text
stringlengths 195
587k
| id
stringlengths 47
47
| dump
stringclasses 8
values | url
stringlengths 14
2.28k
| file_path
stringlengths 125
138
| language
stringclasses 1
value | language_score
float64 0.65
1
| token_count
int64 46
159k
| score
float64 2.52
5.06
| int_score
int64 3
5
|
---|---|---|---|---|---|---|---|---|---|
CausesBy Mayo Clinic staff
CLICK TO ENLARGE
|Patent ductus arteriosus|
As a baby develops in the womb, a vascular connection (ductus arteriosus) between two major blood vessels leading from the heart — the aorta and pulmonary artery — is a normal and necessary part of your baby's blood circulation while in the womb. The ductus arteriosus diverts blood from the lungs of the fetus while they aren't being used. The fetus receives oxygen from the mother's circulation. But, the ductus arteriosus is supposed to close within two or three days after birth once the newborn's heart adapts to life outside the womb. In premature infants, the connection often takes longer to close on its own. If the connection remains open, it's referred to as a patent ductus arteriosus.
The abnormal opening causes too much blood to circulate to the lungs and heart. If not treated, the blood pressure in the lungs may increase (pulmonary hypertension) and the heart may enlarge and weaken.
Congenital heart defects arise from problems early in the heart's development — but there's often no clear cause. Genetics and environmental factors may play a role.
- Patent ductus arteriosus. National Heart, Lung, and Blood Institute. http://www.nhlbi.nih.gov/health/health-topics/topics/pda/. Accessed Nov. 9, 2011.
- Patent ductus arteriosus. The Merck Manuals: The Merck Manual for Healthcare Professionals. http://www.merckmanuals.com/professional/pediatrics/congenital_cardiovascular_anomalies/patent_ductus_arteriosus_pda.html?qt=patent%20ductus%20arteriosus&alt=sh. Accessed Nov. 9, 2011.
- Schneider DJ, et al. Patent ductus arteriosus. Circulation. 2006;114:1873.
- Doyle T, et al. Clinical manifestations and diagnosis of patent ductus arteriosus. http://www.uptodate.com/home/index.html. Accessed Nov. 9, 2011.
- Phillips III JB, et al. Pathophysiology, clinical manifestations, and diagnosis of patent ductus arteriosus in premature infants. http://www.uptodate.com/home/index.html Accessed Nov. 9, 2011.
- Miyamoto SD, et al. Cardiovascular diseases. In: Hay WW, et al, eds. Current Diagnosis & Treatment: Pediatrics. 20th ed. New York, N.Y.: The McGraw-Hill Companies; 2011. http://www.accessmedicine.com/content.aspx?aID=6582787. Accessed November 13, 2011.
- Patent ductus arteriosus (PDA). American Heart Association. http://www.heart.org/HEARTORG/Conditions/CongenitalHeartDefects/AboutCongenitalHeartDefects/Patent-Ductus-Arteriosis-PDA_UCM_307032_Article.jsp#.Trsm4fJUFI4. Accessed Nov. 9, 2011.
- Warnes CA, et al. ACC/AHA 2008 guidelines for the management of adults with congenital heart disease: A report of the American College of Cardiology/American Heart Association Task Force on Practice Guidelines (writing committee to develop guidelines on the management of adults with congenital heart disease). Journal of the American College of Cardiology. 2008;52:e143. Accessed Nov. 9, 2011.
- Clyburn RI, et al. Patent ductus arteriosus: Evidence for and against treatment. Journal of Pediatrics. 2007;150:216.
- Hammerman C, et al. Ductal closure with paracetamol: A surprising new approach to patent ductus arteriosus treatment. Pediatrics. In Press. Accessed Nov. 9, 2011.
- Preconception care questions and answers. U.S. Centers for Disease Control and Prevention. http://www.cdc.gov/ncbddd/preconception/QandA.htm. Accessed Nov. 14, 2011. | <urn:uuid:8c86f672-7cd7-42af-a3f2-168acb99423a> | CC-MAIN-2013-20 | http://www.mayoclinic.com/health/patent-ductus-arteriosus/DS00631/DSECTION=causes | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368702448584/warc/CC-MAIN-20130516110728-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.710558 | 897 | 3.25 | 3 |
The Cacao tree is a small tree in the family Sterculiaceae, which origininates from South America, but is now grown all over the world in tropical regions. The photos in this gallery show a cacao tree plantation in Malaysia's state of Perak. The fruits of the cacao tree, also called cocoa pods, are oval, 15-30cm long and 8-10cm wide. The pod contains 20 to 60 seeds, also called cocoa beans, embedded in a sweet, eatable white pulp. Each seed contains a significant amount of fat (40-50% as cocoa butter).
The image MA22853 ("09 Cocoa fruits hanging from the tree") has been added to your selection. Click on 'Lightbox' to view the content of the selection. | <urn:uuid:2dc8a914-7d70-4a5c-9426-3cc2400a5a12> | CC-MAIN-2013-20 | http://www.molon.de/galleries/Malaysia/WestCoast/Cocoa/?add=MA22853 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368702448584/warc/CC-MAIN-20130516110728-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.944906 | 160 | 3.015625 | 3 |
|Search Results (175 videos found)|
|NASADestinationTomorrow - DT5 - Virtual Reality
NASA Destination Tomorrow Segment explaining how NASA uses virtual reality environments to simulate NASA missions.
Keywords: Virtual Reality; How It Works; Johnny Alonso; 3D Images; Immersive Design And Simulation Lab; Cave; Cave Automatic Virtual Environment; Dr. Chris Sandridge;
Popularity (downloads): 1118
|NASASciFiles - Winds
NASA Why? Files segment describing how atmospheric particles are transported over distance by wind.
Keywords: Jennifer Olson; CAVE; Cave Automated Virtual Environment; Wind Vector; Global Wind Pattern; Jet Stream; Particle Lifetime; Sulfur Dioxide; Water Vapor; Sulfuric Acid;
Popularity (downloads): 1765
|ACM UIST 1997 - Worldlets: 3D thumbnails for wayfinding in virtual environments
Virtual environment landmarks are essential in wayfinding: they anchor routes through a region and provide memorable destinations to return to later. Current virtual environment browsers provide user interface...
Keywords: UIST; 3D thumbnails; wayfinding; VRML; virtual reality
Popularity (downloads): 552
|ACM UIST 1997 - A virtual office environment based on shared room
In this paper, we describe a system that provides a "work-at-home" environment based on a virtual shared room built on a 3D graphics workstations. We realize "Awareness Space" on...
Keywords: UIST; virtual office; informal communication; Personal Space; Presence; Awareness Space; Concetration
Popularity (downloads): 396
|ACM CHI 1997 - The Collaboratory: A Virtual; Collaborative Learning Environment
The collaboratory is the result of a future-oriented project in learning, in which the proces of human-centered design was applied to the observed problems and opportunities in learning in high...
Keywords: CHI; collaboration; project management; learning; human-centered design; userinterface design; virtual spaces; interacative TV; multimedia; teleproxy; user observation.
Popularity (downloads): 146
|ACM CHI 1990 Issue 55 - VIEW: the Ames Virtual Environment Workstation
Popularity (downloads): 384
|Towards Usable VR: An Empirical Study of User Interfaces for lmmersive Virtual Environments
Video Figure from CHI 1999 Paper. Author(s): Robert W. Lindeman, John L. Sibert & James K. Hahn
Keywords: CHI; 3D user interfaces; bimanual interaction; virtual environments; virtual reality; passive-haptic feedback
Popularity (downloads): 445
|The Amulet User Interface Development Environment
Video demonstration from the 1997 CHI conference. The Amulet research project is developing a new user interface development environment which incorporates a number of design and implementation innovations including new...
Keywords: CHI; user interface design; toolkit; user interface development environment; user interface management system; application framework
Popularity (downloads): 432
|ACM UIST 2000 - Speed-Dependent automatic zooming for browing large documents
They propose a navigation technique for browsing large documents that integrates rate based scrolling with automatic zooming. The view automatically zooms out when the user scrolls rapidly so that...
Keywords: UIST; navigation; rate control; scrolling; web browser; zooming
Popularity (downloads): 820
|ACM CHI 1994 Issue 97 - The Garnet User interface Development Environment
The Garnet user interface development environment contains a comprehensive set of tools that make it significantly easier to design and implement highly-interactive, graphical, direct manipulation user interfaces. The toolkit...
Keywords: CHI; user interface management systems; user interface development environment; toolkis; interface builders; demonstrational interfaces;
Popularity (downloads): 501 | <urn:uuid:5965d73c-e967-4148-9cdc-32225dcefa44> | CC-MAIN-2013-20 | http://www.open-video.org/results.php?keyword_search=true&terms=+Cave+Automatic+Virtual+Environment | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368702448584/warc/CC-MAIN-20130516110728-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.775742 | 815 | 2.515625 | 3 |
A view can become a page or a block. There is no difference in work between a page and a block. A page needs a path to display the page. A block is assigned to a region to display the page. There might be a few seconds different to set them up. After that, you can blocks in far more ways than usually shown in tutorials.
Blocks have their uses including constructing complex pages. The content of a page is usually the content of a node in the content region. A view replaces the node to display a list or some other small variation of content.
Next you are asked to make the view more complicated. You scratch your head. What you really need is a collection of views displaying different content. You could use panels and a bunch of other complex approaches. Think about the format again.
If you want a list of different views. You can make each one a block then place them one after the other down the page. Consider a shop.
A shop might list the top selling product in each category with a view sorted by category. The marketing manager then asks for the categories in a different order. The CEO wants some categories to list the top three. The product manager wants one category to list only one product but all the colours for the product.
You could make each category a separate view with each view in a block. Each view can have different criteria. You can give your CEO, sales manager, and marketing manager access to the block admin page and let them fight over the sequence of the blocks.
What method do you use to determine when to use multiple views?
Use the one view when you list data one set of data. Use multiple views when people want different data selection. For example, some product categories have colours but not all product categories. Some product categories have multiple packs but not all product categories.
If the one list has to be by category then colour or pack size and all the products use the same content type, you could use one view to sort by category then colour then pack size. There will be no overlap or conflict or missing data.
The same list becomes more complicated when each product category has a different content type and each content type has a different set of attributes. You might be able to product one list in one view but it will be sensitive to change and management will want change. Start with two views or more views stacked as blocks to form one list.
Another example is a book shop where novels have different descriptions and content types compared to other books. Cook books may have a special content type to allow listing by food type, country, major ingredients, and the reality television show paying for the cook book.
If the data is exactly the same for each view but the display is different, consider multiple displays on one view. The technique is described in another page. you make the first view a page to list the data and validate your data selection. You then add some displays to create the blocks. Each display might vary by as little as selecting a different content type.
Top ten lists are popular and soon take up too much space. People start talking about variations. Perhaps the top three items, including teasers, followed by the next seven without teasers. | <urn:uuid:b833e175-0f06-496c-90a2-fc2151545197> | CC-MAIN-2013-20 | http://www.petermoulding.com/views_development_-_page_or_block | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368702448584/warc/CC-MAIN-20130516110728-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.931844 | 655 | 3.421875 | 3 |
As a developmental pathway towards autonomy and dexterity in robot in-hand manipulation, HANDLE is a Large Scale IP project coordinated by the university Pierre and Marie Curie of Paris and include a consortium formed by nine partners from six EU countries: France, UK, Spain, Portugal, Sweden, and Germany.
The TACO project aims at enhancing the abilities of service robots by improving the sensing system with real 3D foveation properties and to increase their ability to interact with their natural environment in a more natural and human-like way.
The PV-Servitor project focuses on concepts for a fully autonomous cleaning robot for ground mounted large scale photovoltaic power plants consisting of 100 kW and over.
STIFF-FLOP is researching how to take some of the new capabilities in soft robotics and apply them to the development of tools for endoscopic surgery. This project takes inspiration from octopus tentacles for the design of flexible soft robots.
DEXDEB is researching meat deboning. Taking apart an animal carcass to produce high-quality pieces of meat is a skilled but unpleasant and dangerous task. In DEXDEB we are looking at two designs of robotic hand and using them as the “left hand” that pulls at the meat, while a human operator slices the meat with a knife held in their right hand. This will provide DEXDEB with a baseline for doing more complex human-robot interaction work later.
HYFLAM is investigating the role of robotics in biosafety level 3 and 4 laboratories. Working with a UK Government lab and Hamburg University, HYFLAM is looking at a range of skilled tasks and investigating whether a robotic hand can perform them, and how well it performs them when working with software like that developed in HANDLE. This could lead to a new generation of robotic systems for hazardous lab work. | <urn:uuid:f74a9ce3-5706-4b3e-81a8-1da2cec57638> | CC-MAIN-2013-20 | http://www.shadowrobot.com/consulting/research-activity/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368702448584/warc/CC-MAIN-20130516110728-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.938273 | 377 | 2.53125 | 3 |
Wildflowers in the Field and Forest : A Field Guide to the Northeastern United States
Author(s): Clemants, S.; C. Gracie
Publisher: Oxford University Press
Comments: From Amazon.com: Many of us have stopped to pick bunches of wildflowers or have admired them as they flourished in fields, hiking trails, and roads. Always appreciated but not always recognized, now these beauties can easily be identified with Wildflowers in the Field and Forest, the most inclusive field guide available to the wildflowers of the northeastern United States. Designed for easy use, the book features two-page spreads with descriptive text and range maps on one side facing pages of color photos on the other. The descriptions are concise, but thorough, and the range maps show both where the plant grows and what time of year it is likely to be in bloom. Plants are grouped by flower color, usually the feature first noticed by the observer. The species are subsequently grouped by petal arrangement, type of leaves, and number of flower parts as indicated in the "quick characters" box at the top of each page. There is also a simple key in the beginning of the book that allows one to quickly narrow the search to a few pages. In addition to the more common and conspicuous wildflowers, many of the lesser known, and often overlooked, species are also depicted. Full-color photos generally show the flowers of the plant, and while insets of leaves (and occasionally fruits) are often included to help in identification. A bar on each photo allows users to accurately judge the actual size of each flower. Both serious botanists and casual nature observers will welcome this beautifully illustrated and expertly detailed guide.
Last Updated: 2007-01-01 | <urn:uuid:fb715268-c730-4114-9ab9-07111c15e22c> | CC-MAIN-2013-20 | http://www.wildflower.org/bibliography/show.php?id=1036 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368702448584/warc/CC-MAIN-20130516110728-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.945085 | 359 | 3.03125 | 3 |
One of my favorite data structures is the binary heap. I first learned about it in my data structures class, and remember marveling at its simplicity and elegance. How could something so simple be so powerful and useful?
For those unfamiliar with the binary heap, it is a relatively simple data structure. It is a binary tree, which means each node has at most 2 children and n top of this, there are several constraints which are imposed. One is that the the children of each node must have a value that is equal to or greater. This means we have some sort of loose ordering, where nodes closer to the root have a lower value. Secondly, the tree must be complete. This means that all levels of the tree except for the last level must be full, and filled left-to-right. As described, this would be a Min-Heap, since the minimum value is always at the root. If we were to reverse our comparisons, so that the children must be less than or equal to the current node, we would have a Max-Heap with the maximum value at the root.
One of the primary uses of a Min/Max Heap is as a Priority Queue. If one inserts nodes based on their “priority”, then the nodes with the highest priority are at the root.
Below is a example of a Min-Heap, where each node represents a persons age and name. We can see that there is a rough ordering with the youngest person at the root. | <urn:uuid:d43c4ff6-ff6b-45de-a7dc-036d0b7fef8b> | CC-MAIN-2013-20 | http://armondadgar.com/tagged/C | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705559639/warc/CC-MAIN-20130516115919-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.963554 | 308 | 3.1875 | 3 |
Posted by Admin on June 29, 2012
Even though solar panel technology has been around for a long time, a lot of people find themselves hesitant in adopting solar technology on their roofs due to many misconceptions regarding solar panel systems. One myth argues that photovoltaic panels require constant sunlight. However, in reality, panels mostly require UV radiation over direct sunlight. Even when the sky is cloudy, the panels will function with full potential. In fact, panels work even more efficiently when they’re cooler.
Another myth is that pv panels cannot handle winter temperatures and precipitation. However, panels are almost maintenance-free even in the winter. South-facing panels even help melt the snow and keep it off and still collect a lot of solar energy. They also protect the roof from weather damage. Another myth concerns the visual appeal of installing solar panels. While some may think that panels will dampen the esthetic appeal of their property, in actuality, solar panels can even come as solar shingles for a sleek, black roof. They also increase the value of the property and protect the roof from weather damage.
Some people think that solar panels require a lot of maintenance. However, since panels can survive extreme weather conditions such as hurricanes, normal weather will not affect the efficiency of the panel. The panels are easy to clean, all you need to do is hose them off periodically.
Solar energy is efficient, free, does not damage the environment, and will lead to savings in the long run. While the initial investment may seem excessive, they pay for themselves in the long run and save the homeowner a substantial amount of money every year.
To read more about these myths, click here.
To learn more about installing your own solar panel system, contact us today!
Posted by Admin on May 16, 2012
Opponents of the solar industry constantly attempt to portray the solar energy field as an expensive venture. However, recent studies predict the decrease in the cost of solar energy if the market grows in popularity. If you examine Germany, with their booming solar market, you can see how widely solar energy is used, making it obvious that with the popularity, the accessibility and affordability are increased. Due to this boom in their country’s solar use, solar PV decreased peak electricity prices by 40%.
There is enough solar electricity on a sunny day in Germany to fully compensate the increase in energy usage due to air conditioning. Instead of using conventional, nonrenewable sources of energy to power this increase in utility usage, the country turns to solar to fill the difference, diminishing the price peaks during hot summer days.
Posted by Admin on March 13, 2012
Logitest Solar is introducing solar PV systems that can be connected to the grid and save money on electricity bill since the day of the connection.
Today house owners are interested in efficient houses that save money on electricity bills. We are able to provide solar systems that can be installed and connected within a month time frame and increase household savings with same rate as price for electricity is increasing.
Logitest Solar offers variety of solar panels that measure from 8 sq. ft. up to 18 sq. ft. per panel. That means that every house can participate and amount of savings depends from the roof space available.
Houses that can fit more than 25 solar panels can bring monthly hydro bill close to nothing. The cost of solar PV has decreased significantly over the past few years. Now is the right time to start saving money on electricity bills with solar.
Contact Logitest Solar for a quote and start saving today!
If you have questions, feel free to browse through our Frequently Asked Question (FAQ) page. | <urn:uuid:d6dfb381-82ba-47e2-85a6-4139f0b492d0> | CC-MAIN-2013-20 | http://blog.logitestsolar.ca/tag/bill-savings/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705559639/warc/CC-MAIN-20130516115919-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.955225 | 748 | 2.703125 | 3 |
April 17, 2012 | 3
Two thousand comets a day collide around nearby star Fomalhaut creating a continually replenished dust belt in the outskirts of the star’s system, according to a new paper recently published in the journal Astronomy & Astrophysics.
Fomalhaut is a young star. It is twice as massive as the sun and sits 25 light years away from us. In the 1980s, astronomers discovered that it was surrounded by large amounts of dust. The Herschel Space Observatory has now produced the best ever far-infrared images of the star system and given a team of astronomers lead by Bram Acke at the University of Leuven in Belgium chance to take a fresh look at the system.
Most intriguing is a narrow belt of dust and debris in the outer edges of the Fomalhaut system, that is a bit like the solar system’s own Kuiper belt. Fomalhaut’s belt is 140 times further from the star than the Earth is from the sun. The dust particles that fill it have temperatures between -170C and -230C.
In our solar system, the Kuiper belt includes Pluto and two other dwarf planets but mostly consists of smaller icy objects left over from the formation of the solar system. Belts like this tend to exist in planetary systems at locations where, for one reason or another, no planets formed. Fomalhaut’s belt is much younger than the Kuiper belt, though. And it is more active too. The Fomalhaut system resembles our solar system in its most active phase, says Acke.
The belt is off-centre with respect to its star, hinting at one or more planets close by interacting with it via gravity. The narrowness of the belt, confirmed by the new Herschel observations, also points to planets nearby that keep the dust and debris in place and stopping it spreading out.
But that’s not the most interesting thing about Fomalhaut. Neither is the existence of a dusty disk around the star – they are probably as common as planets (which are very common indeed). “What makes Fomalhaut special is the presence of large amounts of very small dust,” says Acke.
Dust in Fomalhaut’s narrow belt absorbs light as if it were made of tiny particles, micrometers across, according to the new Herschel observations of the dust grains’ “glow”. But previous Hubble observations saw the dust belt reflect light as if it were made of much larger grains.
To resolve this, Acke and his colleagues suggest that the grains that fill Fomalhaut’s belt are “fluffy”. That is, they are small, as Herschel shows, but clump together loosely and reflect light as if they were bigger.
But there was another problem: small grains like those in Fomalhaut’s belt should get blown out of the system by strong winds from the star. Larger grains have enough gravitational staying power to resist getting blown away, but smaller ones do not. That there are still small grains in the belt suggests that they are being constantly replenished somehow.
The “fluffy” nature of the particles pointed to comets as the source of the dust, says Acke. So, along with his colleagues, he calculated how many comets would need to be destroyed to keep the belt full of tiny dust particles. “From the amount of small particles, we deduced that 2000 [1km-sized] comets are reduced to dust each day,” he says. | <urn:uuid:4a0e2602-acf5-4766-9df7-aaf7408dfd1d> | CC-MAIN-2013-20 | http://blogs.scientificamerican.com/basic-space/2012/04/17/crushed-comets-give-star-a-dusty-belt/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705559639/warc/CC-MAIN-20130516115919-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.96529 | 757 | 4.03125 | 4 |
Is it scientific fact that acid stabilizes meringue or is this a fallacy? If so does anyone know actually why and are there any other substances that do this well also?
Acids allow more air to be beaten into a meringue. In order to make meringue, the proteins in egg white must be denatured. In their natural state, the proteins are curled up into tightly packed balls. When the egg is beaten, they uncoil into long strands.
These strands then begin to coagulate, or join together, with the help of the sugar you add. The air you whisk in gets trapped between these joining strands, giving the meringue its characteristic light texture.
Acid delays coagulation, which means that there is more time for air to get trapped in amongst the proteins, resulting in a lighter meringue.
The acids usually added to meringue are white wine vinegar, lemon juice, or cream of tartar. Fresh eggs are more acidic than old ones, so these help too.
Some cooks use copper bowls to make meringue, because copper ions from the bowl bind to a particular protein (conalbumin) and strengthen it.
|show 3 more comments|
I have made two separate meringue mixtures side by side: one with vinegar and one without. In my experience it makes no difference to the final outcome provided that you add the sugar really slowly (a tablespoon at a time) and not too early. If this is done correctly then there is no need to add an acid. | <urn:uuid:f800d702-9456-46be-9fab-b3ceed8033d0> | CC-MAIN-2013-20 | http://cooking.stackexchange.com/questions/23935/does-an-acid-actually-stabilize-meringue-and-if-so-why | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705559639/warc/CC-MAIN-20130516115919-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.928858 | 321 | 2.828125 | 3 |
[First published April 11, 2005] I recently came across a reference to the number killed in World War II to about 60,000,000. This figure, or one lower at about 55,000,000 is not uncommonly mentioned. But, these figures are wrong and way too high. The correct count is closer to 15,000,000, but when I use this figure I get emails like one that said—“Your total inaccurate and detracts from your credibility.”
What confuses people is the way war dead are often counted. The most authoritative sources, widely relied in the field of war studies, are the statistical books of J. David Singer (See his Correlates of War Project here). His figure for World War II war dead is 15,000,000. Crazy, right? You often read figures like those I mentioned, and here is an authoritarive source which gives a figure only 25 to 30 percent of that usuallygiven. Even more confusing about this is that the World War II death toll for the Soviet Union is widely accepted as about 20,000,000. What gives?
What has caused these massive disparities is the confusion between those killed in combat and its crossfire, and those murdered by governments during the war (democide). Aside from battle or military engagements, during the war the Nazis murdered around 20,000,000 civilians and prisoners of war, the Japanese 5,890,000, the Chinese Nationalists 5,907,000, the Chinese communists 250,000, the Nazi satellite Croatians 655,000, the Tito Partisans 600,000, and Stalin 13,053,000 (above the 20,000,000 war-dead and democide by the Nazis of Soviet Jews and Slavs). I also should mention the indiscriminate democidal bombing of civilians by the Allies that murdered hundreds of thousands, and the atomic bombing of Hiroshima and Nagasaki. Most of these dead are usually included among the war-dead. But those killed in battle versus in democide form distinct conceptual and theoretical categories and should not be confused. That they have been consistently confounded helps raise the toll during World War II to some 60,000,000 people, way above Singer and my estimated 15,000,000 killed in battle and military action. And that the almost universally accepted count of genocide (a form of democide) during this period is no more than “6,000,000″ Jews, around 13 percent of the total wartime democide, has further muddled research and thought.
Overall, both World War I and World War II had about 24,000,000 (combat) war dead. This leaves still many, and smaller, wars to go to reach my approximate 35,000,000 war dead 1900-1987. I did a through search of the estimates of war dead for each nation, 1900-1987, and you can find them in my books Lethal Politics for the U.S.S.R., China’s Bloody Century, Democide for Nazi Germany, and for all others, Statistics of Democide. For their location on my website, see my list of documents
Good to clear that up. I trust I won’t see those highly inflated World War II war dead totals again.
Link of Note
”Why Not Here” (2/26/05)
By David Brooks [only available for purchase at The New York Times]
From Colleague: Along with the idea of memes and the zeitgeist, here’s a good oped by David Brooks. I especially like his mention of the argument that US foreign policy is at its best when it is not accommodating, but “maximalist” for freedom….Another reason to be grateful that John “Rodney King” Kerry ain’t president!
[Why not here] This is the most powerful question in the world today: Why not here? People in Eastern Europe looked at people in Western Europe and asked, Why not here? People in Ukraine looked at people in Georgia and asked, Why not here? People around the Arab world look at voters in Iraq and ask, Why not here?
Thomas Kuhn famously argued that science advances not gradually but in jolts, through a series of raw and jagged paradigm shifts. Somebody sees a problem differently, and suddenly everybody’s vantage point changes.
“Why not here?” is a Kuhnian question, and as you open the newspaper these days, you see it flitting around the world like a thought contagion.
Wherever it is asked, people seem to feel that the rules have changed. New possibilities have opened up.
The question is being asked now in Lebanon. Walid Jumblatt made his much circulated observation to David Ignatius of The Washington Post: “It’s strange for me to say it, but this process of change has started because of the American invasion of Iraq. I was cynical about Iraq. But when I saw the Iraqi people voting three weeks ago, eight million of them, it was the start of a new Arab world.”
So now we have mass demonstrations on the streets of Beirut. A tent city is rising up near the crater where Rafik Hariri was killed, and the inhabitants are refusing to leave until Syria withdraws. The crowds grow in the evenings; bathroom facilities are provided by a nearby Dunkin’ Donuts and a Virgin Megastore.
The head of the Syrian Press Syndicate told The Times on Thursday: “There’s a new world out there and a new reality. You can no longer have business as usual.”
Meanwhile in Palestine, after days of intense pressure, many of the old Arafat cronies are out of the interim Palestinian cabinet. Fresh, more competent administrators have been put in. “What you witnessed is the real democracy of the Palestinian people,” Saeb Erakat said to Alan Cowell of The Times. As Danny Rubinstein observed in the pages of Ha’aretz, the rules of the game have changed.
Then in Iraq, there is actual politics going on. The leaders of different factions are jostling. The tone of the coverage ebbs and flows as more or less secular leaders emerge and fall back, but the amazing thing is the politics itself. If we had any brains, we’d take up Reuel Marc Gerecht’s suggestion and build an Iraqi C-Span so the whole Arab world could follow this process like a long political soap opera.
It’s amazing in retrospect to think of how much psychological resistance there is to asking this breakthrough question: Why not here? We are all stuck in our traditions and have trouble imagining the world beyond. As Claus Christian Malzahn reminded us in Der Spiegel online this week, German politicians ridiculed Ronald Reagan’s “tear down this wall” speech in 1987. They “couldn’t imagine that there might be an alternative to a divided Germany.”
But if there is one soft-power gift America does possess, it is this tendency to imagine new worlds. As Malzahn goes on to note, “In a country of immigrants like the United States, one actually pushes for change. … We Europeans always want to have the world from yesterday, whereas the Americans strive for the world of tomorrow.”
Stephen Sestanovich of the Council on Foreign Relations wrote an important essay for this page a few weeks ago, arguing that American diplomacy is often most effective when it pursues not an incrementalist but a “maximalist” agenda, leaping over allies and making the crude, bold, vantage-shifting proposal – like pushing for the reunification of Germany when most everyone else was trying to preserve the so-called stability of the Warsaw Pact.
As Sestanovich notes, and as we’ve seen in spades over the past two years in Iraq, this rashness – this tendency to leap before we look – has its downside. Things don’t come out wonderfully just because some fine person asks, Why not here?
But this is clearly the question the United States is destined to provoke. For the final thing that we’ve learned from the papers this week is how thoroughly the Bush agenda is dominating the globe. When Bush meets with Putin, democratization is the center of discussion. When politicians gather in Ramallah, democratization is a central theme. When there’s an atrocity in Beirut, the possibility of freedom leaps to people’s minds.
Not all weeks will be as happy as this one. Despite the suicide bombings in Israel and Iraq, the thought contagion is spreading. Why not here? | <urn:uuid:1a600e7f-2d21-4e16-b42e-796e1ba3976d> | CC-MAIN-2013-20 | http://democraticpeace.wordpress.com/2009/04/25/no-not-50-60mil-war-dead/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705559639/warc/CC-MAIN-20130516115919-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.951578 | 1,806 | 2.625 | 3 |
I'm interested to learn why the following three-word phrases have stress on different words.
- "little straw house" (stress is on little and house)
- "small wooden house" (stress is on wooden)
Here are the sentences:
- The first little pig built a little straw house.
- The second little pig built a small wooden house.
How come the stress for the second phrase is not on small and house?
Can you please help? | <urn:uuid:dfd7adc6-672d-4ca3-9650-b389631df2ae> | CC-MAIN-2013-20 | http://english.stackexchange.com/questions/95880/three-word-phrase-stress-little-straw-house-vs-small-wooden-house | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705559639/warc/CC-MAIN-20130516115919-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.951371 | 98 | 2.765625 | 3 |
Yellow-rumped caciques (Cacicus cela) are widespread across northern South America. They can be found east of the Andes Mountains throughout the Amazon Basin. Yellow-rumped caciques are more numerous in the tropics than in temperate regions although some have been spotted along the southern border of Bolivia which is considered to be the southern (more temperate) extent of their range. They inhabit all northern countries of South America and extend east throughout the upper half of Brazil. They are native to the Amazon and have not been introduced into any other regions.
Biogeographic Regions: neotropical (Native )
- Lowther, P. 1975. Geographic and ecological variation in the family Icteridae. The Wilson Bulletin, 87/4: 481-495.
- Ridgely, R., G. Tudor. 1989. The Birds of South America. United States of America: Robert S. Ridgely, Guy Tudor, and World Wildlife Fund, Inc.
No one has provided updates yet. | <urn:uuid:ff41eb3d-f6ac-4ea0-aa0f-cf08c77c9480> | CC-MAIN-2013-20 | http://eol.org/data_objects/18636931 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705559639/warc/CC-MAIN-20130516115919-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.917575 | 211 | 3.375 | 3 |
There are very few specimens (around 20), but six of these have been collected in the past decade or so, despite an enormous increase in the number of people visiting its range in four-wheel drive vehicles. Maxwell et al.’s (1996) description of two of the records indicates the importance of chance in obtaining specimens of this fossorial species. An animal was found on Talawanna Track west of Cotton Creek, Western Australia, in October 1995 (Western Australia Museum), having been excavated by a bulldozer about one metre below the surface. Another came from near Nifty Mine in March 1996 after it was found nearly dead on the surface after heavy rain.
Habitat and Ecology
In 1998 a live specimen was captured on the surface at Punmu in Rudall River National Park and kept briefly in captivity. Study of this individual showed that the species has an unusual metabolism and can vary its body temperature as a probable adaptation to its fossorial way of life (Withers et al. 2000).
IUCN Red List Assessment
Red List Category
Red List Criteria
The Recovery Plan Objectives and Actions for this species are (Benshemesh 2004): 1) Resolve taxonomic issues; 2) Describe the distribution, abundance, and lineages; 3) Determine population trends; 4) Provide preliminary information on threat of fire, introduced predators (foxes and cats), and grazing; 5) Describe activity patterns and behaviour 6) Obtain ecological information from Aboriginal elders; 7) Examine diet, reproduction, and general condition of surfacing animals; 8) Prepare for captive individuals brought to Desert Park; 9) Manage the recovery process with a recovery team; 10) Downlist species from endangered to a lower category of threat.
No management actions can be defined until additional research has been completed (Maxwell et al. 1996; Benshemesh 2004).
Northern marsupial mole
The Northern Marsupial Mole or Northwestern Marsupial Mole (Notoryctes caurinus) is a species of marsupial in the Notoryctidae family. It is endemic to Australia. Its natural habitat is hot deserts. The Northern Marsupial Mole is yellow in color. Its diet consists of insect pupae and larvae. It lacks eyes and barely has ears.
- Groves, C. P. (2005). "Order Notoryctemorphia". In Wilson, D. E.; Reeder, D. M. Mammal Species of the World (3rd ed.). Johns Hopkins University Press. p. 22. ISBN 978-0-8018-8221-0. OCLC 62265494.
- Benshemesh, J. & Burbidge, A. (2008). Notoryctes caurinus. In: IUCN 2008. IUCN Red List of Threatened Species. Retrieved 28 December 2008. Database entry includes justification for why this species is data deficient
- Northern Marsupial Mole
- Warburton, N. M 2003., Functional morphology and evolution of marsupial moles (Marsupialia: Notoryctemorphia) thesis
|This article about a marsupial is a stub. You can help Wikipedia by expanding it.|
EOL content is automatically assembled from many different content providers. As a result, from time to time you may find pages on EOL that are confusing.
To request an improvement, please leave a comment on the page. Thank you! | <urn:uuid:69b92222-2360-44bb-95be-d92ab297adde> | CC-MAIN-2013-20 | http://eol.org/pages/323861/details | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705559639/warc/CC-MAIN-20130516115919-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.836035 | 721 | 3.28125 | 3 |
National Cancer Institute
Ultima Vez Modificado: 28 de septiembre del 2012
|Key Points for This Section|
Non-Hodgkin lymphoma in pregnant women is the same as the disease in nonpregnant women of childbearing age. However, treatment is different for pregnant women. This summary includes information on the treatment of non-Hodgkin lymphoma during pregnancy
Non-Hodgkin lymphoma can occur in both adults and children. Treatment for children, however, is different than treatment for adults. (See the PDQ® summary on Childhood Non-Hodgkin Lymphoma Treatment for more information.)
Lymphomas are divided into two general types: Hodgkin lymphoma and non-Hodgkin lymphoma. This summary is about the treatment of adult non-Hodgkin lymphoma. For information about other types of lymphoma, see the following PDQ® summaries:
Waldenstrím macroglobulinemia begins in a type of white blood cell called B lymphocytes. Certain B lymphocytes multiply out of control and make large amounts of a protein called monoclonal immunoglobulin M (IgM) antibody. High levels of IgM in the blood cause the blood to thicken and leads to many of the symptoms of Waldenstrím macroglobulinemia. Waldenstrím macroglobulinemia is also called lymphoplasmacytic lymphoma.
Anything that increases your risk of getting a disease is called a risk factor. Having a risk factor does not mean that you will get cancer; not having risk factors doesn't mean that you will not get cancer. Talk with your doctor if you think you may be at risk. Risk factors for adult non-Hodgkin lymphoma include the following:
Symptoms of Waldenstrím macroglobulinemia depend on the part of the body affected. Most patients with Waldenstrím macroglobulinemia have no symptoms. Check with your doctor if you have any of the following problems:
Some types of non-Hodgkin lymphoma spread more quickly than others do. Most non-Hodgkin lymphomas that occur during pregnancy are aggressive. Delaying treatment of aggressive lymphoma until after the baby is born may lessen the mother's chance of survival. Immediate treatment is often recommended, even during pregnancy.
|Key Points for This Section|
The process used to find out the type of cancer and if cancer cells have spread within the lymph system or to other parts of the body is called staging. The information gathered from the staging process determines the stage of the disease. It is important to know the stage of the disease in order to plan treatment. The following tests and procedures may be used in the staging process:
For pregnant women with non-Hodgkin lymphoma, staging tests that protect the fetus from the harms of radiation are used. These include MRI, bone marrow aspiration and biopsy, lumbar puncture, and ultrasound, which do not use radiation. An ultrasound exam is a procedure in which high-energy sound waves (ultrasound) are bounced off internal tissues or organs and make echoes. The echoes form a picture of body tissues called a sonogram.
When cancer cells break away from the primary (original) tumor and travel through the lymph or blood to other places in the body, another (secondary) tumor may form. This process is called metastasis. The secondary (metastatic) tumor is the same type of cancer as the primary tumor. For example, if breast cancer spreads to the bones, the cancer cells in the bones are actually breast cancer cells. The disease is metastatic breast cancer, not bone cancer.
Adult non-Hodgkin lymphoma may be described as follows:
Check for U.S. clinical trials from NCI's list of cancer clinical trials that are now accepting patients with Waldenstrím macroglobulinemia. For more specific results, refine the search by using other search features, such as the location of the trial, the type of treatment, or the name of the drug. General information about clinical trials is available from the NCI Web site.
Recurrent adult non-Hodgkin lymphoma is cancer that has recurred (come back) after it has been treated. The lymphoma may come back in the lymph system or in other parts of the body. Indolent lymphoma may come back as aggressive lymphoma. Aggressive lymphoma may come back as indolent lymphoma.
|Key Points for This Section|
Different types of treatment are available for patients with non-Hodgkin lymphoma. Some treatments are standard (the currently used treatment), and some are being tested in clinical trials. A treatment clinical trial is a research study meant to help improve current treatments or obtain information on new treatments for patients with cancer. When clinical trials show that a new treatment is better than the standard treatment, the new treatment may become the standard treatment. Patients may want to think about taking part in a clinical trial. Some clinical trials are open only to patients who have not started treatment.
For pregnant women with non-Hodgkin lymphoma, treatment is carefully chosen to protect the fetus. Treatment decisions are based on the mother's wishes, the stage of the non-Hodgkin lymphoma, and the age of the fetus. The treatment plan may change as the symptoms, cancer, and pregnancy change. Choosing the most appropriate cancer treatment is a decision that ideally involves the patient, family, and health care team.
Radiation therapy is a cancer treatment that uses high-energy x-rays or other types of radiation to kill cancer cells and keep them from growing. There are two types of radiation therapy. External radiation therapy uses a machine outside the body to send radiation toward the cancer. Internal radiation therapy uses a radioactive substance sealed in needles, seeds, wires, or catheters that are placed directly into or near the cancer. The way the radiation therapy is given depends on the type and stage of the cancer being treated.
For pregnant women with non-Hodgkin lymphoma, radiation therapy should be given after delivery, if possible, to avoid any risk to the fetus. If treatment is needed right away, pregnant women may decide to continue the pregnancy and receive radiation therapy. However, lead used to shield the fetus may not protect it from scattered radiation that could possibly cause cancer in the future.
Chemotherapy is a cancer treatment that uses drugs to stop the growth of cancer cells, either by killing the cells or by stopping them from dividing. When chemotherapy is taken by mouth or injected into a vein or muscle, the drugs enter the bloodstream and can reach cancer cells throughout the body (systemic chemotherapy). When chemotherapy is placed directly into the cerebrospinal fluid, an organ, or a body cavity such as the abdomen, the drugs mainly affect cancer cells in those areas (regional chemotherapy). To treat certain types of adult non-Hodgkin lymphoma that spread to the brain, CNS prophylaxis (chemotherapy given to kill cancer cells in the brain or spinal cord) may be used. The way the chemotherapy is given depends on the type and stage of the cancer being treated.
In pregnant women, the fetus is exposed to chemotherapy when the mother is treated, and some anticancer drugs cause birth defects. Because anticancer drugs are passed to the fetus through the mother, both must be watched closely when chemotherapy is given.
See Drugs Approved for Non-Hodgkin Lymphoma for more information.
Targeted therapy is a type of treatment that uses drugs or other substances to identify and attack specific cancer cells without harming normal cells. Monoclonal antibody therapy and proteasome inhibitor therapy are two types of targeted therapy used to treat adult non-Hodgkin lymphoma.
Monoclonal antibody therapy is a cancer treatment that uses antibodies made in the laboratory from a single type of immune system cell. These antibodies can identify substances on cancer cells or normal substances that may help cancer cells grow. The antibodies attach to the substances and kill the cancer cells, block their growth, or keep them from spreading. Monoclonal antibodies are given by infusion. They may be used alone or to carry drugs, toxins, or radioactive material directly to cancer cells. Monoclonal antibodies that have been joined to radioactive material are called radiolabeled monoclonal antibodies.
Proteasome inhibitor therapy blocks the action of proteasomes in cancer cells and may prevent the growth of tumors.
See Drugs Approved for Non-Hodgkin Lymphoma for more information.
If the blood becomes thick with extra antibody proteins and affects circulation, plasmapheresis is done to remove extra plasma and antibody proteins from the blood. In this procedure, blood is removed from the patient and sent through a machine that separates the plasma (the liquid part of the blood) from the blood cells. The patient's plasma contains the unneeded antibodies and is not returned to the patient. The normal blood cells are returned to the bloodstream along with donated plasma or a plasma replacement. Plasmapheresis does not keep new antibodies from forming.
Biologic therapy is a treatment that uses the patient's immune system to fight cancer. Substances made by the body or made in a laboratory are used to boost, direct, or restore the body's natural defenses against cancer. This type of cancer treatment is also called biotherapy or immunotherapy.
Interferon is a type of biologic therapy. It affects the division of cancer cells and can slow tumor growth.
This summary section describes treatments that are being studied in clinical trials. It may not mention every new treatment being studied. Information about clinical trials is available from the NCI Web site.
Vaccine therapy is a type of biologic therapy. Biologic therapy is a treatment that uses the patient's immune system to fight cancer. Substances made by the body or made in a laboratory are used to boost, direct, or restore the body's natural defenses against cancer. This type of cancer treatment is also called biotherapy or immunotherapy. Vaccine therapy can also be a type of targeted therapy.
High-dose chemotherapy with stem cell transplant is a method of giving high doses of chemotherapy and replacing blood-forming cells destroyed by the cancer treatment. Stem cells (immature blood cells) are removed from the blood or bone marrow of the patient or a donor and are frozen and stored. After the chemotherapy is completed, the stored stem cells are thawed and given back to the patient through an infusion. These reinfused stem cells grow into (and restore) the body's blood cells.
For some patients, taking part in a clinical trial may be the best treatment choice. Clinical trials are part of the cancer research process. Clinical trials are done to find out if new cancer treatments are safe and effective or better than the standard treatment.
Many of today's standard treatments for cancer are based on earlier clinical trials. Patients who take part in a clinical trial may receive the standard treatment or be among the first to receive a new treatment.
Patients who take part in clinical trials also help improve the way cancer will be treated in the future. Even when clinical trials do not lead to effective new treatments, they often answer important questions and help move research forward.
Some clinical trials only include patients who have not yet received treatment. Other trials test treatments for patients whose cancer has not gotten better. There are also clinical trials that test new ways to stop cancer from recurring (coming back) or reduce the side effects of cancer treatment.
Clinical trials are taking place in many parts of the country. See the Treatment Options section that follows for links to current treatment clinical trials. These have been retrieved from NCI's listing of clinical trials.
Some of the tests that were done to diagnose the cancer or to find out the stage of the cancer may be repeated. Some tests will be repeated in order to see how well the treatment is working. Decisions about whether to continue, change, or stop treatment may be based on the results of these tests. This is sometimes called re-staging.
Some of the tests will continue to be done from time to time after treatment has ended. The results of these tests can show if your condition has changed or if the cancer has recurred (come back). These tests are sometimes called follow-up tests or check-ups.
A link to a list of current clinical trials is included for each treatment section. For some types or stages of cancer, there may not be any trials listed. Check with your doctor for clinical trials that are not listed here but may be right for you.
Endocrine System Cancers
Head and Neck Cancers
Urinary Tract Cancers
Bone Marrow Transplants
General Treatment Concerns
Newly Diagnosed Patients
Causes and Prevention
Legal and Financial Information for Patients
Cancer Resource List
Resources for Young Adults | <urn:uuid:5985dbdf-b5b8-42d7-998d-17ea00f4367f> | CC-MAIN-2013-20 | http://es.oncolink.org/types/article.cfm?c=10&s=36&ss=288&id=9258 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705559639/warc/CC-MAIN-20130516115919-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.932073 | 2,696 | 2.75 | 3 |
We hold the position of 'most successful species' because unlike animals we have been able to modify our environment to suit our needs. To early humans nature was a powerful and frightening force, the bringer of plagues, storms and droughts. Nowadays we control our environment to such an extent that nature is no longer a demon spirit or an instrument of the wrath of god. In much of the world nature is way down on our list of worries, it is more likely to fear us. As the capability to control the world around us has increased from the first primitive farmers to the high-technology multinationals, the way we perceive the world around us has also changed. So has the way we perceive each other.
One thing, however, that has remained constant throughout this time is that in the majority of societies half our species (women) has been held in an inferior position to the other half (men). Why is this the case? The answer to this question should explain two things. It should explain why today with all our equal rights legislation women are still second class citizens, and secondly it should indicate the mechanisms and tactics we have to use to achieve womens' liberation. If we know what the problem is, we can find a solution.
Early humans were hunter/gatherers living in nomadic communities, living from hand to mouth. The discovery of agriculture lead to huge changes in the organisation of humanity. Agriculture was the point at which civilisation began. This is because there are a number of ways in which an agricultural community is different from a hunter/gatherer clan. Communities remain in the same spot. Agriculture can support more people than hunting/gathering so communities get larger. Farming leads to the development of new technology. New skills lead to a greater division of labour. Individuals specialise in certain types of work, be it tool making, leatherwork or defence.
