerged honey bee, Apis mellifera, the subject of genome sequencing work aimed at improving bee traits and management. Click the image for more information about it.
What is ARS doing about CCD?
In April 2007, ARS held a Colony Collapse Disorder Research Workshop that brought together over 80 of the major bee scientists, industry representatives, extension agents, and others to discuss a research agenda. They identified areas where more information is needed and the highest-priority needs for additional research projects related to CCD.
A CCD Steering Committee, led by ARS and USDA's Cooperative State Research, Education, and Extension Service, developed a Research Action Plan to coordinate a comprehensive response for discovering what factors may be causing CCD and what actions need to be taken.
One of the tools that will help in this research is the recently sequenced honey bee genome to better understand bees' basic biology and breed better bees, and to better diagnose bee pests and pathogens and their impacts on bee health and colony collapse. The use of this genome information certainly will have great applications in improving honey bee breeding and management.
The search for factors that are involved in CCD is focusing on four areas: pathogens, parasites, environmental stresses, and bee management stresses such as poor nutrition. It is unlikely that a single factor is the cause of CCD; it is more likely that there is a complex of different components.
In September 2007, a research team that included ARS published the results of an intensive genetic screening of CCD-affected honey bee colonies and non-CCD-affected hives.
The only pathogen found in almost all samples from honey bee colonies with CCD, but not in non-CCD colonies, was the Israeli acute paralysis virus (IAPV), a dicistrovirus that can be transmitted by the varroa mite. It was found in 96.1 percent of the CCD-bee samples.
This research does not identify IAPV as the cause of CCD. What this research found was strictly a strong correlation of the appearance of IAPV and CCD together. No cause-and-effect connection can be inferred from the genetic screening data. (More information about this study)
Honey bees devour a new, nutrient-rich food developed by ARS researchers. Click the image for more information about it.
This was the first report of IAPV in the United States. IAPV was initially identified in honey bee colonies in Israel in 2002, where the honey bees exhibited unusual behavior, such as twitching wings outside the hive and a loss of worker bee populations.
The study also found IAPV in honey bees from Australia that had been imported into the United States, as well as in royal jelly imported from China. Australian bees began to be imported from Australia into the United States in 2005. Questions were raised about a connection between those imported bees and the appearance of IAPV in the United States. Beekeepers sought out Australian imports of bees as a way to replenish their hive populations.
To determine whether IAPV has been present in the United States since before the importation of honey bees from Australia, a follow up detailed genetic screening of several hundred honey bees that had been collected between 2002 and 2007 from colonies in Maryland, Pennsylvania, California and Israel was conducted by ARS researchers.
The results of the follow study showed IAPV has been in this country since at least 2002, which challenges the idea that IAPV is a recent introduction from Australia. (More information about this study)
This study in no way rules IAPV out as a factor in CCD. Research by several groups will now focus on understanding differences in virulence across strains of IAPV and on interactions with other stress factors. Even if IAPV proves to be a cause of CCD, there still may also be other contributing factors-which researchers are pursuing.
What should beekeepers do now about CCD?
Since little is known about the cause(s) of CCD right now, mitigation must be based on improving general honey bee health and habitat and countering known mortality factors by using best management practices.
What can I as a member of the public do to help honey bees?
The best action you can take to benefit honey bees is to not use pesticides indiscriminately, especially not to use pesticides at mid-day when honey bees are most likely to be out foraging for nectar.
In addition, you can plant and encourage the planting of good nectar sources such as red clover, foxglove, bee balm, and joe-pye weed. For more information, see www.nappc.org.]
ARS Honey Bee Research | <urn:uuid:6117655e-ff6b-4001-9834-1cee09b05d14> | CC-MAIN-2013-20 | http://www.dirtdoctor.com/Honeybee-Colony-Collapse-Disorder_vq2259.htm | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.957155 | 2,135 | 3.734375 | 4 |
|Talking Trash about the Oceans: Creating a Community Service Campaign to Stop Offshore Dumping|
In this lesson, students create a community service advertising campaign that raises awareness about the importance of keeping trash out of the marine ecosystem. Students work in teams to create different ad campaigns geared toward particular target audiences and produce posters promoting their messages. Links to additional information and resources are also provided.
Intended for grade levels:
Type of resource:
No specific technical requirements, just a browser required
Cost / Copyright:
Copyright 2005, The New York Times Company.
DLESE Catalog ID: DWEL-000-000-000-461
Resource contact / Creator / Publisher:
Publisher: The New York Times Learning Network | <urn:uuid:0a2dc5ea-1fbc-4dca-afae-288edd3db469> | CC-MAIN-2013-20 | http://www.dlese.org/library/catalog_DWEL-000-000-000-461.htm | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.835331 | 148 | 3.25 | 3 |
This book was the chosen book for the Celebration of Reading campaign, 2012
A Dog Named Worthless:
A Hero Is Born Children's Book
for K-6th Grade Humane Education
A Dog Named Worthless: A Hero Is Born
Written and illustrated by Rocky Shepheard
Welcome to Dogs Deserve Better's first Fantasy Action/Adventure Fiction picture book for kids and adults alike! Disney-esque in tone, the book is beautifully illustrated and written by Rocky Shepheard, a long-time supporter and advocate for chained dogs. The book is full color, hardback for better protection and sturdiness, and comes to life on 32 pages.
Worthless is a chained dog who has never lived inside the house. He suffers through cold winters and hot summers only with the help of his two friends—Otto and Sly Fox. His friends plot to free him and they set off on an adventure to look for a new life somewhere where there are no chains.
They search for days in snow and ice until they find a place on the edge of a pond to hunker down for the winter.
But fate intervenes and presents an opportunity for Worthless to finally prove to himself that he is worthy of love and a good home. Will Worthless have the courage to face his fears and become the dog he has always wanted to be?
About Worthless: Worthless was the name of a real dog, he was the reason that Dogs Deserve Better was founded and that's why the book was named after him. Someone actually named their dog Worthless, can you believe that? Read about his rescue here. It was fitting that the winning contest model for the book was another black lab named Maggie, beloved companion of Joe Maringo of SPARRO.
Dan Piraro - Internationally acclaimed cartoonist and creator of Bizarro:
"'A New Name for Worthless: A Hero is Born' is, like it's title character, anything but worthless. This is an exciting story with a full range of emotions that kids will love and adults will take pause to think about.
The same story that is lovingly illustrated within plays itself out in communities all over the world and the lessons learned from this story are simple but so important. This book will lead readers of all ages to more fully understand the true nature of "man's best friend" with a common-sense, compassionate approach that can change the world for the better."
– Dan Piraro, creator of "Bizarro"
Cia Bruno, Esq. - New York Animal Rights Advocate:
"A masterfully captivating illustrative theme! In A New Name for Worthless: A Hero is Born, the author skillfully introduces several elements of conflict and resolution that are rich in
opportunity for mutual exploration between parent and child.
The dominant message being that 'all' sentient creatures are worthy of our respect for their needs and existence."
— Cia Bruno, Attorney at law and advocate for all sentient creatures at www.meaningfuladvocacy.com
Lorraine Chittock -Photographer and Author:
"Wow. I love it. Finally a book appears which addresses a pressing dog
issue, but doesn't come across as preachy or pandering. From the first
page to the last, the reader is drawn into the troubles of Worthless,
and captivated by a wonderful story juxtaposed with exquisite
paintings. For children this book is a must. For adults, it signifies
hope and the progress being made for the lives of chained dogs all
over the world."
Travel books exploring our unique bond with animals
DDB Founder Tamira Thayne:
"When Rocky presented his idea, I was instantly intrigued by a story that is less about the reality of everyday chaining, and more a fun fiction tale featuring animal friends and foes. I was delighted with his storyline, and even more enamored with his illustrations. I hope that A New Name for Worthless: A Hero is Born ends up on every dog lover's bookshelf, because that's where it deserves to be!"
– Tamira C. Thayne, founder and CEO of Dogs Deserve Better www.dogsdeservebetter.org
Robin Helfritch Co-founder of Open The Cages Alliance:
"Rocky Shepheard's inspiring and delightful book, “A New Name for Worthless: A Hero is Born” will warm your heart and leave you smiling. Beautifully illustrated, it tells the tale of “Worthless,” a neglected dog who is callously left by his uncaring human “owner” to live his life chained to a rickety wooden box in extreme temperatures. This is, unfortunately, the fate for far too many dogs. Luckily for Worthless, he has good friends, Sly Fox and Otto the Otter. Through teamwork, bravery and a little luck, Worthless's life takes a turn for the better!
This book teaches the importance of compassion, friendship, collaboration, acceptance, and the fact that all deserve freedom from oppression. It is perfect for children and adults of all ages, and the life lessons learned in this book will resonate within all who read it."
