text
stringlengths 366
374k
| id
stringlengths 47
47
| dump
stringclasses 1
value | url
stringlengths 20
277
| file_path
stringclasses 21
values | language
stringclasses 1
value | language_score
float64 0.68
1
| token_count
int64 84
77.4k
| score
float64 2.52
4.59
| int_score
int64 3
5
| domain
stringclasses 1
value |
---|---|---|---|---|---|---|---|---|---|---|
There’s a course at Yale University in which undergraduates travel to the Amazon rain forest to collect fungi.
The fungus samples are often nothing you’ve encountered. One of them, however, which will be featured in a paper accepted by a scientific journal, might solve the problem of polyurethane building up in our landfills. The fungus basically eats the plastic and breaks it down into carbon.
That’s just one discovery being studied in the Rainforest Expedition and Laboratory course taught by professor Scott A. Strobel.
“We take 15 undergraduates into the Ecuadorean rain forest and collect plant samples,” said Kaury Kucera, co-instructor of the course and a postdoctoral researcher in the department of molecular biophysics and biochemistry.
The fungus they’re looking for “grows in the inner tissues of plant samples that is symbiotic with the plant and often produces natural compounds that are interesting to medicine,” Kucera said.
Click "source" for entire article. | <urn:uuid:2d6808b0-5c98-46c6-849f-49b15d671b18> | CC-MAIN-2013-20 | http://www.microbeworld.org/component/jlibrary/?view=article&id=7187 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697974692/warc/CC-MAIN-20130516095254-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.943792 | 221 | 3.078125 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
Those who cannot learn from history are doomed to repeat it.--George Santayana
At the HNI Shareholders meeting, President and CEO, Stan Askren, made a point to tell shareholders that the past does not predict the future. There are always unforeseen events that are random or exogenous that lie outside the realm of normal that alter the future. For example, who could foresee the credit crisis and the mortgage mess.
What’s wrong with looking at history and making an inference about the future? Bestselling author, Nicholas Taleb, points out that history suffers from a problem of induction that he calls the Black Swan. When one moves from specific examples to general conclusions, there’s always a problem that a random event can alter the expected outcome. Looking at history provides comfort because it rules out randomness. It’s like a brain suave for those who are afraid of risk.
In fact, economists say that one should not let sunk costs determine future decisions. What happened in the past should be irrelevant to future decisions.
There’s another problem when using history as a guide in teaching economics. The problem lies in the brain’s tendency to find patterns in past events and think that one should have predicted the events that followed given these past events. This is what Taleb calls the post hoc narrative fallacy. In other words, hindsight is 20/20.
So when economics is taught in the history department, there’s tendency to teach it with a post hoc narrative and tendency to use induction. For these two reasons alone, economics should be taught in the business department. | <urn:uuid:88f62a18-739a-4ef7-b4dc-e5ca1c073d19> | CC-MAIN-2013-20 | http://www.mikeroeconomics.blogspot.com/2009/05/what-department-should-teach-economics.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697974692/warc/CC-MAIN-20130516095254-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.940032 | 329 | 3.078125 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
Source Newsroom: University of Alabama Huntsville
Newswise — Dr. Michael Briggs, a member of NASA’s Fermi Gamma-ray Burst Monitor (GBM) team at The University of Alabama in Huntsville today announced that the GBM telescope has detected beams of antimatter produced above thunderstorms on Earth by energetic processes similar to those found in particle accelerators.
"These signals are the first direct evidence that thunderstorms make antimatter particle beams," said Michael Briggs, a university researcher whose team, located at UAHuntsville, includes scientists from NASA Marshall Space Flight Center, the University of Alabama in Huntsville, Max-Planck Institute in Garching, Germany, and from around the world. He presented the findings during a news briefing at the American Astronomical Society meeting in Seattle.
Scientists think the antimatter particles are formed in a terrestrial gamma-ray flash (TGF), a brief burst produced inside thunderstorms that has a relationship to lighting that is not fully understood. As many as 500 TGFs may occur daily worldwide, but most go undetected.
The spacecraft, known as Fermi, is designed to observe gamma-ray sources in space, emitters of the highest energy form of light. Fermi’s GBM constantly monitors the entire celestial sky, with sensors observing in all directions, including some toward the Earth, thereby providing valuable insight into this strange phenomenon.
When the antimatter produced in a terrestrial thunderstorm collides with normal matter, such as the spacecraft itself, both the matter and antimatter particles immediately are annihilated and transformed into gamma-rays observed by the GBM sensors. The detection of gamma-rays with energies of a particular energy -- 511,000 electron volts -- is the smoking-gun, indicating that the source of the observed gamma-rays in these events is the annihilation of an electron with its antimatter counterpart, a positron, produced in the TGF.
Since the spacecraft’s launch in 2008, the GBM team has identified 130 TGFs, which are usually accompanied by thunderstorms located directly below the spacecraft at the time of detection. However, in four cases, storms were a far distance from Fermi. Lightning-generated radio signals, detected by a global monitoring network, indicated the only lightning at the time of these events was hundreds or more miles away.
During one TGF, which occurred on December 14, 2009, Fermi was located over Egypt. However, the active storm was in Zambia, some 2,800 miles to the south. The distant storm was below Fermi’s horizon, so any gamma-rays it produced could not have been detected directly. Although Fermi could not see the storm from its position in orbit, it was still connected to it through sharing of a common magnetic field line of the Earth, which could be followed by the high-speed electrons and positrons produced by the TGF. These particles travelled up along the Earth’s magnetic field lines and struck the spacecraft. The beam continued past Fermi along the magnetic field, to a location known as a mirror point, where its motion was reversed, and then 23 milliseconds later, hit the spacecraft again. Each time, positrons in the beam collided with electrons in the spacecraft, annihilating each other, and emitting gamma-rays detected by Fermi’s GBM.
NASA's Fermi Gamma-ray Space Telescope is an astrophysics and particle physics partnership. The spacecraft is managed by NASA's Goddard Space Flight Center in Greenbelt, Md. The GBM instrument is a collaboration between scientists at NASA's Marshall Space Flight Center, the University of Alabama in Huntsville, and the Max-Planck Institute in Garching, Germany. The Fermi mission was developed in collaboration with the U.S. Department of Energy, with important contributions from academic institutions and partners in France, Germany, Italy, Japan, Sweden and the United States. | <urn:uuid:989a7303-e260-45ab-8210-a42bb5fa3437> | CC-MAIN-2013-20 | http://www.newswise.com/articles/view/572496/?sc=dwhn | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697974692/warc/CC-MAIN-20130516095254-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.957234 | 813 | 3.359375 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
The IDLgrTessellator class is a helper class that converts a simple concave polygon (or a simple polygon with holes) into a number of simple convex polygons (general triangles). A polygon is simple if it includes no duplicate vertices, if the edges intersect only at vertices, and exactly two edges meet at any vertex.
Tessellation is useful because the IDLgrPolygon object accepts only convex polygons. Using the IDLgrTessellator object, you can convert a concave polygon into a group of convex polygons.
The IDLgrTessellator::Init method takes no arguments. Use the following statement to create a tessellator object:
myTess = OBJ_NEW('IDLgrTessellator')
See IDLgrTessellator for details on creating tessellator objects.
The procedure file
obj_tess.pro, located in the
examples/visual subdirectory of the IDL distribution, provides an example of the use of the IDLgrTessellator object. To run the example, enter OBJ_TESS at the IDL prompt. The procedure creates a concave polygon, attempts to draw it, and then tessellates the polygon and re-draws. Finally, the procedure demonstrates adding a hole to a polygon. (You will be prompted to press Return after each step is displayed.) You can also inspect the source code in the
obj_tess.pro file for hints on using the tessellator object. | <urn:uuid:55ea103e-d05b-4d17-afe3-3d22471f1685> | CC-MAIN-2013-20 | http://www.physics.nyu.edu/grierlab/idl_html_help/obj_attribute8.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697974692/warc/CC-MAIN-20130516095254-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.811223 | 329 | 2.71875 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
"Many environmentalists believe that wind and solar power can be scaled to meet the rising demand [of billions emerging from poverty], especially if coupled with aggressive efforts to cut waste," reports Justin Gillis. "But a lot of energy analysts have crunched the numbers and concluded that today’s renewables, important as they are, cannot get us even halfway there."