However the key difference is that farmed land becomes a valuable resource. Land provides a surplus, that is land provides more food than is necessary for day to day survival. More importantly, land will provide this resource in the future, for the next generation. None of this is true of the herd of wild animals persued by the hunter-gatherer. The concept of ownership developed.
So civilisation began when man began to acquire wealth in the form of land, food and animals. If a rich man wants to ensure that his offspring alone inherit his wealth, he must be sure that his wife is only mating with him. Thus, he has to be in a position of control over her. He needs to portray this as part of the 'natural order'. To accommodate this need society, through the use of religion, developed a rationale to justify the inferior position of woman.
Rulers have always been good at rationalising unfair practices, take for example the idea of the 'divine right of kings'. Popular for centuries, the church and state argued that kings and queens were appointed by God. The status quo was natural and good, any opposition to it was evil and doomed to eternal hell. These days kings don't have much power, which is why not many people rush to describe Charles and Di as God's chosen rulers.
In much the same way, it was necessary to have women inferior to men to ensure inheritance rights. In order to keep women in this position a whole mythology of women as second class humans was developed. It was the accumulation of a surplus and the desire of a minority to monopolise it that lead to the class division of society and to the oppression of women.
Now we've established the motive and the cover story, but of what relevance is the status of women in early history to their status today. As capitalism evolved it built on the existing model of the family, adapting it to suit it's own interests. Assurance of inheritance rights isn't as necessary today, however the family provides other services which capitalism does require. Initially, when the industrial revolution first began men, women and children were drafted wholesale into the factories.
Quickly, however, the bosses realised that this was not the most economic way to run the system. The labour force was weak and the children who were to be next generation of workers were dying in the mills and mines. The solution was was to be found in the family.
Before the rise of capitalism society was based around a system of slaves/serfs and kings or lords. The problem with slaves or serfs is that the owner must provide food, basic health care and subsistence in old age, i.e. maintain the slave at a cost for those times when he or she is not productive. A much more cost efficient way to keep a workforce is through the nuclear family. In this scenario, it is up to the family to provide itself with food, shelter, healthcare, look after the elderly and young (who will provide the next crop of workers). Within this family unit it is normally the woman who fulfils the functions of housekeeper, nurse, childminder and cook.
There are two knock-on effects of women staying at home minding the family. Firstly they are not financially independent. They do not earn any money and are dependant on income received from their partners. Because nobody gets paid for rearing a family it's status as an occupation is at the bottom of the ladder and because women are financially dependant on their husbands it means they, in the past, have had little input into the major decisions affecting the family.
This led to women having no input into the decisions affecting society. A woman's place was in the home. A second effect of women's position in the family is that they are often isolated from each other and from society in general. Unlike a paid worker they have little opportunity of meeting and sharing experiences with others in the same situation on a daily basis, and do something about it. They, on their own, have little power to change the conditions they find themselves in.
Today the family is a trap for women as much as it was for women at the beginning of the industrial revolution. Women are paid on average 2/3 of the wage that men are paid, so within any partnership it obviously makes more sense for the woman to undertake responsibility for the care of children. It is for this reason, common sense rather than sexism, that that the vast majority of part-time workers are women, juggling two jobs at the same time.
Having said that, why is it that women are among the lower paid in society? Is it necessary for capitalism to exploit women workers to this degree? The simple answer to that is sometimes it is, sometimes it isn't. The only important difference between a male and female worker is that the female has the potential to get pregnant, that is the potential to want maternity leave and need creche facilities. In other words they are slightly more expensive to employ than men. So when women are asked (illegally!) at job interviews if they intend to marry, such discrimination has a material basis. An employer isn't interested on the good of society at large but in obtaining the cheapest most reliable workforce possible.
Historically women have been encouraged to work and have been accommodated when it suited capitalism. When there was either a shortage of male labour due to war as during the 1st and 2nd World Wars or an expansion of industry as in the dawn of the industrial revolution or the 1960s. When times are tough, when recession sets in, women are encouraged back into the family.
The conclusion for most socialists is that women's' liberation can only be lastingly obtained with the overthrow of capitalism. This is not to say that reforms should not be fought for at the moment, but to recognise that some of the gains may be short-term ones which can be withdrawn.
This conclusion isn't accepted by everyone concerned with womens' liberation, and certainly is rejected by large sections of the feminist movement. A good example of the alternative analysis can be seen in the following extract from the British Survey of Social Attitudes (a survey carried out regularly by an independent body).
It found that the provision of childcare was one of the impediments preventing women from working. Their conclusion was that "in the absence of changes in mens' attitudes, or working hours outside the home or in their contribution within the family it seems unlikely that even a greater availability of childcare outside the home would alter domestic arrangements greatly. Without these changes, it is conceivable that many useful forms of work flexibility - that might be offered to women such as job sharing, career breaks, special sick leave or term-time working - might reinforce rather than mitigate the formidable level of occupational segregation based on gender, to women's longer-term disadvantage."
The authors of the survey note that as long as responsibility for childcare rests with the women they will remain trapped in the family. They also point out that concessions to women in the world of work often result in women being pidgeon-holed into less well paid job. This already happens in regard to part-time workers who are paid a lower hourly wage than full-time workers. They point out that men have to square up to their responsibility as fathers. The key they emphasise is a change in mens' attitudes.
However what was not mentioned is that no matter how attitudes change, men are as powerless as individuals in regard to their working conditions as women are. With all the good will in the world they cannot change their employer/employee relationship, they cannot adjust their working hours to suit childcare just as women cannot. A more fundamental conclusion would be that society at the moment, capitalism, does not want to accommodate any of the problems of childcare preferring to leave it up to the individual to make their own arrangements as best as they can.
It is for this reason that the issue of womens' ability to control their own fertility is key in obtaining womens' liberation. That is the fight for abortion rights, for freely available contraceptives, for 24 hour quality childcare.
Women will remain as second class citizens as long as they are relegated to an inferior position in the work force. They are now in that position because to the bosses they are an unstable workforce, likely to want pregnancy leave, likely to come in late if a child is sick, likely to require a creche or want to work part time. It is because men in society are seen as the breadwinners that they have slightly more secure, slightly more dependable jobs.
It's a vicious circle, because men are in reality better paid, it makes more sense within the family to assign the role of main earner to the male and the role of carer to the female. The only way to permanently get out out of this circle is to change the system. In a society organised to make profits for a few, women loose out. In a society organised to satisfy needs, womens' fertility would no longer be a limiting factor.
Women can of course win gains at the moment. In Ireland women are no longer forced to stop working upon marriage (though lack of childcare can make it impossible to continue). Attitudes have changed considerably in the last thirty years. Most importantly, the position of women is now an issue. Whereas before it was only addressed by the few socialist or womens' groups, now it's taken up in the mainstream media, in chat shows and newspaper articles. However, any of our new freedoms are very much dependant on the economic conditions of the day. So, while in the booming sixties American women won limited access to abortion, now in recession those rights are being pushed back inch by inch.
When the reality is weighed up equal education & job opportunities and equal pay are limited without free 24 hour nurseries and free contraception & abortion on demand. While a small minority of women can buy control of their own fertility, for the majority family and childcare is still - as it has always been - the largest problem faced by women workers. In this argument capitalism won't concede, it must be defeated. | <urn:uuid:ad8267a6-396a-47cb-a70d-f4f24b412047> | CC-MAIN-2013-20 | http://flag.blackened.net/revolt/ws92/oppress36.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705559639/warc/CC-MAIN-20130516115919-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.98003 | 2,440 | 2.90625 | 3 |
View of Red Hill looking to the north from Fossil Falls parking area.
cinder cone was built during an eruption 10,000-14,000 years ago. A small
flank eruption may have occurred as recently as 400 BP. CalTrans operates
a borrow pit on the southeast side of Red Hill, just behind the low ridge to the
right of the photo. | <urn:uuid:09bcea2e-c1dc-42c0-a824-890201a1dda5> | CC-MAIN-2013-20 | http://geology.csupomona.edu/docs/stop1-1.htm | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705559639/warc/CC-MAIN-20130516115919-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.970991 | 77 | 2.578125 | 3 |
إرفنج ضد ليبستدات
David Irving, Hitler and Holocaust Denial: Electronic Edition, by Richard J. EvansTable of Contents
|<< 2.3 Professional historia...||< 2.1 Publishing career||2.5 Reputation >||2.6 Conclusion >>|
2.4 Documents and sources
2.4.1 Historians customarily distinguish between primary sources, which were produced at the time of the events to which they relate, and secondary sources, which were produced afterwards and rely on memory or on the work of other historians. Clearly, primary sources are prima facie regarded as more reliable, although they must of course be assessed critically as to their authenticity, their authorship and their purpose. As far as secondary sources are concerned, the greater the distance in time from the events to which they relate, the more critically they must be examined. On the other hand, evidence given after the event in the form of testimony in a public trial is relatively sound because it has been given in public, participants in the trial have had the opportunity to challenge it, and their challenges are available as a matter of public record. This testimony too must of course be assessed by the historian as to the purpose or purposes with which it was given. Memoirs and reminiscences have also generally been subject to a process of verification in public through the means of publication and review, though the same principles of source-criticism apply to them too. Finally, there are interviews conducted with participants after the event by the historian. This is perhaps the most problematical kind of evidence. Historians must avoid leading questions; they must not suggest the answers they are looking for; they must try to probe the motives and purposes of those whom they are interviewing; and they must not take everything they are told at face value. Above all, they must interview at length, and in depth. A brief questioning conducted with the obvious aim of eliciting answers favourable to the historian's own arguments will convince no-one.
2.4.2 Historians also have to rely on each other's work. There is nothing wrong with this, where the work relied on conforms to the accepted canons of scholarly research and rests on thorough, transparent and unbiased investigation of the primary sources. So vast is the material with which historians deal, so numerous are the subjects they cover, so consuming of time, energy and financial resources is the whole process of historical research, that it would be completely impossible for new historical discoveries and insights to be generated if every historian had to go back to the original sources for everything he or she wanted to say. This need to rely on each other's work has nothing to do with copying or plagiarism: on the contrary, the conventions of scholarship ensure that footnote and other references are used in scholarly historical work to pinpoint precisely where the historian has obtained information, and to allow the reader to check up on this if so desired. Thus for example the documentation on which this Report rests is extremely voluminous; frequent reference has to be made to works by other scholars on the historical matters with which it deals; the central concern of this Report is in the end with historiographical issues, that is, with the methods used by Irving in writing about the past, and its use of historical subjects is only intended to provide illustrations of these historiographical points.21
2.4.3 In describing his critical approach to the sources for the history of Nazi Germany, Irving has stated that he rejects all 'post-war oral trial evidence', because those who gave it had an axe of some sort to grind. If they were defendants in a war crimes trial, then they would distort the truth in order to save themselves. If they were witnesses, they may have exaggerated their sufferings as an act of revenge. These are reasonable enough points; but they do not completely invalidate the testimony in question, otherwise all testimony given to a court after an offence had been committed would have to be ruled completely useless as a guide to the truth, an extreme point of view which no reasonable person would surely uphold. If Irving is claiming that war crimes trials evidence is inadmissible because it is oral testimony based on memory, he is incorrect. The Nuremberg War Crimes Trials amassed and used a huge quantity of contemporary written evidence on the basis of which the defendants and witnesses were questioned and which served in a variety of ways to underpin their testimony. Irving himself relies extensively on this documentation in his work.
2.4.4 Moreover, as this Report will show, when it suits his argument, Irving makes an exception and actually does use oral testimony from war crimes trials. In any case, Irving does not automatically disqualify oral testimony based on memory. On the contrary, he makes massive use of oral testimony: in particular, over the years he has interviewed a large number of Hitler's former aides and other leading former Nazis, and he places, as this Report will demonstrate repeatedly and in detail a faith in the reliability of their testimony that is almost entirely uncritical. If they were talking to him, after all, they must have been telling the truth! No need therefore to probe too deeply, or to interview for too long. But here too a genuine professional historian has to bring a critical attitude to bear. Former Nazis of all kinds had to construct a version of their own history that would allow them to live in relative peace in the postwar world. In particular, it was in their interest to deny all knowledge of, let alone participation in, the crimes of Nazism, including the extermination of the Jews. If they were part of Hitler's entourage, then it was in their interest to deny Hitler's knowledge or involvement as well, since admitting it would have been to incriminate themselves.
2.4.5 There is no reason to suppose that the story they told to Irving in this respect would have been any different from the story they told to everybody else. If they had an incentive to avoid implicating themselves before a court, they had a motive for persuading Irving to be their mouthpiece in continuing their personal quest for public exculpation at a later date. Their motives for denying their or Hitler's involvement in the extermination of the Jews were the same when they were talking to Irving as they were when they were being interrogated by Allied officers preparing for the Nuremberg trials. Their testimony has to be subjected to particularly searching critical scrutiny. The need for a critical attitude is borne out by the evidence of the memoirs that many of them published - self-serving, mendacious, dishonest, and designed to minimise their own involvement in the crimes of Nazism. This Report will examine many examples of this kind of evidence, much of it relied on by Irving in an entirely uncritical way.
2.4.6 Irving makes great play with his claim that he was the historian who first revealed the 'Hitler Diaries' as fake.22In 1983 - the fiftieth anniversary of Hitler's appointment as Reich Chancellor - the respected German weekly Stern serialized extracts from what its reporters claimed were diaries written by Hitler and recently made available from East German sources. Hugh Trevor-Roper (Lord Dacre), acting for Times Newspapers, declared them to be authentic. As a result, serialization of an English translation began in The Sunday Times. Confronted with doubts about the diaries' authenticity from a number of historians, Stern organized a press conference on 25 April. Irving had come into contact with the diaries through August Priesack, an old Nazi who had been one of the first to be approached by the forger in his quest for authentication. Priesack's collection of Nazi memorabilia consisted, as Irving immediately recognized, of obvious forgeries. This made it overwhelmingly likely that the 'diaries' were forgeries too. Funded by rival newspapers who wished to preserve their circulation in the face of a threatened scoop, Irving appeared at the Stern press conference and denounced them as a forgery. 'I know the collection from which these diaries come', he shouted from the floor. 'It is an old collection, full of forgeries. I have some here'. Within a short time he was proved right. The diaries were quickly shown by tests carried out on the ink and paper by the German Federal Archives in Cologne to be postwar products. Their author, Konrad Kujau, was eventually sent to prison for his offence.23
2.4.7 Irving is accustomed to portray his role in this affair as evidence of his unrivalled expertise on of the original source material for Hitler and the ''Third Reich''. Thus while eminent academics had authenticated them, he proved his superior knowledge of the original documents by recognising them for what they were - a crude fake. In fact, however, one of the reasons why the forgery got as far as being printed as authentic in the national press was the fact that eminent academics had not been allowed near them. Those who had, like the American historian Gerhard Weinberg and the Stuttgart expert on Hitler, Eberhard Jäckel, expressed grave suspicions almost from the very start. Even Hugh Trevor-Roper had changed his mind about them immediately after he had sent off his article to the Sunday Times authenticating them, and had used the Stern press conference, much to the discomfiture of the organizers, to give voice to his new-found scepticism.24
2.4.8 Moreover, what Irving fails to mention is that a couple of days after the press conference, he changed his mind. According to Robert Harris, he did this because he was uncomfortable at being aligned with majority, respectable historical opinion, because he was impressed by the sheer size of the diaries - sixty volumes - which seemed almost beyond the capacity of any one individual to forge, and because having finally seen the diaries for himself, they looked more convincing than he had expected. 'Finally', adds Harris, 'there was the fact that the diaries did not contain any evidence to suggest that Hitler was aware of the Holocaust.' Indeed, all the way through, they seemed to give a favourable impression of Hitler. Whereas most historians held Hitler responsible for the antisemitic pogrom of the 'Reichkristallnacht' in November 1938, the diaries showed him ordering a stop to it as soon as he found out about it. Whereas most historians thought the flight of Rudolf Hess to Scotland in 1941 the act of a madman, the diaries revealed him to have been acting on Hitler's orders in pursuit of a genuine peace mission. On point after point, the diaries seemed to endorse Irving's rose-coloured view of the 'Führer'.25 Soon he was on the front page of The Times declaring his belief in their authenticity. When forensic tests shortly afterwards revealed them definitively as fakes, Irving issued a statement accepting the finding but drawing attention to the fact that he had been the first person to unmask them as forged. 'Yes', said a reporter from The Times when this was read out to him, 'and the last person to declare them authentic.'26
2.4.9 What the affair of the 'Hitler diaries' actually suggests, therefore, is not Irving's skill in unmasking forged Nazi documents, his unrivalled knowledge of the source materials for the history of the ''Third Reich'', or his mastery of the most rigorous techniques of historical source-criticism, but his complete lack of any scruple when it comes to evaluating and making use of historical documents for the arguments he wants to put forward. If an obvious forgery like the 'Hitler diaries' gives credence to his views, he will use it. This Report will detail other, less spectacular but no less telling examples of this unscrupulousness below. Irving will use any argument, no matter how flimsy, to try and discredit genuine source material if it runs counter to his arguments. And if he cannot dismiss it, then he will manipulate it to the point of falsification, or suppress or ignore it altogether. Often he will attempt to disguise what he is doing by rendering his footnote references opaque rather than transparent, flouting one of the most basic requirements of historical scholarship in the process. These arguments will be substantiated at length in the course of this Report.
21. The historical issues concerning the Nazi extermination of the Jews are dealt with in separate Reports by the expert witnesses Professor Browning, Dr. Longerich and Professor Van Pelt.
22. lrving, 'On Contemporary History and Historiography. Remarks Delivered at the 1983 International Revisionist Conference', The Journal of Historical Review, Vo. 5, Nos. 2, 3, 4 (Winter, 1984), pp. 255-6.
23. Robert Harris, Selling Hitler. The Story of the Hitler Diaries (London, 1986), pp. 319-26.
24. See the account in ibid.. Jäckel had earlier accepted some other forgeries from the same collection as genuine; his discovery that they were not was what led to his doubts about the diaries. Irving himself purchased some 800 pages of Hitler documents from the same forger in October 1982 and was on the verge of selling them to Macmillan the publisher when he began to have doubts (Audiocassette 75, side 1, 300-370).
25. Harris, Selling Hitler pp. 339, 344.
26. Ibid., p.359.
|<< 2.3 Professional historia...||< 2.1 Publishing career||2.5 Reputation >||2.6 Conclusion >>| | <urn:uuid:1fa9cb87-2705-4aab-b35e-05bdd623b6dc> | CC-MAIN-2013-20 | http://hdot.org/ar/trial/defense/evans/240 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705559639/warc/CC-MAIN-20130516115919-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.97666 | 2,793 | 3.03125 | 3 |
Head of a Woman
Oil on canvas. 38.5x36 cm
France. Circa 1876
Source of Entry: State Museum of New Western Art, Moscow. 1935
This study was painted at the height of the Impressionist movement, around 1876, by Renoir, one of the leading members of the group. Portraits form perhaps the most important part of Renoir's work, and women are by far the most important of his subjects, embodying vivid, natural charm.
This sitter has a likeness to a number of figures who appear in the artist's other works of this period, both in her general appearance and in hairstyle. It is possible that this is Anne, one of Renoir's models.
In the study, as in the artist's finished pictures, the image is tinged with lyricism and full of the charm of femininity. The freedom and fluidity of the separate brushstrokes, the soft nuances of colour and the attention paid to effects of light and air are characteristic of Renoir's style during these years. | <urn:uuid:3f07cea6-63b7-4385-9083-6c9c21507368> | CC-MAIN-2013-20 | http://impressionistsgallery.co.uk/artists/Artists/pqrs/Renoir/information/ZG3PRGEPK9BRHSEI3.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705559639/warc/CC-MAIN-20130516115919-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.966225 | 219 | 2.734375 | 3 |
Navigating the Digital Universe
Navigating the Digital Universe:
the use of space in the design of multimedia
by Jean Trumbo
Reynolds School of Journalism
University of Nevada, Reno
702 . 784 . 4198
e-mail: [log in to unmask]
Multimedia combines a variety of media formats: text, image, sound
and movement into a dynamic environment that allows users to select the level of
interaction and to make active decisions about how they access the content.
The multimedia designer must create an experience that anticipates and allows
the user's approach and movement through the presentation, as well as the user's
exit. The designer can offer navigational cues, but unlike the sequential
ordering that serves as the underpinning of traditional media (print and film),
multimedia offers multiple avenues through the material. These avenues through
multimedia are digital rather than physical, yet the process of orientation and
navigation have parallels to three-dimensional space. If we accept the notion
that multimedia products can be described as three-dimensional form, the process
of design must incorporate an appreciation for these spatial requirements. This
paper will examine some of the processes and problems of navigation and
orientation in multimedia by comparing the perception of architectural and
sculptural space to that of the multimedia environment.
Space in multimedia
An understanding of the creation and organization of space can be
helpful in the process of planning the multimedia information environment. Space
in multimedia includes the space occupied by the elements that are part of the
multimedia product as well as the space that surrounds the product. The parallel
is the potential to view space as a universe with discrete elements that fit
within and function as complex systems. On the World Wide Web, this universe is
open, although it may not be infinite, and the elements or sites are organized
to be accessible as unique worlds with thoroughfares to other worlds. Users may
have local, regional, global or cosmic experiences as they travel the Internet.
Self-contained multimedia products such as CD-ROMs are spatially limited but no
less complex because each format D text, video, audio, or graphic element D may
be uniquely organized or arranged to interact with the other elements in the
space. The space occupied by the elements and the space between the elements is
navigable in many directions.
There is a tendency when designing for multimedia to think of the
process as a hybrid-linear experience with a hierarchical structure that the
designer can control. In spite of the potential to link from one idea to
another, these links are often used as subsets within a dominant text, much
like footnotes within a research paper. Links may lead from primary topic to
secondary topic and so on. Limitless layers of links are possible, but commonly
these connections branch from one another in a hierarchy of importance or
emphasis. This can be seen in World Wide Web sites that open with a home page
and contain an index of icons that lead the user down a linear path of pages
that are essentially documents dumped into digital form. The reader is forced to
use the product in a directed way D sequentially. This method of information
storage and retrieval is based on a two-dimensional tradition of text navigation
that is dominated by the book and print media publishing. It is a century's old
tradition of organizing information sequentially, and it assumes that the reader
will navigate through this sequence from top to bottom or from beginning to end.
In the design of multimedia, there are multiple pieces of
information that may be presented in a linear format as sections within the
presentation. For example, a document may include pages of text, an author
reading her poetry, a musician playing one of his compositions and then
discussing it, or a video pop-out window that shows scenes from an event. All of
these discrete elements are linear in their structure. They have a beginning,
middle, and end, and for the most part they require that the user navigate
through the experience with reverence for this arrangement. The underlying
organization of elements within the product may be linear but as soon as the
user is invited to move among or between elements, this sequential, directive
approach is given additional dimension.
In multimedia, it is the user's movement through the presentation
and the user's experience with the content that is non-linear. Hypertext allows
this alternative way of approaching beginnings and endings or entrances and
exits from the multimedia product. It offers multiple possible sequences thus
multiple potential beginnings and endings. The point at which the reader enters
the text is a beginning and in hypertext that entrance may be anywhere, at any
point within the structure.
The prospect of arriving on the doorstep of a new structure and
being presented with a maze of confusing paths in, around, or through is
precisely the situation presented by many multimedia products. The ultimate
responsibility of the designer is to create a navigable environment with
interfaces that help orient the user. One strategy for addressing the challenge
of designing navigable multimedia space is to view the environment as
architectural or sculptural. Architectural space has both pragmatic and
expressive intent. It is planned with the user in mind and functions in
particularly well-defined ways to offer shelter or utility. The architect may
have had a particular expressive goal that is revealed through the design and
this expressive intent may be uniquely interpreted by the viewer but it is not
of paramount importance. Function is the primary purpose of architectural space.
Sculptural space, while also three-dimensional, is created with expressive
intent D to reveal the unique vision of the artist. Sculpture may not be
functional but is always expressive in intent. Architecture may be expressive
and is always functional in intent.
Further, space that is modulated to allow the viewer to observe it
but not to inhabit it is sculptural. Space that is modulated to allow the viewer
to enter and inhabit it is architectural. "Clearly, these categories overlap a
great deal: architecture is sculptural, and sculpture can be inhabited."
Multimedia may have both architectural and sculptural space
resident within a single product and the designer must be aware of both the
expressive and functional intent while organizing the design space.
The designer as architect or sculptor
Our senses are affected by the creation of patterns and
proportional relationships between shapes. Light, color and sound also influence
our sensory experience. The architect manipulates space to influence the
environment in which we live and through which we move. Architecture has been
described as "the art into which we walk; it is the art that envelopes us."
Mies van der Rohe described architecture as "the crystallization of its inner
structure, the slow unfolding of form. That is the reason why technology and
architecture are so closely related."
To the architect, space is a functional design element that is as
important to the success of the structure as every column, wall or window. The
function of space can be described pragmatically, with a utilitarian view of the
use or activity that will occur within a given space. Space can also be
described for its circulatory function or its ability to direct or enhance
movement from area to area. The function of space can also be symbolic or may be
used to make a visible statement about its use. And finally, space can function
psychologically to offer optimum satisfaction or to simply be pleasing.
The organization of content within a multimedia product may be
enhanced through an approach to the digital environment that actively
anticipates the function of the space occupied by the structure. From this
perspective, the multimedia designer must anticipate the purpose of the content
and the level of interaction that is necessary. The circulatory function of
multimedia includes the ease with which the user can move and the visual
guideposts that clarify the access routes. Psychologically, a well designed
multimedia experience leaves the user anticipating a return trip.
The design produced by the architect influences the user's movement
through space on many levels. The architect manipulates physical space which is
bounded by walls, floor, and ceiling; perceptual space and the sense of scale,
perspective and distance that is seen by the viewer; conceptual space that is
part of memory and includes the mental maps that we carry around in our heads;
and finally, behavioral space which includes the way we actually move through
and use an environment.
The experience of manipulating space to create an environment
through which others move is a fundamental concern for the multimedia designer.
The environment is constructed of bits of information and is thus binary rather
than physical. Nonetheless, multimedia is space that we enter. If it is space
on the Internet, it is open and vast. If it is space on a portable storage
device such as a CD-ROM it is limited in scale but may be open in structure. The
structure of the space is perceptual as opposed to the bricks and mortar of a
physical structure. And yet, the experience of moving through a constructed
environment is similar.
Mitchell argues that the structure of space on the Internet has
many of the symbolic and social characteristics of physical space but that the
restrictions of architectural form can be overcome. Spatial cities, he says,
condense human activity to promote interaction but there is also an element of
control introduced as access is organized. Districts and neighborhoods are
created to define space.
For the inhabitants, crossing a threshold and entering a defined
place D as an owner, guest, visitor, tourist, trespasser, intruder, or invader
D is a symbolically, socially, and legally freighted act. There is always a big
difference between being a local and being an alien, being on your own turf and
being on somebody else's, enjoying your privacy and appearing in public,
feeling at home and knowing that you are out of place. So it is on the Net, as
well, but the game gets some new rules; structures of access and exclusion are
reconstrued in entirely nonarchitectural terms
(if we continue to define architecture as materially constructed
form), and you enter and exit places not by physical travel, but by simply
establishing and breaking logical links.
The architecture of multimedia space is not simply materially
constructed form, although there are comparisons that can be made. Rather,
multimedia space is formally organized by the designer to allow movement through
and within and between sections. The structure is most effectively created as a
format for guiding movement rather than a form for controlling movement.
Movement is no longer bounded by the structure, rather it is guided. The ability
to link from one section to another or to simply enter or exit a structure at
any point becomes equivalent to walking through walls for the user.
The design of a building or structure relies on the thoughtful
consideration of human behavior. Ultimately, a building is constructed for human
use and thus movement through it, around it, and within it is of primary
importance. The architect can create an environment that employs space in a
directional way. For example, a Gothic cathedral in which the emphatic axis
directs movement toward a single focus D the altar. The architect may also elect
to create an environment of non-directional space in which there is no single or
obvious path through a building. Rather, there are a variety of paths to choose
from, each offering a unique relationship to the space created.
The designer of multimedia must be similarly concerned with the
user's movement through the material. In a multimedia environment there are
multiple windows, doors, and hallways through content. The designer's challenge
is to use directional and non-directional space to create multiple paths through
a coherent, navigable garden of content rather than a labyrinth of dark, empty
passageways and blind alleys.
Physical Space. The constraints of technology allow limited
influences on the part of the designer over physical space, which might be
conceived of as the CD, the user's computer, or the network. Physical space may
also include access speed, storage limitations and the size of the digital
presentation. These technology limitations are generally unavoidable and require
that the designer simply make intelligent decisions that don't impede user
access. In fact, the multimedia designer has the greatest influence over the
realms of perceptual, behavioral and conceptual space.
Perceptual Space. In the design of multimedia, perceptual space
includes the elements visible on the user's screen and the environment that is
created through their arrangement. The choice and arrangement of visual elements
such as type, color, pattern, and image as well as the designer's use of sound,
movement and time are important elements in multimedia design. The designer has
control over the assembly of these elements and is charged with creating a
perceptual space that is articulate and that adds to the communication goals of
the presentation. If there is a sense of depth or perspective visible or if the
passage of time is evident in the presentation, it is perceptual space that has
been influenced by the designer.
Three-dimensional space is described as being boundless or
limitless in all directions. Perception of three-dimensional space is influenced
by our ability to perceive depth and volume. The physiological properties of
binocular vision, seeing with two eyes, gives us an ability to discriminate
between the relative depths or forms within a three-dimensional visual field.
This allows us to imagine distance and to gauge scale, shape and size.
Our understanding of three-dimensional space is also psychological
because perception is a function of our ability to comprehend and assimilate
what we are seeing.
H. L. F. Helmoltz developed cue theory which suggests that before
the mind can know and interpret sensory information, it must participate in
sensory events that form the basis for interpretation. In other words, once
spatial cues are learned through experience, our perception of space becomes
relatively simple and our response to it is automatic. Cumulative sensory
experience builds a foundation from which we perceive.
Our perception of space in multimedia is both a physiological
function of vision and a learned phenomenon that is all the more complex because
the digital data that makes up the multimedia product has no real volume or
scale. It is the orientation, organization and design of content that can be
approached as a three-dimensional problem.
The hierarchic structure of hypertext is extended in multimedia
space to include concern for layers, the distance and paths from one link to
another, and the introduction of movement and time. In hypermedia, each user
decision offers the potential to move from one-dimensional to multi-dimensional.
"...a word in text can open to a hologram, a point within the hologram can open
to an animation, a frame in the animation can return to a text." We can
think of space in this context as "information space" with the actual elements
and the space within which they reside connected. The designer defines how the
information is organized within the space but the user defines how the space
functions, or is perceived, or conceptualized. The user may behave in the space
in a variety of ways.
The designer must consider the entire multimedia document as a
potential entry to the content. If the multimedia document can be approached and
entered from any point in the presentation, the design process must include
attention to the whole as well as the individual elements within the
Many multimedia products use familiar spatial metaphors to help the
user find her place. For example, the computer desktop with file folders, trash
cans and clipboards that serve to connect the user to their physical
counterparts. Apple Computer's E-World village is a spatial metaphor that offers
the user a familiar way to navigate from one content area to another. In each
case, the spatial environment has been organized to give the user a sense of the
Behavioral space in multimedia includes the way in which the user
approaches the material and navigates through it. The user interacts with the
multimedia environment using a variety of entry points and traverses the space
through a variety of paths.
The multimedia designer builds the access routes between topics and
establishes the signage and tools that are necessary to help the user navigate
the information in a coherent way. A well-developed approach to navigation
design minimizes travel by creating simple paths between points, minimizes
complexity by creating a hierarchy with a minimum of levels, and minimizes
redundancy to avoid creating multiple paths to the same place.
There are two levels of access that concern the designer; movement
within the presentation and movement that takes the user away from the
presentation. In the first case, the designer must create a sense of continuity
and a clear sense of direction within the document. This is a matter of
establishing a visual identity with readily understood icons, landmarks, guides,
and an understructure that is based on "user-logic" D literally, the way in
which the user approaches the product and the way in which the user navigates
through the information. User-logic often differs from the intuition or judgment
of the designer. One approach to incorporating user-logic into the multimedia
product is to practice collaborative or participatory design, bringing the end
user into the development process as an active contributor.
Sun Microsystems describes one such approach to evaluating user
comprehension of the icons developed for their Web site
(www.sun/sun-on-net/videsign/sunweb/). The end user was involved in each step of
the design process and consequently was able to eliminate any ambiguity
concerning how they would interact with the final product. This process allowed
Sun to create an icon system that is intuitive and to organize the site in such
a way that user access is assured.
To influence access routes that take the user through and away from
the multimedia presentation, the designer needs to have created an enticing
environment that leaves a positive impression with the user. This concern for
the aesthetic appeal of a presentation is directed less toward user-logic and
more toward creating a pleasing memory and an experience that the user will be
likely to repeat.
The designer also needs to anticipate behavioral differences among
users. Users move through the presentation at their own pace, making selections
along the way that determine how they will behave in the environment that has
been created. The ability of the user to define the viewing experience has
parallels to that of sculpture when the viewer is able to select the angle of
view, the time of view, range of view, etc. The user chooses the sequence, depth
and duration of the experience and consequently the nature of access to the
space. The user may be a relatively passive viewer or an active visitor who
participates or interacts with the object. In any event, each user brings a
unique set of goals, ideas or information processing criteria to the process.
The access to space is one of the key ingredients in creating
interactivity. What is unique about multimedia and the Internet is that both
access and navigation are outside the domain of the designer once the product is
"out there." Accessibility is in the hands of the user and navigation choices
are sometimes arbitrary, sometimes purposeful, but seldom linear.
In effect, interactivity is multimedia's reason for being. It
allows the user to create links between different media types and integrate
them into a uniform multimedia document, program, or presentation. It is
critical to understand that the links to the media and the information carried
by the media are not fused and permanent. They are dynamic and active."
The designer has created an environment of communication that is
multi-dimensional and that is responsive to the influence of the audience. The
designer relinquishes control once the environment is made available to others.
The user decides how to enter the product, approach the content, assimilate the
information, and engage in highlighted details.
Further, we can think of the structure of space within multimedia
as dynamic and evolving with movable walls, permeable fences, flexible hallways
and scalable sections. The designer can adapt and modify the structure without
total disassembly. It is an environment that can respond to the actions of the
Conceptual space in multimedia is another story entirely. It relies
on the internal compass, or spatial memory of the designer and user. Conceptual
space is our sense of how to move, or of boundaries, and direction. It is
whether we are able to conceive of the computer screen as having multiple levels
or layers. Conceptual space is an experience rather than a construction. The
designer and each user of the product may have unique senses of conceptual
space. For example, it might be perfectly understandable for one user to
envision a hypertext document as a three-dimensional form that resembles a
Calder mobile, while another user envisions the same document as a
two-dimensional diagram or flow chart.
Memory plays an important role in our conceptual understanding of
space in multimedia. We rely on spatial memory to get from one point to another
and back again. We rely on spatial memory to create mental maps that allow us to
repeat an action or retrace our steps. The constraints of short- and long-term
memory are important concerns for the multimedia designer.
Short-term memory is accessed quickly but decays rapidly. We use it
as a "scratch pad" to store information that will be used fleetingly. We tend to
seek closure and to group items or events stored in short-term memory. If we are
interrupted while processing information in short-term memory, we easily lose
our place. Another hallmark of short-term memory is the "recency effect" meaning
that we tend to remember best the words or images that are presented last.
Short-term memory is integral to the user's successful navigation in multimedia
design space, particularly as the user accesses new presentations.
The multimedia designer needs to use a variety of tools to help the
user remember where they are in the design space. These tools include
pictographic icons that remind the user where they are and how to get back,
color references that connect to sections or areas of the design space, a
coherent use of typography, movement, sound, and organization that augments the
message and reinforces the user's progression through the design space.
Long-term memory has relatively slower access time but allows the
user to store factual, experiential knowledge in unlimited amounts. We
access long-term memory episodically, with memories stored in serial form, or
semantically, as associations or representations of the relationships between or
For the multimedia designer, the process of storing information in
long-term memory suggests that a clear understanding of the nature of the
information be developed before a design approach is initiated. For example,
information that is likely to be remembered as a sequence of events should be
stored with an appreciation for the structure or hierarchy of information. This
will result in a fairly linear approach to the use of space. Information that is
likely to be remembered as an interpretation or impression can be delivered in a
structure that is less rigid. Space, in this case, can be expansive with links
that open the user to new possibilities rather than directing the user to a
A sense of disorientation occurs when users seek information and
subsequently lose their sense of direction within the information space. If the
user is concerned with how to navigate the system to reach the information,
attention is diverted and the process of moving has become more consuming
than the potential of the destination. Imagine being so concerned about your
ability to walk down a corridor successfully that you fail to notice $1000 bills
lining the walls. This is one of the results of disorientation.
Disorientation can occur in multimedia when the links dead-end or
are irrelevant. It can also result when the tools for navigation are
inappropriate or lacking. If users have a difficult time retracing the route
taken to find information, frustration results. Interface design is an important
part of connecting the user with the information and very often this ingredient
is overlooked or inadequate. For most users a clear path to a primary index or a
diagram of the space is important in creating navigable information space. This
can be frequent connections to a homepage or section pages with reliable
The multimedia designer is charged with considering both user
movement through digital space and the organization and presentation of form
within that space. The challenge is to anticipate not only the development of
the multimedia product but its place in a multidimensional environment and the
ways that the user will interact with the product. A careful consideration of
physical, perceptual, conceptual and behavioral space is a sound first step in
the process of creating a navigable digital universe.
The nature of space in multimedia
A framework for examining the spatial environment in multimedia
and the design considerations that must be addressed to ensure effective
Defining the Design
nature of the space considerations
The size and shape of
the space occupied by the multimedia product
Size of the presentation
and the design elements
that are included,
Our sense of the scale, distance or proportion within the
Use of perspective,
perception of dimension,
time and movement,
constraints of vision and information processing
The way in which the user understands or remembers
the design space
Short term memory
Long term memory
The way the user actually moves through, in, or around the space
The use of directional and
the design of icons and directional graphics,
access and the level of interactivity
Randy Haykin, senior editor. Demystifying Multimedia: a
guide for multimedia developers from Apple Computers, Inc., San Francisco, CA:
Vivid Publishing, 1993, p. 3.
The discussion of the text as it is used in this context is not
limited to a typographic product. Rather, it assumes that the multimedia product
is based upon a traditional, sequential narrative that employs the qualities of
non-linear organization such as that used in hypertext.
Landow, George P. Hypertext: the convergence of contemporary
critical theory and technology. (Baltimore, MD: Johns Hopkins University Press,
1992) p. 57.
Novak, Marcos. "Liquid Architectures in Cyberspace," Cyberspace:
First Steps, ed. Michael Benedict (Cambridge, MA: MIT Press, 1992) p. 243.
Roth, Leland M. Understanding Architecture: Its Elements,
History and Meaning. (NY: Harper Collins Publishers, Inc., 1993) p. 45.
Roth, p. 19.
Roth, p. 12.
Roth, p. 45.
Mitchell, William J. City of Bits: Space, Place and the
Infobahn. (Cambridge, MA: MIT Press, 1995) p. 21.
Roth, p. 51.
Wallschlaeger, Charles and Cynthia Busic-Snyder. Basic Visual
Concepts and Principles for Artists, Architects and Designers. (Dubuque, IA: Wm.
C. Brown Publishers, 1992) p. 307.
Wallschlaeger, et al, p. 306.
Novak, p. 230.
Lindstrom, Robert L. The Business Week Guide to Multimedia
Presentations. (Berkeley, CA: Osborne McGraw-Hill, 1994) p. 173.
Dix, Alan, Janet Finlay, Gregory Aboud, and Russell Beale.
Human-Computer Interaction. (Englewood, Cliffs, NJ: Prentice Hall, 1993) p. 27.
Dix, et al, p. 28.
Dix, et al, p. 29.
Borman, Hester and S.H. von Solms. The Electronic Library,
Volume 11, No 4/5, August/October 1993, p. 263. | <urn:uuid:07f7288f-a1ca-45f3-a2fc-df9a500f08d9> | CC-MAIN-2013-20 | http://list.msu.edu/cgi-bin/wa?A2=ind9612D&L=AEJMC&D=1&O=A&T=0&P=9687 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705559639/warc/CC-MAIN-20130516115919-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.917246 | 5,914 | 2.640625 | 3 |
Hey, I am trying to prove that:
lim(nth root of n)=1 as n approaches infinity and that
lim(nth root of n+1)=1 as n approaces infinity
I do not know how to go about it. Can anybody help??
Is using the delta-epsilon definition of a limit or a less rigorous method?
Start with considering any function . You can do this both graphically and analytically. For the first way, use a calculator to see the trend as n tends to infinity. For the second way, look at the exponential part of the function. What is ? And what is any number or variable to that answer?
This happens to be a famous limit
I will prove that =1.
Notice that the function is a monotonic decreasing function, which has a lower bound. Thus, has a limit. Call that thus,
But because is countinous for that interval,
But this fits the necessary condition of L'Hopital's Rule,
Finally putting all of this together,
Now:Originally Posted by TexasGirl
and as the exponential function is continuous if the limit exists:
so we need only worry about:
Now this is dealt with elsewhere in this thread by ThePerfectHacker, but
an informal short cut is available which tells us what this limit is.
The sort cut is that log functions grow more slowly than any power
of its argument, that is for all , there exists a such that:
for all sufficiently large. Which is sufficient to show that
for any . Of course this can also be demonstrated
using L'Hopital's rule as is done for elsewhere in this thread.
I know, I told him that.Originally Posted by CaptainBlack
For the second thing you cannot just take the natural logarithm of the limit you must first prove it exists. It is a common mistake by just taking the natural logarithm because we are assuming it exits.
I don't understand your point. Obviously I was simply telling her to analytically think about the trend of the exponent. If I made a mistake I apologize, but I really don't see how I was false in showing that as n approaches infinity, the function becomesOriginally Posted by CaptainBlack | <urn:uuid:7b76af57-c9e3-4598-9600-2df0badf4854> | CC-MAIN-2013-20 | http://mathhelpforum.com/calculus/1561-limit-proof.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705559639/warc/CC-MAIN-20130516115919-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.96158 | 470 | 2.53125 | 3 |
This applet allows a person to test several numerical integration approximation methods by having the user fill out the left and right endpoint fields, type in the formula, select the method, and pressing the calculate button. For example try typing in -1 for the left endpoint, 1 for the right endpoint, and y=x^2 for the formula then press calculate.
For each method selected, the estimated integral for that method will appear in the text area at the bottom. Certain functions will also appear on the graph on the left. The java graph class is still experimental and does not use equal stretch principles. y = x2 from -1 to 1 will appear the same as y = x2 from -100 to 100.
NOTE: Equations should be entered in the form of y=3x^2-2. Due to the string parsing code in java decimal numbers, fractions, and trig functions are not supported inside the equation box. Also the "*" operator is not necessary when multiplying times x. | <urn:uuid:482cacad-9ff4-4c71-afa9-beb22173bc11> | CC-MAIN-2013-20 | http://mste.illinois.edu/activity/integration/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705559639/warc/CC-MAIN-20130516115919-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.866588 | 204 | 2.515625 | 3 |
New imaging technology brings trace chemicals into focus (w/ Video)March 11th, 2010 in Chemistry / Analytical Chemistry
(PhysOrg.com) -- Arizona State Univeristy scientist N.J. Tao and his colleagues at the Biodesign Institute have hit on a new, versatile method to significantly improve the detection of trace chemicals important in such areas as national security, human health and the environment.
Tao's team was able to detect and identify tiny particles of the explosive trinitrotoluene or TNT—each weighing less than a billionth of a gram—on the ridges and canals of a fingerprint. "We can easily detect the TNT traces because we combine the strength of optical microscopy, which gives spatial resolution, with the high sensitivity and selectivity of electrochemical detection," he said. Results of this research appear in the March 12 issue of Science.
Tao's work involves the application of a hybrid technique—called electrochemical imaging microscopy—developed in his lab. "We don't use electrochemistry alone," said Tao, director of Biodesign's Center for Bioelectronics and Biosensors and electrical engineering professor in the Ira A. Fulton Schools of Engineering. "We combine electrochemical sensing with other techniques, including optical detection."
The technique has several advantages over more conventional methods of detection, and is a more powerful tool than either optical or electrochemical sensing alone. It is rapid and non-invasive to the chemical system it explores, and provides a detailed map of the surface under study, revealing the chemicals present at every location.
Although Tao's published results highlight the power of electrochemical imaging microscopy to uncover explosive residues, he notes that the method can be usefully applied to a full assortment of detection applications. His group is currently using electrochemical imaging microscopy to monitor the activities of living cells, as well as to detect protein biomarkers—early warning beacons that can alert clinicians to pre-symptomatic signs of disease. This could offer improved speed and a lower cost for biomarker discovery when compared with current microarray approaches. Other potential uses include detection of heavy metal ions in drinking water.
The technique dispenses with the traditional microelectrode used for chemical sensing. "The key idea here," Tao explains, "is to convert an optical signal into local electrochemical current." This is accomplished thanks to a phenomenon known as surface plasmon resonance.
In an electrode—a metal conductor through which electric current is passed—electrons move freely and oscillate in a wavelike fashion called a plasmon. Shining light on the surface plasmon causes the electrons to absorb energy and enter an excited state. Tao notes that the plasmon is exquisitely sensitive to any changes occurring near the electrode's surface. If, for example, an electrochemical reaction involving oxidation or reduction takes place (where electrons are lost or gained, respectively), the plasmon registers this change as a reflection of light (electrochemical current can be inferred from the changes in optical signals detected). The technique allows for the resolution of trace chemicals down to a small fraction of a micron in diameter.