– Robin Helfritch
Co-founder, Open the Cages Alliance
Catherine Hedges founder of Dont Bully My Breed, Inc.:
"A New Name for Worthless; A Hero is Born, is a wonderful combination of fantasy and reality, and a reminder that no dog is born "Worthless" but, any dog, in the hands of the wrong person, can be treated as worthless. The book shows children everyone has worth and is a great lesson in self esteem, as well as emphasizing the importance of loyalty and friendship and what can be accomplished when friends work together. It shows the importance of compassion and love and should inspire kids to ask questions about animal cruelty and neglect. It is evident in Shepheard's heartwarming story and stunning illustrations that he is a person with a great heart and one hopes that his message will impact every adult or child who reads it."
– Catherine Hedges
Founder of Dont Bully My Breed, Inc.
Nikki Brown - The UK DOG WHISPERER from Canine Angel:
"'A New Name for Worthless: A Hero is Born' is just such a delightful book with a really simple yet powerful message about how these creatures that we humans call “Dogs”, can teach us all the important lessons of forgiveness, love, devotion, courage, bravery, living in the moment and never holding a grudge.
The story is about how this dog views his world after being chained up to a dog house all his life suffering all weather conditions and being given the name of “Worthless “ by his human owner, reminding us all that neglect and cruelty still exists in today’s world.
The beautiful illustrations help to ignite your imagination and take you into this dogs world where all he ever wants is the opportunity to show he can be the dog that he was born to be, and show that even though he has been mistreated he can still find it in his heart and soul to forgive, love unconditionally and become man’s best friend.
A great read for kids and adults, and every dog owner or potential dog owner needs to have this in their book collection."
– Nikki Brown – The UK DOG WHISPERER – Canine Angel
Leigh-Chantelle -Australian Vegan Activist/Singer Songwriter:
"Worthless the Dog is much more than his namesake. His friends Sly the fox and Otto the sea otter unite to free him from his unbearable life chained to a rickety wooden box, all Worthless has known as a home.
Beautifully illustrated by Rocky Shepheard and written in the first person from Worthless’ point of view, A New Name for Worthless: A Hero is Born is a wonderful story of courage, friendship and bravery.
Families can read this wonderful book together and learn lessons in patience, humility, forgiveness and respect, all taught by Worthless the dog.
This is a great resource book for Humane Education released by the not for profit organisation Dogs Deserve Better who believe in respecting, freeing and enhancing the freedom of all chained animals."
Founder of Green Earth Day, www.greenearthday.net
Viva La Vegan www.vivalavegan.net
Performing Artist www.leigh-chantelle.com
Veterinarian / Activist Dr. Armaiti May:
"What an inspiration! Engaging as it is educational, this children’s book brings to light the little-known problem of dogs being neglected and left to languish on the end of a chain rather than with their family inside the home.
This dog’s story of hardship, collaboration with his fellow animal friends, and ultimate freedom from unfair confinement warms the heart. It is beautifully told and fills the reader with empathy for the dog’s predicament as well as admiration for his determination to free himself and find a more loving home."
– Armaiti May, DVM
Using age-appropriate messaging,
this book targets the following Humane Education
aspects for coursework and can be used to stimulate discussion
about these issues with students and children:
• Dog Chaining
• Importance of friends
• Working as a team
• Wildlife education
book follows the success of Puddles On The Floor, by Lorena Estep and illustrated by Tamira C. Thayne, and is only the second children's book created specifically for Dogs Deserve Better. It can be bought in package with Puddles at a discounted price, see below for package deals.
book is perfect for family fun reading, and for humane
education from kindergarten-through 6th grades. If
you're a nonprofit who would like to buy wholesale for fundraising
purposes, please call us at 757-357-9292 for pricing options.
you'd like DDB to come to your school
or group for a reading/visit, please call 757-357-9292
or e-mail firstname.lastname@example.org.
Now Take Phone Orders at 1.877.636.1408
or mail your order to 1915 Moonlight Rd., Smithfield, VA 23430.
A Dog Named Worthless: A Hero Is Born Book
Written and Illustrated by Rocky Shepheard
Copy Pak of
A Dog Named Worthless: A Hero Is Born Book
Perfect for Gift-Giving! One Stop Shopping for all the kids in the family.
almost $4.00! FREE
Hero Kids' Pak
Includes: A New Name for Worthless,
Puddles on the Floor, and Happy Dog! Coloring Book. The Hero Kids' Pak is the perfect classroom or home
teaching aid, allowing parents, teachers, and facilitators
to give children the 'whole Hero experience,'
Hero Kids' Pak (FREE
Hero Unchained 3 Pak
Includes: A New Name for Worthless, Unchain My Heart, and Scream Like Banshee.The Hero Unchained 3 Pak is the perfect family pack, something for everyone in the family, and teaches about chaining, being a foster parent to a dog, and how you can get involved with making a dog's life better.
Hero Unchained Pak (includes
Hero Unchained Pak Plus
Includes: A New Name for Worthless, Unchain My Heart, Puddles On The Floor and Scream Like Banshee. The Hero Unchained Pak Plus takes the family pack above and adds in Puddles on the Floor, for those who want both children's books.
Hero Unchained Pak Plus (includes
—Special Fundraiser! Signed Copies of
A Dog Named Worthless - A Hero Is Born
Special Signed Copy by the Author Rocky Shepheard.
All $10 Extra goes to support Dogs Deserve Better!
BOOK BLOGGER REVIEWS | <urn:uuid:5d5034f4-b974-4c74-91bf-ea7da192b616> | CC-MAIN-2013-20 | http://www.dogsdeservebetter.org/aheroisbornbook.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.91685 | 2,498 | 2.5625 | 3 |
Published: Oct. 17, 2006
Updated: Apr. 20, 2010
Two-and-a-half-year-old Nina was bright-eyed and bouncy, full of laughter and hugs -- when you could get her attention. She often seemed to be ignoring her parents when they spoke to her, and when she did respond, many of her words were slurred.
Concerned, her parents arranged for a hearing test -- and learned that Nina had moderate hearing loss in both ears. Outfitted with a hearing aid, and provided with speech therapy, she is just beginning to regain some of the ground she lost during the first years of life when important language skills are being learned.
"Hearing impairment is the largest congenital disability, affecting about six out of every 1,000 infants," says Duke pediatric audiologist Ann Mabie. "For a very long time, people thought you couldn't test infants' hearing, and would just wait until children were two or three years old. But by the time you wait for children not to talk, a window of opportunity has shut."
In fact, those tiny, shell-like ears that parents marvel over when getting to know their new babies are just the most visible parts of a highly sophisticated machine. Human infants spend the first year of life learning about their environment, and by one year of age, already understand far more language than they are yet able to use -- unless an undiagnosed hearing impairment disrupts the process.
While hearing impairments are difficult at any age, they’re especially devastating in young children, because their brains rely on auditory stimulation to develop the capacity for oral communication. This makes early diagnosis and treatment of childhood hearing losses essential.
Happily, all newborns in North Carolina now have access to the specialized screening needed to diagnose infants with hearing loss, thanks to state legislation passed in October 1999.
Even babies born with normal hearing, however, can develop a hearing loss later in infancy or childhood, due to ear infections or head injuries. So parents should be aware of clues that their children might have difficulty hearing and insist on tests if they suspect hearing loss (see below).
Mabie urges all parents who suspect that their child might have a hearing problem to get the child tested by an audiologist or physician with expertise in this area as soon as possible: "Every day you wait is a day lost."
Hearing impairments caused by problems in the middle and outer ear can sometimes be treated medically. For impairments originating in the inner ear, a hearing aid and speech therapy can help. "Hearing aids help provide access to speech, and with some intensive speech and language therapy, hearing-impaired kids will do fine in a normal classroom."
Children with severe to profound hearing impairments typically will require more extensive rehabilitation, and cochlear implantation may be indicated. At Duke, otolaryngologists have begun using sophisticated new technologies to help even tiny children with hearing impairments to interact with the hearing world.
When Lauren, a two-month-old infant from western North Carolina, was diagnosed with profound hearing loss due to a malformation in her inner ears, or cochleas, she was immediately fitted with hearing aids. Shortly before her second birthday, she came to Duke for a cochlear implant.
Duke specialists in speech pathology and audiology worked to perform a detailed evaluation of Lauren’s hearing loss, using the most precise diagnostic technologies available. Duke neurotologist (ear specialist) Debara Tucci, MD, then selected the cochlear implant that would be most appropriate for Lauren.
After Tucci surgically implanted the mechanism -- a marvel of micro-engineering -- into Lauren’s inner ear, the tiny computer chip that controls the implant was carefully adjusted to transmit just the right auditory signals to Lauren’s brain. The result is a girl who is learning how to communicate with those around her right on schedule.