Gillis discusses the most promising innovations in nuclear power, which many technologists see as the most viable option for providing a reliable source of electricity without carbon emissions. These include "a practicable type of nuclear fusion", "a fission reactor that could run on today’s nuclear waste", and "a safer reactor based on an abundant element called thorium."
"Beyond the question of whether they will work," he adds, "these ambitious schemes pose a larger issue: How much faith should we, as a society, put in the idea of a big technological fix to save the world from climate change?"
And as is appropriate for a nuclear-related news item that appeared on the two-year anniversary of the Tohoku earthquake, we offer a reminder of the twelve different nuclear power "near miss" events that occurred in the United States in 2012. | <urn:uuid:11349972-17b0-4f34-b408-cfc39341347b> | CC-MAIN-2013-20 | http://www.planetizen.com/node/61170 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697974692/warc/CC-MAIN-20130516095254-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.954486 | 248 | 3.203125 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
Archeologists, during an ongoing excavation, have unearthed two ancient theater masks belonging to Roman period in southeastern Turkish province of Mardin.
An archaeological team conducted by the Museum of Mardin in Ilisu Dam excavated the masks revealed to be made of bronze and iron.
The experts suggest that the masks belong to a travelling theater group, which came to Mardin at the time of Roman Empire about 2300 years ago.
"It is revealed that this historical artifact from Roman Empire have been brought to Mardin by the travelling theaters as there has been no theater here at that time. This travelling theater is presumed to come from west to east," said Mardin Culture and Tourism Director Davut Beliktay.
Many other relics have been uncovered during the excavation, though they are less important than the masks as rare ancient treasure in Turkey, Beliktay added.
The newly found artifacts have an historical importance to Mardin, as they confirm the city’s rich history, said the Director of Mardin Museum, Nihat Erdogan.
The masks were immediately taken for restoration in a laboratory in the Museum of Mardin. When the restoration comes to end, they are programmed to be protected at the museum. | <urn:uuid:5b6eeb8a-1465-47be-b211-e184ed1b6366> | CC-MAIN-2013-20 | http://www.presstv.ir/detail/2012/08/27/258407/two-old-theater-masks-found-in-turkey/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697974692/warc/CC-MAIN-20130516095254-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.969068 | 257 | 3.015625 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
The Bhopal disaster
was an industrial disaster
that occurred in the city of Bhopal
, Madhya Pradesh
, resulting in the immediate deaths of more than 3,000 people, according to the Indian Supreme Court. A more probable figure is that 8,000 died within two weeks, and it is estimated that the same number have since died from gas related diseases.
The incident took place in the early hours of the morning of December 3, 1984, in the heart of the city of Bhopal in the Indian state of Madhya Pradesh. A Union Carbide subsidiary pesticide plant released 43 tonnes of methyl isocyanate (MIC) gas, exposing at least 520,000 people to toxic gases. The Bhopal disaster is frequently cited as the world's worst industrial disaster. The International Medical Commission on Bhopal was established in 1993 to respond to the disasters.
Background and causes, summary
The Union Carbide India, Limited
(UCIL) plant was established in 1969. 51% was owned by Union Carbide Corporation (UCC) and 49% by Indian authorities. It produced the pesticide carbaryl
(trade mark Sevin). Methyl isocyanate
(MIC), an intermediate in carbaryl manufacture, was used instead of less toxic but more expensive materials. In 1979, a plant for producing MIC was added. UCC was responsible for all technique and design. The plant was located close to a densely populated area, instead of on the other side of the town where UCIL was offered an area. MIC was stored in a few large tanks instead of several small tanks.
During the night of December 3rd 1984, large amounts of water entered tank 610, containing 43 tonnes of methyl isocyanate. The resulting reaction generated a major increase in the temperature of liquid inside the tank to over 400°F (200°C). The MIC holding tank then gave off a large volume of toxic gas, forcing the emergency release of pressure. The reaction was sped up by the presence of iron from corroding non-stainless steel pipelines.
There have been several theories on the reason for the entry of water into the tank. The workers claim that, because of the bad maintenance with leaking valves etc, it was possible for the water to climb from the point where the pipeline washing was performed to tank 610. UCC maintains that this was not possible, and that it was an act of sabotage by a "disgruntled worker" who introduced water directly into the tank. There is much confusion because the Indian government closed the plant to outsiders and would not allow interviews with the plant employees for almost a year. Much speculation arose in the meantime and much of it was not scientifically based, but based on worker accounts which may or may not have been accurate.
The deciding factors that caused the outcome were the state of the art plant design (location near a densely populated area, using hazardous chemicals instead of less dangerous, storing in large tanks, possible corroding material in pipelines etc), and the decision to close the plant which began a shut down which contributed to poor oversight by local managers (poor oversight of operators, safety systems not functioning etc), and in the aftermath, negligence on the part of the governments of India and Madhya Pradesh as well as UCC.
- The deficiencies in the Bhopal plant design can be summarised as: choosing a dangerous method of manufacturing pesticides; large-scale storage of MIC prior to selling; location close to a densely populated area; under-dimensioning of the safety features; dependence on manual operations..
- Deficiencies in the management of UCIL can be summarised: lack of skilled operators because of the staffing policy; reduction of safety management because of reducing the staff; insufficient maintenance of the plant; lack of emergency response plans.
A long-term cause of the catastrophe was the location of the plant; authorities had tried and failed to persuade Carbide to build the plant away from densely-populated areas. Carbide explained their refusal on the expense that such a move would incur.
Plant production process
Union Carbide produced their pesticide, Sevin (the name of carbaryl
), using MIC as an intermediate. Until 1979, MIC was imported from USA. Other manufacturers, such as Bayer
, made Sevin without MIC, though at greater manufacturing costs.
The Bhopal route was to react methyl amine with phosgene (also a deadly gas & chemical warfare agent) to form MIC, the MIC was then reacted with 1-naphthol to form the final product. This route is different to the MIC free route used elsewhere with the same raw materials in a different manufacturing order: phosgene is reacted with the naphthol first to form a chloroformate ester which is then reacted with methyl amine.
It seems as at least some of the techniques were more or less unproven.
In the early 1980s, the demand for pesticides had fallen though production continued leading to buildup of stores of unused MIC.
Attempts to reduce expenses affected the factory’s employees and their conditions.
- Kurzman argues that “cuts... meant less stringent quality control and thus looser safety rules. A pipe leaked? Don’t replace it, employees said they were told... MIC workers needed more training? They could do with less. Promotions were halted, seriously affecting employee morale and driving some of the most skilled... elsewhere”.
- Workers were forced to use English manuals, despite the fact that only a few had a grasp of the language.
- By 1984, only six of the original twelve operators were still working with MIC and the number of supervisory personnel was also cut in half. No maintenance supervisor was placed on the night shift and instrument readings were taken every two hours, rather than the previous and required one-hour readings.
- Workers made complaints about the cuts through their union but were ignored. One employee was fired after going on a 15-day hunger strike. 70% of the plant’s employees were fined before the disaster for refusing to deviate from the proper safety regulations under pressure from management.
- In addition, some observers, such as those writing in the Trade Environmental Database (TED) Case Studies as part of the Mandala Project from American University, have pointed to “serious communication problems and management gaps between Union Carbide and its Indian operation”, characterised by “the parent companies [sic] hands-off approach to its overseas operation” and “cross-cultural barriers”.
- The personnel management policy led to an exodus of skilled personnel to better and safer jobs.
Equipment and safety regulations
- It emerged in 1998, during civil action suits in India, that, unlike Union Carbide plants in the USA, its Indian subsidiary plants were not prepared for problems. No action plans had been established to cope with incidents of this magnitude. This included not informing local authorities of the quantities or dangers of chemicals used and manufactured at Bhopal.