The TNT experiments were carried out by first depositing a fingerprint on the surface of an electrode. The raised ridges of the fingerprint formed a delicate layer of protein that blocked the flow of electrochemical current, whereas the grooves allowed current to flow, providing the contrast to reveal the fingerprint in vivid relief when an electrical potential was applied.
Next, the applied potential was lowered to correspond to the specific reduction potential of TNT, at which point spots of the explosive particles appeared, providing both visual and chemical confirmation. Remarkably, the technique could successfully detect the grains of TNT, even if they were mixed with other species of particles, including traces of dust, airborn particulate matter or wax.
Provided by Arizona State University
"New imaging technology brings trace chemicals into focus (w/ Video)." March 11th, 2010. http://phys.org/news187537969.html | <urn:uuid:6ca91fdf-391f-417e-9a63-10bbb5aff5c1> | CC-MAIN-2013-20 | http://phys.org/print187537969.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705559639/warc/CC-MAIN-20130516115919-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.932189 | 831 | 2.6875 | 3 |
International Women’s Day (IWD) was founded in 1910 in order to confront the great inequalities women faced in the labor force and society as a whole. Unfortunately, one hundred years later, women still make up a majority of the world’s poor.
Women’s wages in the U.S. are only 76% of men’s, but the disparity of long-term earnings between men and women is far worse. A study comparing total earnings between 1983 and 1998 showed women averaging just 38% of men’s wages (Institute for Women’s Policy Research, 2004).
In large part, this is because 80% of American women under 40 are mothers, according to the U.S. census. Without adequate paid maternity leave, mothers are frequently forced to quit stable jobs and disrupt career plans. Add to that $611 in average monthly childcare costs (U.S. Department of Labor), which is more than two weeks pay at the federal minimum wage.
Eighty-seven percent of single parent households are headed by women and of those 37% are in poverty (Association for Women’s Rights and Development). Once a family falls into poverty it is astoundingly hard for them to escape. Sixty percent of families that are in the bottom fifth of income remain there a decade later (Association for Women’s Rights and Development).
The impact of the financial crisis, however, is worldwide. Of the 1.5 million people living on a dollar or less per day, 70% are women (UN.org). Forced into the factories with the worst working conditions, women make up 90% of the world’s sweatshop labor (Women Thrive Worldwide). Often being laid off, these women are accustomed to making 13 cents to one dollar per hour (Powell and Skarbek 2004). Forced to work, women are less likely to attend school or leave the home before marriage. Seventy-seven million girls of primary school age worldwide are out of school, compared to only 55 million boys (The World Bank).
Women around the world are bound together by discrimination and economic servitude created by capitalism. Their work is devalued down to pennies, and often the largest use of their time - household labor - goes unpaid. IWD is a chance to remember and celebrate the struggles of women, which have won huge improvements in our lives. If women united internationally and with the wider struggles of working people to fight for equal rights, better working conditions, wages and stronger social services such as health care, child care and food support, we could collectively improve conditions for all. | <urn:uuid:0681e861-7b72-460f-8ca5-d3e891c9a360> | CC-MAIN-2013-20 | http://socialistalternative.org/news/article16.php?id=1277 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705559639/warc/CC-MAIN-20130516115919-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.963525 | 538 | 4.03125 | 4 |
The goal of the research in engineering education and outreach is to increase awareness and interest in pursuing engineering as a career, as well as to understand what factors help students be successful once they have chosen engineering as a major.
These efforts are being developed by the department in partnership with other UMBC faculty, the University of Maryland Medical School, George Washington University, the Maryland State Department of Education, high school technology education teachers and key businesses.
Under development is the INSPIRES (INcreasing Student Participation, Interest and Recruitment in Engineering and Science) curriculum for high school students, which incorporates hands-on activities, on-line interactive animations, mathematical design simulation and inquiry based learning with ‘real world’ engineering design exercises. These exercises increase interest by bridging the gap between real life and the classroom. Teacher training is a vital component of this project and is provided to in-service teachers.
In addition, we have developed curricula which introduce math students to simple engineering problems and applications which can be solved using algebra. Middle and high school algebra teachers are paired with undergraduate engineering students to learn how to complete simple experiments and activities and apply basic mathematics. This project addresses the need to increase both the awareness of and interest in career opportunities in engineering while building students’ math skills and understanding through the use of engineering applications. We are also involved with Northrop Grumman’s TEAACH program and provide teacher workshops with hands-on activities and demonstrations to increase student understanding in math and science while providing an interest in engineering.
The department’s outreach programs include involvement with middle school and high school students through YESS and Computer Mania Day, as well as the development of a high-quality video, “You Can Be Anything,” which encourages young women to study science and technology; which is featured during Computer Mania Day. In addition, our undergraduate chemical engineering students visit area middle and high schools each academic year to introduce engineering concepts and opportunities using hands-on activities and demonstrations. We continue to explore ways to increase the number and success of students, particularly those from underrepresented groups, receiving degrees in STEM areas through the investigation of a two-week summer bridge program, a mentoring program, a scholarship program and an internship program on student enrollment and retention. | <urn:uuid:ae79568f-0a73-4a14-bdd0-8ee7182b85d0> | CC-MAIN-2013-20 | http://umbc.edu/cbe/research/outreach.php | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705559639/warc/CC-MAIN-20130516115919-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.961295 | 464 | 3.109375 | 3 |
President's Day, John Glenn and Rihanna
Happy President's Day!
It's a day off for most Americans, but at least some probably don't have a clue why their employer is closed for the day. We celebrate President's Day today to honor the birthdays of George Washington and Abraham Lincoln, arguably our two most important presidents.
Washington was born on February 22, 1732 while Lincoln was born on February 12, 1809. However, the holiday is officially just a celebration of Washington's Birthday. In 1885, Chester A. Arthur (Yes, he was a president too) signed the bill to make the third Monday in February a federal holiday called George Washington's Birthday. The snub of Lincoln's birthday did not sit well with many, and the holiday became a celebration of both men's birthdays. There was an attempt in 1968 to officially change the holiday to President's Day, but it died in committee and so to this day the holiday that we refer to as President's Day is really just George Washington's Birthday.
Many mark the day by eating cherries. I can remember as a child, my grandmother giving me candied cherries to mark Washington's Birthday. The legend goes that a young, rebellious Washington chopped down a cherry tree, but later admitted to his father that he did it. He could not tell a lie, the story goes. Of course, the story itself is a lie. Washington's biographer Mason Weems made up the story for the book The Life of Washington. He created the myth as a way to show Washington's honesty.
Fifty years ago today one of the original Mercury seven Astronauts, John Glenn, became the first American to orbit the Earth. Glen trained for three years for his four hour, 55 minute, 23 second three orbit flight in Friendship 7 on February 20, 1962.
Lots of people are searching for King Cake recipes ahead of Fat Tuesday tomorrow, the last day of indulgence before Lent begins. The cake has origins in the Old World from the French and Spanish. It's decorated in the traditional colors of Mardi Gras - purple (justice), green (faith) and gold (power). A token, usually a plastic baby symbolizing the infant Jesus, is hidden inside the cake. The person who finds the baby is crowned king of the party, or wins a trip to the emergency room for eating it.
Happy birthday Rihanna! She turns 24, and she received a birthday wish tweet from Chris Brown, adding even more fuel to rumors that the couple is back together.
Kurt Cobain once said "We're so trendy, we can't even escape ourselves." Twenty years later, he is a trend on Twitter. Cobain, who inspired a generation and influenced the music industry, would have turned 45 years old today. His band Nirvana has sold over 25 million album in the U.S. and more than 50 million around the globe. Cobain, a musical genius, fans and critics will tell you, but he struggled with the glare of the spotlight and lifelong personal pressures during his rise to fame. His short life, that seemed to never recover from his parent's divorce, ended in suicide in 1994. Much has been written about his heroin addiction and rebellious behavior, but I always thought of Cobain as a guy with a big heart so broken that he could not figure out how to fix it. "If you die, you're completely happy and your soul somewhere lives on," he said. "I'm not afraid of dying. Total peace after death, becoming someone else is the best hope I've got."
Carlos Pena Jr., one of the members of Big Time Rush, has a music video gone viral on YouTube. He put together the video featuring some of his friends, including Justin Bieber, Selena Gomez and Ashley Tisdale.
This next video stinks, but it's gone viral anyway. A guy was rolling at sewage plant when a scum pot valve failed as someone was working on it. Yes, the scum goes everywhere. (Note: Foul language in addition to the foul smell.)
We may not have had much snow this winter, but they got a pile of it in Poland. So when one man went outside to snow blow the street, his neighbor was rolling and posted the video as a "fail." At first, I didn't realize why the snow blowing failed, but if you look closely you will figure it out. The poster says the guy kept going for an hour and a half, frustrated that the snow did not seem to be going away.
And finally, a video upload in December is suddenly viral. It shows a bird feeding a dog, beak to mouth.
That's the trend!
Have a great Monday, | <urn:uuid:d428c110-c4aa-4368-ac95-733ed48d818d> | CC-MAIN-2013-20 | http://wabc.typepad.com/thetrend/2012/02/presidents-day-john-glenn-and-rihanna-1.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705559639/warc/CC-MAIN-20130516115919-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.97857 | 970 | 2.640625 | 3 |
Jeni Klugman, director of the United Nations Development Programme’s Human Development Report Office, visited NYU Wagner on November 19, 2009, and spoke to an audience about this year’s Human Development Report, of which the theme is migration.
In her talk, Klugman presented the key message of the report: overall, migration creates aggregate benefits for receiving countries and migrants.
Broader dimensions of how people fair beyond income, including health and education, were also examined in the report, she noted. Though, on average, migrants experience a three to four-fold increase in income, they also usually gain in health and education indicators as well. Some surprising facts were that the number of migrants as a percentage of the world’s population is the same as it has been since 1960–roughly three percent. Furthermore, most migration actually occurs within borders rather than between countries. Contrary to popular though, migration from developing to developed countries actually accounts for only 30% of all world migration.
The report shows that the effects of migration at the destination tend to be positive. There are no aggregate job losses and destination countries capture about one-fifth of aggregate gains–approximately $190 Million (US$). The World Values Survey shows that attitudes toward migration are much more nuanced than news headlines read. People prefer permanent over temporary migrants. Despite this information and a positive reception of the report overall, both physical and paper entry barriers are still high and being tightened further. This is because the recent recession has cut the demand for migrant workers. However, ageing and shrinking populations in developed countries foreshadow an eventual return in demand for migrant workers.
The diagnostic of the report recommends simplification and expansion of regular migration channels–particularly for low-skilled workers–conditional on labor demand; the ensuring of basic rights for migrants; reduction of transaction costs; improvement of the conditions in destination countries–particularly in developing countries; enabling of benefits to be gained from internal migration; and the making of mobility integral to national development strategies. Wagner’s Professor Natasha Iskander, a researcher of migration herself, emphasized the report’s statements and conclusions as being very bold, particularly in the U.S. political context. She also expressed her happiness with the positive global reception of and response to the report. Klugman responded that this positive reception may be in part due to the consultation process used in writing the report, which included regional nuances and priorities, as well as the particular attention paid to political economy. Whatever the reason, many are hopeful that this positive sentiment will be translated into more migrant-friendly policies, particularly at the national level. | <urn:uuid:b81dc5c5-8cc4-4a3a-b049-af3c77a6f580> | CC-MAIN-2013-20 | http://wagner.nyu.edu/blog/the_uns_human_development_report/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705559639/warc/CC-MAIN-20130516115919-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.956004 | 533 | 2.8125 | 3 |
This exceptional system of limestone caves comprises collapsed dolines, some 6 km of underground passages with a total depth of more than 200 m, many waterfalls and one of the largest known underground chambers. The site, located in the Kras region (literally meaning Karst), is one of the most famous in the world for the study of karstic phenomena.
The Škocjan Caves lie in the north-east section of Kraski Landscape Park. The protected area extends over 200 ha and includes four deep and picturesque chasms, Sokolak in the south, Globocak in the west, Sapen dol and Lisicina in the north. They are components of the cave system and are alike floristically. The site also includes the Mahorcic cave which has several underground lakes and five cascades.
The system of subterranean passages, fashioned by the Reka River, constitutes a dramatic example of large-scale karst drainage. An underground system of passages runs from the Reka's source to Timavo on the Gulf of Trieste in Italy. In places the surfaces of the galleries at several levels have collapsed and give the appearance of deep chasms. The river enters the Škocjan grotto in an underground passage 350 m long, reappearing in the bottom of a 150 m deep and 300 m long chasm, before disappearing into a passage 2 km long. There are five galleries and a canal. A gallery of stalactites and stalagmites leads to the surface. In total there are 25 cascades along the river.
Archeological excavations have revealed that the site has been occupied for more than 10,000 years. Archaeological finds point to continuous settlement from the middle Stone Age to the Iron Age, when a fort was constructed where Škocjan stands today. The Romans erected another fortification in the same place, and during the Middle Ages a fortified rural settlement was established. Documentary references exist since the time of Posidinuis (135-50 BC). It has frequently been written about, with important descriptive works appearing in 1599 and 1689.
A mixture of habitats is represented corresponding to the floras of Central Europe, the Mediterranean, Submediterranean, Ilyrian and Alpine, all of which are present side by side in the Great Valley. The rare endemic Campanula justiniana grows here at its type locality.
The system of grottos is rich in speleofauna. The underground galleries hold five species of wintering bat in large numbers.
Ever since the first scientific studies were carried out in the 19th century, the grotto system has been considered important karst phenomena in Europe and all organizations responsible for it have maintained it intact. The caves were first explored by Svetina in 1839, who descended 100 m into the Reka. Speleological research began in 1851 (and continues to date), research on the water system in 1893 and in 1894 the famous speleologist Martel published the work Les abimes .
The total population of 400 is present in three villages (Škocjan pri Divaci, Matavan and Betanja) within this area. Source: UNESCO/CLT/WHC
1980. Inscribed on the World Heritage List in 1986. Source: Advisory Body Evaluation
Property inscribed only for geological values under natural criterion N (ii) before 1994. Criterion N (ii) was replaced with criterion N (i) [Operational Guidelines 2002]. For more details see Decision 30.COM 8D.1. | <urn:uuid:6436ccf7-29a9-498e-9f27-d07f2c09f55d> | CC-MAIN-2013-20 | http://whc.unesco.org/en/list/390/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705559639/warc/CC-MAIN-20130516115919-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.932994 | 738 | 3.40625 | 3 |
The Caucasus: A biodiversity hotspot
Europe/Middle-East > North Asia/Mongolia > Georgia (GE)
The Caucasus region spans across Armenia, Azerbaijan, Georgia, Russia, northeast Turkey and a small part of northwestern Iran. This is one of the world’s biologically richest yet most threatened areas.
In an effort to protect the region’s biodiversity from habitat loss and poaching, WWF and its partners set up the Critical Ecosystem Partnership Fund. The initiative focuses on conserving a number of endangered species, including the critically endangered Saiga antelope, Siberian crane and Baltic sturgeon in 5 priority areas: Greater Caucasus, Caspian, West Lesser Caucasus, East Lesser Caucasus and Hyrcanian.
Biodiversity hotspots are the focus of the Critical Ecosystem Partnership Fund (CEPF), a joint initiative of Conservation International, the Global Environment Facility, the Government of Japan, the MacArthur Foundation, the World Bank and WWF.
In 2003 WWF Caucasus coordinated preparation of the CEPF ecosystem profile, a strategic document directing CEPF's activities in the Caucasus. The profile defines universal conservation outcomes for the region and identifies conservation targets on species, site, and landscape corridor levels. It formulates CEPFs niche and recommends a 5-year investment strategy that will contribute to the conservation of biodiversity in this globally significant region in the future.
This funding strategy was developed based on stakeholder workshops and background reports. More than 130 experts representing a variety of scientific, government, and non-government organizations (NGO) in 6 countries participated in preparation of the document.
Alongside the CEPF Ecosystem Profile, WWF Caucasus is working on an Ecoregional Conservation Plan (ECP), a comprehensive strategy for action to conserve and restore the biodiversity of the Caucasus ecoregion over the span of several decades. The ECP is a guiding document for medium-term conservation (20 years). It is hoped governments, NGOs, and donor organizations will use this document to assist in planning and coordinating conservation activities in the Caucasus.
The ECP is based on a biodiversity vision elaborated by stakeholders from the region. The vision covers the next 50 years and sets long-term goals for conservation of the region's biodiversity, identifying priority conservation areas and strategies regardless of national borders.
Conserve 51 species at risk, including the critically endangered Saiga antelope, Siberian crane and Baltic (Atlantic) sturgeon.
The CEPF programme focus is based on the need to suppress proximate threats to biodiversity and their root causes in the Caucasus. Within the ecosystem profile, 5 target corridors of the 10 total corridors have been delineated to conserve globally threatened species and their major habitats.
Government institutions and civil society are active in conservation in the region, but often lack the capacity to implement environmental programmes. CEPF can build on their existing programmes to further biodiversity conservation, in particular, through increasing transboundary cooperation, strengthening existing protected areas systems, strengthening mechanisms for biodiversity conservation, promoting sustainable resource use and increasing awareness and commitment. | <urn:uuid:d931cb41-75fe-49cb-b3d3-ea4a0d778418> | CC-MAIN-2013-20 | http://wwf.panda.org/what_we_do/where_we_work/project/projects/index.cfm?uProjectID=GE0026&source=ge | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705559639/warc/CC-MAIN-20130516115919-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.867233 | 622 | 3.3125 | 3 |
Seismology is the scientific study of earthquakes and the propagation of elastic waves through the Earth or through other planet-like bodies. The field also includes studies of earthquake effects, such as tsunamis as well as diverse seismic sources such as volcanic, tectonic, oceanic,...
, a microseism
is defined as a faint earth tremor caused by natural phenomena. The term is most commonly used to refer to the dominant background seismic noise signal on Earth, which are mostly composed of Rayleigh waves and caused by water waves in the oceans and lakes. Thus a microseism is a small and long-continuing oscillation
Oscillation is the repetitive variation, typically in time, of some measure about a central value or between two or more different states. Familiar examples include a swinging pendulum and AC power. The term vibration is sometimes used more narrowly to mean a mechanical oscillation but sometimes...
of the ground.
Detection and characteristics
Microseisms are very well detected and measured by means of a broad-band seismograph, and can be recorded anywhere on Earth.
Dominant microseism signals from the oceans are linked to characteristic ocean swell periods, and thus occur between approximately 4 to 30 seconds. Microseismic noise usually displays two predominant peaks. The weaker is for the larger periods, typically close to 16 s, and can be explained by the effect of surface gravity waves in shallow water. These microseisms have the same period as the water waves that generate them, and are usually called 'primary microseisms'. The stronger peak, for shorter periods, is also due to surface gravity waves in water, but arises from the interaction of waves with nearly equal frequencies but nearly opposite directions. These tremors have a period which is half of the water wave period and are usually called 'secondary microseisms'. A slight, but detectable, incessant excitation of the Earth's free oscillations, or normal modes, with periods in the range 30 to 1000 s are also caused by water waves, and is often referred to as the "Earth hum". This hum is probably generated like the secondary microseisms but from the interaction of infragravity waves.
As a result, from the short period 'secondary microseisms' to the long period 'hum', this seismic noise contains information on the sea state
In oceanography, a sea state is the general condition of the free surface on a large body of water—with respect to wind waves and swell—at a certain location and moment. A sea state is characterized by statistics, including the wave height, period, and power spectrum. The sea state varies with...
s. It can be used to estimate ocean wave properties and their variation, on time scales of individual events (a few hours to a few days)
to their seasonal or multi-decadal evolution. Understanding these signals, however, requires a basic understanding of the microseisms generation processes
Generation of 'secondary' microseisms
The interaction of wave trains of different frequencies and directions generates wave groups.
For wave propagating almost in the same direction, this gives the usual sets of waves that travel at the group speed, which is slower than phase speed of water waves (see animation). For typical
ocean waves with a period around 10 seconds, this group speed in close to 10 m/s.
In the case of opposite propagation direction the groups travel at a much larger speed, which is
now 2 π(f1+f2)/(k1-k2) with k1 and k2 the wave numbers of the interacting water waves.
For wave trains with a very small difference in frequency (and thus wavenumbers), this pattern of wave groups may have the same velocity as seismic waves, between 1500 and 3000 m/s, and will excite acoustic-seismic modes that radiate away.
As far as seismic and acoustic waves are concerned, the motion of ocean waves is, to the leading order, equivalent to a pressure applied at the sea
surface. This pressure is nearly equal to the water density times the wave orbital velocity
Orbital velocity can refer to the following:* The orbital speed of a body in a gravitational field.* The velocity of particles due to wave motion, in particular in wind waves....
squared. Because of this square, it is not the amplitude of the individual wave trains that matter (red and black lines in the figures) but the amplitude of the sum, the wave groups (blue line in figures).
Real ocean waves are composed of an infinite number of wave trains and there is always some energy propagating in the opposite direction. Also, because the seismic waves are much faster than the water waves, the source of seismic noise is isotropic: the same amount of energy
is radiated in all directions. In practice, the source of seismic energy is strongest
when there are a significant amount of wave energy travelling in opposite directions. This occurs
when swell from one storm meets waves with the same period from another storm, or close
to the coast due coastal reflection.
Depending on the geological context, the noise recorded by a seismic station on land can be
representative of the sea state close to the station (within a few hundred kilometers, for example
in Central California), or a full ocean basin (for example in Hawaii). In order to understand the noise properties, it is thus necessary to understand the propagation of the seismic waves.
Form of Rayleigh waves modified by the ocean layer: free waves and forced waves
The waves that compose most of the secondary microseismic field are Rayleigh waves. Both water and solid Earth particles are displaced by the waves as they propagate, and the water layer
plays a very important role in defining the celerity, group speed and the transfer of energy
from the surface water waves to the Rayleigh waves. | <urn:uuid:eb4211a1-e78a-45d6-a65c-fe91f07dc169> | CC-MAIN-2013-20 | http://www.absoluteastronomy.com/topics/Microseism | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705559639/warc/CC-MAIN-20130516115919-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.938271 | 1,203 | 3.984375 | 4 |
Chile's economy is based on the export of minerals, which account for about half of the total value of exports. Copper is the nation's most valuable resource, and Chile is the world's largest producer. Agriculture is the main occupation of about 15% of the population; it accounts for about 6% of the national wealth, and produces less than half of the domestic needs. The Vale of Chile is the country's primary agricultural area; its vineyards are the basis of Chile's wine industry. Grapes, apples, pears, onions, wheat, corn, oats, peaches, garlic, asparagus, and beans are the chief crops. Livestock production includes beef and poultry. Sheep raising is the chief pastoral occupation, providing wool and meat for domestic use and for export. Fishing and lumbering are also important economic activities. Chile's industries largely process its raw materials and manufacture various consumer goods. The major products are copper and other minerals, processed food, fish meal, iron and steel, wood and wood products, transportation equipment, and textiles.
The dependence of the economy on copper prices and the production of an adequate food supply are two of Chile's major economic problems. Chile's main imports are petroleum and petroleum products, chemicals, electrical and telecommunications equipment, industrial machinery, vehicles, and natural gas. In addition to minerals, it also exports fruit, fish and fish products, paper and pulp, chemicals, and wine. The chief trading partners are the United States, China, Brazil, Argentina, and South Korea.
The Columbia Electronic Encyclopedia, 6th ed. Copyright © 2012, Columbia University Press. All rights reserved.
More on Chile Economy from Fact Monster:
See more Encyclopedia articles on: South American Political Geography | <urn:uuid:03be5b40-607e-4a35-b8d5-ba0203a6388c> | CC-MAIN-2013-20 | http://www.factmonster.com/encyclopedia/world/chile-economy.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705559639/warc/CC-MAIN-20130516115919-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.936156 | 354 | 3.4375 | 3 |
In 1997, Kentucky undertook the first serious effort to document 158 Rosenwald Schools and buildings constructed in Kentucky between 1917 and 1932. The construction of Kentucky Rosenwald Schools began eleven years after Booker T. Washington initiated the school building program in Alabama in 1911, becoming the third southern state to initiate a Rosenwald School building program. Rosenwald Schools remained in operation in Kentucky until school desegregation which was finalized in Kentucky in 1971.
Julius Rosenwald (1862-1932)
- Father operated the first successful “C.O.D” one-price clothier store in U.S.
- Rosenwald opened his own clothing store in Chicago in 1884
- Life long tradition: donated one-third of salary to savings, one-third to charity, one-third for personal use.
- Philanthropist for Jewish and African American causes.
- Funding source for Carter G. Woodson Journal of Negro History n n
- 1912-1932 Member and President, Board of Trustees, Tuskegee Institute
- First prominent businessman in America to hire African Americans to work at the same pay alongside white workers
- Manager of Sears and Roebuck 1897, president in 1909, fifteen years after opening his first clothing store
- Developed Sears famous mail-order catalog, popularized rural free delivery.
Booker T. Washington and Julius Rosenwald
- Rosenwald labeled a “Negro” by white southern business owners.
- 1870 African American illiteracy 79.9 percent
- Circa 1904, Booker T. Washington develops plan for rural schools funded by African Americans and seeks northern philanthropic aid
- 1904 Washington builds three model rural schools in Alabama with northern financial aid
- 1904 to1909 Tuskegee Institute builds forty- six additional rural schools in Alabama
- 1909 northern philanthropic aid is discontinued to Washington and Tuskegee
- 1909 Founder of the Urban League and President of Tuskegee’s Board of Directors, William Baldwin, introduces Rosenwald to Booker T. Washington in Chicago
- 1912 Washington and Rosenwald develop plans to build new schools throughout the South designed by the Extension Department of Tuskegee Institute until Washington’s death in 1915
- 1915-1932 Rosenwald and Tuskegee join to build 4,977 schools, 217 teacher’s homes, 163 shops in fifteen southern states expending a total of $28,408,520 in building funds
The Rosenwald Fund Incorporated
- Chicago October 30, 1917 for the “well-being of mankind”
- 1917-1928 fund operated under the personal control of Julius Rosenwald
- 1920 Nashville, TN Fund Office opened
- 1928 the Fund reorganized from private to corporate philanthropy, Edwin Embree President
- The Fund required to expend its interest and principle within 25 years of Rosenwald’s death.
- The Fund discontinued building Rosenwald Schools in 1932, the year of Rosenwald’s death.
Officers – Rosenwald Fund
- Edwin Embree, President, Chicago
- Fred G. Wale, Director Rural Education
- Ethel Scott, Secretary
- William Rosenwald, Treasurer
Kentucky Negro Education Association (K.N.E.A.)
- 1874 Legislative Act established the “Colored Common Schools,” the┬áfirst continuous system of public schools for black education in Kentucky
- 1877- 1946 K.N.E.A. – formed following the August 22, 1870 “Georgia Model” in Danville, KY
- First Presidents W. J. Simmons, John H. Jackson, Lexington,
- First Secretary C. C. Vaughn D Russellville
- KY KNEA the longest operating black education system in the South.
Goals of K.N.E.A.
- Establish a state normal school for blacks May 6, 1886
- Train teachers
- Push for single per-capita distribution of public school tax dollars n
- Promoter of Rosenwald School building program Kentucky Rosenwald Schools
Kentucky Rosenwald Schools
- The Fund builds 142 schools, two teacher’s cottages (Webster and Breckinridge Counties), 8 training schools, and 3 shops from 1917 to 1932 in Kentucky.
- Last Rosenwald Schools in KY 1932 Fayette, Henderson and Hickman Counties
- Concord 1926, two-teacher facility, Rosenwald photo maintained, total $5,300
- Pleasant Green 1927, one-teacher facility, Rosenwald photo, total cost of construction $3,000
- Berea Consolidated 1927
- Richmond Shop 1929, five-teacher facility, total cost of construction $24,000, maintained a Rosenwald photo, insured for $56,000
Madison County Contributions – 1926-1930
- Blacks: $2,400
- Whites: $800
- Taxation: $38,850
- Rosenwald Fund: $3,200
Berea Consolidated School
Middleton School, Gallatin County
- Constructed in 1923
- One-teacher facility
- Total cost of construction: $1,600
- Black Contribution: $450
- White Contribution: $0
- Taxation: $750
- Rosenwald: $400
- View photos of Middleton School
Kentucky Rosenwald Schools by Year
- 1917 – 25 schools
- 1921 – 19 schools
- 1922 – 9 schools
- 1923 – 16 schools
- 1924 – 7 schools
- 1925 – 6 schools
- 1926 – 11 schools
- 1927 – 3 schools
- 1928 – 10 schools
- 1930 – 11 schools
- 1931-1932 – 3 schools
Click here to let us know about a Rosenwald School in your area | <urn:uuid:3e605f89-5705-4f3c-95a5-0a5c1ced9d5a> | CC-MAIN-2013-20 | http://www.georgetowncollege.edu/ugrri/research-and-resources/rosenwald-schools-in-kentucky-1917-to-1932/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705559639/warc/CC-MAIN-20130516115919-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.889394 | 1,200 | 3.21875 | 3 |
Broken or knocked out tooth
The medical term for a knocked out tooth is "avulsed."
Teeth - broken; Tooth - knocked out
A permanent tooth that is knocked out can sometimes be reimplanted. In most cases, only permanent, adult teeth are reimplanted into the mouth.
Baby teeth are usually left out.
Tooth accidents are commonly caused by:
- Accidental falls
- Sports-related trauma
- Car accidents
- Biting on hard food
Save any tooth that has been knocked out. Bring it to your dentist as soon as possible. The longer you wait, the less chance there is your dentist to fix it. Hold the tooth only by the crown (chewing edge).
You can take the tooth to the dentist by following one of these tips:
- Try to place the tooth back in the mouth where it fell out, so it is level with other teeth. Bite down gently on gauze or a wet tea bag to help keep it in place. Be careful not to swallow the tooth.
- If the above step cannot be done, place the tooth in a container and cover with a small amount of whole milk or saliva.
- The tooth can also be carried between lower lip and lower gum or under the tongue.
- A tooth-saving storage device (Save-a-Tooth, EMT Tooth Saver) may be available at your dentist's office. Such a kit contains a travel case and fluid solution. Consider buying one for your home first aid kit.
Also follow these steps:
- Apply a cold compress to the mouth and gums for pain.
- Apply direct pressure using gauze to control bleeding.
- Seek your dentist right away.
If your tooth is badly broken, your nerve endings may be exposed. You will need immediate dental help to avoid infection and pain.
You may not need an emergency visit for a simple chip or broken tooth. You should still have it fixed to avoid sharp edges that can cut the lips or tongue.
- Do NOT handle the roots of the tooth. Handle only the chewing edge -- the crown portion of the tooth.
- Do NOT scrape the root of the tooth to remove dirt.
- Do NOT brush or clean the tooth with alcohol or peroxide.
When to Contact a Medical Professional
Immediately contact your dentist when a tooth is broken or knocked out. If you can find the tooth, bring it with you to your appointment.
If you cannot close your upper and lower teeth together, your jaw may be broken. This requires immediate medical help at a dentist or hospital.
- Wear a mouth guard when playing any contact sport.
- Avoid fights.
- Avoid hard foods, such as bones, stale bread, and tough bagels.
- Always wear a seatbelt.
Roberts JR, Hedges JR, eds. Clinical Procedures in Emergency Medicine. 4th ed. Philadelphia, Pa: Saunders; 2004.
Marx JA, Hockberger RS, Walls RM, eds. Rosen’s Emergency Medicine: Concepts and Clinical Practice. 5th ed. St. Louis, Mo: Mosby; 2002.
Paul Fotek, DMD, Florida Institute for Periodontics & Dental lmplants, West Palm Beach, FL. Review provided by VeriMed Healthcare Network. Also reviewed by David Zieve, M.D., MHA, Medical Director, A.D.A.M. Health Solutions, Ebix, Inc.
The information provided herein should not be used during any medical emergency or for the diagnosis or treatment of any medical condition. A licensed medical professional should be consulted for diagnosis and treatment of any and all medical conditions. Call 911 for all medical emergencies. Links to other sites are provided for information only -- they do not constitute endorsements of those other sites. © 1997-
A.D.A.M., Inc. Any duplication or distribution of the information contained herein is strictly prohibited. | <urn:uuid:6fb6ba6d-81a8-456c-9902-71f0758b444b> | CC-MAIN-2013-20 | http://www.glendaleadventist.com/body.cfm?id=6&action=detail&AEProductID=Adam2004_105&AEArticleID=000058&AEArticleType=Injury | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705559639/warc/CC-MAIN-20130516115919-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.895417 | 817 | 3.40625 | 3 |
The General Workers' Union (GWU) was officially founded on 5 October 1943. It is the largest trade union in Malta and its foundation date is celebrated until today as Union Day. The GWU's strength lies in its diverse membership coming from all the sectors of the Maltese economy. It organises in its folds more than 54 per cent of the organised labour force levelling 35 per cent of the gainfully occupied. This makes the GWU the powerful force it is today in the domestic industrial relations arena.
The GWU was born during the devastation of World War II at a time when Malta was a colony in the centre of the Mediterranean sea. For its goe-strategic position Malta served a useful military base for the British naval and airforce thus earning itself the title of 'island-fortress'.
The Second World War, naturally brought a relatively high level of employment mainly in the ship repair sector and other acillary sectors directly linked to the needs of the western military powers in the Mediterranean region.
This reality conditioned the Maltese workers to prosper in times of war and get poorer in times of peace. Such an odd and contrasting reality led the majority of the maltese workers to mobilize and to form a strong trade union to protect their jobs, improve their working and living conditions and to struggle for social justice.
Originally, the GWU found its roots towards the end of 1942 amongst the workers of the then British Admiralty Dockyard. Reggie Miller, a civilian clerks in the Drydocks, successfully convinced a small group of workers to set up a strong general union that would in the future leave its mark on the country’s recent history.
Reggie Miller's impact on them was immediate. Then after, Miller led the march towards the setting up of the GWU, thus making him the GWU's founding father. The first public meeting was held in March 1943 where a huge mass of workers presented themselves. From then on, an interim committee was appointed with the responsibility of drafting the Union's constitution (the Statute). Subsequently the draft constitution was read and elucidated to the workers in another mass activity held a few days later
At the same meeting Reggie Miller enthusiastically accepted the workers call to serve as the Union's first General Secretary. Upon establishing itself the newly GWU appointed leaders embarked on intensive campaign for membership. Therefore many more public meetings and conferences were organized around the Island. Naturally, similar activities were held also at various places of work fearing the hostility and antagonism of the employers. The first GWU members were initially enrolled on 1 July, 1943.
While still in an embryonic stage, on the 6 July 1943, the GWU combined its efforts with other organizations - mostly small groupings created for benevolent purposes - to submit to the British Government a memorandum encapsulating a number of long-standing demands, including a claim for an adequate rise in the workers’ wages and salaries.
The first unofficial strike took place on 24 August 1943, due to the stubborness of the Drydocks authorities to give in to the workers demands. In late September a wage increase was announced, however, short of the original demands the offer was immediately rejected by the workers' and their representatives. that was consequently followed by another strike action on 28 September of the same year.
The days following were characterised by the laying down of tools also by many other workers from the several British Defense establishments, in solidarity with their follow workers. The few existing unions, at that point in time abandoned their solidarity with the striking workers fearing the retaliation of the British military authorities on the Island, thus leave the GWU to carry the alone the brunt of the struggle till the end of the dispute.
At that time, when Britain was fiercly engaged at war with Nazi Germany and Fascist Italy, it was very obvious for the British to diplomatically and subtly control what comes out of the press, particularly those published in the English language. During that industrial relations instability, Miller and his colleagues were labelled as saboteurs and accused of agitating the workers for violence by their behaviour. However, such accusations proved futile and thus, on Tuesday 5 October 1943, the GWU was formally and officially baptised.
Since its inception in the war years the strove hard to improve and guarantee the working condition of the Maltese. For several decades through, the GWU not only to encouraged trade unionism in Malta, but also to fulfilled its responsibility for leading workers into the best future and quality of life. On the workers part, their unity within the folds of the GWU led to achieved a remarkable economic and social progress in all areas of employment and their socio-economic well-being. | <urn:uuid:2e48b0c2-b0d2-4e9e-b95c-08e361347ef5> | CC-MAIN-2013-20 | http://www.gwu.org.mt/pages/gwu_origins.aspx | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705559639/warc/CC-MAIN-20130516115919-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.978367 | 953 | 2.859375 | 3 |
Indian Ocean, third largest ocean, c.28,350,000 sq mi (73,427,000 sq km), extending from S Asia to Antarctica and from E Africa to SE Australia; it is c.4,000 mi (6,400 km) wide at the equator. It constitutes about 20% of the world's total ocean area. The Indian Ocean is connected with the Pacific Ocean by passages through the Malay Archipelago and between Australia and Antarctica; and with the Atlantic Ocean by the expanse between Africa and Antarctica and by the Suez Canal. Its chief arms are the Arabian Sea (with the Red Sea, the Gulf of Aden, and the Persian Gulf), the Bay of Bengal, and the Andaman Sea. The continental shelf of the Indian Ocean is narrow. Madagascar and Sri Lanka, the largest islands in the ocean, are structurally parts of the continents as are Socotra, the Andaman Islands, and the Nicobar Islands; the Seychelles and the Kerguelen Islands are exposed tops of submerged ridges. The Laccadives, the Maldives, and the Chagos are low coral islands, and Mauritius and Réunion are high volcanic cones. The floor of the Indian Ocean has an average depth of c.11,000 ft (3,400 m). The Mid-Oceanic Ridge, a broad submarine mountain range extending from Asia to Antarctica, divides the Indian Ocean into three major sections—the African, Antardis, and Australasian. The ridge rises to an average height of c.10,000 ft (3,000 m), and a few peaks emerge as islands. A large rift, an extension of the eastern branch of the Great Rift Valley that runs through the Gulf of Aden, extends along most of its length (see seafloor spreading). The Mid-Oceanic Ridge, along with other submarine ridges, encloses a series of deep-sea basins (abyssal plains). The greatest depth (25,344 ft/7,725 m) is in the Java Trench, S of Java, Indonesia. The Indian Ocean receives the waters of the Zambezi, Tigris-Euphrates, Indus, Ganges-Brahmaputra, and Irrawady rivers. The surface waters of the ocean are generally warm, although close to Antarctica pack ice and icebergs are found. The Indian Ocean has two water circulation systems—a regular counterclockwise southern system (South Equatorial Current, Mozambique Current, West Wind Drift, West Australian Current) and a northern system, the Monsoon Drift, whose currents are directly related to the seasonal shift of monsoon winds. The southwest monsoon draws moisture from the Indian Ocean and drops heavy rainfall on the Indian subcontinent and Southeast Asia.
The Columbia Electronic Encyclopedia, 6th ed. Copyright © 2012, Columbia University Press. All rights reserved.
More on Indian Ocean from Infoplease:
See more Encyclopedia articles on: Oceans and Continents | <urn:uuid:f1d438a8-f40d-4646-add4-d14a05a22020> | CC-MAIN-2013-20 | http://www.infoplease.com/encyclopedia/world/indian-ocean.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705559639/warc/CC-MAIN-20130516115919-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.897953 | 614 | 3.625 | 4 |
| ||Minding Your Mind || |
When Striving for Perfection Is a Problem
Last Reviewed by Faculty of Harvard Medical School on May 4, 2012
By Howard LeWine, M.D.
Harvard Medical School
Some people can't live with the slightest imperfection. Their need to appear or be perfect perfectionism is so intense that it's exhausting if not painful.
But striving for perfection, while accepting that perfection rarely can be achieved, can lead to growth and development and a feeling of satisfaction. It can be a powerful motivator as long as it is based on reasonable standards and expectation. For example, the desire to have a perfect golf swing or tennis stroke can enhance the pleasure you take in these pursuits, whether you are an amateur or professional.
Perfectionism is unproductive, however, when it is linked to excessively high standards and is driven by a fear of failure.
Back to top
Types of Perfectionism
Perfectionism comes in many forms:
- Obsessive concern over mistakes
- Setting excessively high personal standards
- Perceiving parents as overly critical
- Unreasonable doubts about ability to perform tasks
- An over-emphasis on organization
- Trying to live up to high expectations you're convinced other people, such as parents, have of you
- Having high expectations of other people
But whatever form it takes, perfectionism can rob you of life's pleasures.
Back to top
The Roots of Perfectionism
It may not be so easy to figure out where perfectionism comes from. For some, it is a part of their inborn temperament like perfect skin and teeth. Researchers have linked perfectionism to anxiety, depression and eating disorders. The trait of perfectionism is common among people with obsessive-compulsive disorders. Or it could be a response to having parents who expected too much from you. Maybe they never let you off the hook, even if you got 98 out of 100 on an exam.
Back to top
The Role of Indirect Aggression
What goes on outside the home is also a big factor in the development of perfectionism. For some women, perfectionism is a way to cope with indirect aggression, a term for the socially manipulative behaviors of the stereotypical "mean girls" that they may have experienced.
A recent study published in the journal Aggressive Behavior supports the idea that perfectionism may develop in a social group and suggests that indirect aggression triggers it. The "aggressor" talks behind a person's back, gives someone the "silent treatment," tells secrets, or is nice in private but rejecting in public to hide her hostility toward another.
Girls and women tend to resort to this kind of social bullying because they are not encouraged or taught how to express aggressive or competitive feelings directly. They become aggressive in ways that can be easily concealed or denied.
For the study, researchers at McMaster University asked two groups of college-age women to fill out surveys about what types of verbal abuse, physical abuse and indirect aggression they had experienced in grades 3 through 12. They also asked the women to answer questions to gauge whether they were perfectionists.
The women who recalled experiencing indirect aggression in childhood were more likely to become perfectionists by the time they reached college. Verbal and physical abuse apparently was not linked to perfectionism.
The authors acknowledge that the study asked subjects to report on old experiences and that women who are perfectionistic might be more likely to recall past events in a negative way, no matter how they were treated in reality.
Even so, the authors say that a victim of indirect aggression may without knowing it come to feel that being "perfect" is the only way to assert herself in social situations or maintain control. Thus, perfectionism becomes a way to cope with a threatening environment.
Back to top
Making Perfectionism Work for You
There is a fine line between the positive aspects of striving to be perfect and perfectionism that can be detrimental. Striving to be perfect can be very positive as long as it:
- Is realistic
- Moves you forward
- Helps you feel stronger
- Gives you the satisfaction you deserve after all that hard work.
Perfectionism becomes a problem when it makes you feel worse instead of better, or when your inability to be satisfied unless you are perfect realizing that it will always be out of reach causes suffering.
You can make perfectionism work for you. Here's how:
- Look at and change unrealistic and self-destructive thought patterns with cognitive behavior therapy.
- Understand how you became perfectionistic and ease up on unwarranted self-criticism. Psychodynamic therapy can help you do this.
- If you do have one of the underlying disorders linked to perfectionism (obsessive-compulsive disorder, anxiety or depression), then a medication or psychotherapy may help by targeting the pressure coming from that source.
Consult a mental health professional as a first step. The goal is to let go of the excessively high standards and find ways to cope with fears of failure. At the same time, you want to hold on to the positive force of striving for perfection.
Back to top
Howard LeWine, M.D. is chief editor of Internet Publishing, Harvard Health Publications. He is a clinical instructor of medicine at Harvard Medical School and Brigham and Women's Hospital. Dr. LeWine has been a primary care internist and teacher of internal medicine since 1978. | <urn:uuid:34e5084b-7059-464f-b37f-a87caeccd8a1> | CC-MAIN-2013-20 | http://www.intelihealth.com/IH/ihtIH/EMIHC267/35320/63153/724345.html?d=dmtHMSContent | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705559639/warc/CC-MAIN-20130516115919-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.955684 | 1,116 | 2.828125 | 3 |
Suma Root and Powder Profile
Also known as
Pfaffia paniculata (and glomerata)
Suma is an indigenous plant to South America, most notably Brazil, Ecuador, Peru and Venezuela. Traditionally it has been used as a food product for many forest foragers and was occasionally administered for a variety of ailments, hence its nickname "para tudo," meaning "for all." Because of its rather Vanilla like flavor this botanical can be easily consumed for those with palatable sensitivities.
Rich in Amino Acids, electrolytes, trace minerals, pfaffic acid, Germanium, Sitosterol, Stigmasterol, Beta-ecdysone, and Saponins.
Western herbal medicine uses the dried root in whole, cut or powdered form. Fresh root seems to be fairly "tannic" for palatable consumption.
Tea decoction from the root, powdered root sprinkled on food or in beverages, as a liquid herbal extract, and capsules (non-standardized) from powdered root.
Not much research has been carried out for this particular botanical and to date there have not been any released notes on possible medicinal contraindications, side effects or potential health hazards.
This information is not intended to diagnose, treat, cure, or prevent any disease. | <urn:uuid:d5bfa8d4-a6bc-40d4-ad12-408febab2fad> | CC-MAIN-2013-20 | http://www.mountainroseherbs.com/learn/suma.php | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705559639/warc/CC-MAIN-20130516115919-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.923088 | 273 | 2.796875 | 3 |
The following HTML text is provided to enhance online
readability. Many aspects of typography translate only awkwardly to HTML.
Please use the page image
as the authoritative form to ensure accuracy.
Oil in the Sea III: Inputs, Fates, and Effects
waters contain elevated concentrations of radionuclides, metals, volatile organic aromatic compounds, monoaromatic hydrocarbons, light alkanes, higher molecular weight aromatic hydrocarbons, ketones, phenols, and organic acids. The environmental effects that may result from oil and gas production in a field depend greatly on the characteristics of the receiving environment. For example, there was a decreased abundance of fouling organisms, particularly barnacles, from the surface to a depth of about 3 m on a platform leg immediately below the produced water discharge located 1 m above the water surface (Howard et al., 1980). Produced water discharges, however, are usually dispersed to some degree. If discharged into the ocean, the produced water dilutes rapidly so that no impacts are ascribed to salinity. In more confined estuarine waters, produced water discharges form dense, saline plumes that move along the bottom sediments, but the resulting elevated water column and interstitial sediment salinity levels are within the range of tolerance of euryhaline estuarine organisms. In shallow, more confined areas with high suspended sediment loads or fine-grained sediments, medium molecular weight hydrocarbons and metals can absorb to particles and be deposited. Measurable effects are most likely in shallow waters, areas of restricted flow and dispersion, water with a high concentration of suspended particulates, and areas of fine-grained anaerobic sediments.