Whatever intervention a child with hearing deficiencies may need, time is of the essence. As the mother of one hearing-impaired child puts it, "Once you find out and take action, things only get better, not worse.”
If your child exhibits any of the following behaviors, have him or her checked by a professional audiologist or physician with expertise in hearing disorders. | <urn:uuid:2e03df66-fa9b-468c-9fa8-487fd46503ea> | CC-MAIN-2013-20 | http://www.dukehealth.org/health_library/health_articles/hear_hear/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.969457 | 888 | 3.125 | 3 |
How to Check Your Dog’s Pulse
6 of 7 in Series: The Essentials of Dog Care for a Healthy Pet
To check your dog’s pulse, you need to locate the femoral artery, which lies just below the skin on the inside of the back legs, between two large muscles where the leg joins the body.
With your dog standing, reach around in front of the rear leg where it joins his body, and slide your fingers into the groin area. You can feel the femoral artery pumping each time the heart beats.
When you have found the artery with your dog standing, try it with your dog lying on his side. Count how many pulses you feel in 15 seconds and multiply by 4 to get the number of beats per minute. Dogs normally have a pulse between 70 and 120 beats per minute. In puppies, the pulse ranges from 120 to 160 beats per minute.
Become familiar with your dog’s pulse rate and how his pulse feels when he is relaxed as well as after exercise.
If you have reason to believe your dog is suffering from an emergency, a dramatic change in pulse (such as, a slowed pulse indicating shock) can be one sign and symptom. | <urn:uuid:c5b7ff1c-c303-4447-bd3a-5dc50802f12c> | CC-MAIN-2013-20 | http://www.dummies.com/how-to/content/how-to-check-your-dogs-pulse.seriesId-111403.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.953371 | 248 | 2.765625 | 3 |
CHICAGO – Nearly 1 in 20 Americans older than 50 have artificial knees, or more than 4 million people, according to the first national estimate showing how common these replacement joints have become in an aging population.
Doctors know the number of knee replacement operations has surged in the last decade, especially in baby boomers. But until now, there was no good fix on the total number of people living with them.
The estimate is important because it shows that a big segment of the population might need future knee-related care, said Dr. Daniel Berry, president of the American Academy of Orthopedic Surgeons and chairman of orthopedic surgery at the Mayo Clinic in Rochester, Minn. He was not involved in the research.
People with knee replacements sometimes develop knee infections or scar tissue that require additional treatment. But also, even artificial knees wear out, so as the operations are increasingly done on younger people, many will live long enough to almost certainly need a second or even third knee replacement.
“These data are sobering because we didn’t know what an army of people we’ve created over the last decade,” said Elena Losina, lead author of the analysis and co-director of the Orthopedics and Arthritis Center for Outcomes Research at Harvard’s Brigham and Women’s Hospital. “The numbers will only increase, based on current trends.”
Replacement joints can greatly improve quality of life for people with worn-out knees, but they’re not risk-free and it’s a major operation that people should not take lightly, she said.
Modern knee replacements in the United States date to the 1970s. Since then, advances in materials and techniques, including imaging scans to create better-fitting joints, have made the implants more durable and lifelike, surgeons say.
Losina and colleagues came up with their estimate by analyzing national data on the number of knee replacements done from 1998-2009, U.S. census data, death statistics and national health surveys.
For example, in 2009, more than 600,000 knee replacement operations were done nationwide. The study estimate includes people who had knee replacement operations that year and in previous years who are still living.
Overall, 4.5 million Americans are living with artificial knees. That includes an estimated 500,000 who have had at least two replacement operations on the same knee.
Knee replacements are most common in people older than 80 – 1 in 10 people in this age range have them, the study found. Though they’re less prevalent in people younger than that, there are still more than half a million Americans in their 50s with the artificial joints, and based on current trends, operations in that age group are expected to increase.
According to the federal Agency for Healthcare Research and Quality, knee replacements tripled in people ages 45 to 64 between 1997 and 2009.
Doctors think two trends have contributed to that increase: the nation’s obesity epidemic and amateur athletes who don’t adjust workouts to spare aging or even injured joints. Both can lead to or worsen arthritis, the main reason for replacing knees.
Donna Brent, 63, is in the latter category. The Deerfield, Ill., administrative assistant says decades of racquetball, tennis, softball and other sports took a toll on her knees, but she got used to living with the pain, even when she became bowlegged and developed a limp. When pain “started getting in the way of some of my sports,” she gave in to her doctor’s advice and had the operation last June on her right knee. She said she feels better than ever, is back to exercising and plans to resume tennis and softball when the weather warms up.
During knee replacement operations, surgeons slice off a small portion of the worn-out surface on the ends of both leg bones that meet at the knee, then implant an artificial joint usually made of plastic or metal. Typical operations last about two hours, require a few days in the hospital and cost about $40,000.
Artificial knees generally last 15 to 20 years. While some are promoted as lasting 30 years, these estimates are generally based on use among older people more sedentary than baby boomers who expect new knees to let them be as active as they were before surgery. Sometimes that’s possible, though doctors often discourage knee replacement patients from engaging in high-impact sports including jogging.
The National Institute of Arthritis, Musculoskeletal and Skin Diseases paid for the study. | <urn:uuid:62078429-1038-4e59-b941-96afd2102c07> | CC-MAIN-2013-20 | http://www.durangoherald.com/article/20120220/LIFESTYLE04/702209984/0/lifestyle01/Nearly-4M-US-adults%E2%80%99-knees-are-faking-it | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.967286 | 940 | 2.53125 | 3 |
Last week, President Barack Obama ordered interim regulations designed to enable wildland firefighters employed by the federal government to purchase health insurance through their jobs.
For anyone who has seen this summer’s catastrophic wildfires, this seems like a no-brainer. People who risk their lives to save others’ lives and property, including public lands “owned” by the country’s citizens, should be treated better.
According to federal labor laws, most firefighters don’t qualify as permanent employees. Even though they may put in nearly a full year’s worth of hours during the fire season, the demand for men and women skilled in fighting wildfires drops precipitously during the winter. Keeping thousands of firefighters on the payroll all year long doesn’t make fiscal sense.
Policies that push them toward other jobs make even less sense. Come spring, it makes sense to attract those who know what they are getting into and who already have been trained to fight fires effectively and safely.
Every employer, including Uncle Sam, knows benefits are not cheap. Employers also know that good benefits help attract and retain good employees. Seasonal workers often do not receive benefits because they are largely interchangeable. One quits, another is hired, only minimal training is required. Quality may suffer – newly hired servers make more errors, for example, and the thumbs of new landscape personnel are not quite as green – but inexperience goes with the territory and the budget.
That is hardly true of firefighters. These are not slow bloomers who ought to grow up and get a real job. They may never have another job as hard as this one. The hours are long, the working conditions are miserable and the work itself can be backbreaking, not to mention potentially fatal. They must respond quickly to rapidly worsening situations on unfamiliar terrain, and the consequences of not doing it well are catastrophic.
Although some will transition into permanent public-lands jobs, most of these young men and women won’t fight fires as a lifelong career. Similarly, not all enlisted military personnel serve until retirement; that does not mean their service is not valuable for its duration. While they serve, they deserve good benefits, and that certainly includes health insurance.
Insurance is available to nearly everyone for the right price, but anyone who has ever tried to buy an individual policy knows it can be difficult to find and difficult to use – distractions that firefighters certainly do not need. Individual insurance also can be more expensive than seasonal firefighters can afford, but the lack of insurance hampers their ability to seek care.
And they do need care, not only because they risk their lives and their health on our behalf, but because occupational hazards are not the only health-care problems they face. Like everyone else, they catch colds and flu and fall off their bicycles on their days off. Also like everyone else, they may have families.
Letting them purchase insurance through their job is the right thing to do. It is also not a benefit that many Coloradans would begrudge them, especially not this year. | <urn:uuid:ec2cbf97-d58a-435d-a771-124d9a3d81cd> | CC-MAIN-2013-20 | http://www.durangoherald.com/article/20120717/OPINION01/707179971/-1/Opinion | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.976614 | 628 | 2.546875 | 3 |
When I was learning carpentry from a master carpenter, I tried to do something with a tool close at hand instead of going to get the correct tool for the job. Of course, I butchered the piece of wood and eventually had to get the right tool, which got the job done in a fraction of the time that I wasted with the convenient-to-reach tool. The same lesson applies to power quality tools, which range from a simple screwdriver to a $24,000, 32-gigahertz (GHz) spectrum analyzer. Not only can you waste time and not get the answer you are looking for, you might even be led to the wrong answer using the wrong tool for the task.