- The MIC tank’s alarms had not worked for 4 years.
- There was only one manual back-up system, not the four-stage system used in the USA.
- The flare tower and the vent gas scrubber had been out of service for 5 months before the disaster. The gas scrubber therefore did not treat escaping gases with sodium hydroxide (caustic soda), which may have brought the concentration down to a safe level. Even if the scrubber had been working, according to Weir, investigations in the aftermath of the disaster discovered that the maximum pressure it could handle was only one-quarter of that which was present in the accident. Furthermore, the flare tower itself was improperly designed and could only hold one-quarter of the volume of gas that was leaked in 1984.
- To reduce energy costs, the refrigeration system, designed to inhibit the volatilization of MIC, had been left idle – the MIC was kept at 20 degrees Celsius, not the 4.5 degrees advised by the manual, and some of the coolant was being used elsewhere.
- The steam boiler, intended to clean the pipes, was out of action for unknown reasons.
- Slip-blind plates that would have prevented water from pipes being cleaned from leaking into the MIC tanks via faulty valves were not installed. Their installation had been omitted from the cleaning checklist.
- Water sprays designed to “knock down” gas leaks were poorly designed – set to 13 metres and below, they could not spray high enough to reduce the concentration of escaping gas.
- The MIC tank had been malfunctioning for roughly a week. Other tanks had been used for that week, rather than repairing the broken one, which was left to “stew”. The build-up in temperature and pressure is believed to have affected the explosion and its intensity.
- Carbon-steel valves were used at the factory, despite the fact that they corrode when exposed to acid. On the night of the disaster, a leaking carbon-steel valve was found, allowing water to enter the MIC tanks. The pipe was not repaired because it was believed it would take too much time and be too expensive.
- Themistocles D'Silva contends that the design of the MIC plant, following government guidelines, was "Indianized" by UCIL engineers to maximize the use of indigenous materials and products. It also dispensed with the use of sophisticated instrumentation as not appropriate for the Indian plant. Because of the unavailability of electronic parts in India, the Indian engineers preferred pneumatic instrumentation.
Previous warnings and accidents
A series of prior warnings and MIC-related accidents had been ignored:
- In 1976, the two trade unions reacted because of pollution within the plant.
- In 1981, a worker was splashed with phosgene. In panic he ripped off his mask, thus inhaling a large amount of phosgene gas; he died 72 hours later.
- In January 1982, there was a phosgene leak, when 24 workers were exposed and had to be admitted to hospital. None of the workers had been ordered to wear protective masks.
- In February 1982, an MIC leak affected 18 workers.
- In August 1982, a chemical engineer came into contact with liquid MIC, resulting in burns over 30 percent of his body.
- In October 1982, there was a leak of MIC, methylcarbaryl chloride, chloroform and hydrochloric acid. In attempting to stop the leak, the MIC supervisor suffered intensive chemical burns and two other workers were severely exposed to the gases.
- During 1983 and 1984, leaks of the following substances regularly took place in the MIC plant: MIC, chlorine, monomethylamine, phosgene, and carbon tetrachloride, sometimes in combination.
- Reports issued months before the incident by scientists within the Union Carbide corporation warned of the possibility of an accident almost identical to that which occurred in Bhopal. The reports were ignored and never reached senior staff.
- Union Carbide was warned by American experts who visited the plant after 1981 of the potential of a “runaway reaction” in the MIC storage tank; local Indian authorities warned the company of problems on several occasions from 1979 onwards. Again, these warnings were not heeded.
- In November 1984, most of the safety systems were not functioning. Many valves and lines were in poor condition. Tank 610 contained 43 tonnes MIC, much more than allowed according to safety rules.
- During the nights of 2-3 December, large amounts of water entered tank 610. A run-away reaction started, which was accelerated by contaminants, high temperatures and other factors. The reaction generated a major increase in the temperature of liquid inside the tank to over 200°C (400°F). The MIC holding tank then gave off a large volume of toxic gases, forcing the emergency release of pressure. The reaction was sped up by the presence of iron from corroding non-stainless steel pipelines.
- We know that workers cleaned pipelines with water. They were not told by the supervisor to add a slip-blind water isolation plate. Because of this, and of the bad maintenance, the workers consider it possible for water to enter the MIC tank.
- UCC maintains that a "disgruntled worker" deliberately connected a hose to a pressure gauge. However, this would hardly have been possible if the safety rules had been followed.
Time line, summary
At the plant
- 21.00 Water cleaning of pipes start.
- 22.00 Water enters 610. Reaction starts.
- 22.30 Gases are coming out from the VGS-tower.
- 00.30 The large siren sounds and is turned off.
- 00.50 The siren is heard within the plant area. The workers escape.
- 22.30 First sensations felt. Suffocation, cough, eyes, vomiting.
- 1.00 Police alerted. People escaped. UC-director denied a possible leak.
- 2.00 The first people reached Hamidia hospital. Half blind, gasping for air, frothing at the mouth, vomiting.
- 2.10 The alarm was heard outside the plant.
- 4.00 The gases were reduced.
- 6.00 The police's loudspeaker said: "Everything is normal".
- Morning: Thousands of dead bodies and hundreds of dead cattle lying on the streets.
Apart from MIC the gas cloud may have contained phosgene
, hydrogen cyanide
, carbon monoxide
, hydrogen chloride
, nitrous oxides
, monomethyl amine
(MMA) and carbon dioxide
, either produced in the storage tank or in the atmosphere. All these gases, except carbon dioxide, are acutely toxic at levels well below 500 ppm
The gas cloud, composed mainly of materials more dense than the surrounding air, stayed close to the ground and spread outwards through the surrounding community. The initial effects of gas exposure were coughing, vomiting, severe eye irritation and a feeling of suffocation. People awoken by these symptoms fled away from the plant. Those who ran inhaled more than those who had a vehicle. Due to their height, children and other people of lower stature inhaled relatively higher concentrations. Many people were trampled trying to escape.
Thousands of people had succumbed to gas exposure by the morning hours. There were mass funerals and mass cremations as well as bodies being disposed of in the Narmada river. 170,000 people were treated at hospitals and temporary dispensaries. 2,000 buffaloes, goats, and other animals had to be collected and buried. Within a few days, leaves on trees went yellow and fell off. Supplies including food became scarce due to safety fears by the suppliers. Fishing was prohibited as well which caused further supply shortages. .
A total of 36 wards were marked by the authorities as being "gas affected", affecting a population of 520,000. In 1991, 3,928 deaths had been certified. Independent organizations recorded 8,000 dead the first days. Other estimations vary between 10,000 and 20,000. Another 100,000 to 200,000 people are estimated to have been injured.
The majority of deaths and serious injuries were related to pulmonary edema, but the gas caused a wide variety of other ailments. Signs and symptoms of methyl isocyanate exposure include coughing, dyspnea, chest pain, lacrimation, eyelid edema, and unconsciousness. These effects tend to progress over 24 to 72 hours following exposure to include acute lung injury, cardiac arrest, and death.
Long term health effects
The quality of the epidemiological and clinical research varies. Reported and studied symptoms are eye problems, respiratory difficulties, immune and neurological disorders, cardiac failure secondary to lung injury, female reproductive difficulties, and birth defects among children born to affected women. Other symptoms and diseases are often ascribed to the gas exposure, but there is no good research supporting this.. For a review of the research on the health effects of the Bhopal disaster (Dhara & Dhara, 2002), see http://www.ncbi.nlm.nih.gov/pubmed/12641179.
Aftermath of the leakage
- The doctors and the staff were completely taken by surprise as thousands and thousands of survivors entered the gates.
- Doctors and hospitals were not informed of proper treatment methods for MIC gas inhalation. They were told to simply give cough medicine and eye-drops to their patients.
- The gases immediately caused visible damage to the trees. Within a few days, all the leavsfelof.
- 2,000 bloated animal carcasses had to be taken care of.