Effects of Production Discharges in Estuarine Waters
U.S. regulations now prohibit most discharges of produced waters from platforms to state waters of Texas and Louisiana, although the phase-out is not yet complete and some exceptions are provided, for example the highly dispersive distributaries of the Mississippi and Atchafalaya Rivers. The discharge of treated produced water from several offshore platforms at shore-based facilities is still permitted in Upper Cook Inlet, Alaska. The discharge of produced waters into estuaries and shallow coastal waters continues globally in developing fields (e.g., Nigeria, Angola, China, Thailand), and the effects of produced water discharges may still linger where the practice has been discontinued (Rabalais et al., 1998).
The effects of produced water discharges in estuaries have been studied extensively in Texas and Louisiana. For example Mackin (1971) surveyed estuarine benthic communities in eight Texas bays receiving produced water effluents. He reported no effects in two bays, minor localized effects in several other bays, and a zone of severely depressed fauna up to 106 m from submarine outfalls in Trinity Bay, Texas and a zone of enhanced faunal abundance and diversity down-current from there. Mackin (1971), however, conducted no chemical analyses. Armstrong et al. (1979) repeated these studies in Trinity Bay to correlate the benthic community effects with the distribution of hydrocarbons in sediments. In shallow waters of 2-3 m, they demonstrated the impacts of high concentrations of hydrocarbons, in this case sediment naphthalene concentrations of 4 to 8 ppm up to 1200 m from the platform, with corresponding severely depressed benthic fauna.
It was not until the mid to late 1980s that more extensive, systematic studies of the effects of produced water discharges in estuarine waters were conducted. While most surface water disposal was terminated on January 1, 2000, except within the distributary channels of Louisiana’s major rivers (the Mississippi and Atchafalaya), it is prudent to review the results of these studies for several reasons. First, this disposal method was practiced in coastal Louisiana and Texas and at one time accounted for 2,500,000 bbl/d of discharges into estuarine waters with the potential in some areas for long-term accumulation of contaminants and subsequent reintroduction to the environment (Boesch and Rabalais, 1989b; Rabalais et al., 1991a,b; Rabalais et al., 1998). Second, accidents associated with current disposal methods (pipelines and barges) will have similar results. Third, surface water disposal in estuarine waters still occurs elsewhere in the world.
Boesch and Rabalais (1989a), Neff et al. (1989), St. Pé (1990), Rabalais et al. (1991a,b), Steimle & Associates, Inc. (1991), Mulino et al. (1996) studied the effects of produced water discharges in estuarine waters of Louisiana. Where suitable measurements were made, the eventual fate of the dispersed produced water and the effects on benthic infauna could be explained by the volume of the discharge, the concentration of the various constituents, and the sedimentary regime, physical structure, and hydrology of the receiving environment (Boesch and Rabalais, 1989; Rabalais et al., 1991a). Dilution of water-soluble contaminants was influenced primarily by the volume of the receiving waters, the current velocity, and the potential for resuspension of sediments. Dispersion of sediment-adsorbed contaminants was influenced by the bed shear stress, sedimentation rates, and the grain size distribution of the surface sediments. The dilution potential of the environment was high for erosional environments with high current speeds and low for depositional environments, with intermediate potential for environments with periodic resuspension (storm-related) and deposition. There were no documented effects on the benthic community due to elevated salinities, because the overlying water and sediment interstitial salinities were within the range of the euryhaline organisms found in these habitats. Volatile hydrocarbons in the water column density plume that disperses across the sediment bed varied from nil to as high as 130 mg/L; alkylated PAH in bottom sediments reached concentrations from 2 to 40 ppm with one value of 100 ppm (Rabalais et al., 1991a,b). The potential for accumulation to depth in depositional environments exists (some sediments contained 30 ppm alkylated PAH at 35 cm depth) (Rabalais et al., 1991a). Produced water source contaminants persisted in surface sediments for two years after cessation of the effluent, as did benthic community effects, and persisted for as | <urn:uuid:d4167ebf-ae7e-4706-9da9-ee7011321b52> | CC-MAIN-2013-20 | http://www.nap.edu/openbook.php?record_id=10388&page=151 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705559639/warc/CC-MAIN-20130516115919-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.925103 | 1,350 | 2.828125 | 3 |
Here's a look at the life of Anthony Kennedy, Associate Justice of the Supreme Court of the United States.
Personal: Birth date: July 23, 1936
Birth place: Sacramento, California
Birth name: Anthony McLeod Kennedy
Father: Anthony J. Kennedy, lawyer and lobbyist
Mother: Gladys (McLeod) Kennedy, civic leader
Marriage: Mary (Davis) Kennedy (1963 - present)
Children: Justin, Gregory, Kristin
Education: London School of Economics, 1957-1958; Stanford University B.A. Political Science, 1954-1958; Harvard Law School LL.B., 1961
Military Service: California Army National Guard, PFC 1961
Religion: Roman Catholic
Other Facts: He is a member of Phi Beta Kappa.
While a Sacramento lawyer in private practice he was also a lobbyist.
His nomination to the Ninth Circuit Court of Appeals by President Gerald Ford was a result of his being recommended by California's then governor, Ronald Reagan.
He is known for his reverence for legal precedent, for creating unlikely coalitions among the justices, and for being a strong advocate of free speech.
Kennedy teaches at the University of Salzburg in Austria during the court's summer recess. The class is offered as part of the University of the Pacific's McGeorge School of Law's summer program.
Timeline: 1962 - Kennedy is admitted to the California Bar.
1961-1963 - Practices law at the firm of Thelen, Marrin, John & Bridges in San Francisco.
1963 - After his father's sudden death, Kennedy takes over his law practice in Sacramento.
1965-1988 - Professor of Constitutional Law at the University of the Pacific's McGeorge School of Law. | <urn:uuid:70357b59-e338-4142-a885-25f68722d585> | CC-MAIN-2013-20 | http://www.news4jax.com/news/Anthony-Kennedy-Fast-Facts/-/475880/19037940/-/yqqjaf/-/index.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705559639/warc/CC-MAIN-20130516115919-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.94061 | 356 | 2.6875 | 3 |
Criminal Law Glossary
Arraignment — A proceeding during which a judge informs the accused of the criminal charges against him or her, asks the accused whether he or she has an attorney or wants a court-appointed attorney, asks how the accused will plead to the charges, determines whether to modify the initial amount of bail and sets a schedule for future court dates.
Bail — An amount of money that the accused must post so that he or she can get out of jail. If the accused shows up for future court dates, the bail money is returned. If, however, the accused doesn’t show up or flees, the court will keep the money and issue an arrest warrant.
Felony — Generally, a crime that is punishable by imprisonment of more than one year.
Grand Jury — The grand jury decides whether there is sufficient evidence to indict a suspect and continue the criminal proceedings against him or her. The grand jury does not decide guilt or innocence.
Indictment — The formal process of charging a person with a crime.
Misdemeanor — Generally, a crime for which the maximum possible punishment is incarceration for one year or less.
Miranda Rights — Refers to a suspect’s constitutional right to an attorney and right against self-incrimination. The name comes from the Supreme Court case of Miranda v. Arizona (1966). Police must inform suspects of these rights upon arrest or when they detain a suspect. If the police fail to do so, any information obtained from an investigation is inadmissible in court.
Parole — The supervised release of a prisoner from incarceration into the community before the end of his or her sentence.
Plea Bargain — A negotiated agreement between a criminal defendant and a prosecutor that resolves the criminal matter. The prosecutor may agree to reduce a charge, drop one of several charges or recommend a more lenient sentence in exchange for the defendant’s guilty plea, often to a lesser offense.
Probable Cause — Information enough so that there is a reasonable belief that a crime has been committed. Police must have probable cause before arresting a suspect or performing a search. This is also the standard for obtaining a warrant.
Probation — A type of criminal punishment that allows a person to stay in the community (instead of going to jail) as long as he or she complies with certain conditions, such as regularly reporting to a probation officer, refraining from alcohol and drugs and not committing further crimes.
Prosecutor — The attorney who represents the federal, state or local government in a case against a criminal defendant. Also known as district attorney, county attorney, city attorney, United States attorney or state attorney.
Sentence — The punishment for a criminal conviction. The severity of the sentence generally depends on the nature of the crime for which a person is convicted. Sentences include: fines, community service, restitution, alcohol or drug rehab, probation, suspended sentence (only will be implemented if the individual fails to adhere to certain conditions) and incarceration.
Warrant — An order directing or allowing some action to be taken. Generally, a warrant is a document signed by a judge that allows the police to arrest a suspect; search a home, business or other location or seize property.
DISCLAIMER: This site and any information contained herein are intended for informational purposes only and should not be construed as legal advice. Seek competent legal counsel for advice on any legal matter.
Call 602-957-3300 or contact me online for an initial consultation to discuss your criminal law matter. | <urn:uuid:6f27e8f9-1c3d-4d06-97a5-aa2f5b7ecdb3> | CC-MAIN-2013-20 | http://www.notacriminal.com/resources/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705559639/warc/CC-MAIN-20130516115919-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.937787 | 728 | 3 | 3 |
Native tribes used to catch monkeys by hollowing out a coconut and filling it with rice or other delicacies, then leaving it tethered to a tree for a monkey to find. A monkey would reach in and grab the desired delicacy and be trapped because the hole had been deliberately made just big enough for a flexible hand to enter but not for a closed fist to leave. In short order, the monkey went from getting his dinner to being someone else’s dinner.
Clearly it was not the coconut that was the trapping the monkey. Rather the true trap was in the monkey’s own mind, the monkey’s greed, the monkey’s attachment to his physical possessions, the monkey’s unwillingness to “Let Go.”
From that perspective, how are we trapping ourselves? Where are we creating our own boxes? Our own predicaments? Where would an outside perspective, one free of our emotional attachments, one unencumbered by our cultural norms, see a way out that we do not let ourselves see?
How could we see the world differently?
Monkey’s Fist is also a name for a sailor’s knot, frequently tied with a weight on the end and used as a throwing line or, one hopes only in days past, as a melee weapon. Here is an interesting link from a hobo site giving even more back story: (http://worldpath.net/~minstrel/hoboart.htm) .
In the days of piracy, when there was only wind power, sailors had to somehow get the ships together in times of distress. This is almost impossible on the high seas. Someone got the idea to throw a rope to the other ship to pull them together. This didn’t work. Then it was decided to tie a rope around a cannonball and sling it to the other ship. The problem was that they needed a knot that would stay secure on a round object, so this “Monkey’s Fist” knot was devised. It is the only knot that will stay secure on a round object.
The knot became known as a “Monkey’s Fist” because, as with a monkey, it won’t let loose of an object. Since this knot has long leads, it can be thrown to another ship and became known as a life line. It was used to rescue people when ships were in distress.
The “Monkey’s Fist” knot has been adopted by the hobo community as a symbol of sorority and fraternity, a life line between hoboes. | <urn:uuid:c91f66cc-721e-4937-b6b6-251ddfc591be> | CC-MAIN-2013-20 | http://www.nscblog.com/personal-growth/the-monkeys-fist-an-ancient-parable-for-modern-times/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705559639/warc/CC-MAIN-20130516115919-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.978381 | 538 | 3.1875 | 3 |
Emerging Nutrient Crisis Causing Massive New Breakdowns in the Great Lakes
NWF to testify today before U.S. Senate Subcommittee on new report as part of federal examination of nation-wide nutrient pollution epidemic
The National Wildlife Federation today released a report documenting new and massive ecosystem breakdowns in the Great Lakes caused by interactions between excessive fertilizer run-off from farms and invasive zebra and quagga mussels. The report comes on the same day that NWF is testifying before the U.S. Senate Environment for Public Works Subcommittee on Water and Wildlife on the report findings.
The report, “Feast and Famine in the Great Lakes: How Nutrients and Invasive Species Interact to Overwhelm the Coasts and Starve Offshore Waters (pdf),” details the links between enormous algal blooms in Lake Erie that threaten the health of people and wildlife and a 95 percent decline in fish biomass in Lake Huron.
“Too much food is causing massive algal blooms in Lake Erie and other coastal systems, while too little food is making fish starve in Lake Huron’s offshore waters,” said Andy Buchsbaum, regional executive director of the National Wildlife Federation’s Great Lakes Regional Center. “Nutrient-rich runoff from farms is growing a huge crop of algae along the lakes’ coasts, but those nutrients aren’t making it out to the water in the middle of the lakes. Quagga mussels are consuming almost all of it, leaving nothing left in the water for fish to eat.”
The dual feast-and-famine crises plaguing the Lakes, according to the report, are leading to a collapse of the base of the food web, declines in desirable sport fish populations such as lake whitefish and salmon, and resurgence of toxic algae blooms and the Lake Erie “Dead Zone.”
“This feast-and-famine dichotomy is unprecedented,” said report-co-author Julie Mida Hinderer. “Rapid and drastic ecosystem changes are altering the Great Lakes from top to bottom. The impacts we're witnessing are a sign that the Great Lakes need urgent help.”
Among the report findings that illustrate how excessive nutrients are overwhelming coastal areas:
- This summer Lake Erie experienced the worst toxic algal bloom in recorded history – worse than when the lake was declared dead in the 1960s.
- The bloom, involving the toxic alga Microcystis, at one point extended across almost the entire western basin and into the central basin, and in some places was up to 2 feet thick.
- The toxic algae can sicken or even kill people. A toxin from the algae was measured in this summer’s bloom at 1,000 times the World Health Organization guidelines for drinking water.
- Algal blooms are significant, although so far less severe, in Saginaw Bay (Michigan), Green Bay (Wisconsin), and along the Lake Michigan coastline, among other areas, and federal agencies rate nearshore areas in all lakes but Lake Superior as “poor” for nutrient phosphorus concentrations.
The report also documents how invasive zebra and quagga mussels have consumed much of the food in the offshore waters of the lakes, causing fish to starve:
- The biomass of prey fish (which are fed upon by predators such as salmon) in the open waters of Lake Huron has declined by 95 percent in just 15 years.
- The populations of the tiny freshwater shrimp at the base of the Great Lakes food web, Diporeia, have declined in Lake Michigan by 94 percent in 10 years.
“This report is a wake-up call that we need to take action now,” said Frank Krist, who chairs the Lake Huron Citizens Fishery Advisory Committee to the Michigan Department of Natural Resources. “That sucking sound you hear is the disappearance of the base of the Great Lakes food web, which is impacting some of the most desirable sport fish in the region. Reversing this damage has got to be a top priority to protect our lakes, our fish and our economy.”
Rick Unger, president of the Lake Erie Charter Boat Association, has seen some of the economic damage first hand. He blames nutrient-fed algae blooms for a steep decline in charter boat captains operating on Lake Erie—from 800 in 2010 to 700 this year.
“The cost of doing business is skyrocketing,” according to Unger, who says that charter boats have to journey at least 10 miles farther out into the lakes to avoid harmful algae blooms to fish. “Bookings are down. People don’t want to go onto the water. Once people have been out in the algae they don’t want to go back. Unless things change, more people will be out of business.”
It will take a comprehensive response, according to the report, to solve the emerging nutrient crisis in the Great Lakes. Among the recommendations in “Feast and Famine” are:
- Forging a stronger Great Lakes Water Quality Agreement to achieve nutrient-reduction goals;
- Supporting federal Farm Bill programs to reduce polluted agricultural run-off;
- Using the Clean Water Act to uphold water quality standards;
- Focusing protection efforts in Lake Erie; and,
- Targeting Great Lakes restoration programs to reduce nutrient pollution.
“The challenges facing the Great Lakes are no less severe today than they were in the 1960s when Lake Erie was declared ‘dead,’” said Michael Murray, staff scientist at the National Wildlife Federation and co-author of the report. “Strong federal action and increased coordination helped revive the Great Lakes then. Strong action can help them rebound now—so long as policy makers act with urgency to support solutions that protect the lakes and the people and wildlife which depend on them.” | <urn:uuid:e61e430f-9e5e-427e-898f-e9e084c0aa8b> | CC-MAIN-2013-20 | http://www.nwf.org/News-and-Magazines/Media-Center/News-by-Topic/Wildlife/2011/10-04-11-Nutrient-Crisis-Causing-Breakdowns-in-the-Great-Lakes.aspx | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705559639/warc/CC-MAIN-20130516115919-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.933 | 1,219 | 3 | 3 |
Mars Rover FAQs: What's Next
The fact that the Mars rover "Curiosity" didn’t crash during its 7-minute landing sequence Sunday night PDT is, in itself, huge.
The agency’s largest and most complex rover so far landed safely on the red planet and will spend the next two years investigating it for signs of microbial life.
The flawless, albeit complicated, landing was confirmed Sunday at 10:32 p.m. PDT after Curiosity set down near the foot of a mountain three miles tall inside Mars’ 96-mile-wide Gale Crater.
How is the Rover Equipped to Investigate Mars?
Curiosity is equipped with 10 science instruments that, combined, have a total mass 15 times larger than science payloads on the previous Mars rovers Spirit and Opportunity. Some of the high-tech apparatuses are the first of their kind on Mars, such as a tool that can check the elemental composition of rocks by firing a vaporizing laser at them from a distance.
Curiosity’s robotic arm will drill into, scoop, sieve, parcel out, and analyze samples of the planet’s surface. NASA says its orbital observations have identified clay and sulfate minerals in the lower layers, indicating the planet, at one time, had a wet history.
The rover’s power source is a thermonuclear electric generator that produces electricity from the heat of plutonium-238’s radioactive decay. Longer-living and more reliable than solar power, the thermonuclear generator can provide Curiosity with power for at least a full year on Mars—687 days on Earth—and pumps warm fluids through the rover to keep it at the right operating temperatures.
What Is Curiosity Seeing?
It took communication signals 14 minutes after landing to reach Earth from Mars via a relay from NASA's Mars Odyssey orbiter to the Canberra, Australia, antenna station of NASA's Deep Space Network.
Two minutes later, the first photo from Curiosity popped onto video screens at the California Institute of Technology’s Jet Propulsion Laboratory (JPL) in Pasadena, Calif., where the NASA mission is managed.
The grainy, low-resolution image showed one of the rover’s wheels and the Martian horizon. A few minutes later the Curiosity began to transmit higher-resolution images back to Earth.
"Curiosity's landing site is beginning to come into focus," said John Grotzinger, project manager of NASA's Mars Science Laboratory mission, in an announcement touting a black-and-white, 512-pixel by 512-pixel image, taken by Curiosity's rear-left Hazcam two hours after Curiosity’s landing.
"In the image, we are looking to the northwest. What you see on the horizon is the rim of Gale Crater. In the foreground, you can see a gravel field.
The question is: where does this gravel come from? It is the first of what will be many scientific questions to come from our new home on Mars."
In a news conference Monday, engineers and scientists heading the mission showed off some of the images coming in from Curiosity, as well as those from the HiRISE camera onboard the Mars Reconnaissance Orbiter (MRO), which was able to capture a photo of Curiosity parachuting toward the surface of Mars.
What’s Next for the Rover?
In its first week on Mars, Curiosity will deploy its main antenna, raise a mast outfitted with cameras, the rock-vaporizing laser and other tools, and take its first panoramic photo.
But now that the incredible hurdle of landing on Mars is out of the way, NASA isn’t rushing the mission Scientists will initially spend weeks inspecting the Curiosity as well as mapping out its future routes before setting off on the first drive. The rover won’t scoop its first sample of soil until at least mid-September, and it will be October or November before it first drills into rock.
Why Is the Landing a Big Deal?
The one-ton rover and its spacecraft plummeted into the Martian atmosphere hustling at a blistering 13,000 mph.
Withstanding 65,000 lbs. of force, its huge supersonic parachute slowed Curiosity’s decent to about 200 mph, after which the spacecraft deployed a kind of hovercraft with retrorockets that further slowed Curiosity to about 0.75 meters per second and gently lowered it down to the planet’s surface via 25-foot-long cables.
After waiting 1.5 seconds to make sure the rover was on the ground, the “sky-crane” system activated small explosives on the cables to set the spacecraft free from the rover so it could fly away for a crash landing.
How Can I Keep Tabs on What’s Happening on Mars?
NASA has set up plenty of ways for people to keep track of the Curiosity.
NASA TV is a fantastic resource for images, videos, blogs, podcasts and more. It's also the place where you can watch upcoming press conferences and news updates—the next ones are scheduled for 4 p.m. PDT Aug. 6 and 10 a.m. PDT on Aug. 7 and on Aug. 8. | <urn:uuid:d5830f1d-973e-4829-b88f-d36806756d87> | CC-MAIN-2013-20 | http://www.pcworld.com/article/260446/mars_rover_faqs_what_s_next.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705559639/warc/CC-MAIN-20130516115919-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.924491 | 1,074 | 3.390625 | 3 |
See what questions
a doctor would ask.
Dobriner syndrome: An inherited metabolic disorder involving a deficiency of coproporphyrinogen oxidase. The condition is similar to but milder than intermittent porphyria and sometimes includes photosensitivity. More detailed information about the symptoms, causes, and treatments of Dobriner syndrome is available below.
Review possible medical complications related to Dobriner syndrome:
Read more about causes of Dobriner syndrome.
Research the causes of these diseases that are similar to, or related to, Dobriner syndrome:
Read about other experiences, ask a question about Dobriner syndrome, or answer someone else's question, on our message boards:
Search Specialists by State and City | <urn:uuid:2ec0fb52-5e97-4feb-958c-86d31785f39d> | CC-MAIN-2013-20 | http://www.rightdiagnosis.com/d/dobriner_syndrome/intro.htm | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705559639/warc/CC-MAIN-20130516115919-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.908052 | 151 | 2.65625 | 3 |
Wolfsburg’s advantageous position in the Braunschweig-Salzgitter-Magdeburg industrial triangle, close to the Mittellandkanal and the planned East/West transport lines of the Autobahn put this previously little-known town on the map.
In the 1930s, Wolfsburg was planned as a model industrial town to house the new Volkswagen plant and its workers. Impressive though it may be, the Volkswagen plant was not the first noteworthy structure in the area. Wolfsburg Castle, built in 1300, is considered to be one of the best-preserved medieval keeps in Northern Germany, and remains a symbolic city center, functioning as an art gallery, museum and historical attraction to the city that carries its name.
Even today, Volkswagen and Wolfsburg are inseparably linked. Volkswagen’s Autostadt is responsible for the city’s rebirth and has paved the way for marvels such as Phaeno Science Center, which along with the world’s largest car manufacturing plant, draws in millions of visitors each year. | <urn:uuid:f3b86878-ee48-419b-996b-aa68a23e56d8> | CC-MAIN-2013-20 | http://www.ritzcarlton.com/en/Properties/Wolfsburg/Destination/Default.htm | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705559639/warc/CC-MAIN-20130516115919-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.938286 | 220 | 2.984375 | 3 |
Zinc oxide is a compound formed from a combination of one molecule of the mineral zinc and one molecule of oxygen. Zinc is one of the most abundant elements on the Earth and is a silver-colored metal with a medium luster. When the metal combines with oxygen, it forms a white powder that slightly resembles flour or baking soda.
For use in skin care and cosmetics products, zinc oxide can be produced through several methods. One way, called the French or direct process, involves heating pure zinc metal at extremely high temperatures until it forms a vapor and mixes with the air. Then, the air is cooled, and the zinc oxide is captured in a special bag. This produces a potent, high quality form of the ingredient.
The same method can be used with zinc that has already combined with other elements. Known as the indirect or American process, this technique results in a finished product that is of lower potency.
In laboratory settings, zinc oxide can be produced by combining different chemicals with solutions that contain zinc. Another way to synthesize the ingredient is to pass electricity through a zinc electrode that is submerged in a liquid that contains oxygen in its molecules. These methods are used to produce large batches of medium-quality zinc oxide.
The use of zinc oxide in natural medicine dates back as far as 500 BC, when it was used as an ointment in Ancient India. By 1025, European physicians, including the Greek doctor Dioscorides, were using zinc oxide to treat growths on the skin, such as cancerous lesions. As research continued, the uses of zinc oxide expanded, and in the 20th century, mass-produced skin care products that contain the ingredient first appeared on the market.
During the 1970s, the U.S. Food and Drug Administration began regulating the production of sunscreens, products that are used to protect the skin from ultraviolet rays. Zinc oxide is one of 17 approved substances that can be used as a sun-protective ingredient in sunscreens. Of these ingredients, zinc oxide is known to absorb the most ultraviolet energy and protects against both UVA and UVB rays, the two forms of sun energy that are the most damaging for the skin.
Zinc oxide sunscreens help to prevent the redness and irritation known as sunburn that happens as a result of prolonged exposure to the sun. These sunscreens also help limit the amount of cellular damage that occurs when the skin is subjected to ultraviolet energy. By reducing the amount of damage, zinc oxide sunscreens help to prevent sun damage that can lead to signs of premature aging. In addition, using a zinc oxide sunscreen greatly reduces the risk of developing melanoma and other forms of skin cancer that are typically caused by the sun.
Manufacturers of zinc oxide sunscreens are continually working to improve the potency and effectiveness of their products. Recently, many top skin care brands have made changes to their formulations by including nano-molecules, particles of zinc oxide that are smaller than 100 nanometers in size. These tiny molecules are able to slightly penetrate the outer layer of the skin and have been shown in some clinical studies to be more protective than traditional zinc oxide sunscreens.
The FDA lists zinc oxide in its "Generally Regarded as Safe" ingredient category. The chemical is non-toxic and rarely causes side effects when used as a sunscreen. In addition, zinc oxide does not penetrate the pores, so it does not lead to acne breakouts or enlarged pores. One drawback to zinc oxide is that formulas that contain it are a bright white color, which some people feel detracts from their appearance. Sunscreens that contain nano-molecules often appear less white in color, as their smaller size allows them to reflect less light in one area, making them less noticeable. Some brands tint their products so that they do not create a white cast on the skin.
In addition to its use in sunscreens, zinc oxide has other applications in skin care products. The powder is often used as a thickening agent to make creams and lotions more luxurious in texture. The thick nature of zinc oxide also makes it effective as a skin protectant. Many diaper creams and formulas designed to prevent chaffing include zinc oxide. These products cut down on the amount of friction that occurs when fabric or skin rubs against skin tissue. | <urn:uuid:338a02a8-d119-4ba8-b6ca-74529eb09237> | CC-MAIN-2013-20 | http://www.skinstore.com/zinc-oxide.aspx?ft=zinc+oxide&ppp=48&c=True | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705559639/warc/CC-MAIN-20130516115919-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.957253 | 885 | 3.25 | 3 |
A one-week to two-week unit on the most common capitalization errors complete with daily bell ringers, worksheets, quiz, a teacher's guide, and more!
This is unit #4 of Ten-Minute Grammar: Trimester One.
Also available are the other eight units in Trimester One, all nine units in Trimester Two, and nine more in Trimester Three. If you plan on using more than a few Ten-Minute Grammar units during the year, purchasing full-trimester units or the FULL-YEAR megadownload will save a lot of time and money:
Ten-Minute Grammar: Trimester One
Ten-Minute Grammar: Trimester Two
Ten-Minute Grammar: Trimester Three
TMG: FULL YEAR!
Ten-Minute Grammar is a comprehensive grammar curriculum based on the Common Core Standards for seventh-grade, eighth-grade, or ninth-grade students.
Using only the first ten minutes of each day, this unit helps students learn to identify and correct errors with common capitalization rules. Students practice and review for a week to a week and a half, and then take a final quiz.
To give the students exposure to quality published writing, some of the practice example sentences are drawn from Sunrise over Fallujah
by Walter Dean Meyers.
This 17-page unit includes everything you'll need for up to two weeks of grammar instruction:
* Seven days of bell-ringer activities
* Daily wordplay activities
* Two double-sided worksheets
* One unit quiz
* Plus an additional 16-page teacher's guide with answer keys and extra lesson instructions
The daily bellwork or bell ringers can be copied onto transparencies for an overhead projector or projected digitally onto a white board or a SmartBoard.
Unit files will come as a PDF file, but the folder also includes the original Word files in case you want to make small tweaks to a page or two (which I often like to do when I purchase lesson materials from someone else.) Download the FREE preview in PDF format for a sample of what you'll get in the unit.
Enjoy, and remember to WRITE A REVIEW!
Created by Arik Durfee | <urn:uuid:537a99fe-986e-448b-9aa0-f5c12b7b5ca9> | CC-MAIN-2013-20 | http://www.teacherspayteachers.com/Product/Capitalization-Ten-Minute-Grammar-Unit-4-148130 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705559639/warc/CC-MAIN-20130516115919-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.889633 | 466 | 3.03125 | 3 |
Since NASA chose the first astronauts in 1959, thousands of pilots, engineers, and scientists have applied to its intensive astronaut candidate training program. Just a handful–321 to date–have actually enrolled. Of those, MIT has educated 34–more than any other private university. Among all universities, only the U.S. Naval Academy claims more, with 52.
Alumni astronauts include Russell L. (Rusty) Schweickart ‘56, SM ‘63, who piloted the first manned flight of the Apollo 9 lunar module in 1969 (see “Defending the Planet,” November/December 2006). The same year, Buzz Aldrin, ScD ‘63, served as lunar-module pilot for the Apollo 11 mission in the first manned lunar landing. Ronald McNair, PhD ‘76, died in the 1986 explosion of the space shuttle Challenger.
Pamela Melroy, SM ‘84, will become the fifth MIT-trained astronaut to command a space mission when she leads the STS-120 space shuttle operation, slated for launch in October. This undertaking will also make her the second woman to command a U.S. space mission.
Melroy’s mission will give a lift to Daniel M. Tani ‘84, SM ‘88, who will remain on the International Space Station as a flight engineer. Five other alumni are scheduled on missions through 2008.
MIT’s Proving Ground
MIT’s astronauts have come from diverse departments. Eleven earned degrees in aeronautics and astronautics, eight studied mechanical engineering, and others pursued courses including applied plasma physics, ocean engineering, geology, chemistry, and nuclear engineering.
Aero-astro head Wesley Harris says MIT provides a stellar proving ground. “To travel to space requires the ability to risk failure in order to succeed. And people are not born with this ability,” says Harris. “It must be taught.”
Melroy says MIT taught her how to apply principles to practice in complex situations. “This is such an important element of what astronauts do, because every time we go into space, we are not sure what will happen next,” she says. “Understanding physical principles–engineering, physics, and so forth–allows you to take the leap when something unexpected happens and apply those principles to the situation at hand.”
The opportunity to help students develop this capability drew Jeffrey Hoffman, professor of the practice in aero-astro, to teach at MIT. Hoffman himself was inducted into the U.S. Astronaut Hall of Fame in 2006. His NASA career included five shuttle flights, including one to repair the Hubble Space Telescope in 1993.
Solving Problems in Tight Spots
“NASA looks for qualities like the ability to solve problems, to analyze and fix things,” Hoffman says. “And those qualities are encouraged at MIT, through project-based learning.” Last year, for example, a group of Hoffman’s junior and senior students designed a mobile camper to operate on the moon’s surface. The camper would offer astronauts unprecedented mobility by providing a pressurized environment for spending nights free of their space suits.
In the Space Systems Laboratory (SSL), undergraduate and graduate students build, program, and test microsatellites and other devices for use in space. For instance, the Synchronized Position Hold Engage and Reorient Experimental Satellites (SPHERES) can fly in formation and dock with each other as components of a distributed satellite system. The devices are being tested at MIT and on the International Space Station. “The hands-on spaceflight education that students receive gives them the comprehensive, concept-to-operation perspective that is needed to be an astronaut,” says SSL director David W. Miller.
This intense education also forges lasting bonds. Melroy is close friends with astronaut Catherine Cady Coleman ‘83, whom she met in MIT’s ROTC program. “This friendship,” says Melroy, “is just one of the benefits from my days at MIT.” | <urn:uuid:ac81e1d0-bba9-4914-94c8-21f9857afbaf> | CC-MAIN-2013-20 | http://www.technologyreview.com/article/408083/34-mit-astronauts-and-counting/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705559639/warc/CC-MAIN-20130516115919-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.937334 | 857 | 2.921875 | 3 |
POPULAR CHESS TERMS
The Tactics Workbook that Explains the Basic Concepts Too!
1001 Chess Exercises for Beginners
50 Years of Tal-Botvinnik - 4 DVD's - Chess Lecture - Volume 24
A Complete Chess Course - How to Win at Chess - VOLUME I
A Complete Chess Course - How to Win at Chess - VOLUME II
From Chaturanga to the Present Day
A History of Chess
Alexander Kotov - RUSSIAN EDITION
Proven Ideas and Training Methods
Amateur to IM
Author: Per Skjoldager and Jorn Erik Nielsen
Year of Publication: 2012 Pages: 458
Notation Type: Algebraic (AN)
Book Description One of the greatest chess legends of all time, Aron Nimzowitsch (1886-1935), is best known for founding the Hypermodernism school of chess, which emerged after World War I to challenge the chess ideologies of traditional central European masters. This first full-scale biography of Nimzowitsch chronicles his early life in Denmark, his family and education, and his fascination with the game that would become the focus of his life. Also included are explorations of his tournament games and records, his dispute with influential chess teacher Siegbert Tarrasch, and his role in the development of Hypermodern Chess. With detailed accounts of nearly 450 games and the only narrative of Nimzowitsch from 1914 to 1924, a period formerly cloaked in mystery, this volume offers the most thorough profile available of one of chess's greatest innovators.
Aron Nimzowitsch - On the Road to Chess Mastery
Bishop Against Knight, Rook Against Minor Pieces
Averbakh Chess Endings - RUSSIAN EDITION
The Final Years in Iceland, a Saga of Friendship and Lost Illusions
Bobby Fischer Comes Home
A Study of 101 Outrageous Moves by the Great Chess Champion of All Time
These 101 moves - every one a move that either forced checkmate, gained material or lead to an overwhelmingly superior position - have been selected from among all of Fischer's recorded games, most of which were were played under tournament or match conditions.
Bobby Fischer's Outrageous Chess Moves
A Modern Look at Chess Strategy
Break the Rules!
The Chess Gangs of New York and London - Volume 9
Bronstein - The Mechanic
Capablanca - Move by Move
Carlsen's Black Magic & Carlsen in Baku - Chess Lecture - Volume 30
The Memoirs of a Grandmaster
Checkmate in Prague
Of the World Chess Championship
Chess - The Fischer-Spassky Games
Tactics in Attack and Defense
Chess Camp - VOLUME 6
Chess Camp - VOLUME 7
Chess Evolution 2 - Beyond the Basics
Chess Heritage of A.A. Alekhine - VOLUME 1 - RUSSIAN EDITION
Chess Informants - ISSUE 113
Chess Informants - ISSUE 114
Chess Informants - ISSUE 115
Chess Informants - ISSUE 116
Teaching Techniques that Work!
Chess is Child's Play
Volume 2: Basic Tactics and Strategy. You'll discover a variety of tactical weapons that you could use over and over to win material and gain an advantage over your opponents. You'll also learn all about chess strategy, plans and formations that will provide you with a lasting edge. 27 chapters, 100 minutes.
Volume 3: Endgames. When few pieces are left on the board, knowing the proper procedures can spell the difference between victory and defeat. 22 chapters, 45 minutes + bonus material.
Chess King's Complete Chess Course - ALL 3 VOLUMES
CHESS LECTURE - VOL. 46 - Nimzo-Indian Patterns - 2 DVDs
CHESS LECTURE - Vol. 47 - Pawn Endgames - 2 DVDs
A Vivid Record of Chess Activities in the Leading Centers of the World
Chess Marches On!
100 Puzzles to Torment Your Brain Cells
Chess Puzzles for Kids
Understanding Chess Tactics
Chess Tactics from Scratch - 2ND EDITION
Planning the Pieces
Complete Chess Strategy - VOLUME 1
Principles of Pawn Play and the Center
Publisher: ISHI Press
Author: Ludek Pachman
Year of Publication: 2012 (Reprint) Pages: 185
Notation Type: Descriptive (DN)
Book Description Continuing his major work on strategy and tactics in modern chess, the internationalyl renowned Grandmaster, Ludek Pachman, now turns his attention to the play of the pawns and the achievement of control of the center squares. Though the pawns are the weakest pieces in chess, their importance in determining the character of the attack (and defense) and the development of strategic play cannot be underestimated. Pawns are essential to the protection of important squares and pieces. They are the best means of blockading enemy pawns and when correctly deployed, their advance can open vital files and diagonals, thereby creating weaknesses in the opposite position. Despite its limited power, the pawn has one special advantage over other pieces in that it can be promoted when it reaches the eighth rank; a successful pawn advance can completely change the balance of power and the outcome of a game. Pawns have aptly been described as "the soul of chess." Vital of chess mastery is a basic understanding of the importance of control of the center squares. The effectiveness of the pieces depend upon the strength of their position and center control creates a vital sapatial superiority. The effective play of the pawns and center control have been touched upon on other works, but seldom with the insight and lucidity revealed in this second volume of Pachman's masterwork.
Complete Chess Strategy - VOLUME 2 | <urn:uuid:b1063249-7b76-4c7e-b421-4dcb5ae5490f> | CC-MAIN-2013-20 | http://www.uscfsales.com/chess/terms/where/year-of-publication/1985_2012.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705559639/warc/CC-MAIN-20130516115919-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.889786 | 1,196 | 2.71875 | 3 |
Volume 47 Number 11
Focus Update: Hot Tub Lung
Initially easy to misdiagnose, by the time doctors know whats causing the problem, Hot Tub Lung can be a serious ailment that requires hospitalization and a heavy antibiotic regimen. In the past six months, more than a dozen people in the U.S. have been diagnosed with the infectious agent that leads to Hot Tub Lung.
For all its potential dangers and recent press, it remains a relatively uncommon upper respiratory infection. But as the cases of Hot Tub Lung increase throughout America, many of the 3.3 million spa owners who typically use their hot tub for a relaxing respite are beginning to question its safety and are seeking out water treatment professionals for answers.
Hot Tub Lung is caused by the infectious agent Mycobaterium avium, part of the Mycobactirum avium complex (MAC) normally present in the environment. Typically, the growth of M. avium is mitigated by cooler, dry temperatures. A hot tub provides ideal conditions for rapid reproduction of M. avium(and most other bacteria). Where swimming pools and hot tubs are disinfected properly, few of these bacteria can cause any ill health effects. However, in poorly maintained hot tubs, where water is not circulated properly and disinfection is insufficient, M. avium thrives.
As the hot tub steams, these bacteria become airborne and are inhaled by bathers. Under the right conditions, any person who bathes in a contaminated hot tub is at risk of this airborne infection. However, it typically is more like to affect immunocompromised people (children, the elderly and those suffering from immune deficiency diseases such as AIDS).
Symptoms Hot Tub Lung is associated with a host of flu-like symptoms, such as: · Shortness of breath · Fatigue · Fever or chills · Wet cough · Tightness in the chest
Because of these symptoms, the disease is commonly misdiagnosed as acute asthma, pneumonia or bronchitis. Treating for these ailments only prolongs the disease in the afflicted, since the M. avium bacteria actually causing the infection requires a regimented antibiotic treatment with as many as three separate medications. When compounded by the fact that few people tell their doctor that they have recently bathed in a heated spa (and few doctors ask for that information), Hot Tub Lung regularly becomes more than just a passing sickness. While it can be treated very easily if caught quickly, the lack of prompt diagnosis typically leads to months of illness and eventual hospitalization.
Conclusion Hot Tub Lung is easily preventable with a consistent and thorough disinfection process. Water treatment professionals should always make sure their customers are aware of the factors that can compromise spa water and educate them on how to best defend themselves from the sickness.
For more Hot Tub Lung and spa-related resources on the web, visit:
Centers for Disease Control and Prevention http://www.cdc.gov/healthyswimming/
Association of Pool and Spa Professionals www.nspi.org/
National Swimming Pool Foundation www.nspf.com | <urn:uuid:d214980a-2556-431c-9640-2cc9e66dd4f8> | CC-MAIN-2013-20 | http://www.wcponline.com/ArchiveNewsView.cfm?ID=3253 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705559639/warc/CC-MAIN-20130516115919-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.94129 | 641 | 2.921875 | 3 |
Maternal mortality ratio (per 100 000 live births)
Rationale for use
Complications during pregnancy and childbirth are a leading cause of death and disability among women of reproductive age in developing countries. The maternal mortality ratio represents the risk associated with each pregnancy, i.e. the obstetric risk. It is also a MDG indicator.
Maternal death is the death of a woman while pregnant or within 42 days of termination of pregnancy, irrespective of the duration and site of the pregnancy, from any cause related to or aggravated by the pregnancy or its management but not from accidental or incidental causes. To facilitate the identification of maternal deaths in circumstances in which cause of death attribution is inadequate, a new category has been introduced: Pregnancy-related death is defined as the death of a woman while pregnant or within 42 days of termination of pregnancy, irrespective of the cause of death.
Live birth refers to the complete expulsion or extraction from its mother of a product of conception, irrespective of the duration of the pregnancy, which, after such separation, breathes or shows any other evidence of life - e.g. beating of the heart, pulsation of the umbilical cord or definite movement of voluntary muscles - whether or not the umbilical cord has been cut or the placenta is attached. Each product of such a birth is considered live born.
Vital registration, health service records, household surveys, census.
Methods of estimation
Measuring maternal mortality accurately is difficult except where comprehensive registration of deaths and of causes of death exists. Elsewhere, census, surveys or models have to be used to estimate levels of maternal mortality. Reproductive-age mortality studies (RAMOS) use triangulation of different sources of data on deaths of women of reproductive age coupled with record review and/or verbal autopsy to identify maternal deaths. Based on multiple sources of information, RAMOS are considered the best way to estimate levels of maternal mortality. Estimates derived from household surveys are subject to wide confidence intervals and long period rates (often for 10 year periods). Global and regional estimates of maternal mortality are developed every five years, using a regression model.
By age and parity, location (urban/rural, major regions/provinces), and socio-economic characteristics (e.g. education level, wealth quintile).
Maternal death is, from an epidemiological perspective, a relatively rare event and mortality is difficult to measure accurately. Many low-income countries have no or very little data and modelling is used to obtain a national estimate. | <urn:uuid:37986021-9af4-42d9-b701-2eecfdbfef9d> | CC-MAIN-2013-20 | http://www.who.int/healthinfo/statistics/indmaternalmortality/en/index.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705559639/warc/CC-MAIN-20130516115919-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.916135 | 516 | 3.359375 | 3 |
This is an image of the surface of Io.
Click on image for full size
Can there be Life in the Environment of Io?
In spite of the fact that Io has an atmosphere, the environment of Io seems pretty unfriendly toward life as we know it
Io is very small, so there is not much gravity. For this reason, the atmosphere of Io is constantly drifting away. If it were not for the volcanic eruptions, there would be no atmosphere at all.
Io is inside the enormously powerful magnetosphere of Jupiter. With very little atmosphere, there is little protection from the radiation of the charged particles of the magnetosphere.
With little atmosphere, there is hardly a buffer between the surface and space itself. This means that the temperature above the surface is very cold. On the other hand, with all the volcanos, the surface of Io is frequently molten, therefore the surface itself is sometimes super-hot!
All together these things add up to a very hostile environment for life as we know it.
Shop Windows to the Universe Science Store!
The Spring 2010 issue of The Earth Scientist
, focuses on the ocean, including articles on polar research, coral reefs, ocean acidification, and climate. Includes a gorgeous full color poster!
You might also be interested in:
Jupiter's magnetosphere is very special. It is the biggest thing in the entire solar system. Not only is it big enough to hold all of Jupiter's moons, but the sun itself could fit inside. It goes all...more
Jupiter's atmospheric environment is one of strong gravity, high pressure, strong winds, from 225 miles per hour to 1000 miles per hour, and cold temperatures of -270 degrees to +32 degrees (freezing temperature)....more
In July, 1996, it was announced that Dr. David McKay, along with a team of scientists at Johnson Space Center (a division of NASA), had discovered possible fossils of bacteria in a meteorite named ALH84...more
Saturn's atmospheric environment is one of strong gravity, high pressure, strong winds, from 225 miles per hour to 1000 miles per hour, and cold temperatures of -270 degrees to +80 degrees. With winds...more
Titan's atmosphere is a lot like the Earth's, except that it is very cold, from -330 degrees to -290 degrees! Like the Earth, there is a lot of Nitrogen and other complex molecules. There also may be an...more
Autotrophs are organisms that can "make their own food" from an inorganic source of carbon (carbon dioxide) given a source of energy. Most autotrophs use sunlight in the process of photosynthesis to make...more
In the warm primordial ocean, aggregates of amino acids, proteins, and other hydrocarbons came together into a form called *coacervates*. Amino acids will spontaneously form coacervates in the same way...more | <urn:uuid:02e394b4-f0c3-4110-8b8a-89d2995b8116> | CC-MAIN-2013-20 | http://www.windows2universe.org/earth/Life/Io_environment.html&edu=mid | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705559639/warc/CC-MAIN-20130516115919-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.940352 | 604 | 3.34375 | 3 |
Croatian math and computer science teacher Maja Cvitkovic is not content with the same old math lessons. So when she recently had the opportunity to use Mathematica with a group of teenage students at a workshop in Zagreb, she devised a lesson that gave them a chance to play. The assignment: Create a picture using random dots.
"A common calculus exercise is to present a function and have students plot its graph," explains Cvitkovic. "But this is too passive for me." To help students gain greater insight into functions and their corresponding graphs, Cvitkovic turned the traditional exercise "upside down," as she describes it. Her students began by envisioning an image and then were asked to find the function that would create that image when applied to a list of random dots.
After settling on and sketching an image on paper, students identified where the points required to create that image would be more dense and where they would be more sparse. The next step is where experimentation began: Using what they already knew about the shapes represented by basic equations and simple transformations, students wrote functions in Mathematica and modified them until they found the exact expression for the function that would fit the desired curves and distribution of dots. Then they applied the function to a list of random dots to visualize their pointillist creations. The final stages involved applying colors and replacing dots with different-sized disks if they chose to do so.