Before going into the variety of tools available, here’s a quick safety reminder. Always assess the hazards and skills required for the task, and ensure you or whoever is doing it is a “qualified person” per the National Electrical Code definition. Ensure all personnel within the possible hazard area wear the proper personal protective equipment per NFPA 70E and other local requirements. And wherever possible, make connections on de-energized circuits only. Even something as simple as taking a panel cover off to tighten a screw can be disastrous. Accidents don’t always happen to someone else.
On the low end of the price range is an item in everyone’s tool kit: a digital multimeter (DMM). A DMM can measure a number of steady-state power quality phenomena, such as voltage imbalance. It can also be used to find voltage drops across contacts and other devices that should have very low drops. Excessive neutral-to-ground voltage is often a steady-state condition.
Clamp-on power meters are slightly more expensive ($300–$3,000) but used similarly. Though only single-phase, they can be useful for current imbalance and power factor, and many have limited harmonic measuring capabilities. Be wary of the 3 assumptions some meters make, which contend that all three phases are identical and, therefore, give you three-phase answers with a simple multiplication. Also, most clamp-on meters use current transformers that cannot measure (or tolerate) direct current (DC).
Power loggers generally have capabilities similar to power meters but can take unattended readings for extended periods. They are useful for finding time-correlated problems, such as the voltage drops at a certain time each day. Several manufacturers offer both single- and three-phase loggers ($500–$3,500) that come with software for downloading the data onto a computer for analysis. Some plug right into an outlet to let you piggyback the equipment being monitored for simple and safe connections.
Most electrical contractors doing power quality work have several monitors, which can monitor a wide range of power quality phenomena. Read the specifications and the user’s guide before taking one out to troubleshoot for a suspected power quality problem. This is especially important when looking for transients and higher order harmonics. If the sampling rate of the instrument is 64 times per cycle, it is not possible to determine harmonics above the 32nd, and even that is suspect in the real world of measuring. If the current probe is a Rogowski coil (flex-probes) and you are measuring in a room with a half dozen 500-horsepower motors running off adjustable speed drives, much of the current data is going to be skewed by the antenna-like pickup characteristic of those probes. If using a current transformer that isn’t rated for DC and there is an inrush current condition on a saturated transformer with a DC offset, it won’t produce reliable data.
However, using the instrument within its limitations provides a wealth of data that virtually no other instrument can simultaneously do for you. Right in the sweet spot of power quality monitors are capturing the waveforms of disturbances, such as the arcing transients that occur before the voltage sag is cleared by the distribution circuit protection device or the slight frequency and phase shift that occurs when switching from utility power to a backup power source that resulted in a particularly susceptible piece of equipment dropping off line. Whether doing a benchmark survey to compare the site data to the commissioning data or troubleshooting a process interruption that only occurs once per month but with large financial consequences, a power quality monitor in the $3,000–8,000 price range can do exactly that.
Though they don’t have the same triggering, capture and characterization functionality as a power quality monitor, a high-speed (200 megahertz–1 GHz) digital oscilloscope ($3,000–5,000) can be a valuable tool to have at your disposal when looking at noise or transients that are above the bandwidth of power quality monitors. Likewise, a spectrum analyzer ($10,000–15,000) can provide a more complete and wider picture of the steady-state signals that are present in a system and fall below the fundamental frequency or above the harmonic range of most power quality analyzers. For random or burst signals, a noise logger ($4,000–8,000) is an invaluable tool, and for a hands-free, no-contact look for hot spots that can result from high impedance contacts or harmonic losses in motors and transformers, the thermal or infrared camera ($4,000–20,000) is the tool of choice.
Of course, the most used tool for power quality tasks is likely the screwdriver (priceless).
BINGHAM, a contributing editor for power quality, can be reached at 732.287.3680. | <urn:uuid:20342dbc-37d4-47e7-8758-faea1b8cbd9d> | CC-MAIN-2013-20 | http://www.ecmag.com/section/your-business/what%E2%80%99s-your-toolkit?qt-issues_block=0 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.928073 | 1,151 | 2.65625 | 3 |
Focus on Economic Data: Consumer Price Index and Inflation, October 19, 2011
Glossary terms from:
One of many choices or courses of action that might be taken in a given situation.
Any activity or organization that produces or exchanges goods or services for a profit.
Consumer Price Index (CPI)
A price index that measures the cost of a fixed basket of consumer goods and services and compares the cost of this basket in one time period with its cost in some base period. Changes in the CPI are used to measure inflation.
People who use goods and services to satisfy their personal needs and not for resale or in the production of other goods and services.
Spending by households on goods and services. The process of buying and using goods and services.
A sustained decrease in the average price level of all the goods and services produced in the economy.
A severe, prolonged economic contraction.
The central bank of the United States. Its main function is controlling the money supply through monetary policy. The Federal Reserve System divides the country into 12 districts, each with its own Federal Reserve bank. Each district bank is directed by its nine-person board of directors. The Board of Governors, which is made up of seven members appointed by the President and confirmed by the Senate to 14-year terms, directs the nation's monetary policy and the overall activities of the Federal Reserve. The Federal Open Market Committee is the official policy-making body; it is made up of the members of the Board of Governors and five of the district bank presidents.
Something a person or organization plans to achieve in the future; an aim or desired result.
Tangible objects that satisfy economic wants.
Spending by all levels of government on goods and services; includes categories like military, schools and roads.
Individuals and family units that buy goods and services (as consumers) and sell or rent productive resources (as resource owners).
Payments earned by households for selling or renting their productive resources. May include salaries, wages, interest and dividends.
A rise in the general or average price level of all the goods and services produced in an economy. Can be caused by pressure from the demand side of the market (demand-pull inflation) or pressure from the supply side of the market (cost-push inflation).
Money paid regularly, at a particular rate, for the use of borrowed money.
The quantity and quality of human effort available to produce goods and services.
The amount of money that people pay when they buy a good or service; the amount they receive when they sell a good or service.
The weighted average of the prices of all goods and services in an economy; used to calculate inflation.
People and firms that use resources to make goods and services.
A good or service that can be used to satisfy a want.
A process of manufacturing, growing, designing, or otherwise using productive resources to create goods or services used to to satisfy a want.
Goods, often supplied by the government, for which use by one person does not reduce the quantity of the good available for others to use, and for which consumption cannot be limited to those who pay for the good.
The amount of goods and services that a monetary unit of income can buy.
A decline in the rate of national economic activity, usually measured by a decline in real GDP for at least two consecutive quarters (i.e., six months).
Money set aside for a future use that is held in easily-accessed accounts, such as savings accounts and certificates of deposit (CDs).
Activities performed by people, firms or government agencies to satisfy economic wants.
Use money now to buy goods and services.
Standard of Living
The level of subsistence of a nation, social class or individual with reference to the adequacy of necessities and comforts of daily life.
Compulsory payments to governments by households and businesses.
An abstract measure of the satisfaction consumers derive from consuming goods and services.
Payments for labor services that are directly tied to time worked, or to the number of units of output produced.
People employed to do work, producing goods and services. | <urn:uuid:793a70c3-d2e7-44e1-88a7-34319f254cb8> | CC-MAIN-2013-20 | http://www.econedlink.org/lessons/EconEdLink-print-glossary.php?lid=1051 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.945948 | 849 | 3.59375 | 4 |
Rainy Day Painting
Create your very own creepy, haunted castle sitting in a turbulent field of flowing grass, eerily surrounded by dark, ominous clouds.
Fireworks are such an exciting part of part of summer festivities, but it's sad when the show is over. Keep them alive all year long with watercolor fireworks.
Show your high schooler how to celebrate Mary Cassatt, an Impressionist painter, by creating a mother-child painting in her style.
Put your individual fingerprint on the 100th Day of School (literally!) with this activity.
Show your preschooler how to make a print of a butterfly using her hand as a tool--a great way to stimulate her sense of touch.
Use marbles and paint to explore the wild world of shapes and color...and build kindergarten writing strength, too.
Introduce your kindergartener to some art history by showing him how to create an everyday object print, Andy Warhol-style.
Celebrate the changing seasons with this fun, hands-on art activity that will teach your child about the different colors of the seasons.
Help your preschooler begin reading and writing the printed word by connecting simple letter recognition exercises with this easy art project: alphabet trees! | <urn:uuid:b9953fa3-a9b1-49a2-8a31-a2bff8d508c2> | CC-MAIN-2013-20 | http://www.education.com/collection/zapkode/rainy-day-painting/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.914055 | 253 | 3.453125 | 3 |
Twenty Ideas for Engaging ProjectsSeptember 12, 2011 | Suzie Boss
The start of the school year offers an ideal time to introduce students to project-based learning. By starting with engaging projects, you'll grab their interest while establishing a solid foundation of important skills, such as knowing how to conduct research, engage experts, and collaborate with peers. In honor of Edutopia's 20th anniversary, here are 20 project ideas to get learning off to a good start.