- "Operation Faith" On december 16, the tanks 611 and 619 shoud be emptied of the remains of MIC. This led to a second mass evacuation from Bhopal.
- Complaints of a lack of information or misinformation were legion. Not even the medical doctor of the Bhopal plant had proper information about the properties of the gases. An Indian Government spokesman said that "Carbide is more interested in getting information from us than in helping our relief work."
- Up to today, UCC has not released information about the possible composition of the cloud.
- Formal statements were issued that air, water, vegetation and foodstuffs were safe everywhere in the city. At the same time, television features informed people that poultry was unaffected, but warned people not to consume fish, etc.
- The survivors lost their economic standard, lost health and gained worries about the future. Much time was spent at hospitals and clinics. The expences fore medicines could sometimes esceed expenses on food. It was difficult for girls to get married.
- Bhopal was invaded by American lawyers, radical groups and health personnel. Sometimes there was conflicts with the police.
Union Carbide’s defense
Now owned by Dow Chemical Company
, Union Carbide denies allegations against it on its website dedicated to the tragedy. The corporation believes that the accident was the result of sabotage, stating that safety systems were in place and operative. It also stresses that it did all it could to alleviate human suffering following the disaster.
Investigation into possible sabotage
The company cites an investigation conducted by the engineering consulting firm Arthur D. Little
, which concluded that a single employee secretly and deliberately introduced a large amount of water into the MIC tank by removing a meter and connecting a water hose directly to the tank through the metering port. Carbide claims such a large amount of water could not have found its way into the tank by accident, and safety systems were not designed to deal with intentional sabotage. UC says that the rest of the plant staff falsified numerous records to distance themselves from the incident, and that the Indian Government impeded its investigation and declined to prosecute the employee responsible, presumably because that would weaken its allegations of negligence against Union Carbide.
Union Carbide has never publicly named or identified the employee it claims sabotaged its Bhopal plant or attempted to prosecute. Nevertheless, on the company’s Bhopal Information Center website, Carbide claims that “the Indian authorities are well aware of the identity of the employee and the nature of the evidence against him”.
Safety and equipment issues
The corporation denies the claim that the valves on the tank were malfunctioning, claiming that “documented evidence gathered after the incident showed that the valve close to the plant's water-washing operation was closed and leak-tight. Furthermore, process safety systems – in place and operational – would have prevented water from entering the tank by accident”. Carbide states that the safety concerns identified in 1982 were all allayed before 1984 and “none of them had anything to do with the incident”.
The company admits that “the safety systems in place could not have prevented a chemical reaction of this magnitude from causing a leak”. According to Carbide, “in designing the plant's safety systems, a chemical reaction of this magnitude was not factored in” because “the tank's gas storage system was designed to automatically prevent such a large amount of water from being inadvertently introduced into the system” and “process safety systems – in place and operational – would have prevented water from entering the tank by accident”. Instead, they claim that “employee sabotage – not faulty design or operation – was the cause of the tragedy”.
The company stresses the “immediate action” taken after the disaster and their continued commitment to helping the victims. On December 4th, the day following the leak, Union Carbide sent material aid and several international medical experts to assist the medical facilities in Bhopal.
Carbide put $2 million into the Indian Prime Minister’s immediate disaster relief fund on 11th December 1984. The corporation established the Employees' Bhopal Relief Fund in February 1985, which raised more than $5 million for immediate relief.
In August 1987, Carbide made an additional $4.6 million in humanitarian interim relief available.
Union Carbide also undertook several steps to provide continuing aid to the victims of the Bhopal disaster after the court ruling, including:
- The sale of its 50.9 percent interest in UCIL in April 1992 and establishment of a charitable trust to contribute to the building of a local hospital. The sale was finalized in November 1994. The hospital was begun in October 1995 and was opened in 2001. The company provided a fund with around $90 million from sale of its UCIL stock. In 1991, the trust had amounted approximately $100 million. The hospital caters for the treatment of heart, lung and eye problems.
- Providing "a $2.2 million grant to Arizona State University to establish a vocational-technical center in Bhopal, which was constructed and opened, but was later closed and leveled by the government”.
- Donating $5 million to the Indian Red Cross.
- Developing the Responsible Care system with other members of the chemical industry as a response to the Bhopal crisis, which is designed “to help prevent such an event in the future by improving community awareness, emergency preparedness and process safety standards”.
Legal action against Union Carbide has dominated the aftermath of the disaster. However, other issues have also continued to develop. These include the problems of ongoing contamination, criticisms of the clean-up operation undertaken by Union Carbide, and a 2004 hoax.
Time-line 1984-2004: See "Bhopal Gas Tragedy: Fact Sheet", Hindustan Times, Dec 3, 2004
Legal action against Union Carbide
Legal issues began affecting Union Carbide, the US and Indian governments, the local authorities in Bhopal and the victims of the disaster immediately after the catastrophe.
Legal proceedings leading to the settlement
On 14th December 1984, the Chairman and CEO of Union Carbide, Warren Anderson
, addressed the US Congress, stressing the company’s “commitment to safety” and promising to ensure that a similar accident “cannot happen again”. However, the Indian Government passed the Bhopal Gas Leak Act in March 1985, allowing the Government of India to act as the legal representative for victims of the disaster, leading to the beginning of legal wrangling.
March 1986 saw Union Carbide propose a settlement figure, endorsed by plaintiffs’ US attorneys, of $350 million that would, according to the company, “generate a fund for Bhopal victims of between $500-600 million over 20 years”. In May, litigation was transferred from the US to Indian courts by US District Court Judge. Following an appeal of this decision, the US Court of Appeals affirmed the transfer, judging, in January 1987, that UCIL was a “separate entity, owned, managed and operated exclusively by Indian citizens in India”. The judge in the US, Judge Keenan, granted Carbide’s forum request, thus moving the case to India. This meant that, under US federal law, the company had to submit to Indian jurisdiction.
Litigation continued in India during 1988. The Indian Supreme Court told both sides to come to an agreement and “start with a clean slate” in November 1988. Eventually, in an out-of-court settlement reached in 1989 , Union Carbide agreed to pay US$470 million for damages caused in the Bhopal disaster, 15% of the original $3 billion claimed in the lawsuit. By the end of October 2003, according to the Bhopal Gas Tragedy Relief and Rehabilitation Department, compensation had been awarded to 554,895 people for injuries received and 15,310 survivors of those killed. The average amount to families of the dead was $2,200.
Throughout 1990, the Indian Supreme Court heard appeals against the settlement from “activist petitions”. Nonetheless, in October 1991, the Supreme Court upheld the original $470 million, dismissing any other outstanding petitions that challenged the original decision. The decision set aside a “portion of settlement that quashed criminal prosecutions that were pending at the time of settlement”. The Court ordered the Indian government “to purchase, out of settlement fund, a group medical insurance policy to cover 100,000 persons who may later develop symptoms” and cover any shortfall in the settlement fund. It also “requests” that Carbide and its subsidiary “voluntarily” fund a hospital in Bhopal, at an estimated $17 million, to specifically treat victims of the Bhopal disaster. The company agreed to this. However, the International Campaign for Justice in Bhopal notes that the Court also reinstated criminal charges.
Charges against Warren Anderson and others
The Chairman and CEO of Union Carbide, Warren Anderson
, had been arrested and released on bail by the Madhya Pradesh Police in Bhopal on December 7, 1984. This caused controversy as his trip to Bhopal was conditional on an initial promise by Indian authorities not to arrest him. Anderson has since refused to return to India.