Cvitkovic feels the exercise is appropriate for beginning calculus students, also exposing them to a bit of probability theory. It requires knowledge of what happens when two functions are combined and what results when a function is multiplied by a number. In terms of Mathematica skills, the prerequisite for this exercise is simply a basic familiarity with the system, including knowing how to perform calculations, work with lists, and plot graphs of elementary functions. Cvitkovic's students had about 10 two-hour sessions with Mathematica before working on this assignment.
Cvitkovic reports that students enjoy this exercise because it is different and involves creativity. It is motivating because the problem with its "answer" is unique for each student, and it can be repeated to discover endless variations, images, and behaviors of functions.
Cvitkovic finds Mathematica uniquely appropriate for this exercise because it gives students easy access to all of the necessary tools. It takes just a few keystrokes to plot a graph of a function, calculate values for points, and combine parts of a picture. And, she adds, "When they need help, there is excellent online help, complete with examples."
"The main advantage of Mathematica is the elegance of its syntax. It lets you write what you think, so the students can concentrate on the mathematical aspects of the exercise rather than on the programming. I think this is the way Mathematica should be used in education. It encourages students to explore, to invent something."
For her teacher colleagues, Cvitkovic's final thoughts on the topic include encouragement and one caveat: "Just try it! But be warned--you and your students can get addicted to playing with Mathematica." | <urn:uuid:18dc3626-0a80-43fb-998b-e193a5b734fa> | CC-MAIN-2013-20 | http://www.wolfram.com/mathematica/customer-stories/art-inspires-a-lesson-in-calculus-with-mathematica.en.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705559639/warc/CC-MAIN-20130516115919-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.954792 | 654 | 3.875 | 4 |
RENO, Nevada -- While mammography is still considered the gold standard for detecting breast cancer, a Reno, Nevada company is developing a new screening tool that's non invasive, non compression, and extremely accurate.
Matthew Benardis' company, First Warning Systems, has developed a bra that can detect temperature changes in a woman's breasts, which could signal breast cancer, with the help of 16 sensors, eight on each breast.
Women would wear the bras for 12 hours, starting at 18 years old, as part of their annual health screening to gather the data for doctors.
First Warning Systems hopes to have the bra available for public use in the middle of next year.
To learn more about First Warning Systems, click here. | <urn:uuid:503c8776-571a-4574-ad3e-a3377a3eaea7> | CC-MAIN-2013-20 | http://www.wtsp.com/news/article/296989/175/Cancer-detecting-bra-in-development | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705559639/warc/CC-MAIN-20130516115919-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.953657 | 150 | 2.578125 | 3 |
The National Association of State Treasurers Foundation presents:
Tomorrow's Money for Young Adults
13 Things Your Family Can Do Today
All parents want their children to grow up knowing how to responsibly handle money – how to earn money, how to most wisely spend it, and how to invest it well for future needs. But how does that happen? Here are 13 things that every family can do together to take control of your finances to reach important family goals. Whether you have young or older children, whether you are helping care for grandchildren or raising them on your own, you can use these ideas to get everyone on the same page about your family’s finances and teach children and teens valuable money management skills at the same time:
Talk about where money comes from and where it goes. It may sound obvious to you, but your kids need to know that you and/or your spouse work full-time jobs, part-time jobs, seasonal work, etc. to earn the money that you use for necessary expenses like your rent/mortgage, utility bills, groceries, insurance, gas, taxes. Begin to help children make the connection between the work you do and how it provides the money to pay for the things that you as a family need and want. Even if you are living paycheck to paycheck, talking about creating an emergency saving fund to cover three to six months of everyday expenses—and making sure that everyone in the family knows how much money you need to save. That exercise can be a good way to teach children that not every penny earned should be spent today.
Talk together about what things are important to your family – for example, being able to spend time together, being able to being able to travel, going out to eat, staying out of debt, donating to a charity, etc. Start to put down on paper how much those things “cost” that you value as a family and how you can work together to meet those goals. Consider making a list of your family’s values and posting it somewhere visible to remind everyone how those values affect your decision-making about money.
Set financial goals as a family based on your values. For example, if you value spending time together as a family then perhaps a financial goal would be for one parent to be able to work fewer hours, or for the family to take a vacation together. On the other hand, if one of your family values is staying out of debt then a possible financial goal would be to pay off credit card debt, or to find additional part-time work to earn more income for daily needs. Once you have begun to brainstorm family financial goals, post them somewhere that everyone can see them and be reminded what you are working together toward as a family.
After you have decided on some initial family financial goals pick one or two of those goals and break those down into short-term steps. For example if one of your values is to spend time together as a family and the related financial goal is to take a family vacation then some possible short-term goals could be:
Research vacation options and compare prices/services to find best possible deals
Create a budget for the trip
Reduce weekly discretionary or “miscellaneous” spending and save money toward trip
Give children an opportunity to earn money or provide them with an allowance. Providing children with a small weekly or monthly allowance, or giving them the opportunity to do jobs around the house for pay is a natural way to help them learn the basics of managing money. Talk with them about the importance of saving some of that money for future wants or needs, and the wisdom in planning their spending according to the money they have. This is a natural way to help children grasp the decision-making processes involved in making spending and saving choices.
Create a visible savings “bank” in your home – something like a clear bank or jar - so that everyone in the family can begin putting money toward your first short-term goal. Watching your savings grow toward your goal is encouraging for everyone.
Think through your family’s banking situation. Do you have a savings and or checking account for your family? If you are a part of a multigenerational family, do the adults in your family have multiple accounts that you might want to consider consolidating or coordinating among you to help ensure that you are maximizing your opportunities to save and pay for everyday expenses? If you do not currently have a bank account, you should look into account options offered at local bank branches or credit unions that can help you, as a family, realize your financial goals to save and invest. Learn more about what banks offer and how credit unions work. Once you have opened an account, consider helping younger family members open savings accounts and help them make regular deposits into those accounts, no matter how small the amount.
Have every member of the family keep a record of what they spend for one week (cash spent, checks written, debit and credit card used) and then get together to add up what you spend in one week. Some families benefit from having one notebook located in a central place where everyone writes down what they have spent; or each family member can keep his/her own record. It may come as a surprise for everyone to realize how quickly expenses (and possibly debt) can mount.
Put together a family budget – it doesn’t have to be exact, just something that is in the general ballpark – and talk about how much it costs for your family to live at your current level or lifestyle. Use our budget worksheet to get an idea of the things you will want to have included your budget. Talk about what areas of your family life cost the most.
Compare choices for spending and saving—Family members, depending on age, may benefit from talking about choices and comparing trade-offs when spending or saving. For example, it cost $100 for a family outing last weekend. Were there other options that would have cost less, lasted longer, been more fun or enjoyed more? What else might that $100 have been used for? What could that $100 have been saved for?
Brainstorm together small ways that you, as a family, could begin to reduce expenses in at least one budget category to save money. Or, depending on the age of your kids, assign each family member a different area of your family budget and have them brainstorm and research how you could save money in those areas. Decide on 2-3 things that you will begin implementing immediately and track how much those habits save you over one month.
Talk about all of the financially-related responsibilities in the family and how you divide those responsibilities up. For example: how will each family member contribute to the family’s financial picture? Who will earn the family’s income? Who will take the lead on paying bills? Who will make decisions about investing money the family has saved? How will children take responsibility for saving toward their personal future goals (i.e. college, a car, clothes, etc.)? How will children help save money on home-related costs (i.e. turning lights off, taking shorter showers to reduce utility bills; mowing lawns instead of hiring someone; clipping coupons to help at the grocery store; looking through store circulars for sales on items, etc.)? Not only is involving the kids in your family’s finances a practical, hands-on way for them to learn money management skills, but it may also ease the burden on you as the kids begin to realize the effort of work and how much things cost and that they too have choices in saving and spending!
Decide on a regular time (i.e. at a weekly family meeting or a special once-a-month family finances meeting) to review how you as a family are doing financially—regardless of whether it is a good time or not so good. Make sure you celebrate your successes (i.e. how much money you have accumulated in your family savings “bank” toward a short-term goal, lower bills, etc.) as well as identifying the next areas you want to work on together and where you think there is still room for improvement.
Your family may be going through a rough period financially or you may almost always feel you are living paycheck to paycheck. Then something else happens--someone loses a job, is sick, there is an accident, the car finally can no longer be repaired, etc., etc. Even if adults work hard to keep financial worries and hardships from affecting the family, it isn’t always possible. In bad financial times, adults need to focus on the “message” you are sending at the family finance meetings as well as what will be done and what can be done. Depending on the ages of the children, you’ll want to explain enough so that children or teens know that family finances are strained and/or what the immediate key consequences are. For example, the family will have to reduce spending or do things another way—taking the bus instead of driving everywhere, not going on vacation this year, etc. Outlining concrete steps that the family can take together or choices the kids can help make about cost-cutting tradeoffs can help them feel less anxious about the unknown and understand more about why things are the way they are.
If good fortune, and your hard work, should result in your family getting ahead of your goals then these meetings are a good time to discuss how to change your goals or use the money in a way that makes everyone feel like they are a part of your family’s successes. | <urn:uuid:0f81f3ab-26a7-47ef-88de-d033cee95704> | CC-MAIN-2013-20 | http://www.youngadults.tomorrowsmoney.org/Templates/yp/Print.aspx?id=337 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705559639/warc/CC-MAIN-20130516115919-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.964484 | 1,952 | 2.875 | 3 |
The definition of smooth is even, flat and not rough.(adjective)
Smooth is defined as to get rid of wrinkles, lumps or ridges in something.(verb)
An example of smooth is to iron a piece of clothing.
See smooth in Webster's New World College Dictionary
Origin: ME smothe < OE smoth, for earlier smethe < Gmc *smanthi < IE *som-, together < base *sem-, together, same
See smooth in American Heritage Dictionary 4
adjective smooth·er, smooth·est
Origin: Middle English smothe
Origin: , from Old English smōth.
Learn more about smooth | <urn:uuid:9ffac0c8-a25c-4b47-8750-a6ff022f3bfe> | CC-MAIN-2013-20 | http://www.yourdictionary.com/smooth | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705559639/warc/CC-MAIN-20130516115919-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.773873 | 142 | 2.984375 | 3 |
- blown by the wind
- twisted in growth by the prevailing wind: said of a tree
See windblown in American Heritage Dictionary 4
- Blown or dispersed by the wind: windblown pollen.
- Growing or shaped in a manner governed by the prevailing winds: windblown scrub pines.
- Cut short and curled or combed toward the front of the head: a windblown hairstyle.
Learn more about windblown | <urn:uuid:634e3b0b-1b44-4316-87df-6a1dcf5e1723> | CC-MAIN-2013-20 | http://www.yourdictionary.com/windblown | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705559639/warc/CC-MAIN-20130516115919-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.834459 | 90 | 2.84375 | 3 |
- Subscribe TodayGet a Free Book of Lists
Milestones of Science: Hidden treasure at downtown library
Johann Gutenberg (1398 - 1468) was a man for all seasons – blacksmith, goldsmith and printer. This is a page from the Book of Job in the so-called “42-line Bible,” completed in 1455 on the Gutenberg press. Written in Latin, it is the earliest example of printing with mechanical, moveable type. The press was the first to combine various technologies besides moveable type, including the use of oil-based ink and the use of a wooden press derived from the screw presses commonly used in the agriculture of the time.(From the Buffalo and Erie County Public Library Milestones of Science collection)
Conrad Gesner (1516 - 1565) was a Swiss physician and naturalist who is today considered the father of modern zoology. This is the title page from his great work, “Historaie animalium,” (History of the Animals), which compiled accounts of all the known animal species of his time. Each animal is represented by a colored woodcut, with detailed information written in Latin. The Roman Catholic Church, under Pope Paul IV, placed the book on its list of prohibited books, since the fact that Gessner was a Protestant was deemed to contaminate all his works, according to Catholic doctrine of the time.From the Buffalo and Erie County Public Library Milestones of Science collection
Nicolaus Copernicus (1473 - 1543), who was born in a part of Prussia that later became Poland, is one of the founders of modern astronomy. He was the first person to formulate a comprehensive body of cosmology that did not place the Earth at the center of the solar system and the greater universe. Rather, he pointed out, our home planet and the others in the solar system revolve about the sun. Besides his work in astronomy, he was a mathematician, a lawyer, a physician, a scholar of the classics, a translator (capable in several languages), an artist, a cleric, an economist and a diplomat. Whew! Here we see an illustration from his great work, “De revolutionibus orbium coelstium,” (The Revolutions of the Heavenly Bodies), clearly showing the sun (Sol) at the center.From the Buffalo and Erie County Public Library Milestones of Science collection
Charles Darwin (1809 - 1882), an English naturalist, showed in On the Origin of the Species, published in 1859, that all species of life on earth have descended over time from common ancestors. Eventually, he proposed that evolution was the branching of the various species over a span of millions of years in a process he termed “natural selection.” He developed his ideas beginning as a young man, when he spent five years aboard the ship the Beagle, cruising the world, making observations and compiling notes. The accompanying image is the title page from the first edition of Origin of the Species. Another Englishman, Charles Russell Wallace, came up with pretty much the same ideas as Darwin at about the same time, although it is Darwin who history most remembers.From the Buffalo and Erie County Public Library Milestones of Science collection
Galileo Galilei (1564 - 1642), an Italian, was an astronomer, physicist and mathematician, who is represented here with the title page of his “Dialogo,” (Dialogue), from 1632, which defended and elaborated upon Copernicus’ earlier work showing that the Earth was not the center of everything. Galileo had concrete evidence of this, since he had seen the four largest moon of Jupiter in orbit around that planet with his own eyes, using one of the earliest telescopes. The clerics of the Inquisition were not happy with this finding and ordered all copies of the Dialogo to be burned, so the presence of a first edition in Buffalo is a rare thing indeed. Galileo was eventually forced to publicly recant all his beliefs and spent the remainder of his life under house arrest.From the Buffalo and Erie County Public Library Milestones of Science collection
Johannes Kepler (1571 - 1630), a German astronomer, established the laws of planetary motion that paved the way for later work allowing humans to eventually launch interplanetary probes and globe-circling satellites with extraordinary precision. Here we have the frontispiece from his “Tabula Rudolphinae,” (The Rudolphine Tables), published in 1627, which was the foundation of all planetary calculations for more than a century. Also included was a table of logistic logarithms, which were invented by Kepler.From the Buffalo and Erie County Public Library Milestones of Science collection
Leonhard Fuchs (1501 - 1566), a German physician, was one of the founders of modern botany. This is the title page of his “De historia stirpium,” (The History of Plants), published in 1542, which was one of the first attempts to formalize botanical terminology. Within its pages, Fuchs arranged 500 plants according to their Greek names. The book contains hundreds of colored woodcut illustrations.From the Buffalo and Erie County Public Library Milestones of Science collection
Andreas Vesalius (1514 - 1564) was a Belgian physician whose work, “De humani corporis fabrica” (On the Fabric of the Human Body), in 1543, established him as the father of modern human anatomy. This is an illustration from that book. The work described the human body in great detail and demonstrated that humans are made of the same things and more-or-less assembled the same way as the lower animals.From the Buffalo and Erie County Public Library Milestones of Science collection
Edward Jenner (1749 - 1823), an English physician, is often called the father of immunology. He pioneered the first effective smallpox vaccine and, by doing so, may have saved the lives of more people than any other single individual who had lived up until that time. Jenner had observed that dairymaids who had contracted cowpox from cattle rarely, if ever, contracted smallpox. Coxpox was a disease that appeared to be much like smallpox, but far less virulent. (The accompanying image, from Jenner’s “An inquiry into the causes and effects of the variolae vaccinae” (1798), illustrates cowpox.) Jenner theorized that exposure to cowpox must be protecting the dairymaids from smallpox. Jenner injected his gardener’s son with material scraped from the cowpox sores on the arm of a milkmaid. The boy was later exposed to smallpox, repeatedly, and did not contract the highly contagious disease. Jenner had successfully introduced preventative inoculation to the world.From the Buffalo and Erie County Public Library Milestones of Science collection
Carl Linnaeus (1707 - 1778) was a Swedish botanist, physician and zoologist who established a viable classification for plants and animals. He’s represented here with the title page of “Species planetarum,” (The Species of Plants) in 1753, which formalized the binomial nomenclature still used by botanists today. The book listed all the species of plants known to Linnaeus, either from personal experience or through his reading.From the Buffalo and Erie County Public Library Milestones of Science collection
Send this story to a friend
Photo galleries See all photo galleries
Which WNY community has the biggest share of new homes?
Which WNY community has the highest home values?
Who's Who in Banking and Finance 2013
Which WNY community has the largest concentration of big homes?
- Most popular
- Which WNY community has the highest income levels?
- Who's Who in Banking and Finance 2013
- 5 private high schools in WNY charge more than $10K in tuition
- Here are the Upstate colleges whose graduates make the most money
- Which WNY community has the highest home values?
- Which WNY community has the largest concentration of big homes?
- Which WNY community has the largest concentration of renters?
- Nardin remains No. 1 among Western New York high schools, but City Honors is closing the gap
- Which WNY community has the highest rate of homeownership?
- Williamsville pushes WNY district streak to 10 years; East Aurora edges Clarence for second place | <urn:uuid:d1e13e25-750b-46c6-b269-00108520bc23> | CC-MAIN-2013-20 | http://assets.bizjournals.com/buffalo/news/2012/04/24/milestones-of-science.html?s=image_gallery | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.958988 | 1,751 | 3.09375 | 3 |
Late last week the government of France, in its role as six-month president of the European Union (EU), began circulating a draft declaration on “sexual orientation” and “gender identity” among United Nations (UN) member states. The draft calls for recognition of “sexual orientation or gender identity” as a protected human rights category on par with race and sex.
Rama Yade, France’s Junior Minister of State for Foreign Affairs and Human Rights, had previously announced that her country would submit such a “declaration” at the UN General Assembly in December. Sources have told the Friday Fax that so far at least 47 nations have signed onto the draft declaration, a list that presumably includes all 27 member states of the EU. It is expected to take the form of a “political declaration” which will not be voted on, but simply submitted to the Secretary-General for promulgation as representative of the views of the signatory nations.
The declaration also calls for states “to ensure that sexual orientation or gender identity may under no circumstances be the basis for criminal penalties,” which some interpret as an implicit linking of behavior to orientation and identity, given that it is homosexual acts which are illegal in some 90 nations worldwide.
Though not a binding document, critics fear that once issued, proponents will begin touting the declaration as evidence of a new international norm that is in the process of evolving. Such fears are not unfounded – the draft declaration itself references a resolution on “Human Rights, Sexual Orientation, and Gender Identity” that emerged over the summer from the Organization of American States (OAS). That OAS resolution, however, was also non-binding and not subject to a vote, passing instead by consensus.
Moreover, though political declarations are nonbinding, they frequently reappear in a more definitive format later. A resolution on the Moratorium on the Use of the Death Penalty, which passed the Third Committee both this year and last, first appeared in the General Assembly as a political declaration.
So far member states have rebuffed attempts to add “sexual orientation” to the list of protected non-discrimination categories. In 2003, at the UN Commission on Human Rights in Geneva, Brazil introduced a resolution that sought to make “sexual orientation” a protected classification. Member states overwhelmingly rejected the proposal.
Critics also raise the ambiguity of the term “gender identity.” The concept of gender as defined in UN documents upholds traditional understandings. The 1995 Beijing Platform for Action said that gender is “understood in its ordinary, generally accepted usage,” and the Report of the Conference on Human Settlements held the following year in Istanbul restated this. Likewise, the Rome Statute of the International Criminal Court declares that “the term ‘gender’ refers to the two sexes, male and female, within the context of society.”
France’s six-month EU presidency term expires at the end of the year, with the Czech Republic scheduled to take the helm next. France’s President Nicholas Sarkozy courted controversy last month when his government suggested that France continue to lead the bloc on economic issues, given the worldwide financial crisis and the Czech Republic’s small size and relative newness to the EU.
IMPORTANT NOTICE TO OUR READERS
Catholic Exchange is free—but it is not free to produce. Advertising revenue covers only a fraction of the cost to generate reliably Catholic commentary and news, inspiring videos, a selection of the best Catholic blogs, and daily meditations and prayers.
To give us the strength and stability we need, Catholic Exchange is turning to you—our loyal reader—and asking you to become a monthly contributor.
Whether you can give $5 or $25, $50 or $100 each month, please leave something behind so we can continue—and strengthen—this important apostolate.
We are deeply grateful for one-time gifts, but we encourage you to choose “Monthly” on the drop-down menu. Your support will ensure that Catholic Exchange will be here during this most critical moment for the Church and America. | <urn:uuid:17b8311e-905a-4ac1-a5f0-677d8758ad51> | CC-MAIN-2013-20 | http://catholicexchange.com/france-circulates-draft-un-declaration-on-%E2%80%9Csexual-orientation%E2%80%9D-and-%E2%80%9Cgender-identity%E2%80%9D/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.939445 | 855 | 2.65625 | 3 |
We mentioned a recent paper that examined silicon/carbon fibers for use in batteries. Shown above is a TEM image from the paper. From it you can tell the fibers are essentially hollow carbon fibers with a layer of silicon around the outside edge.
Transmission electron microscopes (TEMs) work by shooting a beam of electrons through a sample. The sample has to be quite thin to let the electrons through, but since these fibers are around 100 nm thick that is fine. The important thing is that the image is made with electrons. This is different than the sort of images you’re used to, such as those made with cameras, regular microscopes, or even your eyes: all of those images are made by light. Electrons have a smaller wavelength than light, and so electron microscopes work at extremely high resolution: in some cases you can make out individual atoms with them.
Why would anyone care about silicon-coated nano-fibers? Because lithium ions can be stored inside silicon, and that makes these fibers well-suited to storing lithium for lithium ion batteries. Some researchers think we may be able to extend the life of batteries using these. | <urn:uuid:6d86496c-53c1-4080-8a94-89e00c16c845> | CC-MAIN-2013-20 | http://clearscience.tumblr.com/post/42350836249/we-mentioned-a-recent-paper-that-examined | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.958234 | 240 | 3.640625 | 4 |
GNU Octave is a high-level language, primarily intended for numerical computations. It provides a convenient command line interface for solving linear and nonlinear problems numerically, and for performing other numerical experiments. It may also be used as a batch-oriented language. Octave has extensive tools for solving common numerical linear algebra problems, finding the roots of nonlinear equations, functions written in Octave's own language, or by using dynamically loaded modules written in C, C++, Fortran, or other languages.
Donations to support the software can be made at https://my.fsf.org/donate/working-together/octave.
DocumentationUser manual included; User FAQ included; Printed and online user manual available from http://www.network-theory.co.uk/octave/manual/
- PARI GP
- Octave-data smoothing
- Octave-information theory
- Octave-linear algebra
- GNU Oflox
This is a GNU package:octave
released on 31 May 2012
|License||Verified by||Verified on||Notes|
|GPLv2||Kelly Hopkins||6 December 2011|
|GPLv3orlater||Kelly Hopkins||29 January 2010|
Leaders and contributors
|John W. Eaton||Maintainer|
Resources and communication
|Developer||VCS Repository Webview||http://www.octave.org/hg/octave|
|Required to build||GNU make|
|Required to build||a recent version of g++|
|Required to build||libstdc++|
|Required to build||fortran|
This entry (in part or in whole) was last reviewed on 4 February 2012.
Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the page “GNU Free Documentation License”.
The copyright and license notices on this page only apply to the text on this page. Any software described in this text has its own copyright notice and license, which can usually be found in the distribution itself. | <urn:uuid:ea48cfbe-f960-4639-8b5f-c6cc73963105> | CC-MAIN-2013-20 | http://directory.fsf.org/wiki?title=Octave&oldid=12717 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.665794 | 494 | 2.546875 | 3 |
Hispanic American naming customs
||This article needs additional citations for verification. (December 2010)|
||This article may contain original research. (December 2010)|
Many Hispanic Americans, such as Rafael Vicente Correa Delgado, have two given names (Rafael Vicente, in the example), plus a paternal surname and a maternal surname. In this example the person may be referred to as Señor (Mr.) Correa, or Señor Correa Delgado, but never as Señor Delgado; a less-used form (and a declining custom) is to use the first name preceded by Don, e.g. Don Rafael.
In the colonial period and nineteenth century, it was common to have between one and three given names followed by a second name with a "de" (from) in front. For example the Saint Teresa de los Andes whose real name is Juana Enriqueta Josefina de los Sagrados Corazones Fernández del Solar. Where "Juana", "Enriqueta" and "Josefina" are her first names, followed by the second name "de los Sagrados Corazones". Her paternal surname is "Fernández" and her maternal surname is "del Solar".
Another form of second name can be preceded by a "de" particle, which can be varied to "del" or "de los". Examples are "José del Pilar", "Rosa del Carmen", "Fidelina de las Mercedes". These second names are only used in formal occasions, and in many cases only registered in the birth, marriage and death certificates.
Children that are not recognized by their father have been legally treated in two ways, changing time to time according the civil registration norms. One way is to be registered with only a first surname that is the mother's surname. The second way is to have the mother's surname as first surname and second surname. These are known as natural children. Another case is to only register the father's surname not giving importance to the mother, this happened in the early 20th century.
Spanish naming customs differ by country.
Legally in Uruguay, the use is of two surnames: first the paternal surname, then the maternal surname. For example, Natalia Marisa Oreiro Iglesias is the daughter of Carlos Florencio Oreiro Poggio and Mabel Cristina Iglesias Bourié.
Although two surnames are legally accepted, the common practice in Argentina is to register only the paternal surname in the birth records (or only the maternal if there is no recognised father), so the common usage is to refer to people by a single surname. There are exceptions, however. For example, Gregorio Pérez Companc is the adopted son of Margarita Companc de Pérez, and Carlos Miguens Bemberg is the son of the architect Carlos Miguens and the film director María Luisa Bemberg.
In Argentina, Eva Perón (Evita) and Isabel Perón (Isabelita), the second and third wives of Juan Perón (an ex-president), are commonly known by the Perón surname. This usage of only the marital surname, without the woman's surname nor the wife-connoting article de, is not an exceptional feature in common speech.
Instead of primer apellido (first surname) and segundo apellido (second surname), common in other countries, legally, the following expressions are used: apellido paterno (paternal surname) and apellido materno (maternal surname).
Although a woman may socially use the marital conjunction de, it is omitted in her legal name. For example, former first lady Marta Larraechea very often is called Marta Larraechea de Frei, but her full legal name is Marta Larraechea Bolívar. As another example, Soledad Alvear is almost never called Soledad Alvear de Martínez; her full legal name is María Soledad Alvear Valenzuela.
Although not strictly a Hispanic American country but a Malay-Hispanic country, it uses a similar style. The convention is that with someone called Alberto Mercado Gómez, Mercado would be his maternal surname and Goméz the paternal. That person would seldom being addressed as Mr Mercado, but would instead be addressed as Mr Gómez. Nevertheless some people still follow the Spanish traditional surname conventions.
Proyecto de Ley Orgánica del Registro Civil: Limitación a la inscripción de nombres Artículo 106... no permitirán que... les coloquen nombres que los expongan al ridículo; sean extravagantes o de difícil pronunciación en el idioma oficial; contengan variantes familiares y coloquiales que denoten una identificación confusa o que generen dudas sobre la determinación del sexo. En estos casos, el registrador ofrecerá como referencia, un listado de los nombres y apellidos más comunes.... Quedan exceptuados de esta disposición los nombres de los niños, niñas o adolescentes de las etnias indígenas del país, así como los nombres de los hijos de los extranjeros....”
Civil Registry Organic Law Project: Limitation upon the inscription of names Article 106 “...[civil registrars] will not permit... [parents] to place names [upon their children] that expose them to ridicule; that are extravagant or difficult to pronounce in the official language; that contain familiar and colloquial variants that denote a confused identification, or that generate doubts about the determination of the sex. In these cases, the registrar will offer, as reference, a listing of the most common names and surnames... The names of boys, girls, or adolescents of the country's indigenous ethnic groups and the names of foreigners' children are excepted from this disposition. . . .”
Popular complaint against the naming-custom-limiting Article 106 compelled the Venezuelan National Electoral Council to delete it from the Civil Registry Organic Law Project. It could be said that common names like Elvio Lado (which can be pronounced as "el violado", meaning "the raped one") or Mónica Galindo (which can be pronounced as "Moni caga lindo", meaning "Moni shits prettily") would count as as an example of violation to this law.
The marital conjunction "de" (of)
In some Latin American nations, a wife could drop her own maternal surname while adding her husband's apellido (his paternal surname) suffixed after her (paternal) first surname with the conjunction de (“of") — thus Ángela López Sáenz, as wife of Tomás Portillo Blanco, would become Ángela López de Portillo. In other nations doing so is frowned upon. The contemporary naming custom now practises the wife retaining her surname. The use of the husband's surname by a wife is typically encountered in social situations where the connection to the husband is being stressed. Her full formal married-name (Ángela López Sáenz de Portillo) is the documentary convention in only some Latin American countries. Where it exists, the custom provides her with ceremonial life and death wife-names, Ángela López, Sra. de Portillo (Ángela López, Wife of Portillo) wherein Sra. (señora, “Mrs”) connotes "wife"; and Ángela López Sáenz, vda. de Portillo (Ángela López Sáenz, Widow of Portillo), wherein vda. (viuda, “widow”) denotes widowhood.
Some names have the de conjunction without association to marriage at all. Instead they may reflect the geographical origin of the individual or that of the individual ancestors. Thus there are men named Juan Ponce de Leon, José de Guzmán Benítez, and Oscar de la Renta.
The Hispanic preference for using the first surname from the father over the second surname from the mother occasionally results in serious legal problems in English-speaking countries like the United States, whose laws operate on the assumption that each person has a first name, middle name, and last name, where the last name is normally inherited solely from the father and is assumed to be the only surname.
For example, in a 2006 decision from one of the California Courts of Appeal, it was held that a creditor had failed to perfect its security interest in the strawberry crop of a debtor whose full true name was "Armando Muñoz Juárez." In accordance with Mexican naming convention, he frequently went by Armando Muñoz, and signed documents by that name, and the creditor's financing statement therefore referred to him as "Armando Muñoz." The court ruled: "Debtor's last name did not change when he crossed the border into the United States. The 'naming convention' is legally irrelevant[.]" In other words, under the California implementation of the Uniform Commercial Code, the debtor's "true last name" was Juárez (his maternal surname).
- Cristina impulsa ley para que el apellido materno vaya primero (Spanish)
- Proyecto de Ley Orgánica del Registro Civil
Limitación a la inscripción de nombres Artículo 106 ... no permitirán que ... les coloquen nombres que los expongan al ridículo; sean extravagantes o de difícil pronunciación en el idioma oficial; contengan variantes familiares y coloquiales que denoten una identificación confusa o que generen dudas sobre la determinación del sexo.
En estos casos, el registrador ofrecerá como referencia, un listado de los nombres y apellidos más comunes....
Quedan exceptuados de esta disposición los nombres de los niños, niñas o adolescentes de las etnias indígenas del país, así como los nombres de los hijos de los extranjeros....
- No se incluirá en anteproyecto de ley de registro civil artículo relacionado con los nombres, National Electoral Council, 13 September 2007
- Corona Fruits and Veggies, Inc. v. Frozsun Foods, Inc., 143 Cal. App. 4th 319, 48 Cal. Rptr. 3d 868 (2006). | <urn:uuid:40e41b35-618d-4d8e-91f8-807fa5a3ea63> | CC-MAIN-2013-20 | http://en.wikipedia.org/wiki/Hispanic_American_naming_customs | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.766617 | 2,331 | 3.390625 | 3 |
"It is recommended to consume a variety of different fruits and vegetables each day. Including a fruit serving as juice is one way to increase the variety of different fruits that are eaten each day."
- Produce for Better Health Foundation
Commonly asked questions about 100% juice
What is 100% juice?
100% juice is the liquid obtained from a fruit or vegetable.
How can you tell if a product is 100% fruit juice?
All juice products are required under the law to list the total percent juice content on the product's information panel.
How does 100% juice fit into a healthy diet?
Great tasting 100% juices are a smart addition to any diet, providing a variety of important nutrients that are found naturally in fruits and vegetables. In addition to providing nutrients like vitamin C, folate and potassium, 100% fruit juices also contain many naturally occurring phytonutrients, which have disease-preventative and health promoting potential. Fruit juices are a convenient way for adults and children to help meet the recommended daily number of servings of fruits and vegetables; a half-cup portion of 100% juice equals a serving of fruit.
Are whole fruits a better source of nutrients than 100% juice?
The Dietary Guidelines for Americans recommend that a majority of our daily fruit servings come from whole fruit. But most Americans are not meeting current recommendation for fruit and vegetable consumption and are missing out on valuable nutrients. For many people, drinking a glass of 100% juice is an easy and convenient way to help reach those goals, with just a half-cup serving of juice providing the equivalent of a full serving of fruit.
Does fruit juice have a lot of sugar and calories?
There are no added sugars in 100 percent juice - just the natural sugars found in whole fruit. In addition, fruit juice is considered a "nutrient dense" beverage, meaning that, per calorie, it packs more nutritional value than other beverage choices. Because nutrition is more than just calories, it's important to look at the whole picture: 100 percent fruit juice is a valuable source of key nutrients like folate, vitamin C and potassium and supplies a serving of fruit in each half-cup portion.
Does fruit juice make children fat?
The majority of research does not show a relationship between overweight and 100 percent juice consumption in children or teens. While there are some general misconceptions about the appropriateness of 100 percent fruit juices as part of the diet - especially children's diets - the current science strongly maintains the nutritional benefits of fruit juice. According to Dr. Theresa Nicklas of the Children's Nutrition Research Center at Baylor College of Medicine, a professor of pediatrics who has conducted research on juice consumption, "One hundred percent juice is and always has been a choice you can feel good about serving your family. The research shows there is no link between 100 percent juice intake and overweight." | <urn:uuid:c8de5e94-758d-45b7-9f3e-47cafdd3dadc> | CC-MAIN-2013-20 | http://fruitjuicefacts.org/faqs.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.948339 | 581 | 2.90625 | 3 |
Does worrying about fracking make you thirst for a drink? Before you raise that pint of ale to your lips, consider the source.
The brewmeister of Brooklyn Brewery says toxic fracking chemicals like methanol, benzene, and ethylene glycol (found in antifreeze) could contaminate his beer by leaking into New York’s water supply. Unlike neighboring Pennsylvania, New York state has promised to ban high-volume fracking from the city’s watershed. But environmentalists say the draft fracking regulations are weak and leave the largest unfiltered water supply in the U.S. — not to mention the beer that is made from it — vulnerable.
This story was produced as part of the Climate Desk collaboration. | <urn:uuid:0d2c4460-af95-4660-b1f2-c865340045fb> | CC-MAIN-2013-20 | http://grist.org/natural-gas/brooklynites-dont-frack-our-beer-video/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.956468 | 149 | 2.65625 | 3 |
In 2009, an hour and a half lecture about sugar and obesity that I gave to the public was posted to YouTube. Given its scientific content, I wasn’t even sure if my family members would watch it. Three million views later, the video is still going strong, and my theories about sugar’s toxic effects on the body are gaining traction. I still believe that one particular form of sugar—fructose—is toxic in high dose. Yet there is still a lot of confusion about this dietary bogeyman. Here are five myths about sugar and some important distinctions about how our body processes its different forms.
(LIST: Top 10 Diet Discoveries of 2012)
Myth 1. A carbohydrate is a carbohydrate; they all have the same calories.
Half true. There are three molecules that make up all the various kinds of carbohydrate: glucose, galactose, and fructose. All three molecules have the same caloric density—4.1 kcal/gm — which is why people erroneously conclude that “a calorie is a calorie.” Glucose is what’s found in starch; it’s the energy of life; all cells in all organisms on the planet burn glucose to make energy. Galactose (the molecule exclusively found in milk sugar) is rapidly converted in the liver to glucose. Fructose (the molecule that makes sugar sweet) is also metabolized in the liver, but any excess is converted into liver fat. Chronic and excess alcohol or fructose exposure both cause fatty liver disease, which drives the pathologic process of insulin resistance, and causes the same chronic diseases — obesity, heart disease, and diabetes.
Myth 2. Fructose is turned into glucose in the body.
Maybe. If you’re energy depleted (i.e. an elite athlete), fructose can be converted to glycogen (liver starch) as a storehouse for ready energy, which can then be fished out of your liver if your body needs glucose in the future (for more exercise or if you’re starving). But most of us aren’t energy depleted, so fructose gets turned into liver fat, driving insulin resistance. This is one reason why exercise can be an antidote to excess fructose consumption.
Myth 3. People can limit their sugar consumption without any difficulty.
In fact, sugar is weakly addictive. In animal studies, fructose causes the four criteria of addiction: bingeing, withdrawal, craving, and sensitization to other addictive substances (meaning after chronic exposure to sugar, it’s easier to get hooked on another drug). In humans, fructose lights up the reward center in your brain called the nucleus accumbens on MRI; but after repeated exposure, the reward center lights up less and less, so you need more and more to achieve the same effect. Fructose has effects on the reward center similar to alcohol; and just like alcohol, can lead to a “vicious cycle” of consumption and disease.
Myth 4. High fructose corn syrup is worse than table sugar.
Studies comparing HFCS and table sugar (sucrose) head-to-head show that they are similar in terms of their metabolic effects; both are equally bad for you. HFCS is 55% fructose, sucrose is 50% fructose. However, a recent study suggests that some commercial sugar-sweetened beverages might have as much as 65% fructose, which could potentially make them worse. This has yet to be shown in large studies.
Myth 5. Fructose is natural — it’s found in fruit — so it couldn’t possibly be poisonous.
(LIST: Top 10 Fitness Fads of 2012)
Just because a chemical is natural and safe in small quantities doesn’t mean it isn’t dangerous in large quantities; e.g. Vitamin D, iron, fluoride. Yet each of these substances are on the FDA’s GRAS (Generally Regarded as Safe) list. But they don’t have abuse potential. Fructose does. A little is OK, a lot is not. And naturally occurring fructose in fruit comes with a boatload of fiber, which limits its absorption. Refined sugar has no fiber. You absorb it all immediately — that’s how the damage is done. Of course, soft drinks are the quickest way to overload your liver; but soft drinks account for only one-third of all sugar consumed. The American Heart Association has recommended cutting our added sugar consumption back by more than two-thirds; from an average of 22 tsp/day down to 6 for women and 9 for men.
As with everything, the devil is in the details. The one thing we can agree on is that our sugar consumption has skyrocketed, from 4 teaspoons a day in 1990 to 22 teaspoons today. It needs to go back to being a once-a-week treat—something for special occasions—instead of a once-a-meal diet staple. | <urn:uuid:1d13bddb-4db7-4bad-abaf-24907f99c76b> | CC-MAIN-2013-20 | http://ideas.time.com/2012/12/27/what-you-need-to-know-about-sugar/?iid=nf-article-mostpop2 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.940951 | 1,017 | 3.0625 | 3 |
This margarita glass-shaped space setup is nicknamed, SPS-ALPHA – which is short for Solar Power Satellite via Arbitrarily Large PHased Array. It consists of a large array of thin-film mirrors attached to the curved surface of a massive satellite. These mirrors are moveable and will be used to redirect incoming Sunlight towards the solar cells that are fixed on the backside of the device. A collection of microwave power transmission panels is placed on the Earth-side of the array, which enables the transportation of the electricity generated by the solar cells to earth in the form of radio waves.
John Mankins, the leader of the concept says: “The needed next steps are to develop a working prototype of one or more of the modules and demonstrate the assembled system in the field. Over the next several years, the goal is to realize a low-Earth orbit flight test of the system.”
Image credit: JAXA
Japan Aerospace Exploration Agency (JAXA) is aiming to launch their space-based solar power prototype by 2020, with plans to set up a full system in space by 2030. JAXA`s SBSP system is a satellite designed to run in stationary orbit 22,400 miles above the equator, where it will absorb sunlight with chromium-enhanced solar cells. Neodymium plates fixed on the satellite’s surface will zap the energy down to Earth by using laser beams with 42% solar-to-laser energy efficiency. Current estimations predict that a single solar SBSP satellite in space would be able to generate enough energy to power 500,000 homes.
Even though The Dyson–Harrop Satellite is technically not a space-based photovoltaic power design, it does harness the sun’s energy for the good of the planet. This satellite is in really a giant “sail” – 8,400 kilometers (5,220 miles) wide – designed to harness solar winds. The sail generates a magnetic field by pointing copper wires at the sun. This field is capable of capturing the electrons found in solar winds, which in turn are funneled into a spherical receiver that produces a current (a fundamentally different approach than photovoltaic solar panels). The plan is to send this energy back to Earth with powerful infrared laser beams. The total potential for harnessing solar winds is 1 billion gigawatts of electricity, so figuring out how to tap into this energy source could be a revolutionary step for mankind.
Image credit: NASA artwork by Pat Rawlings/SAIC.
The SunTower is a supertall gravity stabilized structure that uses inflatable circular solar concentrators, multi-junction solar cells and magnetron segments to transmit the sun’s energy down to earth. In laymen terms, it is similar in design to a sunflower, with the flower facing the Earth and sending the energy down the stem using microwaves. The predicted cost – before any energy has been produced – of one SunTower is estimated at $12 billion. Though the SunTower is an interesting concept, it soon became clear that the approach could only deliver power to a given ground station for a few minutes a day.
Image credit: Space Future
This SBSP concept involves an axisymmetric, modular space segment that extends in geostationary Earth orbit. It is covered with high-efficiency thin-film solar cells. One SolarDisc along with its ground component could be scaled to produce as much as 10 GW of energy.
The European Sail Tower SPS
The European Sail-Tower SPS (short for Solar Power Satellite) is a large tower-like orbital system that is similar to the Sun tower. The satellite deploys rectangular solar panels from sail-like structures that line the sides of the tower. The satellite stays in orbit and generates electricity that is transmitted back to Earth via microwaves. This design was developed in the late 90s, although there hasn’t been much activity in the last couple of years.
Peter Sage of Space Energy Inc., said the following in his space energy presentation at TED: “The challenge has never been technology, but economics [...] We have the technology to convert electricity into a transferable radio frequency, send it back down to Earth with pinpoint accuracy safely and reliably to create constant energy generated by the Sun 24 hours a day”
SBSP is the holy grail of renewable energy. These systems have the potential to supply the entire Earth with clean, base-load electricity. A coordinated effort from China, India, Japan, EU and United States, both in terms of funding and research collaboration, could bring us closer to making science fiction become reality. | <urn:uuid:6190dafc-d372-4cdf-8fa1-f736f6b743a5> | CC-MAIN-2013-20 | http://inhabitat.com/6-out-of-this-world-space-based-solar-power-designs/dyson-harrop/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.938272 | 961 | 3.5 | 4 |
The XmlLite library allows developers to build high-performance XML-based applications that provide a high degree of interoperability with other applications that adhere to the XML 1.0 standard. The primary goals of XmlLite are ease of use, performance, and standards compliance.
XmlLite works with any Windows language that can use dynamic link libraries (DLLs), but Microsoft recommends C++. XmlLite comes with all necessary support files for use with C++, but if you want to use it with other languages, some additional work may be required.
XmlLite works with various versions of the Microsoft C++ compiler, but the samples in the documentation have been validated only with the latest version of Visual Studio.
This topic provides an overview of XmlLite and some guidelines for which XML parser to use in various scenarios.
For installation information, see Installing XmlLite.
XML can be used as a format for storing documents, such as Microsoft Office Word documents. It can also be used to encode data for marshalling method calls across machine boundaries (SOAP). Businesses can use XML for sending and receiving purchase orders and invoices. Web technologies can use XML to send data between the Web server and the client's Web browser. Database servers can return the data from queries in XML for further processing by other applications. Because it is such a flexible format, XML can be used in a vast variety of scenarios.
Usage scenarios can be generally divided into two categories:
Some scenarios work with XML documents that come from external sources, and it is not known whether the XML documents are valid. In these scenarios, verification of validity is important. Typically, developers use XSD schemas or Document Type Definitions (DTDs) to verify validity. Performance may be a concern, but the overriding concern is that the application reading the XML receives a valid document. Saving and loading documents from and to a variety of applications is a usage scenario that falls in this category.
Some software systems use XML as a data store or a means for communication. In these scenarios, the developer knows that the XML document is valid, perhaps because another part of the system (which is under the control of the same developer or organization) generated the XML. The question of document validity is not an overriding concern. One example of this approach is where the software system runs on a server farm, and XML is used to communicate between various servers and processes. Another example might be one where a relatively complicated application has to store and retrieve a large amount of information. The developer completely controls the format of the XML document.
The focus of XmlLite is on performance. Therefore, XmlLite is most appropriate in the second of the two scenarios. XmlLite enables developers to write efficient (fast) code to read and write XML documents. In most scenarios, XmlLite parses faster than either the DOM in MSXML or SAX2 in MSXML.
XmlLite vs. System.XML
XmlLite is most appropriate for use with C++. If you are using C#, Visual Basic .NET, or other languages that use the common language runtime (CLR), it is more appropriate to use one of the parsers in System.XML.
Some developers want a deployment scenario where it is not required that the Microsoft .NET Framework be installed on deployment computers. XmlLite does not require the .NET framework to be installed, and may be appropriate for this situation.
No XSD or DTD Validation
Because XmlLite is oriented towards optimum performance, it does not provide for document validation. Validation via XSD schemas or DTDs is not supported. If you require validation, it is recommended that you use either MSXML or System.XML.
If you read a document that refers to an external XSD schema, the XmlLite reader ignores the external schema. Even if the document is invalid per the schema, the XmlLite reader will report no errors.
If you read a document that contains an inline schema, the XmlLite reader returns all of the elements and attributes of the inline schema, just as if they were parts of the XML document.