1. Flat Stanley Refresh: Flat Stanley literacy projects are perennial favorites for inspiring students to communicate and connect, often across great distances. Now Flat Stanley has his own apps for iPhone and iPad, along with new online resources. Project founder Dale Hubert is recently retired from the classroom, but he's still generating fresh ideas to bring learning alive in the "flatlands."
2. PBL is No Accident: In West Virginia, project-based learning has been adopted as a statewide strategy for improving teaching and learning. Teachers don't have to look far to find good project ideas. In this CNN story about the state's educational approach, read about a project that grew out of a fender-bender in a school parking lot. When students were asked to come up with a better design for the lot, they applied their understanding of geometry, civics, law, engineering, and public speaking. Find more good ideas in West Virginia's Teach21 project library.
3. Defy Gravity: Give your students a chance to investigate what happens near zero gravity by challenging them to design an experiment for NASA to conduct at its 2.2 second drop tower in Brookpark, Ohio. Separate NASA programs are offered for middle school and high school. Or, propose a project that may land you a seat on the ultimate roller coaster (aka: the "vomit comet"), NASA aircraft that produces periods of micro and hyper gravity ranging from 0 to 2 g's. Proposal deadline is Sept. 21, and flight week takes place in February 2012.
4. Connect Across Disciplines: When students design and build kinetic sculptures, they expand their understanding of art, history, engineering, language arts, and technology. Get some interdisciplinary project insights from the Edutopia video, Kinetic Conundrum. Click on the accompanying links for more tips about how you can do it, too.
5. Honor Home Languages: English language learners can feel pressured to master English fast, with class time spent correcting errors instead of using language in meaningful ways. Digital IS, a site published by the National Writing Project, shares plans for three projects that take time to honor students' home languages and cultures, engaging them in critical thinking, collaboration, and use of digital tools. Anne Herrington and Charlie Moran curate the project collection, "English Language Learners, Digital Tools, and Authentic Audiences."
6. Rethink Lunch: Make lunch into a learning opportunity with a project that gets students thinking more critically about their mid-day meal. Center for Ecoliteracy offers materials to help you start, including informative including informative essays and downloadable planning guides. Get more ideas from this video about a middle-school nutrition project, "A Healthy School Lunch."
7. Take a Learning Expedition: Expeditionary Learning schools take students on authentic learning expeditions, often in neighborhoods close to home. Check out the gallery for project ideas about everything from the tools people use in their work to memories of the Civil Rights Movement.
8. Find a Pal: If PBL is new to you, consider joining an existing project. You'll benefit from a veteran colleague's insights, and your students will get a chance to collaborate with classmates from other communities or even other countries. Get connected at ePals, a global learning community for educators from more than 200 countries.
9. Get Minds Inquiring: What's under foot? What are things made of? Science projects that emphasize inquiry help students make sense of their world and build a solid foundation for future understanding. The Inquiry Project supports teachers in third to fifth grades as they guide students in hands-on investigations about matter. Students develop the habits of scientists as they make observations, offer predictions, and gather evidence. Companion videos show how scientists use the same methods to explore the world. Connect inquiry activities to longer-term projects, such as creating a classroom museum that showcases students' investigations.
10. Learn through Service: When cases of the West Nile virus were reported in their area, Minnesota students sprang into action with a project that focused on preventing the disease through public education. Their project demonstrates what can happen when service-learning principles are built into PBL. Find more ideas for service-learning projects from the National Youth Leadership Council.
11. Locate Experts: When students are learning through authentic projects, they often need to connect with experts from the world outside the classroom. Find the knowledgeable experts you need for STEM projects through the National Lab Network. It's an online network where K-12 educators can locate experts from the fields of science, technology, engineering and mathematics.
12. Build Empathy: Projects that help students see the world from another person's perspective build empathy along with academic outcomes. The Edutopia video, "Give Me Shelter", shows what compassionate learning looks like in action. Click on the companion links for more suggestions about how you can do it, too.
13. Investigate Climate Science: Take students on an investigation of climate science by joining the newest collaborative project hosted by GLOBE, Global Learning and Observations to Benefit the Environment. The Student Climate Research Campaign includes three components: introductory activities to build a foundation of understanding, intensive observing periods when students around the world gather and report data, and research investigations that students design and conduct. Climate project kicks off Sept. 12.
14. Problem-Solvers Unite: Math fairs take mathematics out of the classroom and into the community, where everyone gets a chance to try their hand at problem solving. Galileo Educational Network explains how to host a math fair. In a nutshell, students set up displays of their math problems but not the solutions. Then they entice their parents and invited guests to work on solutions. Make the event even more engaging by inviting mathematicians to respond to students' problems.
15. Harvest Pennies : Can small things really add up to big results? It seems so, based on results of the Penny Harvest. Since the project started in New York in 1991, young philanthropists nationwide have raised and donated more than $8 million to charitable causes, all through penny drives. The project website explains how to organize students in philanthropy roundtables to study community issues and decide which causes they want to support.
16. Gather Stories: Instead of teaching history from textbooks, put students in the role of historian and help them make sense of the past. Learn more about how to plan oral history projects in the Edutopia story, "Living Legends." Teach students about the value of listening by having them gather stories for StoryCorps.
17. Angry Bird Physics: Here's a driving question to kickstart a science project: "What are the laws of physics in Angry Birds world?" Read how physics teachers like Frank Noschese and John Burk are using the web version of the popular mobile game in their classrooms.
18. Place-Based Projects: Make local heritage, landscapes, and culture the jumping-off point for compelling projects. That's the idea behind place-based education, which encourages students to look closely at their communities. Often, they wind up making significant contributions to their communities, as seen in the City of Stories project.
19. News They Can Use: Students don't have to wait until they're grown-ups to start publishing. Student newspapers, radio stations, and other journalism projects give them real-life experiences now. Award-winning journalism teacher Esther Wojcicki outlines the benefits this post on the New York Times Learning Network. Get more ideas about digital-age citizen journalism projects at MediaShift Idea Lab.
20. The Heroes They Know: To get acquainted with students at the start of the year and also introduce students to PBL processes, High Tech High teacher Diana Sanchez asked students to create a visual and textual representation of a hero in their own life. Their black-and-white exhibits were a source of pride to students, as Sanchez explains in her project reflection . Get more ideas from the project gallery at High Tech High, a network of 11 schools in San Diego County that emphasize PBL. To learn more, watch this Edutopia video interview with High Tech High founding principal Larry Rosenstock.
Please tell us about the projects you are planning for this school year. Questions about PBL? Draw on the wisdom of your colleagues by starting discussions or asking for help in the PBL community. | <urn:uuid:6d6b12c8-51d9-4d93-b798-19f2bbb48a21> | CC-MAIN-2013-20 | http://www.edutopia.org/blog/20-ideas-for-engaging-projects-suzie-boss?quicktabs_edutopia_blogs_sidebar_popular_list=0 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.944685 | 1,793 | 3.515625 | 4 |
Nutrition has a big impact on health, including major diseases such as heart disease, osteoporosis, and cancer. Our work is designed to help people keep track of the nutrional content of foods they have eaten. Our work uses shopping receipts to generate suggestions about healthier food items that could help to supplement missing nutrients. Our application, based on shopping receipt data, provides access to ambiguous suggestions for more nutritious purchases.
Our goal is to contribute a better understanding of how a sensor-based application can be integrated in everyday life. To do this, we chose an approach that can easily be replicated for many users, deployed, and tested for months at a time. We are currently in the process of conducting a diary study that can provide data on which we can train our prediction algorithms. We conducted a formative user study that suggested that receipts may provide enough information to extend our work by also estimating what people are actually eating, as opposed to simply what they are purchasing. We are also interviewing and observing people's shopping and food managing habits to further inform the system design. | <urn:uuid:0cbebbe3-f6c6-48cc-9401-6782625b11a6> | CC-MAIN-2013-20 | http://www.eecs.berkeley.edu/IPRO/Summary/Old.summaries/03abstracts/jmankoff.2.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.974744 | 216 | 2.8125 | 3 |
Description from Flora of China
Lianas large, herbaceous or woody. Inflorescences extra-axillary, umbel-like or short racemelike, occasionally branched, shorter than leaves, usually few flowered. Flowers large. Calyx without glands. Corolla subrotate; lobes overlapping to right. Corona shallowly cupular, inserted at base of gynostegium, fleshy, apex entire or shallowly undulate. Filaments connate; anthers very large, decurrent to base of column, apex acuminate; pollinia 2 per pollinarium, slender, falcate, pendulous. Stigma head scarcely umbonate. Follicles stout, cylindric-fusiform, slightly tapering to a blunt apex.