Beginning in 1991, the local authorities from Bhopal charged Warren Anderson, who had retired in 1986, with manslaughter, a crime that carries a maximum penalty of 10 years in prison. Anderson has so far avoided an international arrest warrant and a US court summons. He was declared a fugitive from justice by the Chief Judicial Magistrate of Bhopal on February 1, 1992 for failing to appear at the court hearings in a culpable homicide case in which he was named the chief defendant. Orders were passed to the Government of India to press for an extradition from the United States, with whom India had an extradition treaty in place. He went missing for several years, until he was discovered by Greenpeace “living a life of luxury in the Hamptons”. The Bhopal Medical Appeal believe that “neither the American nor the Indian government seem interested in disturbing him with an extradition”. Some allege that the Indian government has hesitated to put forth a strong case of extradition to the United States, fearing backlash from foreign investors who have become more important players in the Indian economy following liberalization. A seemingly apathetic attitude from the US government, which has failed to pursue the case, has also led to strong protests in the past, most notably by Greenpeace. A plea by India's Central Bureau of Investigation to dilute the charges from culpable homicide to criminal negligence has since been dismissed by the Indian courts.
The U.S. Supreme Court refused to hear appeal of the decision of the lower federal courts in October 1993, meaning that victims of the Bhopal disaster could not seek damages in a US court.
Meanwhile, very little of the money from the settlement reached with Union Carbide went to the survivors, and people in the area feel betrayed not only by Union Carbide (and chairman Warren Anderson), but also by their own politicians..On the anniversary of the tragedy, effigies of Anderson and politicians are burnt.
In July 2004, the Indian Supreme Court ordered the Indian government to release any remaining settlement funds to victims. The deadline for this release was extended by the Indian Supreme Court In April 2005, giving the Indian government until 30th April 2006 after a request from the Welfare Commission for Bhopal Gas Victims. The fund is believed to amount to $500 million after earning interest “from money remaining after all claims had been paid”.
August 2006 saw the Second Circuit Court of Appeals in New York City upheld the dismissal of remaining claims in the case of Bano v. Union Carbide Corporation. This move blocked plaintiffs’ motions for class certification and claims for property damages and remediation. In the view of Carbide, “the ruling reaffirms UCC’s long-held positions and finally puts to rest — both procedurally and substantively – the issues raised in the class action complaint first filed against Union Carbide in 1999 by Haseena Bi and several organizations representing the residents of Bhopal”. In September 2006, the Welfare Commission for Bhopal Gas Victims announced that all original compensation claims and revised petitions had been “cleared".
Criminal charges are proceeding against former Union Carbide India Limited employees including: Former UCIL Chairman Shri Keshub Mahindra; presently Chairman-cum managing Director Shri Vijay Gokhale; former Vice-President Functioning In charge, Shri Kishor Kamdar; former works manager Shri J. Mukund; and former Production manager A.P. Division, Shri S.P. Choudhury.
Federal class action litigation, Sahu v. Union Carbide et al., is presently pending on appeal before the Second Circuit Court of Appeals in New York. The litigation seeks damages for personal injury, medical monitoring and injunctive relief in the form of cleanup of the drinking water supplies for residential areas near the Bhopal plant. A related complaint seeking similar relief for property damage claimants is stayed pending the outcome of the Sahu appeal before the federal district court in the Southern District of New York.
Changes in corporate identity
Sale of Union Carbide India Limited
Union Carbide sold its Indian subsidiary, which had operated the Bhopal plant, to Eveready Industries India Limited
, in 1994.
Merger of Union Carbide and Dow Chemical Company
The Dow Chemical Company
purchased Union Carbide in 2001 for $10.3 billion in stock and debt. Dow has publicly stated several times that the Union Carbide settlement payments have already fulfilled Dow's financial responsibility for the disaster.
Some Dow stockholders filed suits to stop the merger, noting the outstanding liabilities for the Bhopal disaster. The merger has gained criticism from the International Campaign for Justice in Bhopal, as it is apparently “contrary to established merger law” in that “Dow denies any responsibility for Carbide’s Bhopal liabilities”. According to the Bhopal Medical Appeal, Carbide “remains liable for the environmental devastation” as environmental damage was not included in the 1989 settlement, despite ongoing contamination issues.
Ongoing contamination from the accident
Lack of political willpower has led to a stalemate on the issue of cleaning up the plant and its environs of hundreds of tonnes of toxic waste, which has been left untouched. Environmentalists
have warned that the waste is a potential minefield in the heart of the city, and the resulting contamination
may lead to decades of slow poisoning, and diseases affecting the nervous system, liver and kidneys in humans. Studies have shown that the rates of cancer
and other ailments are higher in the region since the event. Activists have demanded that Dow clean up this toxic waste, and have pressed the government of India to demand more money from Dow.
Criticisms of Clean-up Operations
Carbide states that “after the incident, UCIL began clean-up work at the site under the direction of Indian central and state government authorities”, which was continued after 1994 by the successor to UCIL, Eveready Industries, until 1998, when it was placed under the authority of the Madhya Pradesh Government. Critics of the clean-up undertaken by Carbide, such as the International Campaign for Justice in Bhopal
, claim that “several internal studies” by the corporation, which evidenced “severe contamination”, were not made public; the Indian authorities were also refused access. They believe that Union Carbide “continued directing operations” in Bhopal until “at least 1995” through Hayaran, the US trained site manager, even after the sale of its UCIL stock. The successor, Eveready Industries, abruptly relinquished the site lease to one department of the State Government while being supervised by another department on an extensive clean up programme. Environmental problems resulting from lack of a proper clean-up persist today. The Madhya Pradesh authorities have announced that they will “pursue both Dow and Eveready” to conduct the clean-up as joint tortfeasors.
The International Campaign view Carbide’s sale of UCIL in 1994 as a strategy “to escape the Indian courts, who threatened Carbide’s assets due to their non-appearance in the criminal case”. The successor, Eveready Industries India, Limited (EIIL), ended its 99 year lease in 1998 and turned over control of the site to the state government of the Madhya Pradesh. Currently, the Madhya Pradesh Government is trying to legally force Dow and EIIL to finance clean-up operations.
Contamination from the site itself
A large portion of the contamination in the site itself and the surrounding areas did not arise directly from the Bhopal disaster, but rather from the materials processed at the plant and the conditions under which those materials were processed. A report from Greenpeace
details the extent and persistence of this contamination, which accounts for most of the heavy metal contamination.
In 2002, an inquiry found a number of toxins, including mercury, lead, 1,3,5 trichlorobenzene, dichloromethane and chloroform, in nursing women’s breast milk. Well water and groundwater tests conducted in the surrounding areas in 1999 showed mercury levels to be at “20,000 and 6 million times” higher than expected levels; heavy metals and organochlorines were present in the soil. Chemicals that have been linked to various forms of cancer were also discovered, as well as trichloroethene, known to impair fetal development, at 50 times above safety limits specified by the United States Environmental Protection Agency (EPA).
In an investigation broadcast on BBC Radio 5 on November 14, 2004 , it was reported that the site is still contaminated with 'thousands' of metric tons of toxic chemicals, including benzene hexachloride and mercury, held in open containers or loose on the ground. Some areas are reportedly so polluted that anyone entering the area for more than ten minutes is likely to lose consciousness. Rainfall causes run-off, polluting local wells and boreholes, and the results of tests undertaken on behalf of the BBC by accredited water analysis laboratories in the United Kingdom reveal pollution levels in borehole water 500 times the legal maximum in that country. Statistical surveys of local residents, with a control population in a similarly poor area away from the plant, are reported to reveal higher levels of various diseases around the plant.
Additional Settlement Funds Hoax
On December 3, 2004, the twentieth anniversary of the disaster, a man claiming to be a Dow representative named Jude Finisterra was interviewed on the BBC. He claimed that the company had agreed to clean up the site and compensate those harmed in the incident. (video) Immediately afterward, Dow's share price fell 4.2% in 23 minutes, for a loss of $2 billion in market value Dow quickly issued a statement saying that they had no employee by that name — that he was an impostor, not affiliated with Dow, and that his claims were a hoax. BBC broadcast a correction and an apology. The statement was widely carried
"Jude Finisterra" was actually Andy Bichlbaum, a member of the activist prankster group The Yes Men. In 2002, The Yes Men issued a phony press release explaining why Dow refused to take responsibility for the disaster and started up a website, DowEthics.com, designed to look like the Dow website but give what they felt was a more accurate cast on the events. In 2004, a producer for BBC News emailed them through the website requesting an interview, which they gladly obliged
Taking credit for the prank in an interview on Democracy Now!, Bichlbaum explains how his fake name was derived: "Jude is the patron saint of impossible causes and Finisterra means the end of the Earth". He explained that he settled on this approach (taking responsibility) because it would show people precisely how Dow could help the situation as well as likely garnering major media attention in the US, which had largely ignored the disaster's anniversaries, when Dow attempted to correct the statement
After the original interview was revealed as a hoax, Bichlbaum appeared in a follow-up interview on the United Kingdom's Channel 4 news (video). During the interview he was repeatedly asked if he had considered the emotions and reaction of the people of Bhopal when producing the hoax. According to the interviewer, "there were many people in tears" upon having learned of the hoax. Each time, Bichlbaum said that, in comparison, what distress he had caused the people was minimal to that for which Dow was responsible.