No Scripting Language Support
XmlLite does not support scripting languages. If you need to use XML from JScript or Visual Basic Scripting Edition (VBScript), it is more appropriate to use the Document Object Model (DOM) in MSXML.
Limited DTD Support
Document Type Definitions (DTDs) are supported, but only for entity expansion and defaults for attributes, not for document validation. If you require DTD validation, it is recommended that you use either MSXML or System.XML.
If you enable DTDs, note the following: If you use XmlLite to read a document that refers to a DTD and the document is not valid per that DTD, no error will be thrown.
Both the XmlLite runtime and development files are required to run the examples in this documentation. For more information, see Installing XmlLite. | <urn:uuid:afc1de8a-e57a-4e74-bc10-8eb3635d863f> | CC-MAIN-2013-20 | http://msdn.microsoft.com/en-us/library/ms752838(v=vs.85).aspx | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.859403 | 1,067 | 2.734375 | 3 |
Individual differences |
Methods | Statistics | Clinical | Educational | Industrial | Professional items | World psychology |
Developmental Psychology: Cognitive development · Development of the self · Emotional development · Language development · Moral development · Perceptual development · Personality development · Psychosocial development · Social development · Developmental measures
BSID-III is the current version and is a standard series of measurements used primarily to assess the motor (fine and gross), language (receptive and expressive), and cognitive development of infants and toddlers, ages 0-3. This measure consists of a series of developmental play tasks and takes between 45 - 60 minutes to administer. Raw scores of successfully completed items are converted to scale scores and to composite scores. These scores are used to determine the child's performance compared with norms taken from typically developing children of their age (in months). The assessment is often used in conjunction with the Social-Emotional Adaptive Behavior Questionnaire. Completed by the parent or caregiver, this questionniare establishes the range of adaptive behaviors that the child can currently achieve and enables comparison with age norms.
- Essentials of Bayley Scales of Infant Development II Assessment Maureen M. Black, Kathleen Matula. New York: John Wily, 1999. ISBN: 978-0-471-32651-9
- "Scales of Infant Development and Play-Based Assessment in Two-Year Old At-Risk Children" Lisa Kelly-Vance, Howard Needelman, Kim Troia, Brigette Oliver Ryalls, University of Nebraska-Omaha, USA Developmental Disabilities Bulletin, Vol. 27 (1), 1999
- "Poor predictive validity of the Bayley Scales of Infant Development for cognitive function of extremely low birth weight children at school age." Hack M, Taylor HG, Drotar D, Schluchter M, Cartar L, Wilson-Costello D, Klein N, Friedman H, Mercuri-Minich N, Morrow M. Pediatrics. 2005 Aug;116(2):333-41. | <urn:uuid:e141b346-f67b-48e0-b5a0-48180e7c05c0> | CC-MAIN-2013-20 | http://psychology.wikia.com/wiki/Bayley_Scales_of_Infant_Development?oldid=110220 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.792597 | 417 | 3.015625 | 3 |
Strictly speaking, the use of the term "signature" about HMAC is improper; it is widespread, but still incorrect: signatures are about asymmetric algorithms with a public and a private key, such as RSA.
HMAC uses a secret key (i.e. a bunch of arbitrary bytes) which is used for computing the MAC and for verifying it (it is actually verified by recomputing it). So, in your problem, yes, the server must store either the secret key, or some data which is enough to recover it.
Note that the secret key K can be derived from the password in a non-invertible way. E.g. through a hash function or, better yet, with a Key Derivation Function. The server will store the key K "in plaintext" and knowing key K is enough to produce valid HMAC values. However, this forces an attacker to use some specific software for that, not the standard client which requests a user password. Depending on the context and your attack model, this may or may not be a security improvement.
A way to achieve what you are looking for, but with higher complexity then a plain HMAC, is to use SRP. SRP is an asymmetric key exchange protocol with mutual password-based authentication, with the following characteristics:
- No need for public key distribution (PKI, certificates...).
- Client authenticates server and server authenticates client, in the same pass, even in the presence of active attackers ("Man-In-The-Middle" attackers are defeated).
- No active or passive attackers learns enough information to perform offline dictionary attacks (a dictionary attack is guessing the password by trying random words; the attack is offline if it can be done without interacting with the honest client or server for each guess).
- What the server stores is not enough to learn the password or impersonate the client (but it allows offline dictionary attacks, which is unavoidable).
The key which results from the SRP protocol can then be used for a MAC algorithm such as HMAC. It needs not be stored: it is just kept in RAM for the duration of the session.
SRP can be integrated in TLS, as explained in RFC 5054. The easiest, most standard supported way to use SRP in your context would be to use HTTPS (i.e. HTTP within a SSL/TLS tunnel) with the TLS part using SRP for key exchange. GnuTLS is an opensource implementation of SSL/TLS which supports SRP. | <urn:uuid:66f6e3ee-c5bd-4a51-a930-c3cf3e9ede6a> | CC-MAIN-2013-20 | http://security.stackexchange.com/questions/2512/is-there-a-way-to-accept-signed-requests-without-storing-clients-password-in-pl/2515 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.925211 | 523 | 2.859375 | 3 |
The Dow theory has been around for almost 100 years, yet even in today's volatile and technology-driven markets, the basic components of Dow theory still remain valid. Developed by Charles Dow, refined by William Hamilton and articulated by Robert Rhea, the Dow theory addresses not only technical analysis and price action, but also market philosophy. Many of the ideas and comments put forth by Dow and Hamilton became axioms of Wall Street. While there are those who may think that it is different this time, a read through The Dow Theory will attest that the stock market behaves the same today as it did almost 100 years ago.
The Dow theory presented below has been taken from Robert Rhea's book, The Dow Theory. Although Dow theory is attributed to Charles Dow, it is William Hamilton's writings that serve as the corner stone for this book and the development of the theory. Also, it should be noted that most of the theory was developed with the Dow Jones Rail and Industrial averages in mind. Even though many concepts can be applied to individual stocks, please keep in mind that these are broad concepts and best applied to stocks as a group or index. When possible, we have also attempted to link some of the realities of today's market with the Dow theory as explained by Dow, Hamilton and Rhea.
Charles Dow developed the Dow theory from his analysis of market price action in the late 19th century. Until his death in 1902, Dow was part owner as well as editor of The Wall Street Journal. Although he never wrote a book on the subject, he did write some editorials that reflected his views on speculation and the role of the rail and industrial averages.
Even though Charles Dow is credited with developing the Dow theory, it was S.A. Nelson and William Hamilton who later refined the theory into what it is today. Nelson wrote The ABC of Stock Speculation and was the first to actually use the term "Dow theory." Hamilton further refined the theory through a series of articles in The Wall Street Journal from 1902 to 1929. Hamilton also wrote The Stock Market Barometer in 1922, which sought to explain the theory in detail.
In 1932, Robert Rhea further refined the analysis of Dow and Hamilton in The Dow Theory. Rhea read, studied and deciphered some 252 editorials through which Dow (1900-1902) and Hamilton (1902-1929) conveyed their thoughts on the market. Rhea also referred to Hamilton's The Stock Market Barometer. The Dow Theory presents the Dow theory as a set of assumptions and theorems.
Before one can begin to accept the Dow theory, there are a number of assumptions that must be accepted. Rhea stated that for the successful application of the Dow theory, these assumptions must be accepted without reservation.
The first assumption is: The manipulation of the primary trend is not possible. When large amounts of money are at stake, the temptation to manipulate is bound to be present. Hamilton did not argue against the possibility that speculators, specialists or anyone else involved in the markets could manipulate the prices. He qualified his assumption by asserting that it was not possible to manipulate the primary trend. Intraday, day-to-day and possibly even secondary movements could be prone to manipulation. These short movements, from a few hours to a few weeks, could be subject to manipulation by large institutions, speculators, breaking news or rumors. Today, Hamilton would likely add message boards and day-traders to this list.
Hamilton went on to say that individual shares could be manipulated. Examples of manipulation usually end the same way: the security runs up and then falls back and continues the primary trend. Examples include:
- PairGain Technology rose sharply due to a hoax posted on a fake Bloomberg site. However, once the hoax was revealed, the stock immediately fell back and returned to its primary trend.
- Books-A-Million rose from 3 to 47 after announcing an improved web site. Three weeks later, the stock settled around 10 and drifted lower from there.
- In 1979/80, there was an attempt to manipulate the price of silver by the Hunt brothers. Silver skyrocketed to over 50$ per ounce, only to come back down to earth and resume its long bear market after the plot to corner the market was unveiled.
While these shares were manipulated over the short term, the long-term trends prevailed after about a month. Hamilton also pointed out that even if individual shares were being manipulated, it would be virtually impossible to manipulate the market as a whole. The market was simply too big for this to occur.
The market reflects all available information. Everything there is to know is already reflected in the markets through the price. Prices represent the sum total of all the hopes, fears and expectations of all participants. Interest rate movements, earnings expectations, revenue projections, presidential elections, product initiatives and all else are already priced into the market. The unexpected will occur, but usually this will affect the short-term trend. The primary trend will remain unaffected.
The chart below of Coca-Cola (KO) is a recent example of the primary trend remaining intact. The downtrend for Coca-Cola began with the sharp fall from above 90. The stock rallied with the market in October and November 1998, but by December started to decline again. According to Dow theory, the October/November rally would be called a secondary move (against the primary trend). It is likely that the stock was caught up in the general market advance at the time. However, when the major indices were hitting new highs in December, Coca-Cola was starting to flounder and resume its primary trend.
Hamilton noted that sometimes the market would react negatively to good news. For Hamilton, the reasoning was simple: the market looks ahead. By the time the news hits the street, it is already reflected in the price. This explains the old Wall Street axiom, "buy the rumor, sell the news". As the rumor begins to filter down, buyers step in and bid the price up. By the time the news hits, the price has been bid up to fully reflect the news. Yahoo! (YHOO) and the run up to earnings is a classic example. For the past three quarters, Yahoo! has been bid up leading right up to the earnings report. Even though earnings have exceeded expectations each time, the stock has fallen by about 20%.
Hamilton and Dow readily admit that the Dow theory is not a sure-fire means of beating the market. It is looked upon as a set of guidelines and principles to assist investors and traders with their own study of the market. The Dow theory provides a mechanism for investors to use that will help remove some of the emotion. Hamilton warns that investors should not be influenced by their own wishes. When analyzing the market, make sure you are objective and see what is there, not what you want to see. If an investor is long, he or she may want to see only the bullish signs and ignore any bearish signals. Conversely, if an investor is out of the market or short, he or she may be apt to focus on the negative aspects of the price action and ignore any bullish developments. Dow theory provides a mechanism to help make decisions less ambiguous. The methods for identifying the primary trend are clear-cut and not open to interpretation.
Even though the theory is not meant for short-term trading, it can still add value for traders. No matter what your time frame, it always helps to be able to identify the primary trend. According to Hamilton (writing in the early part of the 20th century), those who successfully applied the Dow theory rarely traded more than four or five times a year. Remember that intraday, day-to-day and possibly even secondary movements can be prone to manipulation, but the primary trend is immune from manipulation. Hamilton and Dow sought a means to filter out the noise associated with daily fluctuations. They were not worried about a couple of points, or getting the exact top or bottom. Their main concern was catching the large moves. Both Hamilton and Dow recommended close study of the markets on a daily basis, but they also sought to minimize the effects of random movements and concentrate on the primary trend. It is easy to get caught up in the madness of the moment and forget the primary trend. After the October low, the primary trend for Coca-Cola remained bearish. Even though there were some sharp advances, the stock never forged a higher high.
Dow and Hamilton identified three types of price movements for the Dow Jones Industrial and Rail averages: primary movements, secondary movements and daily fluctuations. Primary moves last from a few months to many years and represent the broad underlying trend of the market. Secondary (or reaction) movements last from a few weeks to a few months and move counter to the primary trend. Daily fluctuations can move with or against the primary trend and last from a few hours to a few days, but usually not more than a week.
Primary movements represent the broad underlying trend of the market and can last from a few months to many years. These movements are typically referred to as bull and bear markets. Once the primary trend has been identified, it will remain in effect until proved otherwise. (We will address the methods for identifying the primary trend later in this article.) Hamilton believed that the length and the duration of the trend were largely indeterminable. Hamilton did study the averages and came up with some general guidelines for length and duration, but warned against attempting to apply these as rules for forecasting.
Many traders and investors get hung up on price and time targets. The reality of the situation is that nobody knows where and when the primary trend will end. The objective of Dow theory is to utilize what we do know, not to haphazardly guess about what we don't know. Through a set of guidelines, Dow theory enables investors to identify the primary trend and invest accordingly. Trying to predict the length and the duration of the trend is an exercise in futility. Hamilton and Dow were mainly interested in catching the big moves of the primary trend. Success, according to Hamilton and Dow, is measured by the ability to identify the primary trend and stay with it.
Secondary movements run counter to the primary trend and are reactionary in nature. In a bull market a secondary move is considered a correction. In a bear market, secondary moves are sometimes called reaction rallies. Earlier in this article, a chart of Coca-Cola was used to illustrate reaction rallies (or secondary movements) within the confines of a primary bear trend. Below is a chart illustrating a correction within the confines of a primary bull trend.
In Sept-96, the DJIA ($INDU) recorded a new high, thereby establishing the primary trend as bullish. From trough to peak, the primary advance rose 1988 points. During the advance from Sept-96 to Mar-97, the DJIA never declined for more than two consecutive weeks. By the end of March, after three consecutive weeks of decline, it became apparent that this move was not in the category of daily fluctuations and could be considered a secondary move. Hamilton noted some characteristics that were common to many secondary moves in both bull and bear markets. These characteristics should not be construed as rules, but rather as loose guidelines to be used in conjunction with other analysis techniques. The first three characteristics have been applied to the example above.
- Based on historical observation, Hamilton estimated that secondary movements retrace 1/3 to 2/3 of the primary move, with 50% being the typical amount. In actuality, the secondary move in early 1997 retraced about 42% of the primary move. (7158 - 5170 = 1988; 7158 - 6316 = 842, 842/1988 = 42.35%).
- Hamilton also noted that secondary moves tend to be faster and sharper than the preceding primary move. Just with a visual comparison, we can see that the secondary move was sharper that the preceding primary advance. The primary move advanced 38% (1988/5170 = 38%) and lasted from Jul-96 to Mar-97, about 8 months. The secondary move witnessed a correction of 11.7% (842/7158 = 11.7%) and lasted a mere five weeks.
- At the end of the secondary move, there is usually a dull period just before the turnaround. Little price movement, a decline in volume, or a combination of the two can mark this dullness. Below is a daily chart focusing on the Apr-97 low for the secondary move outlined above.
April 7 through 10 marked the dull point (red line on volume). There was little price movement and volume was the lowest since the decline began. The DJIA ($INDU) then gapped down on an increase in volume. After the down gap, there was a reversal day and then the DJIA proceeded with a gap up and breakout to a reaction high on increasing volume (green line on volume). The new reaction high combined with the increase in volume indicated that the secondary move was over and the primary trend had resumed.
- Lows are sometimes accompanied by a high-volume washout day. The September/October lows in 1998 were accompanied by record volume levels. At the time, the low on Sept-1 witnessed the highest volume ever recorded and the Oct-8 low recorded the second highest volume ever. Although these high-volume lows were not a signal in and of themselves, they helped form a pattern that preceded a historical advance. This advance took the DJIA ($INDU) from below 8000 to over 11000 in less than one year. Further confirmation of a change in trend came in the form of a new reaction high with high volume on Oct-15.
There is still debate as to whether the crash of 1998 was a bear market or merely a secondary move within the confines of a larger bull market. In hindsight, it would appear to be a secondary move. Even though the DJIA recorded a lower low on August 4 and had lost just over 20% by September 4, the two-month time frame makes it difficult to justify as a bear market.
Hamilton characterized secondary moves as a necessary phenomenon to combat excessive speculation. Corrections and counter moves kept speculators in check and added a healthy dose of guesswork to market movements. Because of their complexity and deceptive nature, secondary movements require extra careful study and analysis. Investors often mistake a secondary move for the beginning of a new primary trend. How far does a secondary move have to go before the primary trend is affected? This issue will be addressed in Part 3 of this article, when we analyze the various signals based on Dow theory.
Daily fluctuations, while important when viewed as a group, can be dangerous and unreliable individually. Due to the randomness of the movements from day to day, the forecasting value of daily fluctuations is limited at best. At worst, too much emphasis on daily fluctuation will lead to forecasting errors and possibly losses. Getting too caught up in the movement of one or two days can lead to hasty decisions that are based on emotion. It is vitally important to keep the whole picture in mind when analyzing daily price movements. Think of the pieces of a puzzle. Individually, a few pieces are meaningless, yet at the same time they are essential to complete the picture. Daily price movements are important, but only when grouped with other days to form a pattern for analysis. Hamilton did not disregard daily fluctuations, quite to the contrary. The study of daily price action can add valuable insight, but only when taken in context of the larger picture. There is little structure in one, two or even three days' worth of price action. However, when a series of days is combined, a structure will start to emerge and analysis becomes better grounded.
Hamilton identified three stages to both primary bull markets and primary bear markets. These stages relate as much to the psychological state of the market as to the movement of prices. A primary bull market is defined as a long sustained advance marked by improving business conditions that elicit increased speculation and demand for stocks. A primary bear market is defined as a long sustained decline marked by deteriorating business conditions and subsequent decrease in demand for stocks. In both primary bull markets and primary bear markets, there will be secondary movements that run counter to the major trend.
Hamilton noted that the first stage of a bull market was largely indistinguishable from the last reaction rally of a bear market. Pessimism, which was excessive at the end of the bear market, still reigns at the beginning of a bull market. It is a period when the public is out of stocks, the news from corporate America is bad and valuations are usually at historical lows. However, it is at this stage that the so-called "smart money" begins to accumulate stocks. This is the stage of the market when those with patience see value in owning stocks for the long haul. Stocks are cheap, but nobody seems to want them. This is the stage where Warren Buffet stated in the summer of 1974 that now was the time to buy stocks and become rich. Everyone else thought he was crazy.
In the first stage of a bull market, stocks begin to find a bottom and quietly firm up. When the market starts to rise, there is widespread disbelief that a bull market has begun. After the first leg peaks and starts to head back down, the bears come out proclaiming that the bear market is not over. It is at this stage that careful analysis is warranted to determine if the decline is a secondary movement (a correction of the first leg up). If it is a secondary move, then the low forms above the previous low, a quiet period will ensue as the market firms and then an advance will begin. When the previous peak is surpassed, the beginning of the second leg and a primary bull will be confirmed.
The second stage of a primary bull market is usually the longest, and sees the largest advance in prices. It is a period marked by improving business conditions and increased valuations in stocks. Earnings begin to rise again and confidence starts to mend. This is considered the easiest stage to make money as participation is broad and the trend followers begin to participate.
The third stage of a primary bull market is marked by excessive speculation and the appearance of inflationary pressures. (Dow formed these theorems about 100 years ago, but this scenario is certainly familiar.) During the third and final stage, the public is fully involved in the market, valuations are excessive and confidence is extraordinarily high. This is the mirror image to the first stage of the bull market. A Wall Street axiom: When the taxi cab drivers begin to offer tips, the top cannot be far off.
Just as accumulation is the hallmark of the first stage of a primary bull market, distribution marks the beginning of a bear market. As the "smart money" begins to realize that business conditions are not quite as good as once thought, they start to sell stocks. The public is still involved in the market at this stage and become willing buyers. There is little in the headlines to indicate a bear market is at hand and general business conditions remain good. However, stocks begin to lose a bit of their luster and the decline begins to take hold.
While the market declines, there is little belief that a bear market has started and most forecasters remain bullish. After a moderate decline, there is a reaction rally (secondary move) that retraces a portion of the decline. Hamilton noted that reaction rallies during bear markets were quite swift and sharp. As with his analysis of secondary moves in general, Hamilton noted that a large percentage of the losses would be recouped in a matter of days or perhaps weeks. This quick and sudden movement would invigorate the bulls to proclaim the bull market alive and well. However, the reaction high of the secondary move would form and be lower than the previous high. After making a lower high, a break below the previous low would confirm that this was the second stage of a bear market.
As with the primary bull market, stage two of a primary bear market provides the largest move. This is when the trend has been identified as down and business conditions begin to deteriorate. Earnings estimates are reduced, shortfalls occur, profit margins shrink and revenues fall. As business conditions worsen, the sell-off continues.
At the top of a primary bull market, hope springs eternal and excess is the order of the day. By the final stage of a bear market, all hope is lost and stocks are frowned upon. Valuations are low, but the selling continues as participants seek to sell no matter what. The news from corporate America is bad, the economic outlook bleak and not a buyer is to be found. The market will continue to decline until all the bad news is fully priced into stocks. Once stocks fully reflect the worst possible outcome, the cycle begins again.
Through the writings of Dow and Hamilton, Rhea identified 4 separate theorems that addressed trend identification, buy and sell signals, volume, and trading ranges. The first two were deemed the most important and serve to identify the primary trend as bullish or bearish. The second two theorems, dealing with volume and trading ranges, were not considered instrumental in primary trend identification by Hamilton. Volume was looked upon as a confirming statistic and trading ranges were thought to identify periods of accumulation and distribution.
The first step in identifying the primary trend is to identify the individual trend of the Dow Jones Industrial Average (DJIA), and Dow Jones Transportation Average (DJTA), individually. Hamilton used peak and trough analysis in order to ascertain the identity of the trend. An uptrend is defined by prices that form a series of rising peaks and rising troughs (higher highs and higher lows). In contrast, a downtrend is defined by prices that form a series of declining peaks and declining troughs (lower highs and lower lows).
Once the trend has been identified, it is assumed valid until proved otherwise. A downtrend is considered valid until a higher low forms and the ensuing advance off of the higher low surpasses the previous reaction high. Below is a chart of the Dow Jones Transportation Average in 1992. Even though Hamilton and Dow did not make specific references to trend lines, a line has been drawn to emphasize the downward trajectory of the trend. Since the peak in February, a series of lower lows and lower highs formed to make a downtrend. There was a secondary rally in April and May (green circle), but the March high was not surpassed.
The DJTA ($TRAN) continued down until the high volume washout day (red arrow). As discussed in this article, high volume days signal that a possible change is looming. Alone, a high volume washout day is not a buy signal, but rather an indication to monitor price action a little closer. After this high volume day, the DJTA dipped again and then moved above 1250, creating a higher low (green arrow). Even after the higher low is in place, it is still too early to call for a change in trend. The change of trend is not confirmed until the previous reaction high is surpassed (blue arrow).
Conversely, an uptrend is considered in place until a lower low forms and the ensuing decline exceeds the previous low. Below is a line chart of the closing prices for the DJIA. An uptrend began with the Oct-98 lows and the DJIA formed a series of higher highs and higher lows over the next 11 months. Twice, in Dec-98 (red circle) and Jun-99 (blue arrows), the validity of the uptrend came into question, but the uptrend prevailed until late September. (The Dec-98 price action is addressed below.) There were lower highs in Jun-99, but there were never any lower lows to confirm these lower highs and support held. Any bears that jumped the gun in June were made to sit through two more all-time highs in July and August. The change in trend occurred on September 23 when the June lows were violated. Some traders may have concluded that the trend changed when the late August lows were violated. This may indeed be the case, but it is worth noting that the June lows represented a more convincing support area. Keep in mind that the Dow theory is not a science and Hamilton points this out numerous times. The Dow theory is meant to offer insights and guidelines from which to begin careful study of the market movements and price action.
Looking at the line chart above (DJIA ($INDU) 1998/1999 daily close semi-log scale), it may be difficult to distinguish between a valid change in trend and a simple correction. For instance: Was a change in trend warranted when the December low penetrated the November low? (red circle) After the November peak, a lower high formed in December and then the November reaction low was broken. In order to eliminate false signals, Hamilton suggested excluding moves of less than 3%. This was not meant to be a hard and fast rule, but the idea is worth noting. With the increased volatility of today's markets comes the need to smooth the daily fluctuations and avoid false readings.
Hamilton and Dow were interested in catching the big moves and would have been apt to use weekly charts to establish reaction highs and lows. However, in today's fast moving markets, weekly charts may not portray the detail that investors need. One possible solution is to apply a short moving average to the price plot. Although not mentioned by Hamilton and Dow, a 5-day moving average could be applied to smooth the price series and still allow for detail. The chart below (DJIA ($INDU) 1998/1999 daily close 5-EMA) uses a 5-day exponential moving average to smooth the price plot. Notice that the November reaction low now appears quite immaterial. Also, the September reaction high (red arrow) still shows up.
When the Dow theory was being developed at the turn of the century, the railroads were a vital link in the economy. Hamilton argued that many times activity would begin in the Rail Average before the Industrial Average. He attributed this to the fact that before economic activity began, raw materials would have to be moved from the suppliers to manufacturers. Before General Motors could increase production, more steel would need to be transported. Therefore, an increase in activity among the rail stocks would foreshadow an increase in business activity for the industrial stocks.
There is no doubt that today's economy is much different and the makeup of the DJTA has changed to favor the airlines. However, there is still some credibility in using the DJTA to confirm movements in the DJIA. Transport stocks are much more dependent on the economic environment than the average stock and will likely foreshadow economic growth.
- The airline business is cyclical and revenues are highly susceptible to economic changes.
- Airline companies typically carry above average levels of debt and will be more vulnerable to changes in interest rates.
- Energy and Labor costs form a large portion of expenses.
To reflect the added risks above, airline stocks have traditionally sold significantly below market multiples. If the PE for the S&P 500 is 28, the average airline might sell for only 8-10 times earnings.
Even though we are possibly entering into a "new economy," the majority of businesses will somehow be affected by changes in economic activity, interest rates, energy costs and labor costs. Airline companies, bearing the burden of all of the above, are still likely to act as a leading indicator of the general economic environment.
However, one caveat must be added as well. Possibly the greatest fear of the airlines is that people will stop flying in airplanes. Business travel accounts for a large portion of airline revenues, especially the high margin revenues. With the development of the Internet and networking, the need for business travel could be greatly reduced in the future. Federal Express has already experienced a slowdown in the quantity of business documents being shipped. This could ultimately spill over into the business of the airlines.
Hamilton and Dow stressed that for a primary trend buy or sell signal to be valid, both the Industrial Average and the Rail Average must confirm each other. If one average records a new high or new low, then the other must soon follow for a Dow theory signal to be considered valid.
Combining the guidelines set forth for trend identification with the theorem on confirmation, it is now possible to classify the primary trend of the market. The chart above shows an array of signals that occurred during a 7-month period in 1998.
- In July, trouble began to surface when the DJTA failed to confirm the new high set by the DJIA. This served as a warning sign, but did not change the trend. Remember, the trend is assumed to be in force until proved otherwise.
- On July 31, the DJTA recorded a new reaction low. Two days later, the DJIA recorded a new reaction low and confirmed a change in the primary trend from bullish to bearish (red line). After this signal, both averages went on to record new reaction lows.
- In October, the DJIA formed a higher low while the DJTA recorded a new low. This was another non-confirmation and served notice to be on guard for a possible change in trend.
- After the higher low, the DJIA followed through with a higher high later that month. This effectively changes the trend for the average from down to up.
- It was not until early November that the DJTA went on to better its previous reaction high. However, at the same time the DJIA was also advancing higher and the primary trend had changed from bearish to bullish.
The importance of volume was alluded to above with the chart of the Apr-97 bottom in the DJIA. Rhea notes that while Hamilton did analyze volume statistics, price action was the ultimate determinant. Volume is more important when confirming the strength of advances and can also help to identify potential reversals.
Hamilton thought that volume should increase in the direction of the primary trend. In a primary bull market, volume should be heavier on advances than during corrections. Not only should volume decline on corrections, but participation should also decrease. As Hamilton put it, the market should become "dull and narrow" on corrections, "narrow" meaning that the number of declining issues should not be expanding dramatically. The opposite is true in a primary bear market. Volume should increase on the declines and decrease during the reaction rallies. The reaction rallies should also be narrow and reflect poor participation of the broader market. By analyzing the reaction rallies and corrections, it is possible to judge the underlying strength of the primary trend.
Hamilton noted that high volume levels could be indicative of an impending reversal. A high volume day after a long advance may signal that the trend is about to change or that a reaction high may form soon. In his StockCharts.com commentary on 25-Jun-99, Rex Takasugi discusses the correlation between volume and peaks in the market. Even though his analysis reveals a lag time between volume peaks and market reversals, the relationship still exists. Takasugi's analysis reveals that since 1900 there have been 14 cycles and volume peaked on average 5.6 months ahead of the market. He also notes that the most recent volume peak occurred in Apr-99.
In his commentaries over the years, Hamilton referred many times to "lines." Lines are horizontal lines that form trading ranges. Trading ranges develop when the averages move sideways over a period of time and make it possible to draw horizontal lines connecting the tops and bottoms. These trading ranges indicate either accumulation or distribution, but it was virtually impossible to tell which until there was a break to the upside or the downside. If there were a break to the upside, then the trading range would be considered an area of accumulation. If there were a break to the downside, then the trading range would be considered an area of distribution. Hamilton considered the trading range neutral until a breakout occurred. He also warned against attempting to anticipate the breakout.
Mark Hulbert, writing in the New York Times - 6-Sept-98, notes a study that was published in the Journal of Finance by Stephen Brown of New York University and William Goetzmann and Alok Kumar of Yale. They developed a neural network that incorporated the rules for identifying the primary trend. The Dow theory system was tested against buy-and-hold for the period from 1929 to Sept-98. When the system identified the primary trend as bullish, a long position was initiated in a hypothetical index fund. When the system signaled a bearish primary trend, stocks were sold and the money was placed in fixed income instruments. By taking money out of stocks after bear signals, the risk (volatility) of the portfolio is significantly reduced. This is a very important aspect of the Dow theory system and portfolio management. In the past few years, the concept of risk in stocks has diminished, but it is still a fact that stocks carry more risk than bonds.
Over the 70-year period, the Dow theory system outperformed a buy-and-hold strategy by about 2% per year. In addition, the portfolio carried significantly less risk. If compared as risk-adjusted returns, the margin of out-performance would increase. Over the past 18 years, the Dow theory system has under-performed the market by about 2.6% per year. However, when adjusted for risk, the Dow theory system outperformed buy-and-hold over the past 18 years. Keep in mind that 18 years is not a long time in the history of the market. The Dow theory system was found to under-perform during bull markets and outperform during bear markets.
The first criticism of the Dow theory is that it is really not a theory. Neither Dow nor Hamilton wrote proper academic papers outlining the theory and testing the theorems. The ideas of Dow and Hamilton were put forth through their editorials in the Wall Street Journal. Robert Rhea stitched the theory together by poring over these writings.
Secondly, the Dow theory is criticized for being too late. The trend does not change from bearish to bullish until the previous reaction high has been surpassed. Many traders feel that this is simply too late and misses much of the move. Dow and Hamilton sought to catch the meat of the move and enter during the second leg. Even though this is where the bulk of the move will take place, it is also after the first leg and part way into the second leg. And, if one has to wait for confirmation from the other average, it could even be later in the move.
Thirdly, because it uses the DJIA and DJTA, the Dow theory is criticized as being outdated and no longer an accurate reflection of the economy. This may be a valid point, but as outlined earlier, the DJTA is one of the most economically sensitive indices. The stock market has always been seen as a great predictor of economic growth. To at least keep the industrials up to speed, Home Depot, Intel, Microsoft and SBC Corp have been added to the average to replace Chevron, Goodyear, Sears and Union Carbide, as of 1-Nov-99.
The goal of Dow and Hamilton was to identify the primary trend and catch the big moves. They understood that the market was influenced by emotion and prone to over-reaction both up and down. With this in mind, they concentrated on identification and following: identify the trend and then follow the trend. The trend is in place until proved otherwise. That is when the trend will end, when it is proved otherwise.
Dow theory helps investors identify facts, not make assumptions or forecast. It can be dangerous when investors and traders begin to assume. Predicting the market is a difficult, if not impossible, game. Hamilton readily admitted that the Dow theory was not infallible. While Dow theory may be able to form the foundation for analysis, it is meant as a starting point for investors and traders to develop analysis guidelines that they are comfortable with and understand.
Reading the markets is an empirical science. As such there will be exceptions to the theorems put forth by Hamilton and Dow. They believed that success in the markets required serious study and analysis that would be fraught with successes and failures. Success is a great thing, but don't get too smug about it. Failures, while painful, should be looked upon as learning experiences. Technical analysis is an art form and the eye grows keener with practice. Study both successes and failures with an eye to the future. | <urn:uuid:19d02d4d-4377-46e5-9c64-f6e13602aeef> | CC-MAIN-2013-20 | http://stockcharts.com/school/doku.php?id=chart_school:market_analysis:dow_theory | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.967878 | 7,428 | 2.734375 | 3 |
I posted this last year and just wanted to remind you about our Hispanic Heritage Unit because well it is September now. So if you are trying to figure out what to do, check out our unit. My students love this unit because a lot of them have not been exposed to so many different cultures. They look forward to doing it on Fridays.
Hispanic Heritage Teachers Notebook
OK so I know that September is almost over but if you are like me you are wondering where it went. Didn't it fly by so fast!!!! Well September is Hispanic Heritage Month and along with learning about apples, Johnny Appleseed, and testing I always try to fit it in.
I usually reserve Fridays in the month of September and highlight a different country. I have the students fill out their passports and I even stamp them. Then we buckle up and get ready for our travels. Sometimes if I have enough donations we even have an in flight snack while we go on a tour of the country courtesy of my smart board. After we have toured the country we talk about the language and some of the music. I always try to download some traditional music on my ipod so that we can listen to it while we color in our flag and find our capital on our map. After we have done that we either have a craft or enjoy some traditional games. I love to show the students some pictures of the children in the different cultures so that they know that they are not much different than them. As September comes to an end we have to finish up our Hispanic Heritage Month and I usually finish it off by eating some traditional foods. I usually have parents donate money so that I can cook some things up. Now that Rio is out on dvd we will enjoy the movie while finishing off our fiesta.
I have uploaded my mini unit on TeachersNotebook and TPT if you are interested. My students really enjoy this unit so I hope you will too. Just click on the link and it will take to our store.
Now I am off to enjoy the last few hours before my weekend ends. | <urn:uuid:45f79a60-1d79-4a5a-bc7d-c9ba0eba8aab> | CC-MAIN-2013-20 | http://teaminguptoteach.blogspot.com/2012/09/dont-forget-hispanic-heritage.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.971449 | 420 | 2.671875 | 3 |
Cause of Dispute
Cause of dispute statistics relate to the reported main cause of stoppage of work and not necessarily all causes that may have been responsible for the stoppage of work. For these reasons, the statistics do not reflect the relative importance of all causes of disputes as perceived by both employers and employees. The causes are classified from information supplied by employers and according to standards determined by the International Labour Organisation.
Disputes are initially classified according to whether a dispute occurred during a process of workplace/enterprise bargaining. A process of workplace/enterprise bargaining refers to the negotiations that take place between an employer and their employees (or their representatives), in reaching an agreement over pay and employment conditions.
Disputes not related to a process of workplace/enterprise bargaining include:
Disputes are then further classified according to the main cause of the dispute, as follows:
Enterprise Bargaining (EB) related:
Remuneration: Disputes relating to wages and other forms of remuneration, e.g. increase/decrease in wages, allowances, entitlements and superannuation.
Employment conditions: Disputes relating to hours of work, leave, non-remuneration related benefits, and other general employment conditions, e.g. increase/decrease in hours, distribution of hours, and holiday and leave provisions.
Other EB related: Causes other than Remuneration or Employment conditions, including job security and other causes relating to a process of workplace/enterprise bargaining, e.g. pattern bargaining strikes, disputes where employees refuse to enter into enterprise bargaining negotiations.
Remuneration: as above
Employment conditions: as above
Health and safety: Disputes concerning physical working conditions, safety issues and workers' compensation provisions, e.g. accidents, protective clothing and equipment, first aid services, uncomfortable working conditions, employee amenities, shortage or poor distribution of equipment or material, condition of equipment, and arduous physical tasks.
Job security: Disputes concerning issues relating to job security, e.g. retrenchment of employees, downsizing, restructuring, use of contractors, outsourcing, re-classification of the workforce, and market conditions within the relevant industry.
Managerial policy: Disputes relating to the decisions and policies of line managers, e.g. disciplinary matters, suspensions, personal disagreement, discrimination, decisions that impact upon work and family issues, docking of pay, fines, production limits or quotas, principles of promotion or filling positions, and work practices.
Union issues: Disputes concerning the alleged anti-union attitude of the employer, inter-union and intra-union disputes (e.g. demarcation disputes), sympathy stoppages in support of employees in another industry, and recognition of union activities.
Other non-EB related: Disputes that cannot be ascribed to any other category, e.g. political protests.
- disputes relating to award negotiations
- disputes relating to the content or application of an existing agreement (and do not seek to amend or terminate the agreement)
An industrial dispute is defined as a state of disagreement over an issue or group of issues between an employer and its employees, which results in employees ceasing work. Industrial disputes comprise strikes, which are a withdrawal from work by a group of employees; and lockouts, which are a refusal by an employer or group of employers to permit some or all of their employees to work.
Disputes which ended during the reference period
Disputes which ended during the period encompasses those disputes which:
Disputes which occurred during the reference period
Disputes which occurred during the period encompasses those disputes which:
- started in a previous period and ended in the reference period
- began and ended in the reference period.
Employees refers to wage and salary earners only. Excluded are persons who are self-employed (e.g. building sub-contractors, owner-drivers of trucks) and employers.
Employees directly involved: Employees who actually participated in the dispute in order to enforce or resist a demand or to express a grievance.
Employees indirectly involved: Employees who were stood down at the location where the stoppage occurred, but who were not themselves parties to the dispute. Employees who were stood down at locations other than those where the disputes occurred are excluded.
Employees newly involved: For a new dispute, comprises all employees who are involved and, for an ongoing dispute, those involved for the first time.
Total employees involved: Comprises employees newly involved and, for an ongoing dispute, those who continue to be involved. Total employees involved for any period of time is obtained by adding together the number of employees involved in each dispute for the period.
- started in a previous period and ended in the reference period
- began and ended in the reference period
- began in the reference period and continued into the next period
- started prior to the reference period and continued past the reference period.
Industry is classified according to the Australian and New Zealand Standard Industrial Classification, 1993.
Other industries comprises those industries not included in the specified industry groupings, i.e. Agriculture, forestry and fishing; Electricity, gas and water supply; Wholesale trade; Retail trade; Accommodation, cafes and restaurants; Finance and insurance; Property and business services; Government administration and defence; Cultural and recreational services and Personal and other services.
Reason Work Resumed
Reason work resumed statistics relate to the reason for ending the stoppage of work as reported and not necessarily to the reason(s) for settling all matters in dispute. Therefore, they do not reflect the relative importance of the work of various industrial tribunals operating under state and federal legislation. The classification of Reason work resumed is as follows:
Negotiation without intervention of a third party: Negotiation between the parties involved, or their representatives, without the intervention or assistance of authorities constituted under state or federal industrial legislation, and without mediation.
State legislation: Intervention or assistance of an industrial authority or authorities created by, or constituted under, state industrial/workplace relations legislation. Disputes that are referred to a mediator by a state industrial tribunal, either on a voluntary or compulsory basis, are included under 'Mediation' (except in instances where mediation is directed and a return to work ordered).
Federal legislation: Intervention or assistance of the Australian Industrial Relations Commission (AIRC). Disputes that are referred to a mediator by the AIRC, either on a voluntary or compulsory basis, are included under 'Mediation' (except in instances where mediation is directed and a return to work ordered).
Pre-determined return to work: Disputes for which a return to work is determined prior to the industrial action, e.g. when employees decide to go out on strike for a pre-determined period of 24 hours.
Resumption without negotiation: Disputes in which employees decide to return to work without the dispute being resolved, and without any negotiations having taken place to prompt the return, e.g. stop-work meetings, and disputes where employees decide to return to work to avoid further loss of earnings or for other reasons. This category may include some disputes which are settled subject to subsequent negotiation, such as industrial court hearings.
Mediation: Disputes that are settled through the assistance of a mediator, either voluntarily or as directed by a state or federal industrial tribunal, e.g. AIRC.
Other reasons: Disputes that cannot be ascribed to any other category, e.g. replacing employees on strike or locked out, permanent closure of business, and dismissal or resignation of employees.
Working days lost
Working days lost refers to working days lost by employees directly and indirectly involved in the dispute.
Working days lost per employee involved (formerly 'Duration of dispute')
The average number of working days lost per employee involved in the dispute, calculated by dividing the number of working days lost in the dispute by the number of employees involved (both directly and indirectly).
Working days lost per thousand employees
Working days lost per thousand employees are calculated for a quarterly period by dividing the total number of working days lost in the period by the total number of employees in the Australian labour force in the period (obtained from the ABS Labour Force Survey) and multiplying by 1,000. Labour Force Survey employee estimates are revised every 5 years as a result of the implementation of new population benchmarks from the Census of Population and Housing. As a result, estimates of working days lost per thousand employees are also subject to revision.
This page last updated 20 June 2006 | <urn:uuid:6d5c34e9-ea43-4f69-88a5-52d6c03974a4> | CC-MAIN-2013-20 | http://www.abs.gov.au/AUSSTATS/abs@.nsf/Previousproducts/6321.0.55.001Glossary1Jun%202004?opendocument&tabname=Notes&prodno=6321.0.55.001&issue=Jun%202004&num=&view= | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.94789 | 1,756 | 2.71875 | 3 |
Science Fair Project Encyclopedia
|President of the|
Historically, Landes was part of Gascony. It was one of the original 83 departments created during the French Revolution on March 4, 1790. It was created from parts of the provinces of Guyenne and Gascony.
- Prefecture website (in French)
- Conseil Général website (in French)
Landes is also the name of a commune in the Charente-Maritime département, in France.
The contents of this article is licensed from www.wikipedia.org under the GNU Free Documentation License. Click here to see the transparent copy and copyright details | <urn:uuid:d85d324e-ed2c-4899-9a89-c448dbdfab67> | CC-MAIN-2013-20 | http://www.all-science-fair-projects.com/science_fair_projects_encyclopedia/Landes | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.788577 | 139 | 2.703125 | 3 |
Research into end-of-fe care
Ethics of dementia research
In 2008, Alzheimer Europe produced recommendations on the good end-of-life care of people with dementia based on the work of a multi-disciplinary working group comprised of experts in the field of palliative care, medicine, psychiatry and psychology, as well as carers, in collaboration with the board of Alzheimer Europe and its member associations (Alzheimer Europe, 2008).
In its recommendations on good end-of-life care, Alzheimer Europe stated its opinion that a palliative care approach should be adopted for people with end-stage dementia as attempts to cure and prolong life are inappropriate for them. It nevertheless respected the right to individual choice and emphasised that palliative care is not limited to the actual end of life but should be introduced in a seamless manner, overlapping and complementing good dementia care. In this way palliative care is not restricted to the last days or months of life even though the provision of palliative care services may increase towards the end of the person’s life. Palliative care and end-of-life care are therefore not synonymous. A definition of each is provided below.
Definition of palliative care
Alzheimer Europe’s working group on good end-of-life care agreed on the following definition of palliative care, which is adapted from and closely resembles that developed by the World Health Organisation in 2002.
“Palliative care is an approach that improves the quality of life of patients and their families facing the problem associated with life-threatening illness, through the prevention and relief of suffering by means of early identification and impeccable assessment and treatment of pain and other problems, physical, psychosocial and spiritual. Palliative care:
- affirms life and regards dying as a normal process;
- intends neither to hasten nor postpone death;
- does not aim to prolong life;
- strives for a good death (the least distressing passage partly due to the relief of suffering from pain and other distressing symptoms)
- may however be used in conjunction with other therapies that are intended to prolong life, such as chemotherapy or radiation therapy, and includes those investigations needed to better understand and manage distressing clinical complications;
- integrates the psychological, religious and spiritual aspects of patient care;
- offers a support system to help patients live as actively as possible until death;
- aims to enhance the quality of life of patients;
- offers a support system to help family and friends cope during the patient’s illness and in their own bereavement;
- uses a team approach to address the needs of patients and their families, including bereavement counselling, if indicated;
- is an attitude, a philosophy and a method which should be possible in any environment.”
Definition of end-of-life care
End-of-life care is the care provided to people at the end of their lives. It may involve a palliative approach but not necessarily. People may want to pursue all available medical options (including treatment for other conditions they may have in addition to dementia).
People with dementia who are dying are not all in the final stage of dementia (Lynn and Adamson, 2005). The end of life is difficult to define as dementia does not follow the kind of steady, linear trajectory that is common to many other terminal conditions. Cox and Cook (2007) identify three distinct groups of people with dementia who may need end-of-life care. These are:
- People who reach the end of life but die from some other identifiable condition, such as cancer, before reaching the final stage of dementia.
- People who reach the end of life with a complex mix of mental and physical problems but where the effect on brain functioning is not as advanced.
- People who reach the end of life and die of the complications of dementia, such as end-stage dementia.
Alzheimer Europe’s working group on good end-of-life care defined the end-of-life as being a matter of days or weeks before the actual moment of death (Alzheimer Europe, 2008). This definition is not dependent on any particular stage of dementia. Clearly, good end-of-life care must, by definition, be ethical and much of what applies to good end-of-life care applies to research into end-of-life care and to the involvement of people who are dying with or from dementia in it.
Insufficient research into the end-of-life care of people with dementia
Palliative care services dedicated to the specific needs and situation of people with dementia (and their carers) are not very common throughout Europe. In the United Kingdom, for example, two thirds of patients with cancer who die receive some form of palliative care compared to only one out of twenty non-cancer patients (which includes those with motor neurone disease and AIDS) (Hospice Information Service, 2001 and Addington-Hall and Higginson, 2001).
Staff in palliative care centres and those who provide palliative care at home may therefore be less familiar with issues specifically related to the care of people dying with or from dementia. Similarly, healthcare staff providing end-of-life care or treatment in hospitals or at home are perhaps not sufficiently trained in dementia care or in communicating with people with dementia.