Two species: China, India, Myanmar, Sri Lanka, Thailand; one species in China. | <urn:uuid:a82a277c-a742-4529-9e92-4b0ec00ac4c3> | CC-MAIN-2013-20 | http://www.efloras.org/florataxon.aspx?flora_id=620&taxon_id=115638 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.827055 | 188 | 2.59375 | 3 |
U.S. Energy Information Administration - EIA - Independent Statistics and Analysis
Today in Energy
The Strait of Hormuz (shown in the oval on the map), which is located between Oman and Iran, connects the Persian Gulf with the Gulf of Oman and the Arabian Sea. Hormuz is the world's most important oil chokepoint due to its daily oil flow of almost 17 million barrels per day (bbl/d) in 2011, up from between 15.5-16.0 million bbl/d in 2009-2010. Flows through the Strait in 2011 were roughly 35% of all seaborne traded oil, or almost 20% of oil traded worldwide.
On average, 14 crude oil tankers per day passed through the Strait in 2011, with a corresponding amount of empty tankers entering to pick up new cargos. More than 85% of these crude oil exports went to Asian markets, with Japan, India, South Korea, and China representing the largest destinations.
At its narrowest point, the Strait is 21 miles wide, but the width of the shipping lane in either direction is only two miles, separated by a two-mile buffer zone. The Strait is deep and wide enough to handle the world's largest crude oil tankers, with about two-thirds of oil shipments carried by tankers in excess of 150,000 deadweight tons.
Several alternatives are potentially available to move oil from the Persian Gulf region without transiting Hormuz, but they are limited in capacity, in many cases are not currently operating or operable, and generally engender higher transport costs and logistical challenges.
- Alternate routes include the 745-mile Petroline, also known as the East-West Pipeline, across Saudi Arabia from Abqaiq to the Red Sea. The East-West Pipeline has a nameplate capacity of about 5 million bbl/d, with current movements estimated at about 2 million bbl/d.
- The Abqaiq-Yanbu natural gas liquids pipeline, which runs parallel to the Petroline to the Red Sea, has a 290,000-bbl/d capacity.
- Additional oil could also be pumped north via the Iraq-Turkey pipeline to the port of Ceyhan on the Mediterranean Sea, but volumes have been limited by the closure of the Strategic Pipeline linking north and south Iraq.
- The United Arab Emirates is also completing the 1.5 million bbl/d Abu Dhabi Crude Oil Pipeline that will cross the emirate of Abu Dhabi and end at the port of Fujairah just south of the Strait.
- Other alternate routes could include the deactivated 1.65-million bbl/d Iraqi Pipeline across Saudi Arabia (IPSA) and the deactivated 0.5 million-bbl/d Tapline to Lebanon.
EIA's World Oil Transit Chokepoints analysis brief contains additional information about other chokepoints, and the Middle East & North Africa overview contains additional information about countries in the region. | <urn:uuid:59115ba6-5e81-4858-b414-89604ce9f241> | CC-MAIN-2013-20 | http://www.eia.gov/todayinenergy/detail.cfm?id=4430 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.940473 | 615 | 3.328125 | 3 |
German military use laser to destroy targets
over half-a-mile away
High-energy laser passes various tests with
Germany-based Rheinmetall Defense has
demonstrated a 50kW, high-energy laser at their ground facility in
Switzerland. According to representatives from the company, the
device passed all target tests with “flying
High-energy laser system designed by
While we’re still a bit away from the
sort of shootouts we see in popular science-fiction flicks, the
demonstration of this sort of weaponry is impressive
How it works
The Rheinmetall laser system isn’t a
single laser; rather, it’s composed of two separate laser
modules mounted on a Revolver Gun air defense turrets and attached
to additional power modules. The laser modules themselves are 30kW
and 20kW, respectively, and a Beam Superimposing Technology
combines them, focusing the lights’ energy in a
“superimposed, cumulative manner” for the sole
purpose of obliterating its target(s).
In one test, the laser system sliced through a
half-inch thick steel girder from a little more than a half-mile
away. Next, from a distance of approximately one-and-a-quarter
miles, the system shot down a bunch of drones as they nose-dived
toward the surface at a rate of 50m/s.
Specific to this test, the system’s
radar was able to actually track the drones through their descent
at a distance of two and a half miles.
The last test the system performed was perhaps
its most impressive. The weapon was able to focus in on and destroy
a steel ball with an 82mm diameter traveling at 50m/s. Beyond
demonstrating a high level of accuracy, the purpose of this
demonstrate was to simulate how well the laser could handle an
incoming mortar round.
Representatives from Rheinmetall say that the
laser system will reduce the time required for counter rocket,
artillery, and mortar measures to just a couple of seconds
— even in difficult weather circumstances. As a matter of
fact, the weather during the aforementioned tests featured a wide
array of typical Swiss-based weather patterns, including ice, rain,
snow, and extremely bright sunlight.
Looking forward to the immediate future, the
company plans to test a 60kW “technology
demonstrator”: the quotes are purposeful here, as this
new system will feature a couple of different technologies coming
together in one unit. This includes 35mm Ahead Revolver Guns, which
will allow the company to explore ways in which a laser and
automatic canon can be used together.
Looking a bit further down the road,
Rheinmetall’s ultimate goal is to get their technology to
a 100kW laser, and to make these systems mobile, where they can be
mounted onto an armored vehicle so that they can be operated in the
After successfully testing a 50kW laser
system, Rheinmetall Defense will look to next develop a
truck-mounted mobile system with 100kW power.
Learn more about Jeff Bausch. | <urn:uuid:d57c38a3-6d15-46aa-a8d3-444a1ed428a7> | CC-MAIN-2013-20 | http://www.electronicproducts.com/News/German_military_use_laser_to_destroy_targets_over_half-a-mile_away.aspx | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.915477 | 693 | 2.625 | 3 |
1. Linguistic Background
The languages that are currently spoken in the Pacific
region can be divided broadly into three groups: the Australian and New Guinean
languages formed by people who participated in the region’s earliest migrations
over a period of 20,000-30,000 years starting several tens of thousands of years
ago, and the Austronesian languages spoken by Mongoloid people who migrated
from the Asian continent around 3,000 B.C. The region has numerous languages,
including 250 Aboriginal languages in Australia and 750 Papuan languages on
the island of New Guinea (including the Indonesian territory of Irian Jaya)
and neighboring areas. There are also 350 Austronesian languages in Melanesia,
20 in Polynesia, 12 in Micronesia and 100 in New Guinea (Comrie, Matthews, and
Polinsky 1996). There is wide variation not only among language groups, but
also among the families of languages. Few language families have been identified
among the languages of Australia and New Guinea using the methods of comparative
linguistics. Pacific languages are also characterized by the small size of speaker
populations and by the absence of dominant languages. However, there are usually
bilingual people who can speak or at least understand the languages of neighboring
populations, and it is believed that this situation has existed for a long time.
In terms of cultural factors, it appears that the diversification of languages
in the Pacific region was accelerated by the emblematic function of language
in the creation of a clear distinction between “ingroup” and “outgroup.”
The languages of New Guinea and the region around it show diverse linkages and wide variations between languages. The Austronesian languages of the Pacific region are mostly classified as Oceanian languages, while the Chamorro and Palau languages of Micronesia are classified into the languages of Western Malaya and Polynesia (WMP, Indonesian family), and the indigenous languages of Maluku and Irian Jaya in Eastern Indonesia into the Central Malayo-Polynesian (CMP) or the South Halmahera-West New Guinea (SHWNG) subgroups. In particular, there are strong similarities between the linguistic characteristics of the CMP and SHWNG languages and those of the Melanesian branch of the Oceanian languages. These linguistic conditions and characteristics are attributable to ethnic migrations within the region over a long period of time, accompanied by contacts and linguistic merging with indigenous Papuan people. Papuan languages are still found in parts of Indonesia, including Northern Halmahera and the islands of Pantar and Alor and central and eastern Timor in the Province of Nusa Tenggara. In New Guinea, contact with Papuan languages has caused some Austronesian languages to exhibit a word order change from subject-verb-object to subject-object-verb (Austronesian Type 2) (Sakiyama 1994).
2. Linguistic Strata
With the start of colonization by the European powers
in the nineteenth century, a new set of linguistic circumstances developed in
the region. First, pidgin languages based on European and Melanesian languages
gradually emerged as common languages. The establishment of plantations in Samoa
and in Queensland, Australia, which had concentrations of people who spoke Melanesian
languages, was important in providing breeding grounds for pidgin languages.