- Broughton E (2005). "The Bhopal disaster and its aftermath: A review". Environmental Health 4 (1): 6. 10 May 2005
- Browning, Jackson (1993). Union Carbide: Disaster at Bhopal. Detroit:
- Cassels, J. (1993). The Uncertain Promise Of Law: Lessons From Bhopal. University Of Toronto Press.
- (1994, 2004). Bhopal: the Inside Story – Carbide Workers Speak Out on the World's Worst Industrial Disaster. USA: The Apex Press. India: Other India Press ISBN 81-85569-65-7 Main author Chouhan was an operator at the plant. Contains many technical details.
- Dhara, V. Ramana; Dhara, Rosaline The Union Carbide disaster in Bhopal: A review of health effects. Archives of Environmental Health. (2002). .
- D'Silva, Themistocles (2006). The Black Box of Bhopal: A Closer Look at the World's Deadliest Industrial Disaster. Written by an employed at UCC.
- D'Silva TDJ, Lopes A, Jones RL, Singhawangcha S, Chan JK (1986). "Studies of methyl isocyanate chemistry in the Bhopal incident". J. Org. Chem. 51 (20): 3781–3788.
- Eckerman, Ingrid Chemical Industry and Public Health - Bhopal as an example. (2001). . Essay for MPH. A short overview, 57 pages, 82 references.
- Eckerman, Ingrid (2004). The Bhopal Saga - Causes and Consequences of the World's Largest Industrial Disaster . India: Universities Press. All known facts 1960s - 2003, systematized and analysed. 283 pages, over 200 references.
- Eckerman, Ingrid The Bhopal gas leak: Analyses of causes and consequences by three different models.. Journal of Loss Prevention in the process industry. (2005). .
- Eckerman, Ingrid The Bhopal Disaster 1984 - working conditions and the role of the trade unions.. Asian Pacific Newsletter on occupational health and safety. (2006). .
- de Grazia, Alfred (1985). A Cloud over Bhopal - Causes, Consequences and Constructive Solutions.
- (2005). The Bhopal Reader. Remembering Twenty Years of the World's Worst Industrial Disaster. USA: The Apex Press. Reprinting and annotating landmark writing from across the years.
- Jasanoff, Sheila (2007). "Bhopal’s Trials of Knowledge and Ignorance". Isis 98 344–350.
- Kalelkar AS, Little AD. (1998). Investigation of Large-magnitude incidents: Bhopal as a Case Study.. London: The Institution of Chemical Engineers Conference on Preventing Major Chemical Accidents
- Kurzman, D. (1987). A Killing Wind: Inside Union Carbide and the Bhopal Catastrophe. New York: McGraw-Hill.
- Kovel, J (2002). The Enemy of Nature: The End of Capitalism or the End of the World?.
- Lapierre, Dominique; Moro, Javier (2001). Five Minutes Past Midnight in Bhopal. A novel, based on facts, that describes the development from the 1960s to the disaster itself. Very thrilling.
- Lepowski, W. "Ten Years Later: Bhopal". Chemical and Engineering News, 19 December 1994.
- Rice, Annie; ILO Bhopal Revisited - the tragedy of lessons ignored. Asian Pacific Newsletter on occupational health and safety. (2006). .
- Singh, Moti (2008). Unfolding the Betrayal of Bhopal Gas Tragedy. Delhi, India: B.R. Publishing Corporation. The chief coordinator of rescue operations at the district level writes rather critically on how the administration and bureaucracy functioned after the disaster.
- Stringer R, Labunska I, Brigden K, Santillo D. Chemical Stockpiles at Union Carbide India Limited in Bhopal: An investigation. Greenpeace Research Laboratories. (2002). .
- Weir, D (1987). The Bhopal Syndrome: Pesticides, Environment and Health. San Francisco: Sierra Club Books | <urn:uuid:0f005578-0ea0-4b3e-a92a-e41bbc655af6> | CC-MAIN-2013-20 | http://www.reference.com/browse/benzene+hexachloride | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697974692/warc/CC-MAIN-20130516095254-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.965462 | 8,687 | 3.203125 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
Assurance contracts may be a way to pay for so-called “public goods;” things that it’s said everyone can use without diminishing their value to others. Typical examples of public goods include public parks, open source software, national defense. Assurance contracts are basically pledges of funding towards providing a public good. If enough people pledge funds, then the good is undertaken. (The public park is built.) If not enough people pledge then the good is not provided. (The public park is not built.)
The open source 3D editing program “Blended 3d” was released as a result of SPP. The source code was released only when enough members of a community collectively pledged 100,000 Euros. The program was proprietary before.
Some have proposed Assurance contracts as an alternative to taxation as a way to provide public goods.
Note that the concept of public goods is itself a matter of controversy between free market economists versus more collectivist economists like Samuelson, who is credited with creating a formal theory for them.
I wonder if Seasteads could be funded by assurance contracts, given enough knowledge about and interest in them?
> I wonder if Seasteads could be funded by assurance contracts, given enough knowledge about and interest in them?
I think pledging is a great way of financing. I do not have the statistics to back it up, but I think pledges are more effective than donations. If you pledge you will be sure that your money only goes to the project if a sufficient amount of others give their money, too. So when you give your money away you can be sure it is enough to start the project resp. keep it running.
If you donate, you are often uncertain whether your money makes a difference. It is likely that too few people donate. That would waste your money because the project can’t take off. So you probably hesitate a lot more to donate than to pledge. | <urn:uuid:41879175-d9ad-4704-a02f-c8db98e99cc2> | CC-MAIN-2013-20 | http://www.seasteading.org/forum-list/topic/paying-public-goods-assurance-contracts/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697974692/warc/CC-MAIN-20130516095254-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.968673 | 400 | 2.84375 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
Causes of Keratosis Pilaris
Keratosis pilaris is not a very well known skin condition. Up to 40% of adults all over the globe suffer from it, and over half of them don’t even know it. Keratosis pilaris is genetic in origin but the precise cause has not yet been determined. Still, many doctors believe that the cause of Keratosis pilaris is the overproduction of keratin inside the skin. This excess gets trapped inside the follicle, developing a bump.
It is also thought to be a disorder of keratinisation in which the sticky cells that line the hair follicle form a horny plug instead of exfoliating. This widens the pores making them appear more obvious than elsewhere. Often a curled hair can be identified under the skin.
Keratosis pilaris is a skin condition frequently seen on the upper arms, buttocks and thighs. The skin cells that normally flake off as a fine dust form plugs in the hair follicles. These appear as small pimples that have a dry ''sandpaper'' feeling. They are usually white, but when inflamed they appear rather red. They usually don't itch or hurt, except with extreme changes in temperature.
This condition is particularly common among teenagers (up to 80%). Its manifestation is very common on the upper arms, especially on the external side of the arm. It may occur in babies where it tends to be most obvious on the cheeks. It may remain for years but in most cases it gradually disappears usually before age 30. Keratosis pilaris is unsightly but completely harmless. It is usually worse during the winter months. The worsening is directly associated with low humidity, skin dryness and tight clothes that “rub” the bumps at al times. Some people have stated that this condition worsened during pregnancy and/or after childbirth.