In addition to increasing access to palliative care for people with dementia, research is needed to develop and improve the quality of end-of-life care in general (i.e. including but not limited to palliative care). This might include the development of more effective pain scales, as well as measures to increase comfort and assess quality of life in end-stage dementia. Research of no direct medical benefit is also important for the advancement of knowledge which may improve the care and treatment of people with end stage dementia in the future.
Dementia is not always recognised as a terminal condition. Consequently, it is not always recorded as the actual cause of death on the death certificate, or at least not as the main cause of death, even when this is clearly the case. This may have an impact on the acquisition of medical knowledge about the final stage of dementia and on the ability to accurately predict the end-of-life of people with dementia. Research is therefore needed to develop indicators of the final prognosis, with the ability to predict the last weeks and days of life as this has important consequences for the care and treatment provided.
Conflicting views and interests
Whereas with end-of-life care, the emphasis is on the patient, as explained earlier, one of the aims of palliative care is to provide a support system to help family and friends cope during the patient’s illness and in their own bereavement. Taking up the time and energy of the person with dementia in his/her last moments of life may deprive families of precious time with that person. This would be particularly relevant if the person with dementia was in residential care, hospital or a hospice and if relatives and friends lived some distance away. Addington-Hall (2002) argues in favour of respecting the principle of autonomy (which would mean letting the patient decide) but encouraging him/her to discuss the issue with his/her family or close friends. If the person lacks the capacity to decide and did not previously express his/her wishes, there would be a risk of close relatives and friends deciding on behalf of the person with dementia against his/her participation either directly or by blocking potential researchers’ access to him/her.
Stereotyping and devaluation
There is a danger that blanket judgements will be made about the value or quality of life of people in the advanced stages of dementia, but also generalizations about what is good for people with end-stage dementia. Such judgements and generalizations may be well intentioned but fail to respect the individuality of each person with dementia.
There is also a risk of failing to recognise the personhood of people with advanced dementia due to stereotypes about awareness, capacity and the ability to communicate. This can happen at any stage of dementia but in the end stage, it may be more likely. In some cases, their failure to recognise loved ones, difficulties communicating and changed physical appearance and behaviour may make it difficult for families to consider them as the same person or in the extreme as being a person at all. This puts the person with dementia in an extremely vulnerable position.
- The issue of recording dementia as the cause of death on death certificates should be addressed.
- Stereotypes about people who are dying with or from dementia (e.g. linked to wellbeing, quality of life and capacity) should be challenged.
- Research should be carried out to develop more precise indicators of the end of life for people with dementia.
- Research should be carried out to develop appropriate end-of-life care and treatment for people with dementia (including palliative care).
- It should not be presumed that people with dementia would not want to participate in end-of-life research.
- Researchers should approach people who are dying with or from dementia (and their carers) about research with great sensitivity, paying attention to possible signs that they do not want to discuss the issue or that they are either not aware of, or in denial, about their prognosis.
Last Updated: jeudi 29 mars 2012 | <urn:uuid:0e5cf632-3f15-49b9-b0a0-013396a56a64> | CC-MAIN-2013-20 | http://www.alzheimer-europe.org/FR%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%C2%A6%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%C2%B3/Ethics/Ethical-issues-in-practice/Ethics-of-dementia-research/Research-into-end-of-fe-care | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.945812 | 1,933 | 3 | 3 |
Middlemarch: A Study of Provincial Life is a novel by George Eliot, . Her seventh novel, begun in 1869 and then put aside during the final illness of Thornton Lewes, the son of her companion George Henry Lewes. During the following year Eliot resumed work, fusing together several stories into a coherent whole, and during 1871–72 the novel appeared in serial form. The first one-volume edition was published in 1874, and attracted large sales. The novel is set in the fictitious Midlands town of Middlemarch during the period 1830–32. It has multiple plots with a large cast of characters, and in addition to its distinct though interlocking narratives it pursues a number of underlying themes, including the status of women, the nature of marriage, idealism and self-interest, religion and hypocrisy, political reform, and education. Mary Anne Evans (22 November 1819 – 22 December 1880), better known by her pen name George Eliot, was an English novelist, journalist and translator, and one of the leading writers of the Victorian era. She is the author of seven novels, including Adam Bede (1859), The Mill on the Floss (1860), Silas Marner (1861), Middlemarch (1871–72), and Daniel Deronda (1876), most of them set in provincial England and known for their realism and psychological insight. | <urn:uuid:7af3fbbd-5e4b-49ba-9958-b1be1181dfbe> | CC-MAIN-2013-20 | http://www.americanpoems.com/store/1052-1000-0899682774-Middlemarch.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.965779 | 283 | 3.234375 | 3 |
|Location||Finland, Uudenmaan lääni|
|Central coordinates||24o 43.30' East 60o 9.14' North|
|IBA criteria||B2, C6|
|Altitude||1 - 3m|
|Year of IBA assessment||2009|
Summary Core area of the site is pool with standing freshwater, which acts as reservoir of sewage plant. Site is nationally best breeding area for two species: Gallinula chloropus and Anas strepera, and one of the best for Podiceps auritus and Larus ridibundus.
Ornithological information The status of Suomenoja as a nationally important bird area was published in 2002 (report by Leivo et al 2002). At that time site was recognised important as holding nationally significant numbers of Gadwall Anas strepera, Moorhen Gallinula chloropus and Great Reed Warbler Acrocephalus arundinacea. Additionally the site was known holding 11 pairs of Horned Grebes Podiceps auritus, 850 pairs of Black-headed Gulls Larus ridibundus (Lammi & Routasuo 2001). Values of the Suomenoja have apparently improved during last decade and values are also better known, as being more intensively monitored during last decade. The statement of Finnish Environment Research Centre (Pekka Rusanen, 28.11.2005) and further monitoring data, with over 3000 records (!) of this site in database of BirdLife Finland (Tiira, introduced in 2006), have revealed following values: - Suomenoja is one of the most important breeding site for Horned Grebe Podiceps auritus in Finland (18 pairs in 2005, 16 pairs in 2007, being nationally third best place for the species in overall number and nationally best place in population density). Suomenoja holds about 1 % of national population and 0,3 % of population of EU. Species is listed in Annex I of Birds Directive. - Suomenoja is known nationally most important breeding site for Moorhen Gallinula chloropus (about 14 pairs in 2005, 25 pairs in 2007, which means about 10-20 % of national population). Species was classified vulnerable in the last assessment for national Red Data Book (Rassi & al 2001). - Suomenoja is known nationally best breeding site for Gadwall Anas strepera (12 pairs in 2005, 23 pairs in 2007, which means 2-5 % of national population). - Suomenoja is populated by one of the biggest breeding colonies of Black-headed Gull Larus ridibundus (2400 pairs in 2005, 3400 pairs in 2008, which means about 2-5 % of national population). Species was classified vulnerable in the last assessment for national Red Data Book (Rassi & al 2001). - Suomenoja is also one of the few regular breeding places of Great Reed Warbler Acrocephalus arundinacea in Finland, with 1-3 territories annually, which mean 1-10 % of national population. Species was classified vulnerable in the last assessment for national Red Data Book (Rassi & al 2001). Suomenoja is also one of the best reproduction site for waterfowl in Finland if the effect of area is taken into account. At least five broods per hectare are raised annually. Good reproduction is documented at least by Horned Grebe, Moorhen, Gadwall and Black-headed Gull (Tiira, database of BirdLife Finland) and some commoner species (Coot, Shoveler, Goldeneye etc). Because of good reproduction, Suomenoja is definitely vital source of breeding populations for other breeding sites, thus making it enormously valuable. Place is true “hotspot” with corea area (the pool) being only 18 hectares in size. The protection of this site would be cost-efficient, as good reproduction and relatively very high numbers of mentioned species of conservation concern overlaps in small area. Small size makes the site vulnerable to development projects.
Site description Suomenoja has been earlier a bay of sea with river estuary. The bay was separated from the sea and river by dams in 1960’es. Core area of the site is now pool with standing freshwater, which acts as reservoir of sewage plant. The pool gets temporarily water influxes from communal sewage and very rarely from the sea (when water level of the sea rises very high). Next to the pool are pasture and reedbed flooded regularly by sea. SIte includes also few hectares of ruderal land and alluvial forests.
|Species||Season||Period||Population estimate||Quality of estimate||IBA Criteria||IUCN Category|
|Gadwall Anas strepera||breeding||2004-2007||14-25 breeding pairs||good||B2||Least Concern|
|Horned Grebe Podiceps auritus||breeding||2005-2007||16-18 breeding pairs||good||B2, C6||Least Concern|
|IUCN habitat||Habitat detail||Extent (% of site)|
|Wetlands (inland)||Rivers and streams; Standing freshwater; Water fringe vegetation||70%|
|Artificial landscapes (terrestrial)||Ruderal land||10%|
|Forest||Alluvial and very wet forest; Mixed woodland||20%|
Land ownership Municipality of Espoo and Fortum (powerplant owner next to the site).
|Land-use||Extent (% of site)|
Management considerations Settlement plans, harbour enlargement, industry developement, overgrowth.
Conservation response Suomenoja was included in 2000'es as target wetland site of alien predator management. Site lacks any protection and official management plans. Site have been proposed by BL FInland as SPA/protection area in 2005 and again, in 2007, without results.
References Lammi, E. & Routasuo, P. 2001: Monitoring the bird wetlands of Espoo municipality in 2000. – Environment Council of Espoo municipality, publication 1/2001 (in Finnish, 65 pages) Leivo, M., Asanti, T., Koskimies, P., Lammi, E., Lampolahti, J., Mikkola-Roos, M. & Virolainen, E. 2002: Finnish important bird areas – FINIBA. – BirdLife Finland’s conservation publication nr 4 (in Finnish, 142 pages). Rassi, P., Alanen, A., Kanerva, T. & Mannerkoksi, I. (editors) 2001: The 2000 Red List of Finnish Species. – Ministry of Environment and Finnish Environment Research Center. (in Finnish, 432 pages). Rusanen, Pekka 2005: Statement of values of the Suomenoja. – Annex in the complaint made on the plan of harbour, next to the FINIBA-site Suomenoja.
Contribute Please click here to help BirdLife conserve the world's birds - your data for this IBA and others are vital for helping protect the environment.
Recommended citation BirdLife International (2013) Important Bird Areas factsheet: Suomenoja. Downloaded from http://www.birdlife.org on 19/06/2013
To provide new information to update this factsheet or to correct any errors, please email BirdLife | <urn:uuid:7a79c392-09fa-4640-b4ef-dbc2a6fcc8ac> | CC-MAIN-2013-20 | http://www.birdlife.org/datazone/sitefactsheet.php?id=26551 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.807335 | 1,543 | 2.734375 | 3 |
Cartonnage of Nespanetjerenpere
Cartonnage, a substance made of cloth or papyrus mixed with plaster and water, was used during the Third Intermediate Period to make an innermost case for the mummified body. The mummy was inserted and the covering was then painted with funerary scenes and inscriptions and placed in one or more coffins, which had been decorated in much the same way. The decoration here was chosen to associate its occupant, the priest Nespanetjerenpere, with divine resurrection. The ram-headed falcon on his chest represents the sun god's nightly journey through the land of the dead. The small figures on the front represent deities aligned with various parts of his body, as described in the funerary Book of the Dead.
- Medium: Linen or papyrus mixed with plaster, pigment, glass, lapis lazuli
- Reportedly From: Thebes, Egypt
- Dates: ca. 945-718 B.C.E.
- Dynasty: XXII Dynasty
- Period: Third Intermediate Period
- Dimensions: H: 69 11/16 x W: 17 5/16 in. (177 x 44 cm) Other (Height to top of beard): 14 3/4 in. (37.5 cm) (show scale)
- Collections:Egyptian, Classical, Ancient Near Eastern Art
- Museum Location: This item is on view in Egypt Reborn: Art for Eternity, 19th Dynasty to Roman Period, Martha A. and Robert S. Rubin Gallery, 3rd Floor
- Accession Number: 35.1265
- Credit Line: Charles Edwin Wilbour Fund
- Rights Statement: Creative Commons-BY
- Caption: Cartonnage of Nespanetjerenpere, ca. 945-718 B.C.E. Linen or papyrus mixed with plaster, pigment, glass, lapis lazuli, H: 69 11/16 x W: 17 5/16 in. (177 x 44 cm). Brooklyn Museum, Charles Edwin Wilbour Fund, 35.1265. Creative Commons-BY
- Catalogue Description: Cartonnage of the mummy of a Theban priest Nespaneterenpera of about 1000 B.C. or the XXI dynasty. The mummy is missing. The head is covered by a large wig symbolizing divinity along with the braided beard. The face is painted bright red with the eyebrows and outlines of the eyes of lapiz lazuli, the eyes being of glass. A pectoral is painted on the breast just above the large bull-headed bird covering the breast. On the balance of the cartonnage are painted religious scenes describes in detail in the January 1937 issue of the Brooklyn Museum Quarterly. Nespaneterenpera was a god-father of Amun, one of those priests who were free to enter the sanctuary. He had been a prophetof the fourth class of Amun of Karnak and also bore the special title of priest of Hermonthis. He was the son of Sin-a-Amun. If the latter was the father of the Thoutemes quites in the celebrated inscription of Pinedjem II of Karnak, the date of the cartonnage would be the XXI dynasty. Condition: the lower part of the upper half of the piece has been exposed to dampness and some of the hieroglyphs have been lost. The band running around the feet has split and the bottom of the case (soles of the feet) is missing. This part has been filled in with beaver board. The balance of the painting is in almost pristine condition. The accumulated dirt has been removed and a coat of plymerized vinyl acetate has been applied to preserve the painting. the case is in the usual two pieces. Part of the underside of the case is missing.
- Record Completeness: Best (92%) | <urn:uuid:7dc38838-c26b-4071-8c46-432432d9fa4d> | CC-MAIN-2013-20 | http://www.brooklynmuseum.org/opencollection/objects/3357/Cartonnage_of_Nespanetjerenpere/image/11647/back | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.943047 | 819 | 3.140625 | 3 |
Astronomers detect atmosphereof planet outside solar system
Astronomers using NASA's Hubble Space Telescope have made the first direct detection of the atmosphere of a planet orbiting a star outside our solar system and have obtained the first information about its chemical composition. Their unique observations demonstrate that it is possible with Hubble and other telescopes to measure the chemical makeup of extrasolar planet atmospheres and to potentially search for chemical markers of life beyond Earth.
The planet orbits a yellow, sunlike star called HD 209458, a seventh-magnitude star (visible through an amateur telescope), which lies 150 light-years away in the autumn constellation Pegasus. Its atmospheric composition was probed when the planet passed in front of its parent star, allowing astronomers for the first time ever to see light from the star filtered through the planet's atmosphere.
Lead investigator David Charbonneau of the California Institute of Technology and the Harvard-Smithsonian Center for Astrophysics, Timothy Brown of the National Center for Atmospheric Research, and colleagues used Hubble's spectrometer (the Space Telescope Imaging Spectrograph) to detect the presence of sodium in the planet's atmosphere.
"This opens up an exciting new phase of extrasolar planet exploration, where we can begin to compare and contrast the atmospheres of planets around other stars," says Charbonneau. The astronomers actually saw less sodium than predicted for the Jupiter-class planet, leading to one interpretation that high-altitude clouds in the alien atmosphere may have blocked some of the light. The findings will be published in the Astrophysical Journal.
The Hubble observation was not tuned to look for gases expected in a life-sustaining atmosphere (which is improbable for a planet as hot as the one observed). Nevertheless, this unique observing technique opens a new phase in the exploration of extrasolar planets, say astronomers.
Such observations could potentially provide the first direct evidence for life beyond Earth by measuring unusual abundances of atmospheric gases caused by the presence of living organisms. The planet orbiting HD 209458 was discovered in 1999 through its slight gravitational tug on the star. Based on that observation the planet is estimated to be 70 percent the mass of the giant planet Jupiter (or 220 times more massive than Earth).
Subsequently, astronomers discovered the planet passes in front of the star, causing the star to dim very slightly for the transit's duration. This means the planet's orbit happens to be tilted edge-on to our line-of-sight from Earth. It is the only example of a transit among all the extrasolar planets discovered to date.
The planet is an ideal target for repeat observations because it transits the star every 3.5 days—which is the extremely short amount of time it takes the planet to whirl around the star at a distance of merely 4 million miles from the star's searing surface. This precariously close proximity to the star heats the planet's atmosphere to a torrid 2,000 degrees Fahrenheit (1,100 degrees Celsius).
Previous transit observations by Hubble and ground-based telescopes confirmed that the planet is primarily gaseous, rather than liquid or solid, because it has a density less than that of water. (Earth, a rocky rather than a gaseous planet, has an average density five times that of water.) These earlier observations thus established that the planet is a gas giant, like Jupiter and Saturn.
The planet's swift orbit allowed for observations of four separate transits to be made by Hubble in search of direct evidence of an atmosphere. During each transit a small fraction of the star's light passed through the planet's atmosphere on its way to Earth. When the color of the light was analyzed by a spectrograph, the telltale "fingerprint" of sodium was detected. Though the star also has sodium in its outer layers, the STIS precisely measured the added influence of sodium in the planet's atmosphere.
The team—including Robert Noyes of the Harvard-Smithsonian Center for Astrophysics and Ronald Gilliland of the Space Telescope Science Institute in Baltimore, Maryland—next plans to look at HD 209458 again with Hubble, in other colors of the star's spectrum to see which are filtered by the planet's atmosphere. They hope eventually to detect methane, water vapor, potassium, and other chemicals in the planet's atmosphere. Once other transiting giants are found in the next few years, the team expects to characterize chemical differences among the atmospheres of these planets.
These anticipated findings would ultimately help astronomers better understand a bizarre class of extrasolar planets discovered in recent years that are dubbed "hot Jupiters." They are the size of Jupiter but orbit closer to their stars than the tiny innermost planet Mercury in our solar system. While Mercury is a scorched rock, these planets have enough gravity to hold onto their atmospheres, though some are hot enough to melt copper.
Conventional theory is that these giant planets could not have been born so close to their stars. Gravitational interactions with other planetary bodies or gravitational forces in a circumstellar disk must have carried these giants via spiraling orbits precariously close to their stars from their birthplace farther out, where they bulked up on gas and dust as they formed.
Proposed moderate-sized U.S. and European space telescopes could allow for the detection of many much smaller Earth-like planets by transit techniques within the next decade. The chances for detection will be more challenging, since detecting a planet orbiting at an Earth-like distance will mean a much tighter orbital alignment is needed for a transit. And the transits would be much less frequent for planets with an orbital period of a year, rather than days. Eventually, study of the atmosphere of these Earth-like planets will require meticulous measurements by future larger space telescopes.
The Space Telescope Science Institute (STScI) is operated by the Association of Universities for Research in Astronomy (AURA), for NASA, under contract with the Goddard Space Flight Center, Greenbelt, Maryland. The Hubble Space Telescope is a project of international cooperation between NASA and the European Space Agency (ESA). The National Center for Atmospheric Research's primary sponsor is the National Science Foundation.
Contact: Robert Tindol (626) 395-3631 | <urn:uuid:be53f7b0-83df-48d6-8de8-8f2a067c2449> | CC-MAIN-2013-20 | http://www.caltech.edu/content/astronomers-detect-atmosphereof-planet-outside-solar-system | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.920052 | 1,260 | 3.5625 | 4 |
Background: This story comes from Der Giftpilz, an anti-Semitic children’s book published by Julius Streicher, the publisher of Der Stürmer. This summary and partial translation is taken from a 1938 publication issued by the “Friends of Europe” in London, an organization to which I have not been able to find a successor to request permission to reprint.
How Jewish Traders Cheat
This story introduces a Jewish hawker who tries to sell bad cloth to a young German peasant girl.
It is a festival evening in the village when the Jew turns up with his wares. The Jew flatters the peasant woman and spreads out his wares.
“Everything the heart desires, Levy has for sale.”
But the German peasant girl turns down his offers.
The Jew persists, and shows her some stuff of
“... purest wool. That will make a dress for you, woman, so that you will look like a Baroness or a Princess, like a Queen. And cheap, too, that I can tell you!”
But the peasant woman knows the Jew too well.
“I am buying nothing from you,” she says, and goes away.
The Jew packs up and goes away cursing. He consoles himself with the knowledge that there are lots of other peasants who can be more easily duped than this one. The story concludes:
Woe to the woman, however, who lets herself be taken in by his chatter. It will happen to her. As has happened to so many other peasant women once they have let the Jew in. There is no escape. There is an old saying:
Go to the Giftpilz Page.
Go to the German Propaganda Archive Home Page. | <urn:uuid:7591ee18-037a-403c-b866-59e11eae5b0b> | CC-MAIN-2013-20 | http://www.calvin.edu/academic/cas/gpa/story8.htm | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.959735 | 367 | 2.5625 | 3 |
Despite growing public worry over the safety and long-term consequences of nuclear power, the United States is set to resume construction of reactors after more than three decades of a building freeze that followed the incident at Three Mile Island in March of 1979.
The Three Mile Island accident involved a core meltdown in Unit 2 of the nuclear generating station in Dauphin County, Pennsylvania. Nearly 40,000 gallons of radioactive material was released into the nearby Susquehanna River, resulting in a nearly $1 billion cleanup effort.
Though the incident failed to derail the nuclear power industry in the United States, a moratorium was issued on construction of new nuclear facilities. The four reactors currently slated for building – two in Georgia and two in South Carolina – will be the first since the accident.
The AP1000 1,100 megawatt reactors are expected to be operational by 2016, using turbine equipment provided by the Toshiba Corporation. When completed, the reactors will bring the United States’ total number to 108. More than 26 reactors are under review by the U.S. Nuclear Regulatory Commission.
The recent problems at Japan’s Fukushima plant have again thrust the issue of nuclear power into the public spotlight. With the end of the moratorium on U.S. facilities, though, plans to expand the nation’s capacity will break ground all over the country. While a possible boon to a contracting construction industry, the expansion of American reactors has many concerned about the long-term tradeoffs of nuclear energy. | <urn:uuid:e949d216-0cc9-413f-943f-d26d6f0b9a90> | CC-MAIN-2013-20 | http://www.constructiondigital.com/under_construction/us-to-resume-construction-of-nuclear-reactors | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.941071 | 304 | 3.046875 | 3 |
Tom Smart, Deseret News
According to Wikipedia, in 1922, seven Western states agreed to a compact governing the allocation of Colorado River water among those states. In 1928, as part of the Boulder Canyon Project, the current specific allotments were established based on a total flow of 15 million acre feet per year. Upper Basin (expressed in terms of acre feet per year): Colorado, 3.88 million; Utah, 1.73 million; Wyoming, 1.05 million; New Mexico, .84 million. Lower Basin: California, 4.4 million; Arizona, 2.8 million; Nevada, .30 million. As a percentage, this computes to the following: — Upper Basin: Colorado, 51.75 percent; Utah, 23.00 percent; Wyoming, 14.00 percent; New Mexico, 11.25 percent. Lower Basin: California, 58.70 percent; Arizona, 37.30 percent; Nevada, 4.00 percent.
But which of all these seven states is the driest? The answer is Nevada.
How then is it possible that Nevada is allotted only 2 percent of the total Colorado River water? In 1922, the Nevada delegates to the Colorado River Compact negotiations at Bishop's Lodge, near Santa Fe, demonstrated an amazing lack of vision relating to the development of the sparsely populated southern part of their state. They were reported to be eager to please the California delegation, and they were observed imbibing copious amounts of freely-flowing alcoholic beverages.
The total population of Nevada in 1920 was only 77,000 people. Today it is over 2,640,000. Las Vegas had 2,304 people in 1920 — Clark County had 4,859.
Because of the huge population increases in the Las Vegas Valley and because of Nevada's tiny allotment of Colorado River water in nearby Lake Mead, the Southern Nevada Water Authority, or SNWA, is determined to tap the Great Basin aquifers north of Las Vegas and pipe the water south. This, of course, would result in a massive ecological disaster for the Great Basin deserts. Eastern Nevada and western Utah — primary areas of the Great Basin — are desperate to prevent this huge water grab.
What is to be done? Water is a touchy subject in the arid west and always has been. Arizona has never been happy with the Colorado River Compact (even though its tributary rivers to the Colorado were exempted from the contract), and all of the seven states would like very much to have a larger share. But does anyone really doubt that Nevada's share is absolutely ridiculous?
Renegotiating the Colorado River Compact would be fraught with contention, and the U.S. Supreme Court has already ruled the agreement to be binding. So what can be done to somehow repair the mind-boggling Nevada aberration? It may depend on the extent to which the true spirit of fair play prevails among the Colorado River Compact states.
Here is a modest proposal: In terms of millions of already allotted acre feet of Colorado River water per year, let the fair-minded citizens of the other states of the compact be appealed upon to mercifully redeem Nevada's folly by simply voting to freely give the following amounts of their allotments to Nevada: Colorado, .10; California, .10; Utah, .05; Arizona, .05; Wyoming, .05. Adding this to Nevada's present .30 would leave the compact's seven states with the following allotments: California, 4.30 million acre feet per year; Colorado, 3.78 million acre feet per year; Arizona, 2.75 million acre feet per year; Utah, 1.68 million acre feet per year; Wyoming, 1.00 million acre feet per year; New Mexico, .84 million acre feet per year; Nevada, .65 million acre feet per year.
Gifting these relatively modest amounts of water to Nevada would represent a type of salvation for both southern Nevada and the Great Basin. In times of drought, the amounts would be reduced proportionately. In times of plenty, the amounts would be increased proportionately.
This proposed adjustment to the Colorado River Compact cries out for priority over every other initiative. Thus the delicate Great Basin aquifers will not be plundered, and a more balanced and orderly growth for the greater American Southwest will be maintained. Surely the good people of California, Colorado, Arizona, Utah and Wyoming can be persuaded to make these modest sacrifices in order to resolve this otherwise intractable crisis.
Mr. Horlacher descends from families who have lived in eastern Nevada and western Utah since the 1920s. He was born in Tooele and raised in eastern Nevada. He now lives in Provo.
- Doug Robinson: Utah man's new running shoe...
- In our opinion: A darkening cloud is hanging...
- Snapshot of 2013 in political cartoons
- Timothy R. Clark: Graduation advice for my...
- My view: People deserve rights at our borders
- My view: Nothing sinister about Common Core
- Letters: Federal encroachment
- Richard Davis: Airlines should do more for...
- Letters: Stop the witch hunt 35
- John Florez: Show leadership on... 31
- Supreme Court, Congress, citizens: The... 27
- Letter: Media failure 25
- Letters: Threats justified 24
- Robert Bennett: Sticking to facts is... 23
- Doug Robinson: Utah man's new running... 19
- In our opinion: Limit the power of the... 18 | <urn:uuid:13fc7184-9f16-4ee8-990b-f4cb21d03eed> | CC-MAIN-2013-20 | http://www.deseretnews.com/article/700186851/Review-Colorado-River-water-rights.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.932436 | 1,131 | 3.625 | 4 |
The breed with the honor of winning 2006 Westminster Kennel Club’s Best in Show, the well-trained Bull Terrier is a friendly, affectionate, and loyal dog. With their distinct “egg-shaped” head, these active dogs can bring an exciting energy to almost any family. They
were first established by mating a Bulldog with the now-extinct white English Terrier. Interestingly, these
dogs usually bark only when necessary; therefore, when you hear a Bull Terrier barking, it would be wise to pay attention.
|Interesting Breed Facts:
||57th in 2008; with 1,900 registered with the American Kennel Club (AKC).
|First recognized as a breed:
||Though pedigrees for Bull Terriers date to the mid-1800’s, the first breed standard was written in 1935. The current AKC standard was approved
on July 9, 1974.
With a short coat that
highlights their strong, muscular build,
Bull Terriers have an oval head and
a short, tapering tail. Their small,
triangular eyes are sunken and dark.
Their ears are small, thin, and capable
of being held stiffly erect. The AKC
recognizes two color varieties: solid
white with or without colored head
markings; or, colored, which ranges
from solid red or brindle to
a combination with black,
tan, or white.
|#1 preventable health problem:
||Bull Terriers exposed to airborne allergens,
or flea, mosquito, or mite bites can develop
severe skin allergies. Reaction can range
from incessant itching to a wide outbreak
of hives or a rash. As such, veterinarian-recommended
parasite preventive measures,
through either topical solutions and/or oral
medication, may be necessary.
||Notorious chewers with strong
jaws, Bull Terriers need appropriately durable
toys, offered under continuous supervision.
Without a selection of suitable toys, many will
turn to any available household item and
eagerly ingest any pieces, which could result
in an intestinal impaction that may require
surgery to remove.
||Despite their stubborn nature,
Bull Terriers are very playful, intelligent, and
clownish. These traits allow most Bull Terriers
to form a strong bond with their
human families, with whom they
love to play. However, because
of their playful personality most
require consistent obedience
training from a young age to
keep their independent nature
|Biggest challenge to owners:
||Bull Terriers are exciting and energetic.
When combined with their high level
of intelligence, these active dogs can
nose their way into an abundance of
trouble. Therefore, they are best suited
to families who can satisfy their curiosity
and playfulness through continual
interaction, activity, and supervision. | <urn:uuid:76a4a0f3-5d63-4c4f-ad3e-537a4990f860> | CC-MAIN-2013-20 | http://www.drsfostersmith.com/pic/article.cfm?c=3307&articleid=1326&d=155&category=444 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.894572 | 615 | 2.546875 | 3 |
Four new Brazilian species in the genus Ophiocordyceps have been published in the online journal PLoS ONE. The fungi, named by Dr. Harry Evans and Dr. David Hughes, belong to a group of "zombifying" fungi that infect ants and then manipulate their behavior, eventually killing the ants after securing a prime location for spore dispersal.
These results appear in a paper by Evans et al. entitled Hidden Diversity Behind the Zombie-Ant Fungus Ophiocordyceps unilateralis: Four New Species Described from Carpenter Ants in Minas Gerais, Brazil. This paper is the first to validly publish new fungal names in an online-only journal while still complying with the rules and recommendations of the International Code of Botanical Nomenclature (ICBN).
Beyond this important milestone, the paper is noteworthy for the attention it draws to undiscovered, complex, biological interactions in threatened habitats. The four new species all come from the Atlantic Rainforest of Brazil which is the most heavily degraded biodiversity hotspot on the planet. Ninety-two percent of its original coverage is gone.
The effect of biodiversity loss on community structure is well known. What researchers don't know is how parasites, such as these zombie-inducing fungi, cope with fragmentation. Here the authors show that each of the four species is highly specialized on one ant species and has a suite of adaptations and spore types to ensure infection. The life-cycle of these fungi that infect, manipulate and kill ants before growing spore producing stalks from their heads is remarkably complicated. The present work establishes the identification tools to move forward and ask how forest fragmentation affects such disease dynamics.
Competing Interests: The author has declared that no competing interests exist.
Funding: The research leading to these results has received funding from the European Union's Seventh Framework Programme under an individual Marie Curie International Fellowship to DPH (OIF-221041) and Visiting Fellowship to HCE in collaboration with Simon Elliot at the Federal University of Višosa in Brazil (CNPq 401610/2009-8).The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.
Citation: Evans HC, Elliot SL, Hughes DP (2011) Hidden Diversity Behind the Zombie-Ant Fungus Ophiocordyceps unilateralis: Four New Species Described from Carpenter Ants in Minas Gerais, Brazil. PLoS ONE 6(3): e17024. doi:10.1371/journal.pone.0017024
PLEASE LINK TO THE SCIENTIFIC ARTICLE IN ONLINE VERSIONS OF YOUR REPORT (URL goes live after the embargo ends): http://dx.plos.org/10.1371/journal.pone.0017024
FOR A PRESS-ONLY PREVIEW OF THE FULL ARTICLE, VISIT THE FOLLOWING URL: http://www.plos.org/press/pone-06-03-hughes.pdf
Penn State University
AAAS and EurekAlert! are not responsible for the accuracy of news releases posted to EurekAlert! by contributing institutions or for the use of any information through the EurekAlert! system. | <urn:uuid:6e96f244-337c-40cd-b3de-4c2d88ef2fda> | CC-MAIN-2013-20 | http://www.eurekalert.org/pub_releases/2011-03/plos-fns030111.php | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.873368 | 679 | 3.046875 | 3 |
The Education and Science Institute in Vietnam has warned that the number of children with autism in Ho Chi Minh City (HCMC) has increased by nearly 160 times over eight years. Assoc. Prof. Dr. Nguyen Thi Hoang Yen, deputy head of the institute, said that the number of children diagnosed with autism is rising sharply in Vietnam.
The number of children with autism detected by the Hanoi-based Central Pediatrics Hospital in 2007 was 50 times more than in 2000, and the number of autistic children treated by the hospital in 2007 increased by 33 times from 2000. The number of autistic children in HCMC increased from only two in 2000 to 324, or 160 times higher, in 2008.
The warning was released this week at a seminar on care and education for autistic children. The seminar was jointly held by the Vietnam Association of Autistic Children, the United States Embassy in Vietnam and the United Nations Children's Emergency Fund in Hanoi. On March 13, Tuoitrenews.vn reported that, according to medical websites, "There is probably a combination of factors that leads to autism, including genetic factors and others including diet, mercury poisoning, the body’s inability to properly process vitamins and minerals, and vaccine sensitivity..."
Read about the upcoming revolutionary book 'The Thinking Moms' Autism Beyond the Spectrum...' here: http://www.examiner.com/node/59234476
Find Chiromother on facebook at: http://www.facebook.com/chiromother, twitter http://twitter.com/ChiroMother OR on Pinterest at: http://pinterest.com/chiromother/my-articles-and-videos-at-examiner-com-yahoo-voice/. | <urn:uuid:6d9d0df5-14fe-4364-8392-157151a0723b> | CC-MAIN-2013-20 | http://www.examiner.com/article/in-eight-years-autism-increased-by-160-times-ho-chi-minh-city-vietnam?cid=rss | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.935174 | 359 | 2.84375 | 3 |
SCO, GNU and Linux
This article was first published on ZDNet.
SCO's contract dispute with IBM has been accompanied by a smear campaign against the whole GNU/Linux system. But SCO made an obvious mistake when it erroneously quoted me as saying that “Linux is a copy of Unix.” Many readers immediately smelled a rat—not only because I did not say that, and not only because the person who said it was talking about published ideas (which are uncopyrightable) rather than code, but because they know I would never compare Linux with Unix.
Unix is a complete operating system, but Linux is just part of one. SCO is using the popular confusion between Linux and the GNU/Linux system to magnify the fear that it can spread. GNU/Linux is the GNU operating system running with Linux as the kernel. The kernel is the part of the system that allocates the machine's resources to the other programs you run. That part is Linux.
We developed GNU starting in 1984 as a campaign for freedom, whose aim was to eliminate non-free software from our lives. GNU is free software, meaning that users are free to run it, study it and change it (or pay programmers to do this for them), redistribute it (gratis or for a fee), and publish modified versions. (See an overview of the GNU project.)
In 1991, GNU was mostly finished, lacking only a kernel. In 1992, Linus Torvalds made his kernel, Linux, free software. Others combined GNU and Linux to produce the first complete free operating system, GNU/Linux. (See our GNU/Linux FAQ.) GNU/Linux is also free software, and SCO made use of this freedom by selling their version of it. Today, GNU runs with various kernels including Linux, the GNU Hurd (our kernel), and the NetBSD kernel. It is basically the same system whichever kernel you use.
Those who combined Linux with GNU didn't recognize that's what they were doing, and they spoke of the combination as “Linux”. The confusion spread; many users and journalists call the whole system “Linux”. Since they also properly call the kernel “Linux”, the result is even more confusion: when a statement says “Linux”, you can only guess what software it refers to. SCO's irresponsible statements are shot through with ambiguous references to “Linux”. It is impossible to attribute any coherent meaning to them overall, but they appear to accuse the entire GNU/Linux system of being copied from Unix.
The name GNU stands for “GNU's Not Unix”. The whole point of developing the GNU system is that it is not Unix. Unix is and always was non-free software, meaning that it denies its users the freedom to cooperate and to control their computers. To use computers in freedom as a community, we needed a free software operating system. We did not have the money to buy and liberate an existing system, but we did have the skill to write a new one. Writing GNU was a monumental job. We did it for our freedom, and your freedom.
To copy Unix source code would not be ethically wrong , but it is illegal; our work would fail to give users lawful freedom to cooperate if it were not done lawfully. To make sure we would not copy Unix source code or write anything similar, we told GNU contributors not even to look at Unix source code while developing code for GNU. We also suggested design approaches that differ from typical Unix design approaches, to ensure our code would not resemble Unix code. We did our best to avoid ever copying Unix code, despite our basic premise that to prohibit copying of software is morally wrong.
Another SCO tool of obfuscation is the term “intellectual property”. This fashionable but foolish term carries an evident bias: that the right way to treat works, ideas, and names is as a kind of property. Less evident is the harm it does by inciting simplistic thinking: it lumps together diverse laws—copyright law, patent law, trademark law and others—which really have little in common. This leads people to suppose those laws are one single issue, the “intellectual property issue”, and think about “it”—which means, to think at such a broad abstract level that the specific social issues raised by these various laws are not even visible. Any opinion “about intellectual property” is thus bound to be foolish. (See our list of words to avoid for more explanation of the confusion caused by this term.)
In the hands of a propagandist for increased copyright or patent powers, the term is a way to prevent clear thinking. In the hands of someone making threats, the term is a tool for obfuscation: “We claim we can sue you over something, but we won't say what it is.”
In an actual lawsuit, such ambiguity would make their case fail, or even prevent it from getting off the ground. If, however, SCO's aim is to shake the tree and see if any money falls down, or simply to spread fear, they may regard vagueness and mystery as advantageous.
I cannot prognosticate about the SCO vs IBM lawsuit itself: I don't know what was in their contract, I don't know what IBM did, and I am not a lawyer. The Free Software Foundation's lawyer, Professor Moglen, believes that SCO gave permission for the community's use of the code that they distributed under the GNU GPL and other free software licenses in their version of GNU/Linux.
However, I can address the broader issue of such situations. In a community of over half a million developers, we can hardly expect that there will never be plagiarism. But it is no disaster; we discard that material and move on. If there is material in Linux that was contributed without legal authorization, the Linux developers will learn what it is and replace it. SCO cannot use its copyrights, or its contracts with specific parties, to suppress the lawful contributions of thousands of others. Linux itself is no longer essential: the GNU system became popular in conjunction with Linux, but today it also runs with two BSD kernels and the GNU kernel. Our community cannot be defeated by this.
- Since this statement directly contradicts the establishment views of the proprietary software developers, some readers suppose that the word “not” was inserted by mistake. It is entirely intentional. It is not wrong to copy software. It is wrong to stop others from copying software. Thus, software should be free. | <urn:uuid:b974fb52-d57e-44ce-9d4b-00f8dfe66c6d> | CC-MAIN-2013-20 | http://www.gnu.org/philosophy/sco/sco-gnu-linux.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.964495 | 1,362 | 2.84375 | 3 |
The Red Badge of Courage Summary and Analysis
As The Red Badge of Courage opens, we do not know precisely where we are or whom we are watching. As the fog clears gradually, we see a part of the Union army upon a riverbank. Rumors are flying among the troops about their own movement. One tall soldier, named Jim but referred to mainly by his height, tells his comrades that he has heard, through several sources, that they will be on the move the next day. Arguments break out between the soldiers whether this rumor is true.
The attention then shifts to another private named Henry. The narrator rarely refers to him by his first name, but rather as "the youth" or "the young soldier." He sits in his tent and thinks about the possibility of finally going into battle. Before joining the army, he dreamed of grand battles that "thrilled him with their sweep and fire," and he seems to desire a "Greeklike" or "Homeric" struggle. His mother had discouraged him from joining but he enlists anyway.
When Henry finally leaves, his mother does not try to convince him to be a hero, as he expected. Instead of an impassioned, beautiful scene, his mother gives him some simple advice. She tells him to be careful and not try to beat the entire rebel army himself and not to fall in with a bad group of soldiers. Then she adds: "I don't know what else to tell yeh, Henry, excepting that yeh must never do no shirking, child, on my account. If so be a time comes when yeh have to be kilt or do a mean thing, why, Henry, don't think of anything cept what's right."
He leaves his mother, who cries softly as he goes, and joins his comrades on the way to Washington. Along the way, they are fed at every station and treated like heroes just for joining the fight. Then they train and drill often. Even though he has yet to taste battle, Henry assumes the war will not be a Greeklike struggle. The veterans he meet claim that the rebels are starving and tattered, but these same veterans taunt the new recruits, so Henry is unsure whether to trust them.
Most of all, Henry is concerned that he will run when he finally faces a conflict. He wants to be a hero, but his fears nag at him, making him doubt his own courage and mettle as he lies in his tent. Jim, the tall soldier, and another soldier, "the loud soldier," both come in to Henry's tent, still arguing about the rumor. Jim says they must be moving out because the cavalry have already moved out. Henry nervously asks Jim how he thinks their regiment will do and gets the vague answer that they will probably do well. Henry then asks if he thinks any of them will run when faced with a fight. Jim is confident that they will fight because they are from good stock; however, there is no way to tell since they have not yet been under fire. Henry finally asks Jim if he would run from the battle. Jim speculates that he might, especially if a whole group began to run. "But if everybody was a-standing and a-fighting, why, I'd stand and fight," he adds. These words comfort Henry as the first chapter ends.
Upon rising the next day, the soldiers discover that the rumor is not true and they are not moving out, as Jim Conklin, the tall soldier, had said. For Henry Fleming, this is not a relief. His dilemma of whether or not he will run in battle is still present. Without a battle to test it, he has no idea if he will be courageous or cowardly. He begins to compare himself with other soldiers in an attempt to gain some confidence. He asks several soldiers questions trying to see if they have similar doubts and fears as he does; and he gets little confirmation of his anxieties in reply. His own feelings about his comrades are ambivalent, for sometimes he thinks them heroes, and sometimes he feels that they are all secretly scared.
One morning, he finds himself in the ranks. His regiment is on the move. The early morning is full of colors: the men's uniforms glow purple, red eyes peer from across the river, and the sun slowly rises yellow in the east. The soldiers return to the validity of the rumors they heard the day before, especially when they turn a hill and find they are no longer along the river. Jim, the tall soldier, praises his powers of perception; others argue with him. Henry takes no part in these discussions. He is still despondent and sad. He keeps to himself, his feelings still ambivalent.
The rest of the soldiers seem to be rather jolly. A certain fat soldier attempts to steal a horse from a house. Its owner, a young woman, comes out to save it. The rest of the regiment jeers and yells at the fat soldier. He is beaten away from the horse and flees back into the soldiers, peppered with catcalls from his fellow troops.
At night, the men pitch camp. Henry Fleming lies in the grass, thinking. He wishes more than anything to be back at home, with its barn and fields. He remembers his milk cows, which caused him so much grief previously, with a bit of joy and nostalgia. He tells himself that he is not fit to be a soldier, and he feels quite different from those soldiers around him who still seem happy and carefree.
The loud soldier, who we learn is named Wilson, comes up to Henry, spouting exciting, confident statements about the upcoming battle. "We'll lick 'em good!" he repeats. His joy at the upcoming battle irritates Henry, who says bitterly that Wilson must think he will do great things. Wilson replies that he does not know if he will do great things, but he will fight "like thunder." Henry then challenges Wilson, saying that he may well run when the battle comes, and that he is not the bravest person in the world. Wilson replies coolly that he never said he was, just that he will give his share of the fighting. Then he tells Henry he talks "as if you thought you was Napoleon Bonaparte." Henry retreats to his tent and hears the sound of card games outside. Exhausted from his ruminating, he falls asleep.
The regiment marches for another two days, picking up their pace on the last day. The men become tired, hot, and cranky. They leave some of their supplies behind, trying to lighten their load. They move quickly like veterans, but they still do not have the look of veterans, as their uniforms are too bright and new.
One morning the tall soldier kicks Henry awake. The men are suddenly running in the fog. They hear the distant sounds of firing. Regiments and other men become gradually visible, as the sun rises and the fog begins to melt away. The regiment eventually climbs a hill. As they get to its crest, Henry expects to see a battle scene.
Below a skirmish is in progress. There are lines of fighters spread across the field, and a flag flutters. The skirmishers melt into the scene only to appear later on. Henry is engrossed, trying to observe everything. His own regiment is still in a wooded area. They eventually pass the body of a dead soldier. His uniform is yellow-brown and his shoe soles are paper-thin. The body enraptures Henry.
Henry continues to think as the regiment marches. He feels threatened by the landscape. He sees it as full of fierce-eyed enemies. All of a sudden, he is full of distrust of his commanders. He is sure they have led the men into a trap. He must get out; he must be the sole eyes and ears aware of this danger.
The overall mood of the troops is now very serious. They are facing a true test of their mettle very soon, and it affects them in different ways. Primarily, though, the untried men are quiet and absorbed, waiting to finally face war. They are first ordered to dig in, but are then ordered to pull back.
The soldiers become annoyed, asking why they were marched this much if they are not going to face the enemy. They are then moved to another position, then another. The anticipation starts to irk Henry, who wants to return to camp or go in a battle. The men eat their lunches and talk about their irritation. The loud soldier, Wilson, and the tall soldier, Jim, argue more about whether or not they are truly eager to fight.
In the afternoon, the regiment goes over the land they took, the same land Henry looked at that morning. It no longer threatens the youth; he feels familiar with it. However, he keeps changing his mind about the upcoming battle. He begins to think that it is just better to be killed directly and end his troubles. Out of the corner of his eye, death seems like rest and appreciation, much better than the present circumstances of fear and uncertainty.
As gray smoke rises above the regiment, Wilson prophetically lays his hand on Henry's shoulder and says, with a trembling lip, that this will be his first and last battle. He gives Henry a packet of letters to send to his family and then, in tears, turns away.
The new regiment is now halted just inside a grove of trees, facing out into a field covered in smoke. They talk about rumors and reports from battles, who has lost what and moved where. As always, there is a disagreement about what has actually happened, this time to a Union battery.