A pidgin language is formed from elements of the grammar of both contributing
languages, though the pidgin languages tend to be looked down upon from the
perspective of the more dominant of the two parent languages. The region’s
newly formed common languages, including Tok Pisin, Bislama, and Solomon Pidgin,
flourished after they were taken back to the homelands of the various speakers.
This was possible because Vanuatu, the Solomon Islands and Papua New Guinea
were all multilingual societies without dominant languages. The number of speakers
of pidgin languages increased rapidly in this environment. At the same time,
the continuing existence of ethnic minority languages came under threat.
Examples of pidgins that were creolized (adopted as mother languages in their own right) include Solomon Pijin, which eventually had over 1,000 speakers aged five and over (1976) in the Solomon Islands. Bislama, a mixture of over 100 indigenous languages grafted upon a base of English and French, is now spoken by almost the entire population of Vanuatu (170,000 in 1996) and is partially creolized. Of particular interest is the fact that a group of more than 1,000 people who emigrated to New Caledonia have adopted Bislama as their primary language. The situation in Papua New Guinea, which has a population of 4,300,000 (1996), is even more dramatic. By 1982 the number of people using Tok Pisin as their primary language had reached 50,000, while another 2,000,000 used it as a second language (Grimes 1996).
3. Minority Languages and Common Languages in the Pacific Region
The Atlas of the World’s Languages in Danger of Disappearing published by UNESCO (Wurm 1996) provides merely a brief overview of the current situation in Papua New Guinea, Australia, the Solomon Islands, and Vanuatu. There is no mention of Micronesia, New Caledonia, or Polynesia, presumably because of a lack of information resulting from the large number of languages in these areas. The following report covers areas and languages that I have researched and endangered languages covered by field studies carried out by Japanese researchers.
3.1 Belau (Palau), Micronesia
According to Belau (Palau) government statistics (1990),
the total population of 15,122 people includes 61 people living on outlying
islands in Sonsorol State, and 33 in Hatohobei (Tochobei) State. Apart from
the Sonsorol Islands, Sonsorol State also includes the islands of Fanah, Meril
and Pulo An. In addition to the Hatohobei language, the language mix on these
outlying islands also includes nuclear Micronesian (Chuukic) languages, which
are the core Oceanian languages spoken in the Carolines. They differ from Palauan,
which is an Indonesian language. To lump these languages together as the Sonsorol
languages with a total of 600 speakers (Wurm and Hattori 1981-83) is as inaccurate
as combining the Miyako dialects of Okinawa into a single classification.
The number of Chuukic speakers has declined steadily since these figures were compiled. Starting in the German colonial period of the early twentieth century, people have been relocated from these outlying islands to Echang on Arakabesan Island in Belau. Today there are several hundred of these people. Many of those born in the new location only speak Palauan. A study by S. Oda (1975) estimated that there were 50 speakers of Pulo Annian. The language of Meril continued to decline and has now become extinct.
From the early part of the twentieth century until the end of World War II, Micronesia was under Japanese rule, administered by the South Seas Mandate. Japanese was used as a common language, and its influence is still evident today. The linguistic data on Micronesia presented by Grimes (1996) is distorted by the fact that, while the number of English speakers is shown, no mention is made of Japanese. A study carried out in 1970 (Wurm, Mühlhäusler, and Tryon 1996) found that people aged 35 and over could speak basic Japanese. This group is equivalent to people aged 63 and over in 1998. An estimate based on Belau government statistics (1990) suggests that more than 1,000 of these people are still alive. In the State of Yap in the Federated States of Micronesia, where the percentage of females attending school is said to have been low, we can assume that the number of Japanese speakers has fallen below 500.
It has been suggested that if Japan had continued to rule Micronesia, Japanese would certainly have become the sole language in the region, and indigenous languages would have disappeared (Wurm, Mühlhäusler, and Tryon 1996). This seems an overly harsh appraisal of Japan’s language policy. Except in the schools, as a matter of fact no significant steps were taken to promote the use of Japanese. Micronesia previously had no common language for communication between different islands. Even today, old people from different islands use Japanese as a common language (Sakiyama 1995; Toki 1998). However, the role of this Japanese pidgin appears to have ended within a single generation, and in this sense it too is an endangered language. Pidgin Japanese continues to be used as a lingua franca by Taiwanese in their fifties and older (Wurm, Mühlhäusler, and Tryon 1996), and the number of speakers is estimated to have been 10,000 in 1993 (Grimes 1996).
3.2 Yap, Micronesia
Ngulu Atoll is situated between the Yap Islands and the Belau Islands. The Nguluwan language is a mixture of Yapese and Ulithian, which belongs to the Chuukic family. It has inherited the Ulithian phonetic system and a partial version of Yap grammar (Sakiyama 1982). Nguluwan appears to have evolved through bilingualism between Yapese and Ulithian, and to describe it as a dialect of Ulithian (Grimes 1996) is inappropriate. In 1980 there were 28 speakers. Even with the inclusion of people who had migrated to Guror on Yap Island, where the parent village is located, the number of speakers was fewer than 50. Speakers are being assimilated rapidly into the Yapese language and culture.
3.3 Maluku, Indonesia
The book Atlas Bahasa Tanah Maluku (Taber et al. 1996) covers 117 ethnic languages (Austronesian, Papuan), including numbers of speakers for each language, areas of habitation and migration, access routes, simple cultural information, and basic numbers and expressions. This work is especially valuable since it corrects inaccuracies and errors in the 1977 Classification and Index of the World's Languages by C. Y. L. Voegelin and F. M. Voegelin. It also distinguishes languages and dialects according to their a priori mutual intelligibility. Fifteen languages are listed as having fewer than 1,000 speakers. They include the Nakaela language of Seram, which has only 5 speakers, the Amahai and Paulohi languages, also of Seram, which are spoken by 50 people each, and the South Nuaulu and Yalahatan languages, which have 1,000 speakers each on Seram Island. The data, however, are not complete. For example, the Bajau language is not included, presumably because of the difficulty of accessing the various solitary islands where the Bajau people live. The author researched the Yalahatan language in 1997 and in 1998, and the Bajau language (2,000 speakers) on Sangkuwang Island in 1997.
3.4 Irian Jaya, Papua New Guinea
Detailed information about the names, numbers of speakers,
and research data for over 800 languages spoken in New Guinea and its coastal
regions can be found in the works by the Barrs (1978), Voorhoeve (1975), and
Wurm (1982). However, not only the minority languages but even the majority
languages other than a few have yet to be surveyed and researched adequately.
There are many languages for which vocabulary collection has yet to be undertaken.
It appears that dictionaries or grammars have been published for less than one-tenth
of the region’s languages. However, the gospel has been published in several
dozen languages using orthographies established by SIL. Papuan languages range
from those with substantial speaker populations, including Enga, Chimbu (Kuman),
and Dani, which are spoken by well over 100,000 people, to endangered languages
such as Abaga with 5 speakers (150 according to Wurm ), Makolkol with
7 (unknown according to Wurm), and Sene with under 10. There are very many languages
for which the number of speakers is unknown and more up-to-date information
is needed. Also, despite having substantially more than 1,000 speakers (Wurm
1982; Grimes 1996), Murik is in danger of extinction due to the creolization
of Tok Pisin (Foley 1986). Moreover, it is questionable whether the present
lists include all of the region’s languages.
Information about Irian Jaya is even sparser. A study on popular languages carried out by the author in 1984-85 revealed that Kuot (New Ireland), Taulil (New Britain), and Sko (Irian Jaya) all had several hundred speakers and that, in the case of Taulil in particular, an increasing number of young people were able to understand what their elders were saying but could no longer speak the language themselves. There has been a rapid shift to Kuanua, an indigenous language used in trade with neighboring Rabaul, which is replacing Taulil.
3.5 Solomon Islands, Melanesia
The total population of the Solomon Islands is 390,000 (1996). There are 63 Papuan, Melanesian, and Polynesian indigenous languages, of which only 37 are spoken by over 1,000 people (Grimes 1996). The Papuan Kazukuru languages (Guliguli, Doriri) of New Georgia, which were known to be endangered as early as 1931, have become extinct already, leaving behind just some scant linguistic information. The Melanesian Tanema and Vano languages of the Santa Cruz Islands and the Laghu language of the Santa Isabel Islands were extinct by 1990. This does not mean that the groups speaking them died out, but rather that the languages succumbed to the shift to Roviana, a trade language used in neighboring regions, or were replaced by Solomon Pijin (Sakiyama 1996).