Some doctors as well as patients believe that food is related with keratosis pilaris. According to their own experience, spicy foods tend to increase the bumps and make them more noticeable. On the other hand, patients that reduced or eliminated milk and its derivatives from their diet claimed to have had a considerable improvement.
Treatment for keratosis pilaris is not necessary, and unfortunately, it often has disappointing results. With persistence, most people can get improve this aesthetic condition by moisturizing and replenishing the lipid content of the skin regularly.
The plugged pores can be removed by taking long, hot soaking tub baths and then rubbing the areas with a coarse washcloth, stiff brush, or 'Buf-Puf'. Also, a good microdermabrasion proceeding can help get rid of all the excess keratin.
Prescription medicines may help, including some antibiotics like Erythromycin and Bactrim. If the swelling or redness of the bumps is getting worse, you should discuss with your doctor the use of topical retinoids. The derivatives of vitamin A can be very harsh for the skin, so be aware of all the symptoms you develop.
We offer a solution for Keratosis Pilaris, a natural cream with Helix Aspersa Müller Glycoconjugates. It is a biological ingredient collected from live snails and contains a complex compound of molecules that protect the skin from free radical oxydation, promote the proliferation of the water holding molecules in the skin and the healthy turnover of connective tissues, dissolve damaged and non functional tissues such as keratin plugs by enzymatic digestion or breakdown of their amino-acid components and has antimicrobial properties.
BIOSKINTREATMENT™ and BIOSKINEXFOL™ are natural skin care products that require constancy in their use to achieve results. You must apply BIOSKINEXFOL three times a week, or the BIOSKINTREATMENT lotion twice a day every day. It is important to be patient since results will not be immediate, not even fast. For most people results will be seen in 5 to 6 weeks.
BIOSKINTREATMENT™ and BIOSKINEXFOL™ work because the biological ingredient in them and the formulation makes it the most complete and balanced natural solution for the normal functioning of the skin and for regeneration of damaged skin.
BIOSKINTREATMENT LOTION clears skin of keratin bumps and regenerates healthy skin
The product is made with the same base as BIOSKINCARE plus Salix Nigra (Willow) Extract and Amorphophallus Konjac Root Powder for a more potent keratolytic effect that cleans the excess horny material of the skin by degrading keratin plugs and dissolving debris, damaged, abnormal and necrotic tissues. It decongests the skin as the enzymes in the snail serum and the natural salicylic acid in willow bark extract help to 'digest' all damaged structures into their amino-acid and other components, which also favors the regeneration of all the structural components of healthy skin.
It leaves your skin smooth, refreshed, soft and with use over a period of time it takes away keratosis pilaris, actinic keratosis scales, controls acne and reduces and even vanishes all types of skin blemishes: razor nicks and burns, roughness, blisters, scrapes, cuts, and the list can go on and on...
Made in the USA. 60 grams = 2 oz
One Bottle: $60
Ultra exfoliate rough scars and dull skin with BIOSKINEXFOL
Home microdermabrasion cream. Contains the same natural ingredients in BIOSKINTREATMENT but infused with micro-crystals so that you may rub it with your finger tips to remove old, hard, and tough scars or stretch marks by a physical breakdown of the scar tissues. Best also for oily skin and aged skin, actinic keratosis scales and pitted acne scars. Not for keloids and not if your skin is still fragile (use BIOSKINTREATMENT for a few months first to strengthen your skin). The compounded action of the physical abrasion and the enzymes in the cream liquefy damaged proteins more thoroughly helping to release amino-acids to aid in rebuilding damaged tissues quickly. Results are not only immediate, but compound over time and do not trigger inflamm-aging of delicate skin tissues.
Made in the USA. Two to Three Month's supply 120 grams = 4.23 oz
120 Gram Bottle: $89
Biological Skin Treatment Ingredient
Our products contain a biological serum created by a living creature. It is packed with enzymes, coenzymes, glycoproteins, glycosaminoglycans (hyaluronic acid), proteoglycans, peptides and oligoelements that (a) dissolve keratin plugs that obstruct the hair follicles and cause hyperkeratosis or acne and damaged and dysfunctional tissues, (b) regenerate healthy skin by promoting the proliferation of fibroblasts and supporting microcirculation in capillaries, (c) scavenge oxygen radicals and the damaging effects of excessive solar radiation and (c) keep microbes in check by the action of antimicrobial peptides secreted on the skin and within the hair follicles.
It keeps the skin moisturized, prevents skin infection, repairs wounds, promotes scarless healing, and renews the skin.
The collection of the biological ingredient in our products is done by using a humanely method that inflicts no damage upon the little creatures from which we gather the biological compound that can not possible be replicated in even the most sophisticated laboratory.
What customers say about the results of the product for keratosis pilaris?
Skin Treatment Products
A deeply moisturizing and pure natural skin care cream that dissolves keratin plugs and debris and unblocks clogged pores allowing for the outflow of sebum to the surface where it lubricates and protects the skin instead of causing injuries to the cells lining the follicles and an inflammatory reaction of the body to repair the damage. Triggers the rebuilding of damaged and dead tissues and restores the capacity of the skin to hold in water from within. Rrestores the lipid wall of our skin thereby impeding the penetration of allergens and toxins. It induces the production of antimicrobial peptides on the surface of the skin and within the skin follicles contributing to control microrganisms. Signals the body it is being taken care of and does not need to fire its immune responses and overly react to minor injuries thus avoiding the loss of tissues that characterizes deep scars. Avoids scarring and diminishes scars from accidents, surgery, stretch marks, hypertrophic and keloid scars, by the breakdown of abnormal, dysfunctional and damaged tissues into their amino acid components while stimulating their replacement with new healthy skin structures. Vanishes redness and dryness, relieves eczema and dermatitis, reduces psoriasis scales and most skin blemishes. Repairs skin damaged by glycolic peeling and other chemical peels, dermabrasion or laser resurfacing. By strengthening the skin it relieves the uncomfortable side effects of retinoic drugs such as Accutane that thin the skin. Reduces and heals skin fragility and is a potent antioxidant thus helping to reduce the damaging effects on the dermis of sun burns and too much exposure to solar radiation. It also helps to heal blisters, bruises, wounds, and the consequences on the skin of ionizing radiotherapy or radiodermatitis. 50 gram (1.76 oz) jar = $60.
A home microdermabrasion cream with micro-crystals that breakdown hard, rough and old scar tissues, and allow for a deeper penetration of our natural skin moisturizing and regeneration complex contained in the microdermarasion cream.120 gram (4 oz) jar = $89.- | <urn:uuid:2d3b3a2f-7ba1-43b5-90fe-da8e84ef5643> | CC-MAIN-2013-20 | http://www.skintreatmentcream.com/causes/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697974692/warc/CC-MAIN-20130516095254-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.914281 | 2,033 | 2.96875 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
Australian scientists discover deep sea corals
SYDNEY (AFP) - Australian scientists mapping the Great Barrier Reef have discovered corals at depths never before thought possible, with a deep-sea robot finding specimens in waters nearly as dark as night.
A team from the University of Queensland's Seaview Survey announced the unprecedented discovery 125m below the surface at Ribbon Reef, near the Torres Strait and at the edge of the Australian continental shelf.
Dr Ove Hoegh-Guldberg, chief scientist on the project, told AFP on Thursday that coral had previously only been shown to exist to depths of 70m and the finding could bring new understanding about how reefs spawn and grow.
"What's really cool is that these corals still have photosynthetic symibionts that supposedly still harvest the light," Dr Hoegh-Guldberg told AFP. | <urn:uuid:30063ff7-16ef-45a6-85e9-73e5e4e40e79> | CC-MAIN-2013-20 | http://www.straitstimes.com/breaking-news/technology/story/australian-scientists-discover-deep-sea-corals-20130103 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697974692/warc/CC-MAIN-20130516095254-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.951432 | 177 | 3.21875 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
Shoving, teasing and name-calling are all too often a daily occurrence in schools across the country where cliques thrive and anyone who might be “different” has a hard row to hoe. And, with the growth of technology, bullying has expanded its reach, finding its way out of the schoolyard and into the back pockets of students who have no way to escape their tormentors.