Then the noise and altercation in the field in front of them grows louder, and the new troops grow silent. The Union troops in the field of smoke begin to run. A shell screams overhead the new regiment, landing in the grove and throwing up a shower of pine needles. Bullets begin to fly towards them as well. The lieutenant of the youth's company is then shot in the hand. He curses as if he had hit his finger with a hammer, which sounds quite funny to the rest of the troops. Curiously, the lieutenant holds his wound away from his uniform so as not to stain it.
The Union troops in the field begin to run away and the battle flag falls. The veteran regiments flanking the new troops catcall and jeer the fleeing men. Henry Fleming's regiment is dumbstruck with horror; they witnessed a regiment's defeat right before they are called to fight. The officers try to get the running men to stop, using their swords, fists, and cursing to keep them back. They rage with fury at the retreating regiment. The commander of that brigade gallops about on his horse, weeping. He looks like "a man who has come from bed to go to a fire." The fleeing troops pay no attention to any of these officers as they run.
This makes Henry sure he will run. Seeing the "mad current" of retreat swallow up the men's conscience, he is sure that he too will be driven wild and panic with battle. Yet, as the chapter ends, Henry resolves that now is the time he must see the "monster" that made them run, regardless if he runs himself.
Though The Red Badge of Courage can easily be categorized as a war novel, the psychological overtones of the work take center stage even in the first few chapters. Relying on research rather than first-hand experience, Stephen Crane crafted a portrait of fear within the historical context of The Civil War. Many critics point to Crane as one of the first American authors to initiate a modern style, as exemplified by The Red Badge. Crane’s third-person narrator, concentration on the impressionistic rendering of the natural world and the internal monologue of its protagonist add depth to the novel’s realistic tone, a style popularized in America by William Dean Howells and Frank Norris. However, Crane's style differs from that of his predecessors. For instance, the narrator does not name the characters outright, and the specific setting is never revealed. This serves Crane’s purpose of investigating the innerworkings of his main character, creating an allegorical or more universal quality in the text.
Henry Fleming, identified as “the youth” is a newly enlisted boy with dreams of the glory of war. Calling Henry "the youth" is the most important indicator that this novel is centered on the evolution of Henry’s maturity and psychological development rather than a specific indictment or championing of war. In this first chapter, Henry is unproven even to himself. Before enlisting, the possibility of cowardice does not arise; he assumes battles are unwaveringly valiant struggles of life and death. He does not enlist because of an overwhelming sense of patriotism or even the will to fight, but rather due to his fantasies of heroic deeds. His mother offers a more realistic assessment; rather than instruct him to emulate the Spartans and "return carrying your shield or on top of it" (meaning either victorious or killed in combat), she tells him to do only what he thinks is right. This is a critical moment in both the development of Henry’s character and the plot of the book. The tone here is much more ambivalent and the question of whether Henry will run or face battle becomes the focus of the narrative in the early chapters.
Several tones are at work in The Red Badge – realism, irony and metaphor. Crane’s realistic tone manifests in Henry’s challenged perceptions of the war. He finds war is not as he imagined and the more time passes without being tested, the less certain he becomes of his own capability. Before he is ensnared in battle, Henry's feelings remain ambivalent and shifting. He almost always has some opinion or thought about battle, but they change often – from fear and dread upon seeing the battle, to anticipation of an actual fight, to frustration when the men are being withdrawn. Before their bluster is silenced by the battle, the young soldiers in the opening chapters talk amongst themselves in vernacular common to the time period, reinforcing the historically accurate aspects of the work. Crane’s use of colloquial speech also adds a layer of humor to the talk of war. Henry’s shifting thoughts signal a tone of ironic detachment. His warped assessments of the world around him and his own mind, evident even in the early chapters, often run counter to what is being described by the narrator.
Even the title itself signals the vein of irony running through the novel. "The red badge of courage" is a wound sustained in battle – the tangible proof of bravery. When a shell hits the lieutenant of Henry's company, note that he has no desire to play up the severity of the injury. He holds the wound away from him, not wanting to get blood on his uniform, not wanting red to mingle with the blue. To the lieutenant, redness alone is not a badge of courage. His wound was almost accidental and not the result of a show of glory. There are different levels of authenticity to the wounds and, as we see in the first chapter with Henry’s mother’s speech, courage is not guaranteed. Henry’s yearning for a “red badge” drives the narrative and, as we see later in the novel, it is delivered ironically.
Yet Crane has written into this novel a clear way to tell certain characteristics even without explicit direction from the narrator or Fleming - color metaphors. Crane uses color metaphors to imply certain psychological meanings. For example, Henry's mother's discouragement is described as throwing a "yellow light upon the color of his ambitions." The use of yellow here is deliberate; it refers to cowardice. This continues throughout the book, as many other color associations are repeatedly made - the "red eyes" of fire and imminent battle to imply danger; the black silhouette of a colonel on horseback to imply death or authority; and, most importantly, the gray of fog and uniforms to imply the unknown.
Gray has a particular historical significance, as the uniforms of the Rebel army were gray. However, much like blue often relates not only to the literal color of the Union uniform but also to Henry's melancholy and brooding, Rebel gray also symbolizes the unknown of battle. The blue Union soldiers, who have been thinking about the implications of battle for days, are now faced with the enemy, both in the metaphor of the "blood-swollen god" of war and the Rebel army. The gray of smoke and fog symbolizes this unknown. Henry also has a relationship with nature and Crane uses elements of nature to communicate themes and character. These two metaphors coalesce in the grey fog of the battle. Henry and his regiment do not see the battle clearly; they see it in a haze. This shows their lack of knowledge. The haze and gray colors represent the unknown of battle and the detachment they have experienced thus far.
The Red Badge of Courage Essays and Related Content
- The Red Badge of Courage: Major Themes
- The Red Badge of Courage: Essays
- The Red Badge of Courage: E-Text
- The Red Badge of Courage: Questions
- The Red Badge of Courage: Purchase the Novel and Related Material
- Stephen Crane: Biography
- The Red Badge of Courage Summary
- About The Red Badge of Courage
- Character List
- Glossary of Terms
- Major Themes
- Quotes and Analysis
- Summary and Analysis of Chapters 1-4
- Summary and Analysis of Chapters 5-8
- Summary and Analysis of Chapters 9-12
- Summary and Analysis of Chapters 13-16
- Summary and Analysis of Chapters 17-20
- Summary and Analysis of Chapters 21-24
- The Battle of Chancellorsville
- Related Links on The Red Badge of Courage
- Suggested Essay Questions
- Test Yourself! - Quiz 1
- Test Yourself! - Quiz 2
- Test Yourself! - Quiz 3
- Test Yourself! - Quiz 4
- Author of ClassicNote and Sources | <urn:uuid:a90e964f-e8cb-4684-9988-f7d12b89d5fd> | CC-MAIN-2013-20 | http://www.gradesaver.com/the-red-badge-of-courage/study-guide/section1/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.975071 | 3,733 | 3.1875 | 3 |
Scripture always speaks with absolute authority. It is as authoritative when it instructs us as it is when it commands us. It is as true when it tells the future as it is when it records the past. Although it is not a textbook on science, wherever it intersects with scientific data, it speaks with the same authority as when it gives us moral precepts. Although many have tried to set science against Scripture, science never has disproved one jot or tittle of the Bible--and it never will.
It is therefore a serious mistake to imagine that modern scientists can speak more authoritatively than Scripture on the subject of origins. Scripture is God's own eyewitness account of what happened in the beginning. When it deals with the origin of the universe, all science can offer is conjecture. Science has proven nothing that negates the Genesis record. In fact, the Genesis record answers the mysteries of science.
A clear pattern for interpreting Genesis is given to us in the New Testament. If the language of early Genesis were meant to be interpreted figuratively, we could expect to see Genesis interpreted in the New Testament in a figurative sense. After all, the New Testament is itself inspired Scripture, so it is the Creator's own commentary on the Genesis record.
What do we find in the New Testament? In every New Testament reference to Genesis, the events recorded by Moses are treated as historical events. And in particular, the first three chapters of Genesis are consistently treated as a literal record of historical events. The New Testament affirms, for example, the creation of Adam in the image of God (James 3:9).
Paul wrote to Timothy, "Adam was formed first, then Eve. And Adam was not deceived, but the woman being deceived, fell into transgression" (1 Timothy 2:13-14). In 1 Corinthians 11:8-9, he writes, "Man is not from woman, but woman from man. Nor was man created for the woman, but woman for the man."
Paul's presentation of the doctrine of original sin in Romans 5:12-20 depends on a historical Adam and a literal interpretation of the account in Genesis about how he fell. Furthermore, everything Paul has to say about the doctrine of justification by faith depends on that. "For as in Adam all die, even so in Christ all shall be made alive" (1 Corinthians 15:22). Clearly Paul regarded both the creation and fall of Adam as history, not allegory. Jesus Himself referred to the creation of Adam and Eve as a historical event (Mark 10:6). To question the historicity of these events is to undermine the very essence of Christian doctrine.
Moreover, if Scripture itself treats the creation and fall of Adam as historical events, there is no warrant for treating the rest of the creation account as allegory or literary device. Nowhere in all of Scripture are any of these events handled as merely symbolic.
In fact, when the New Testament refers to creation, (e.g., Mark 13:19; John 1:3; Acts 4:24; 14:15; 2 Corinthians 4:6; Colossians 1:16; Hebrews 1:2, 10; Revelation 4:11; 10:6; 14:7) it always refers to a past, completed event--an immediate work of God, not a still-occurring process of evolution. The promised New Creation, a running theme in both Old and New Testaments, is portrayed as an immediate fiat creation, too--not an eons-long process (Isaiah 65:17). In fact, the model for the New Creation is the original creation (cf. Romans 8:21; Revelation 21:1, 5).
Hebrews 11:3 even makes belief in creation by divine fiat the very essence of faith itself: "By faith we understand that the worlds were framed by the word of God, so that the things which are seen were not made of things which are visible." Creation ex nihilo is the clear and consistent teaching of the Bible. | <urn:uuid:dcc0acf3-a142-466a-a87b-f000ef4f76ec> | CC-MAIN-2013-20 | http://www.gty.org/resources/articles/A160/genesis-1-and-biblical-authority | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.954125 | 827 | 2.671875 | 3 |
Robert Moses '56: Education Must Be Pursued for All
By Ian Thresher '12
Contact: Holly Foster 315-859-4068
October 26, 2010
Robert Moses ’56 gave a lecture titled “Quality Public Education as a Constitutional Right” as part of the Arthur Levitt Public Affairs Center’s Inequality and Equity Program on Oct. 25 in the Chapel.
Moses began his lecture by talking about Somerset v. Stuart; a famous English case in which Lord Mansfield held that slavery was unlawful in England, though not in the English colonies. Moses used this case, which was decided in 1772, to show the disparity between England’s civil rights history and America’s civil right history.
Fifteen years after England declared slavery illegal, Moses noted, the Founders codified the institution of slavery in the American Constitution. This recognition and toleration of slavery ensured that people of color would remain inferior to whites socially and politically for the next 200 years.
Moses talked about how the enormous civil rights gains during reconstruction crumbled in the face of Southern hostility. Even through the early 20th century many southern blacks remained sharecroppers, beholden to the infamous “Jim Crow Laws.” He also talked about how black men who were arrested often got long sentences doing hard labor. The state sold their labor to private companies for a low fee and Moses argued that these prisoners were slaves in all but name. Such activities were designed to “privatize profits and socialize risks.”
This system began to change with the onset of WWII, when African Americans began to migrate north to take industrial jobs in the cities. There they were able to assert their political and social rights much more effectively than in the South. They also started to call for the abolition of “Jim Crow Laws” in the South. Among these African American activists was Moses himself. He briefly described taking part in the Mississippi Summer Project, which was an attempt to register black voters in the South despite the numerous risks that this action posed. He also mentioned his role in organizing the Mississippi Democratic Party, an offshoot of the Democratic Party that was designed specifically to represent the interests of African Americans.
After working as a teacher in Tanzania from 1969 to 1976, Moses returned to the United States to get a philosophy degree from Harvard University. He soon realized that the next big problem confronting African Americans was mathematical illiteracy. Moses became very upset when he learned that the vast majority of underprivileged children in inner cities lacked the necessary mathematical skills to take the “college track” in high school. Instead of preparing underprivileged students to go to college, many high schools simply prepared them for the job market. Moses understood that “the clearest representation of the American caste system can be found in our educational process” and so he started the Algebra Project, a national non-profit mathematics literacy effort.
The Algebra Project has been enormously successful, but Moses believes that something more needs to be done to close the mathematical literacy gap between children of color and white children, saying, “Education, like happiness, must be pursued.” He favors a Constitutional amendment to make quality public education a right for all students. Moses argued that African Americans have been “Constitutionally invisible” for too long. He points to their previous designation as “property,” their suffering under the “Jim Crow Laws,” and the persistent inequality, 50 years after Brown v. Board of Education, between suburban and inner city schools. In Moses’ opinion, this inequality can only be fixed by amending the very heart of American political and social life: the United States Constitution.
Moses concluded his lecture by having the audience recite the preamble of the Constitution. Afterwards he declared, “We have the template down, now we just need to live up to it.” | <urn:uuid:8a89e1e3-261d-4d19-ad4f-c06f7b50e3f1> | CC-MAIN-2013-20 | http://www.hamilton.edu/news/story/robert-moses-56-education-must-be-pursued-for-all | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.973991 | 804 | 2.71875 | 3 |
Near Home is bit of a new idea. What does “near home” mean? There are getting to be more and more hacker spaces ( and similar spaces ) which give makers access to more advanced and expensive equipment than most can afford at home. This instructable assumes such a hacker space is near by. And therefore considers more expensive equipment may be present than in the usual home lab. One such space is now investigating a number of these methods and is hoping to recruit local expertize in developing optimal techniques. For more information on this see the website of AS220 Labs ( http://as220.org/labs/pages/Making%20Printed%20Circuit%20Boards ). If you are near Providence RI consider participating in the project. Results will be posted back here. We hope other hacker spaces also become centers for board fab.
This instructable will give an overview of most of the popular methods, describe how the steps come together and provide links ( mostly to other instructables, but some offsite ) to material on making boards. Many of the instructables cover only one or a few steps I list them with the step, and then at the end have links to instructables covering more complete processes. Note that I am planning to update this instructable for awhile yet, add your suggestions to the comments.
Making boards breaks down into a set of somewhat distinct steps. We will assume you have solved the circuit design stage and are starting on the fabrication stage.
Step 1: * Draw the schematic in a PC design tool.
Step 2: * Layout the components ( or choose the position of the components on the board ) and Route the traces ( this means determining the path the traces take on the circuit board )
Step3: * Output Files describing the board to the next step in the chain, this could be a set of gerber files, an image file, or perhaps some other file(s)
Step 4: * Transfer the file to the board ( in some cases like a milling machine you are then done )
Step 5 * If etching: etch the board.
Step 6: * Drill the holes.
Step 7: * Done.
Note that steps overlap somewhat and are often applied iteratively.
At each step there are a host of choices you can make, each may have consequences on quality and future steps. In this overview we will mention the choices but may not follow up on each of them. We will also bias our answers somewht to free or low cost solutions.
Step 1: Draw the Schematic in a PC Design Tool
* How to make a custom library part in Eagle CAD tool -- http://www.instructables.com/id/How-to-make-a-custom-library-part-in-Eagle-CAD-too/
* Eagle -- http://www.instructables.com/id/Eagle/
* Make hobbyist PCBs with professional CAD tools by modifying "Design Rules" – Eagle -- http://www.instructables.com/id/Make-hobbyist-PCBs-with-professional-CAD-tools-by-/
* Turn your EAGLE schematic into a PCB -- http://www.instructables.com/id/Turn-your-EAGLE-schematic-into-a-PCB/
* Draw Electronic Schematics with CadSoft EAGLE -- http://www.instructables.com/id/Draw-Electronic-Schematics-with-CadSoft-EAGLE/ | <urn:uuid:bbe5dc80-56e9-4b5e-be81-f0f8e461e97a> | CC-MAIN-2013-20 | http://www.instructables.com/id/Making-Printed-circuit-Boards-at-or-Near-Home-A-C/C8KWJWEH4AG5KGV | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.901099 | 739 | 2.796875 | 3 |
(NaturalNews) There are almost fifty years of documented scientific research on a quick, easy and reliable method for testing whether something is true and under the circumstances whether it's good. As an example: should you eat animal protein? On the subject of animal protein versus plant foods there are countless studies on both sides with credentialed experts and excellent arguments. We have plenty of data but the difficulty is in the interpretation. Another question might be regarding the merits of a political candidate. Do they have their constituents' best interests at heart or are they in the service of a corporate sponsor? What if there were a way beyond your limited knowledge to know on any given subject if it were true, if it were good?
In 1964, George J. Goodheart invented Applied Kinesiology (from the Greek: Kinesis = movement) after finding that benign or beneficial stimuli increased the strength of certain indicator muscles, but harmful stimulation caused the same muscles to suddenly weaken. Dr. John Diamond refined the approach to Behavioral Kinesiology by testing emotional and intellectual stimuli. He tested abstract symbols and found that some caused a universally weak response while others gave a strong response. He tested different types of music, photos, and speeches and found consistent results of test subjects either responding with strength or weakness.
Dr. David R. Hawkins, M.D., Ph.D. used kinesiology to develop a map of consciousness. He developed a scale from 1 to 1,000 with 50 being the level of hopelessness and despair, and 600 being the level of peace, bliss and illumination. Mahatma Gandhi calibrated at 700 on this scale and Attila the Hun at 90. He performed multiple thousands of trials using kinesiology to rate the beneficence of religions, books, movies, food, environments, people, history, events and more.
How does it work
There is a field of unified human consciousness which is accessed by the body. The rational mind is included within the field as a limited portion. The body breathes, circulates blood, digests lunch, dreams, and responds to stimuli and it's all happening beyond the conscious awareness of the rational mind.
Have the subject stand erect with the right arm relaxed at the side. Hold the left arm out to the side parallel to the floor with the elbow straight and the wrist relaxed. It's OK to reverse the arms. The tester faces the subject and puts their left hand on the subject's shoulder for steadiness. Then the tester puts their right hand on the subject's extended left arm just above the wrist. To test the muscle strength the subject might say something that's a known truth such as their age or name. The tester immediately presses down on the arm firmly (not hard) and evenly. Next the subject can make a statement that they know is false and the arm strength tested again. It should be clear that the muscles are responding differently to the statements and that the truth brings a strong response. The subject can hold an item and say something such as, "these eggs are healthy for me to eat."
Some people are able to get good results without a partner. Make an "O" with the thumb and index finger. When a statement is true it will be difficult to pull the 'O' apart. When results are false or harmful it will be easy to separate the thumb and forefinger.
Sources for this article include:
Power vs. Force by David R. Hawkins, M.D., PhD. 2002, Hay House
Truth vs. Falsehood by David R. Hawkins, M.D., PhD. 2005, Axial Publishing Company
FREE online report shows how we can save America through a nutrition health care
revolution. "Eating healthy is patriotic!" Click here to read it now...
Healing Power of Sunlight and Vitamin D
In this exclusive interview, Dr. Michael Holick reveals fascinating facts on
how vitamin D is created and used in the human body to ward off chronic diseases
like cancer, osteoporosis, mental disorders and more. Click here to read it now...
Get the Full Story
The International Medical Council on Vaccination has released, exclusively through
NaturalNews.com, a groundbreaking document containing the signatures of physicians,
brain surgeons and professors, all of which have signed on to a document stating
that vaccines pose a significant risk of harm to the health of children.
Click here to read it now...
Ranger Storable Organics
GMO-free, chemical-free foods and superfoods for long-term storage and preparedness.
See selection at www.StorableOrganics.com | <urn:uuid:f30944a5-0355-49a0-8cfb-563874a2128a> | CC-MAIN-2013-20 | http://www.naturalnews.com/034709_kinesiology_consciousness_testing.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.924259 | 943 | 2.640625 | 3 |
The CEI is currently involved in many international space missions and projects.
Gaia: Gaia was adopted within the scientific programme of the European Space Agency (ESA) in October 2000. The mission aims to: measure the positions of ~1 billion stars both in our Galaxy and other members of the Local Group, with an accuracy down to 20 µas, perform spectral and photometric measurements of all objects, derive space velocities of the Galaxy's constituent stars using the stellar distances and motions, and create a three-dimensional structural map of the Galaxy. The gathered large datasets will provide astronomers with a wealth of information covering a wide range of research fields: from solar system studies, galactic astronomy, cosmology to general relativity. The CEI is involved in a number of different projects including modelling the CCDs designed for the Gaia mission to simulate the charge trapping effect of radiation damage, analysis of the BP/RP and RVS radiation campaign datasets and the development of the data processing pipeline.
IXO: The International X-ray Observatory (IXO) is a new X-ray telescope with joint participation from NASA, the European Space Agency (ESA), and Japan's Aerospace Exploration Agency (JAXA). This project supersedes both NASA's Constellation-X and ESA's XEUS mission concepts. IXO is a next-generation facility designed to examine three main areas: black holes and matter under extreme conditions, formation and evolution of galaxies, clusters and large scale structure, and the life cycles of matter and energy. The IXO optics will have 20 times more collecting area at 1 keV than any previous X-ray telescope. The focal plane instruments will deliver up to 100-fold increase in effective area for high resolution spectroscopy from 0.3-10 keV, deep spectral imaging from 0.2-40 keV over a wide field of view, unprecedented polarimetric sensitivity, and microsecond spectroscopic timing with high count rate capability. The CEI is currently developing instrumentation for the X-ray Grating Spectrometer (XGS) readout.
Euclid: Euclid is a medium class mission candidate for launch in 2017 as part of the Cosmic Vision 2015-2025 programme and will spend five years in orbit at L2. The mission is a combination of two missions: the Dark UNiverse Explorer (DUNE) and the SPectroscopic All Sky Cosmic Explorer (SPACE). The primary goal is to study the dark universe by means of two main cosmological probes: the Weak Lensing (WL) technique which maps the distribution of dark matter and measures the properties of dark energy in the universe and the Baryonic Acoustic Oscillations (BAO) technique which uses the scales in the spatial and angular power spectra as "standard rulers" to measure the equation of state and rate of change of dark energy.
The CEI is working with a number of institutes, including ESA and Mullard Space Science Laboratory (MSSL) on the characterisation of the radiation effects to the Euclid CCDs. This work involves pre- and post-irradiation characterisation of the e2v CCD204s provided by ESA, based on the same architecture as the CCD203 which is proposed to be used onboard Euclid. A model of the CCD204 pixel structure is being created to explore the electron density for charge storage as a function of signal size and being used in CTE simulations under a variety of signal conditions to predict CTE effects at the mid and end of mission. The aim is to provide recommendations on CCD design modifications for improved radiation tolerance, device operation and shielding.
Chandrayaan-1 & 2: The Indian Space Research Organisation Chandrayaan-1 spacecraft was launched on the 22nd of October 2008. It spent nine months in a 100 km circular orbit around the Moon before communication was lost. During this time it surveyed the around 15 percent of the lunar surface providing a map of chemical characteristics and 3-dimensional topography. The spacecraft carried a number of instruments including a terrain mapping camera, infrared spectrometers, and the Chandrayaan-1 X-ray Spectrometer (C1XS). The C1XS instrument consisted of 24 e2v technologies CCD54 swept-charge device silicon X-ray detectors arranged in 6 modules that will carried out high quality X-ray spectroscopic mapping of the Moon using the technique of X-ray fluorescence in the energy range 0.5-10 keV.
The CEI was involved in performing the proton radiation damage assessment for the CCD54 devices recommending instrument shielding, operating temperature and operating potentials. The pre-flight characterisation of the 14 modules available for flight selection was also conducted recommending ten modules suitable for use in the instrument. The ESA space environment information system (SPENVIS) software was utilised to estimate the worse case end of life 10 MeV equivalent proton fluence, which was used to irradiate a number of CCD54 devices to investigate their post irradiation performance. The CEI continues to be involved in the instrument in an advisory role on the observed radiation effects to the CCD54 devices.
Chandrayaan-2 is the second Indian lunar mission, to be launched in 2014 into a 200 km polar orbit where is will use and test various new technologies. The spacecraft will include a number of instruments, one being the Chandrayaan-2 Large Area Soft X-ray Spectrometer (CLASS) instrument which is a continuation of the successful C1XS instrument. CLASS will map the abundance of major rock forming elements on the lunar surface, mapping elemental abundances with a nominal spatial resolution of 25 km. The instrument uses the second generation swept charge device, CCD236, and has a geometrical area three times that of C1XS which will allow for data collection at low levels of solar activity.
The CEI will provide assistance with the characterisation of the SCDs and an analysis of the impact of radiation damage on their performance. Initial studies have demonstrated a factor of two improvement in radiation hardness, further optimisation and a more detailed investigation into device performance is currently underway.
UKube-1: The UK Space Agency is planning to launch their first cubesat later this year. The cubesat platform allows fast mission turnaround of small payloads, allowing more groups to be involved with the missions. After launch in late 2011, the satellite will spend 1 year in a low Earth orbit (~400km), with a view to operating for a further 2 years if successful.
The CEI has successfully bid for design and production of a single payload, working in tandem with Clydespace to develop a payload responsible for imaging of the Earth with narrow and wide field imagers. In addition the group plans to include an imager to monitor radiation damage effects on the 0.18µm CMOS sensors, which have been previously characterised on the ground. This is the first such instrument under total development by the group, and will provide ample training and expansion of knowledge of mission development within the group. Click Here to access the mission page for more information. | <urn:uuid:87c1836c-5c2f-464a-b960-6d267edf25b2> | CC-MAIN-2013-20 | http://www.open.ac.uk/pssri/cei/?p=4 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.912695 | 1,461 | 2.734375 | 3 |
Responding to our recent post about clinical trials, a commenter mentioned informed consent and the questions women should ask before agreeing to participate in a trial. This is a timely topic today, with a CNN article asking, Did Tuskegee damage trust on clinical trials?,” as current protections for research subjects have really only been in place for a few decades (the history of women’s inclusion in trials is a topic for another day).
To understand your rights with regard to volunteering for a study, it may help to know a little bit about the process and guidelines for clinical research. Prior to conducting a study, researchers typically must submit their research plan to an institutional review board, or IRB. This board is charged with monitoring the trial and making sure the rights and welfare of the subjects are protected, and that the Belmont Report principles of respect for persons (individual autonomy and informed consent), beneficence (maximizing benefit to subjects while minimizing risk), and justice are honored. This presentation on ethical principles for human subjects research is a good introduction to the topic.
The IRB is also in charge of making sure the informed consent process is in place and adequate. An informed consent process should give you information on the research procedure, its purpose, risks and anticipated benefits, alternative procedures, and make it clear that you can ask questions and withdraw from the study at any time (you always have this right). It should also convey this information in a way that you can comprehend, and your consent should be obtained in a way that makes it truly voluntary for you (i.e., there is no coercion, undue influence, or punishment for not participating). The National Cancer Institute offers this guide to understanding informed consent.
The National Institutes of Health, a major funder of clinical trials in the United States, offers this list of questions you should ask when deciding whether to participate in a trial, and the National Cancer Institute offers a more comprehensive list of questions to have answered. These questions focus on the purpose of the study, possible risks and benefits, personal concerns, costs, and other topics; you should review this list and remember that you have every right to have these questions answered before volunteering for a study.
- Basic questions and answers about clinical trials – FDA
- Clinical trials: what you need to know – American Cancer Society
- Issue: recruitment and retention of women in clinical trials – Society for Women’s Health Research
- FAQ about clinical studies – National Institutes of Health
- Should I Enter a Clinical Trial? A Patient Reference Guide for Adults with a Serious or Life-Threatening Illness [PDF] – ECRI Institute | <urn:uuid:5050d16e-f9e3-478b-b5d0-07e1a07754d8> | CC-MAIN-2013-20 | http://www.ourbodiesourblog.org/blog/2008/03/what-you-should-know-about-clinical-trials | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.938409 | 534 | 2.828125 | 3 |
Photo Credit: John White
SCIENTIFIC NAME: Ondatra zibethicus
DESCRIPTION: The muskrat (Ondatra zibethicus) is a rodent closely related to and resembling the field mouse, except for the muskrat’s larger size. It is a stocky animal with a broad head and short legs weighing from one to four pounds. Its scaly tail is flattened laterally, and sparsely haired. The pelt consists of soft, thick underfur with long, glossy dark-red to dusky-brown guard hairs. The front feet, used primarily for digging and feeding, are unwebbed and have four sharp-clawed toes with a small thumb. The large hind feet are partially webbed with stiff hairs along the toes. The bodies of muskrats measure 10-14 inches in length, with the tail measuring almost as long as its body.
DISTRIBUTION: Muskrats can be found from near the Arctic Circle in Canada to the Gulf of Mexico and are found in every state with the exception of Florida.
HABITAT: Muskrats frequent a large variety of habitats including ditches, streams, marshes, lakes, beaver ponds, mine pits, farm ponds, and other wetland areas. For shelter, muskrats sometimes build a cone-shaped lodge of mud and sticks. This lodge may be five feet in diameter at the base and may reach three feet above the water. Bank dens or burrows are also often excavated for shelters. Both lodges and bank burrow type shelters may have several underwater entrances.
FEEDING HABITS: Muskrats are primarily vegetarians, relishing cattails, bulrush, smartweed, duck potato, horsetail, water lily, sedges, young willow sprouts, and pickerel weed. They will eat almost any type of aquatic vegetation, including the bulbs, roots, tubers, stems, and leaves of numerous wetland plants. Some field crops, when grown close to suitable habitat, are utilized for food. During times when vegetative food sources are low, muskrats may eat animals including crayfish, mussels, turtles, frogs, and fish.
LIFE HISTORY AND ECOLOGY: Muskrats are monogamous breeders (each male and female forming a pair) and are very prolific. In Alabama, muskrats have three to four young per litter and may have three or more litters per year. They may breed year round, but the breeding season usually runs from March through October.
Collins, Henry Hill, 1981 Harper and Row’s Complete Guide to North American Wildlife, Eastern Edition, Harper and Row Publishers, New York, N.Y.. 714 pp.
Yarrow, Greg K., 1998 Managing Wildlife on Private Lands in Alabama and the Southeast. Sweetwater Press. Birmingham, Alabama. 588 pp.
AUTHOR: Tracy Nelson, Wildlife Biologist, Division of Wildlife and Freshwater Fisheries, September 2006 | <urn:uuid:adf1449e-7bd8-4f62-85d4-95a37b2e59aa> | CC-MAIN-2013-20 | http://www.outdooralabama.com/watchable-wildlife/what/Mammals/Rodents/m.cfm | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.927953 | 621 | 3.75 | 4 |
July 8, 2009–Good solar potential, relative proximity to existing or potential energy transmission corridors, and the perception of the fewest conflicts with existing land uses and the natural environment were factors in site selection.
May 27, 2009–Researchers from California and Hawaii have analyzed 25 factors and developed a map that reflects the relative cumulative magnitude of their effects on the waters extending for about 250-350 miles off the shores of Washington, Oregon, California, and the Baja Peninsula.
February 18, 2009–The Western Governors' Association and the US DOE begin Phase 1 of a 4-phase process, with initial designation of suitable zones for renewable power generation in the western US, Canada, and Mexico.
October 31, 2007–California is trying to eradicate the brown apple moth along the state's central coast by aerial spraying of a pheromone-based pesticide intended to interfere with the insect's natural reproductive cycle. Some residents want to know what's being sprayed on them. | <urn:uuid:e3661328-c220-4ec8-b875-16007b80c388> | CC-MAIN-2013-20 | http://www.sej.org/publications/list/*/55?page=3 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.933058 | 196 | 2.90625 | 3 |
To help clarify: the term ASP is an acronym for Active Server Pages, which was coined some years ago. ASP.NET makes use the core .NET framework to accomplish it's goals, and is available in several languages (E.G. C#, VB).
that kind of exactly same mostly i mean to say .net or asp.net both are similar. When you add .net you imply you are using the .net framework. The .net framework behaves similar to Java in which it compiles down to an IL and then gets interpreted by the framework. ASP.net is the web piece of the .net framework. That is a brief overview. There is a lot more that go on with it. I hope that helps out more.
.Net Framework is the platform, where the application runs. The applications are of 3 types - Windows Forms, Web and Console applications. Normally, the web application part of the .Net Framework is known as asp.net . Just look at the figure and see where the asp.net comes in .Net Framework.
The older technology ASP is combined with .Net framework to make ASP.NET. Dot Net is a technology which can run a lot of different programming languages so basically its a platform for different programming languages. | <urn:uuid:0aa1084b-c599-4c0c-8222-9ca0061f785a> | CC-MAIN-2013-20 | http://www.sitepoint.com/forums/showthread.php?878299-ASP-NET-vs-NET&p=5176934&mode=linear | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.944571 | 261 | 3.5 | 4 |
SG Ports is a comprehensive, searchable database of official and unofficial tcp/udp port
assignments, known vulnerabilities, trojans, applications use and more. The ports, services and protocols database contains combined information
derived from IANA, numerous port lists, as well as our own research and user submissions. You can search by application/service name,
or simply click on port numbers below for detailed information.
Please simply use the "Add comment" buttons on individual port pages to add information about ports not already in the database.
IANA official ports
simovits.com trojan list
gameconfig.co.uk - port settings for online games
practicallynetworked.com - special applications port list
nmap.org services list
In computer networking, a port is an application-specific or process-specific software construct serving as a communications endpoint used by Transport Layer protocols of the Internet Protocol Suite, such as TCP and UDP.
Ports are identified by their port number (between 0 and 65535).
The Internet Assigned Numbers Authority (IANA) is responsible for the global coordination of Internet protocol resources, such as the DNS Root, IP addressing,
and the registration of commonly used port numbers for well-known Internet services. The port numbers are divided into three ranges:
Well Known Ports: 0 through 1023
Registered Ports: 1024 through 49151
Dynamic (Private) Ports: 49152 through 65535
Well Known and Registered ports should not be used without IANA registration. The registration procedure is defined in [RFC4340], Section 19.9. | <urn:uuid:1bd58600-bd48-4a2b-97ff-2033f0e4b446> | CC-MAIN-2013-20 | http://www.speedguide.net/ports.php?filter=risk&p=6 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.860839 | 329 | 2.609375 | 3 |
Yes, let's start with the basics:
What are the typical mistakes people make with percentages?
What is the margin of error in a poll?
It would be virtually impossible to conduct a poll on the entire voting population in the United States. Pollsters therefore question a sample of a population.
What is the difference between causation and correlation?
One of the most common errors we find in the press is the confusion between correlation and causation in scientific and health-related studies.
What does it mean for a result to be “statistically significant”?
How can we tell whether two events happen at the same time by chance, or for a reason?
What is the difference between absolute and relative risk?
Which one tells you about the actual risk ?
What is the difference between controlled, observational and case controlled studies?
There are advantages and disadvantages to each type, and an awareness of these differences makes for a savvier consumer of public health information.
What are confounding factors and how do they affect studies? | <urn:uuid:b95458ac-04cb-4ade-8e9f-3c0d35a9a1ac> | CC-MAIN-2013-20 | http://www.stats.org/in_depth/faq/FAQ_intro.htm | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.939496 | 211 | 2.9375 | 3 |
It became obvious, around the turn of last century, that something was very wrong with America’s farmers. Many of them—much too many—had lost their minds. “An alarming amount of insanity occurs in the new prairie States among farmers and their wives,” observed E.V. Smalley, the editor of Northwest Illustrated Monthly Magazine, in 1893. The cause, Smalley believed, was loneliness. The Northern European immigrants who came to settle Nebraska and the Dakotas were accustomed to living in small farming villages, among people their family had known for generations. Now, marooned on the Great Plains, separated from their neighbors by vast distances, language barriers, and extreme weather, they lived in almost total isolation. “Is it any wonder,” asked Smalley, that so many settlers “lose their mental balance?”
In The Americans, the historian Daniel Boorstin traced the madness of the farmers to the Homestead Act of 1862. The legislation, signed by Abraham Lincoln, decreed that a settler had to live on his acreage for five years in order to perfect his title. That meant towns, or even villages, were almost inconceivable. As the size of a settler’s plot increased, so did the distance he would have to travel to visit his neighbor. Since greed tended to prevail over comity, the Great Plains bred depressives and sociopaths. By 1908 the problem had become so dire that Theodore Roosevelt created a Commission on Country Life to improve social conditions for farmers and eliminate “the disadvantages which are due to the isolation of the family farm.” Roosevelt’s commission ended in failure. It was too late to reconfigure the organization of the land, and the spirit of isolation—or self-reliance, to give it a grander name—had become ingrained in the local character. American farmers were doomed to insanity.
It is in this context that one should read Willa Cather’s O Pioneers!, which follows the lives of several mentally unstable Nebraskan homesteaders between 1883 and 1900. In the novel’s opening section, this “dark country” feels like “the end of the earth”; the expanse is so immense that it seems “to overwhelm the little beginnings of human society that struggled in its somber wastes.” To some extent, Cather is speaking literally: the settlers’ houses are built out of the sod itself, and so tiny, that they are invisible to the eye sweeping across the plain—“you did not see them until you came directly upon them.” But the landscape’s vast dreariness also wreaks psychological damage. The settlers felt themselves “too weak to make any mark here, that the land wanted to be let alone, to preserve its own fierce strength, its peculiar, savage kind of beauty, its uninterrupted mournfulness.” Even wild flowers, a symbol for youthful spirit if ever there was one, are snuffed out by the brutality of the plains. They’ve all disappeared, except “a few of the very toughest and hardiest,” which settle “only in the bottom of the draws and gullies.”
All of Cather’s characters have one thing in common: they are desperately, excruciatingly lonely.
One of Cather’s wildest flowers is Marie Tovesky, a young Bohemian girl who is too pretty for her own good. After her 18th birthday she elopes with a handsome, tall, oafish farmer named Frank Shabata, who promptly makes her miserable with his jealousy. He also drives himself crazy, because there are so few men for him to suspect of seducing his wife; the only other boy with whom Marie comes into contact is the teenage farmhand. Secretly, however, Marie pines for Emil Bergson, a dreamer and intellect who seems ill-suited to life on a farm. The star-crossed lovers are separated by acres upon acres.
In a second story, Emil’s prudent, wise older sister Alexandra falls in love, long past her prime, with another dreamer, named Carl Linstrum. He has left the plains to pursue life as an artist in New York City, only to return a failure. He woos Alexandra, but he is rebuffed by her two older brothers, who distrust any man who has seen the world beyond Nebraska.
Despite their differences, all of Cather’s characters have one thing in common: they are desperately, excruciatingly lonely. “There are only two or three human stories,” says Carl, while walking past a graveyard, “and they go on repeating themselves as fiercely as if they had never happened before.” Carl never makes explicit what these three stories are, but it is safe to say that at least one of them involves the terrors of isolation.
For a century now, critics have tried to align Cather’s fiction with one ideology or another, and all have failed—this failure is even the subject of a book by Joan Acocella, Willa Cather and the Politics of Criticism. In O Pioneers!, as elsewhere, Cather works diligently to resist solutions to her characters’ dilemmas; this is her great talent, and the source of her courage as a writer. Carl is repaid for his worldliness with failure and ignominy. Marie and Emil, the tragically thwarted lovers, are penalized with death. Determined, reasonable Alexandra must endure decades of sorrow. Frank goes insane and slaughters his wife. And as cruel as the homesteading existence can be, city life is worse. When Alexandra speaks ruefully of her anonymous life on the plains, where she had no personality “apart from the soil,” Carl chastens her:
“Here you are an individual, you have a background of your own, you would be missed. But off there in the cities there are thousands of rolling stones like me. We are all alike; we have no ties, we know nobody, we own nothing ... We sit in restaurants and concert halls and look about at the hundreds of our own kind and shudder.”
Loneliness, Cather suggests, knows no geographical bounds. People are isolated wherever they find themselves, whether in the middle of a vast rural expanse or amid an urban crowd. Prairie madness is the common condition, one of the human stories that goes on repeating itself, “like the larks in this country, that have been singing the same five notes over for thousands of years.”
Other novels published in 1913:
Roast Beef, Medium by Edna Ferber
Virginia by Ellen Glasgow
John Barleycorn by Jack London
The Valley of the Moon by Jack London
Pollyanna by Eleanor H. Porter
My Little Sister by Elizabeth Robins
The Custom of the Country by Edith Wharton
Bestselling novel of the year:
The Inside of the Cup by Winston Churchill
About this series:
This monthly series will chronicle the history of the American century as seen through the eyes of its novelists. The goal is to create a literary anatomy of the last century—or, to be precise, from 1900 to 2013. In each column I’ll write about a single novel and the year it was published. The novel may not be the bestselling book of the year, the most praised, or the most highly awarded—though awards do have a way of fixing an age’s conventional wisdom in aspic. The idea is to choose a novel that, looking back from a safe distance, seems most accurately, and eloquently, to speak for the time in which it was written. Other than that there are few rules. I won’t pick any stinkers.
1902—Brewster’s Millions by George Barr McCutcheon
1912—The Autobiography of an Ex-Coloured Man by James Weldon Johnson
1922—Babbitt by Sinclair Lewis
1932—Tobacco Road by Erskine Caldwell
1942—A Time to Be Born by Dawn Powell
1952—Invisible Man by Ralph Ellison
1962—One Flew Over the Cuckoo’s Nest by Ken Kesey
1972—The Stepford Wives by Ira Levin
1982—The Mosquito Coast by Paul Theroux
1992—Clockers by Richard Price
2002—Middlesex by Jeffrey Eugenides
2012—Billy Lynn’s Long Halftime Walk by Ben Fountain
1903—The Call of the Wild by Jack London
What American novels best tell the story of the 20th-century? In a monthly series, Nathaniel Rich sets out to chart the history of the American Century through its novelists and their work.
Why did the Yugoslavian novelist Danilo Kis use modernist experiments to explore the horrors of the Eastern Bloc? Anthony Paletta on his life. | <urn:uuid:a830470b-f95f-4b45-a173-c1bc4cf51ae0> | CC-MAIN-2013-20 | http://www.thedailybeast.com/articles/2013/02/27/american-dreams-o-pioneers-by-willa-cather.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.966499 | 1,876 | 3.734375 | 4 |
Development Account Projects
Capacity-building and institutional development for equalization of opportunities for persons with disabilities
Persons who are disabled as a consequence of intellectual, physical or sensory impairment may find their lives handicapped. Many persons with disabilities thus lead isolated and dependent lives. In addition to barriers to the full exercise of their broad human rights, many persons with disabilities may experience barriers in meeting their obligations and in exercising their responsibilities as citizens in the societies in which they live. Participation is a basic right for all.
To strengthen capacities to further the equalization of opportunities by, for and with persons with disabilities for full and effective participation in social life and development
- Improved knowledge, skills and abilities of Governments, the non-governmental community and civil society to further a broad human rights approach to persons with disabilities;
- Networks of centres and institutions for disability action;
- Fully accessible Internet-based information services for use by interested countries concerning equalization of opportunities for all.
Effects and Impact:
The Western Africa sub-regional consultative meeting on the draft international Convention on the Protection and Promotion of the Rights and Dignity of Persons with Disabilities currently being negotiated at UN HQs was held in Ouagadougou – Burkina Faso from 27 to 29 October 2004. It had three main objectives: (i) to share information on the on-going negotiation process, on the content of the draft convention, on its implications and discussions; (ii) to establish a dialogue to clarify the sub-regional priorities with respect to the convention; (iii) to launch the initiative of a partnership project to establish a network of information on disability in Western Africa involving and benefiting all actors involved. The meeting intended to enhance sub regional networking, the sharing of national experiences, and the building of consensus on the development of common approaches. Participants were successfully trained in priority areas of the disability field, namely the content of the draft Convention under negotiation; networking options in the sub-region were discussed and comments on the issue were thoroughly included in the meeting report; accessible Internet-enabled information networking was specifically discussed and the content of a follow-up feasibility study commented upon; and interest and participation in the Convention negotiation process by both Governments and civil society organizations from the region has increased markedly.
The meeting builds upon a series of regional seminars and workshops were organized during the first half of 2003. The workshops covered topics such as: ICT for people with disabilities; human, political, social and economic rights for people with disabilities; the challenges to participation in social life and development of persons with disabilities; and the promotion and protection of the rights and dignity of persons with disabilities. These workshops and seminars enhanced subregional, regional, and inter-regional networking, the sharing of national experiences, and the building of consensus on the development of common approaches. | <urn:uuid:4ee95201-59b1-4405-b896-f6f26a913c02> | CC-MAIN-2013-20 | http://www.un.org/esa/devaccount/projects/2000/0001H.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.951968 | 572 | 2.859375 | 3 |
Birds are more like us than we realize. They eavesdrop on their neighbors in order to figure out where to build their nests and once, their eggs hatch, they sometime engage in "chick abuse," the bird equivalent of child abuse. And just like humans, birds that were abused THEMSELVES are more likely to abuse their offspring!
For one species of seabird in the Galápagos-- Nazca boobies--the child abuse "cycle of violence" found in humans plays out in the wild. This is the first evidence from the animal world showing those who are abused when they are young often grow up to be abusers. Among the ocean-going seabirds live in colonies in the Galapagos Islands off the coast of Ecuador, victimization by adults on other birds' chicks is widespread. They raise solitary nestlings on the ground and frequently leave their offspring unattended while foraging at sea, so there is much opportunity for adult birds to bully and beat up neighbor nestlings.
Biologist Dave Anderson says, "A bird's history as a target of abuse proved to be a strong predictor of its adult behavior." Traumatic abuse of developing young significantly increases the chances those maltreated individuals will exhibit the same maltreatment later in life as adults.
Anne and Whitley have taken a lot of abuse over the years, but we're still here. We hope to be around tomorrow too, but that can only happen with YOUR support, so please: Subscribe today! | <urn:uuid:8ddfe321-5c0e-4be2-8b95-6a2c8212afe3> | CC-MAIN-2013-20 | http://www.unknowncountry.com/news/its-birds | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00001-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.965299 | 305 | 3.375 | 3 |