3.6 Vanuatu, Melanesia
The situation in Vanuatu is very similar to that in the
Solomon Islands. The official view, written in Bislama, is as follows:
I gat sam ples long 110 lanwis evriwan so i gat bigfala lanwis difrens long Vanuatu. Pipol blong wan velej ol i toktok long olgeta bakegen evridei nomo long lanwis be i no Bislama, Inglis o Franis. (Vanuatu currently has 110 indigenous languages, which are all very different linguistically. On an everyday basis people in villages speak only their local languages, not Bislama, English, or French). (Vanuatu, 1980, Institute of Pacific Studies)
Among the Melanesian and Polynesian indigenous languages spoken by 170,000 people, or 93% of the total population (1996), there are many small minority tongues. These include Aore, which has only a single speaker (extinct according to Wurm and Hattori [1981-83]); Maragus and Ura (with 10 speakers each); Nasarian, and Sowa (with 20); and Dixon Reef, Lorediakarkar, Mafea, and Tambotalo (with 50). If languages with around 100 speakers are included, this category accounts for about one-half of the total number of languages (Grimes 1996). The spread of Bislama has had the effect of putting these languages in jeopardy.
3.7 New Caledonia, Melanesia
New Caledonia has a total population of 145,000 people,
of whom 62,000 are indigenous. As of 1981, there were 28 languages, all Melanesian
except for the one Polynesian language Uvean. The only languages with over 2,000
speakers are Cemuhi, Paicî, Ajië, and Xârâcùù, along with Dehu and Nengone,
which are spoken on the Loyalty Islands.
Dumbea (Paita), which is spoken by several hundred people, has been described by T. Shintani and Y. Paita (1983). And M. Osumi (1995) has described Tinrin, which has an estimated 400 speakers. Speakers of Tinrin are bilingual in Xârâcùù or Ajië. Nerë has 20 speakers and Arhö 10, while Waamwang, which had 3 speakers in 1946, is now reported to be extinct (Grimes 1996). Descendants of Javanese, who began to migrate to New Caledonia in the early part of the twentieth century, now number several thousand. The Javanese language spoken by these people, which has developed in isolation from the Javanese homeland, has attracted attention as a new pidgin language.
When Europeans first arrived in Australia in 1788, it is estimated that there were 700 different tribes in a population of 500,000-1,000,000 (Comrie, Matthews, and Polinsky 1996). By the 1830s Tasmanian had become extinct, and today the number of Aboriginal languages has fallen to less than one-half what it once was. However, T. Tsunoda left detailed records of the Warrungu language, the last speaker of which died in 1981, and the Djaru language, which has only 200 speakers (Tsunoda 1974, 1981). Yawuru, which belongs to the Nyulnyulan family, reportedly has fewer than 20 speakers, all aged in their sixties or older. The language is described by K. Hosokawa (1992).
The Pacific has been heavily crisscrossed by human migration
from ancient to modern times. All Pacific countries except the Kingdom of Tonga
were colonized. This historical background is reflected in the existence of
multilevel diglossia in all regions of the Pacific.
Depending on the generation, the top level of language in Micronesia is either English (the official language) or pidgin Japanese (used as a lingua franca among islands). The next level is made up of the languages of major islands that exist as political units, such as Palauan, Yapese and Ponapean. On the lowest level are the various ethnic languages spoken mainly on solitary islands.
In the Maluku Islands of Indonesia, local Malay languages such as Ambonese Malay, North Maluku Malay and Bacanese Malay, form a layer beneath the official language, Indonesian. Under them are the dominant local languages, such as Hitu, which is spoken by 15,000 people on Ambon Island, and Ternate and Tidore, which are spoken in the Halmahera region. These are important as urban languages. On the lowest level are the various vernaculars.
In Papua New Guinea, standard English forms the top level, followed by Papua New Guinean English. Tok Pisin and Hiri Motu are used as common languages among the various ethnic groups. Beneath these layers are the regional or occupational common languages. For example, Hiri Motu is used as the law enforcement lingua franca in coastal areas around the Gulf of Papua, Yabem as a missionary language along the coast of the Huon Gulf, and Malay as a trade language in areas along the border with Indonesia. On the next level are the ethnic and tribal languages used on a day-to-day basis.
An example of a similar pattern in Polynesia can be found in Hawaii, where English and Hawaiian English rank above Da Kine Talk or Pidgin To Da Max, which are mixtures of English and Oceanic languages and are used as common languages among the various Asian migrants who have settled in Hawaii. Beneath these are ethnic languages, including Hawaiian and the various immigrant languages, such as a common Japanese based on the Hiroshima dialect, as well as Cantonese, Korean, and Tagalog.
All of the threatened languages are in danger because of their status as indigenous minority languages positioned at the lowest level of the linguistic hierarchy. Reports to date have included little discussion of the multilevel classification of linguistic strata from a formal linguistic perspective. It will be necessary in the future to examine these phenomena from the perspectives of sociolinguistics or linguistic anthropology.
Barr, Donald F., and Sharon G. Barr. 1978. Index of Irian Jaya Languages. Prepublication draft. Abepura, Indonesia: Cenderawashih University and Summer Institute of Linguistics.
Comrie, Bernard, Stephan Matthews, and Maria Polinsky. 1996. The Atlas of Languages. New York: Chackmark Books.
Foley, William A. 1986. The Papuan Languages of New Guinea. Cambridge, New York: Cambridge University Press.
Grimes, Barbara F., ed. 1996. Ethnologue: Languages of the World. Dallas: International Academic Bookstore.
Hosokawa, Komei. 1992. The Yawuru language of West Kimberley: A meaning-based description. Ph.D. diss., Australian National University.
Oda, Sachiko. 1977. The Syntax of Pulo Annian. Ph. D. diss., University of Hawaii.
Osumi, Midori. 1995. Tinrin grammar. Oceanic Linguistics Special Publication, No. 25. Honolulu: University of Hawaii Press.
Sakiyama, Osamu. 1982. The characteristics of Nguluwan from the viewpoint of language contact. In Islanders and Their Outside World.Aoyagi, Machiko, ed. Tokyo: Rikkyo University.
---. 1994. Hirimotu go no ruikei: jijun to gochishi (Affix order and postpositions in Hiri Motu: A cross-linguistic survey). Bulletin of the National Museum of Ethnology,vol. 19 no. 1: 1-17.
---. 1995. Mikuroneshia Berau no pijin ka nihongo (Pidginized Japanese in Belau, Micronesia). Shiso no kagaku, vol. 95 no. 3: 44-52.
---. 1996. Fukugouteki na gengo jokyo (Multilingual situation of the Solomon Islands). In Soromon shoto no seikatsu shi: bunka, rekishi, shakai (Life History in the Solomons: Culture, history and society). Akimichi, Tomoya et al, eds. Tokyo: Akashi shoten.
Shintani, Takahiko and Yvonne Païta. 1990. Grammaire de la Langue de Païta. Nouméa, New Caledonia: Société d'études historiques de la Nouvelle-Calédonie.
Taber, Mark and et al. 1996. Atlas bahasa tanah Maluku (Maluku Languages Atlas). Ambon, Indonesia: Summer Institute of Linguistics and Pusat Pengkajian dan Pengembangan Maluku, Pattimura University.
Toki, Satoshi, ed. 1998. The remnants of Japanese in Micronesia. Memoirs of the Faculty of Letters, Osaka University, Vol. 38.
Tsunoda, Tasaku. 1974. A grammar of the Warrungu language, North Queensland. Master's thesis, Monash University.
---. 1981. The Djaru Language of Kimberley, Western Australia. Pacific Linguistics, ser. B, No. 78. Canberra: Australian National University.
Voorhoeve, C. L. 1975. Languages of Irian Jaya: Checklist, Preliminary classification, language maps, wordlists. Canberra: Australian National University.
Wurm, Stephen A. 1982. Papuan Languages of Oceania. Tübingen: Gunter Narr Verlag.
---. and Shiro Hattori, eds. 1981-83. Language Atlas of the Pacific Area. Pacific Linguistics, ser. C, No. 66-67. Canberra: Australian National University.
---, Peter Mühlhäusler, and Darrel T. Tryon. 1996. Atlas of languages of intercultural communication in the Pacific, Asia, and the Americas. 3 vols. Trends in Linguistics. Documentation 13. New York: Mouton de Gruyter.
*Translation of the author’s essay “Taiheiyo chiiki no kiki gengo”, Gekkan Gengo, Taishukan Publishing Co., 28(2), 102-11, 1999, with the permission of the publisher.
Any comments and suggestions to firstname.lastname@example.org | <urn:uuid:a58eb30a-d617-46b9-af87-d5abe8362da9> | CC-MAIN-2013-20 | http://www.elpr.bun.kyoto-u.ac.jp/essay/sakiyama.htm | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.92494 | 5,264 | 3.6875 | 4 |