Cell phones and social media have enabled bullying to evolve from mere (albeit still hurtful) verbal and physical harassment to pervasive cyber-bullying attacks through Facebook, emails and text messages.
It’s a pervasive problem and the Blaine school district is looking for answers.
To help curb bullying, they’ve asked Scott Backovich, an international motivational speaker whose talks are geared toward youth, to speak to students about bullying, respect and the effects of being what he calls “a catalyst.” Backovich will speak to students at both Blaine Middle School and Blaine High School during a special day organized by the district on January 16.
Changes in state legislation and the public awareness of teen suicides due to bullying, particularly cyber-bullying, have put the issue on center stage. “We have a mandate from the state [to address bullying],” Randy Ellsbree said. Ellsbree is in charge of making sure the district complies with the state mandate. “I help the principals follow the law and get the resources to teach students.”
The district hopes that an outside speaker can offer students a different perspective on cyber-bullying, and cause them to take note.
“Other school districts have recommended Backovich,” Ellsbree said. “And there’s a parental education piece as well.”
The district has also scheduled Backovich to give a presentation to parents on the evening of the January 16. During this session, parents will have the opportunity to learn about various cyber-bullying issues, along with tips and strategies to help their child be safe.
Parents of children in any age group are encouraged to attend. Daycare and a light meal will be provided at the evening program. For more info, contact Larissa Dhanani at the Blaine school district at 360/332-0728. | <urn:uuid:f17f7991-2f3b-43ea-a3ef-c63710527a24> | CC-MAIN-2013-20 | http://www.thenorthernlight.com/news/article.exm/2013-01-09_international_teen_mentor_to_visit_blaine_school_district | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697974692/warc/CC-MAIN-20130516095254-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.954268 | 472 | 2.796875 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
Snopes.com defines phishing as "a term which refers to the online imitation of a company's branding in spoofed e-mail messages and web sites, created with the intent of fooling unsuspecting users into divulging personal information such as passwords, credit card numbers, PINs, etc. A typical "phish" e-mail will appear to come from a financial institution (such as a bank or credit card company), informing the recipient that some type of problem has affected his account and directing him to follow a provided hyperlink to clear up the problem. The hyperlink leads not to a legitimate site, however, but to a server (usually in another country) on which an imitation web site has been set up. The fooled customer is then prompted to enter confidential personal information (collected by the scammers for perpetrating) identify theft and (usually) redirected to a legitimate web site to obscure the fact that he just gave away data to crooks."
Phishing sites can also include malicious elements that are intended to take advantage of web browser vulnerabilities. Even if you don't enter personal information on the spoofed web site, you could be putting your computer's security in danger simply by clicking on the link in the spoofed message. The best way to protect yourself from phishing scams is to never click on the link in an unexpected or suspicious message you receive.
The Internet has made the world a much smaller place. While its benefits are tremendous, connecting us to others and to volumes of instant information on any subject anywhere in the world, its downside includes dark alleys frequented by criminals intent on harming you, your computer, and/or your information.
In the physical world, it used to be that you knew which dark alleys or bad neighborhoods to avoid. Today the Internet, with all its benefits, has also brought the dark alleyways to your computer. As such, it takes much more vigilance to protect yourself and your computer from would-be criminals.
Some of the risks you encounter simply by surfing the Internet include, but are not limited to: Identity Theft, viruses and worms that infect your computer, spamming, and spyware infections.
Content provided by CU Boulder | <urn:uuid:250130df-2f3d-4b41-8729-6f220641bc45> | CC-MAIN-2013-20 | http://www.uccs.edu/itsecure/home-computing-and-student-resources/phishing.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697974692/warc/CC-MAIN-20130516095254-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.952934 | 446 | 3.34375 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
In July 2010, the United Nations General Assembly created UN Women, the United Nations Entity for Gender Equality and the Empowerment of Women.
In doing so, UN Member States took an historic step in accelerating the Organization’s goals on gender equality and the empowerment of women.
The creation of UN Women came about as part of the UN reform agenda, bringing together resources and mandates for greater impact. It will merge and build on the important work of four previously distinct parts of the UN system which focus exclusively on gender equality and women’s empowerment:
- Division for the Advancement of Women (DAW)
- International Research and Training Institute for the Advancement of Women (INSTRAW)
- Office of the Special Adviser on Gender Issues and Advancement of Women (OSAGI)
- United Nations Development Fund for Women (UNIFEM)
The main roles of UN Women are:
- To support inter-governmental bodies, such as the Commission on the Status of Women, in their formulation of policies, global standards and norms
To help Member States to implement these standards, standing ready to provide suitable technical and financial support to those countries that request it and to forge effective partnerships with civil society.
To hold the UN system accountable for its own commitments on gender equality, including regular monitoring of system-wide progress.
Over many decades, the UN has made significant progress in advancing gender equality, including through landmark agreements such as the Beijing Declaration and Platform for Action and the Convention on the Elimination of All Forms of Discrimination Against Women (CEDAW).
Gender equality is not only a basic human right, but its achievement has enormous socio-economic ramifications. Empowering women fuels thriving economies, spurring productivity and growth.
Yet gender inequalities remain deeply entrenched in every society. Women lack access to decent work and face occupational segregation and gender wage gaps. They are too often denied access to basic education and health care. Women in all parts of the world suffer violence and discrimination. They are under-represented in political and economic decision-making processes.
For many years, the UN has faced serious challenges in its efforts to promote gender equality globally, including inadequate funding and no single recognized driver to direct UN activities on gender equality issues.
UN Women — which will be operational by January 2011 — has been created to address such challenges. It will be a dynamic and strong champion for women and girls, providing them with a powerful voice at the global, regional and local levels.
Grounded in the vision of equality enshrined in the UN Charter, UN Women will, among other issues, work for the:
elimination of discrimination against women and girls
- empowerment of women
- achievement of equality between women and men as partners and beneficiaries of development, human rights, humanitarian action and peace and security. | <urn:uuid:bb220cbb-22d1-4aa4-9ef9-2df7ac00147f> | CC-MAIN-2013-20 | http://www.un.org/womenwatch/daw/daw/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697974692/warc/CC-MAIN-20130516095254-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.94154 | 573 | 3.53125 | 4 | HuggingFaceFW/fineweb-edu/sample-100BT |
The Council has placed much focus on what has come to be known as ‘International hydro-diplomacy’. For the past three years, the Council has been at the forefront, bringing forward a new water politics and making the Voice of Water heard on every level of decision making.
World Water Council Activity Report 2010-2012
One of the Council's major accomplishments is its contribution to increasing awareness of global water issues and to political mobilisation through World Water Forums. Serving as stepping-stones towards global collaboration on water problems, the Forum is a unique platform where the water community and policy- and decision-makers from all regions of the world can come together, debate and attempt to find solutions to achieve water security.
In the past, the Forum has produced the World Water Vision, a unique prospective exercise on the future state of global water resources whose results were presented at the 2nd Forum, as well as the establishment of concrete actions and commitments derived from the 3rd Forum.
The Council has also played a strategic role in promoting and facilitating the establishment of dialogues on cross-cutting issues that were not sufficiently addressed, both at local levels and national levels. Key dialogues include those on Water for Food and Environment, and on Water and Climate.
In 2001, the Council raised the issue of financing to the top of its priorities by establishing the Panel on Financing Water Infrastructure, whose mandate was to look for new sources of funding for water to avoid the 2025 "water scarcity" scenario of the World Water Vision.
With the 4th World Water Forum, the Council established mechanisms for cooperation and coordination to transform global vision into concrete actions while integrating local knowledge.
The 5th Forum gave voice to the local authorities stakeholders’ who were encouraged to improve their water situation on a local level by signing the Istanbul Water Consensus, which has reached more than 1,000 signatories throughout the world.
From 2009 to 2012, political involvement though the Ministerial, Parliamentarian and local Authorities processes of the Forum has steadily increased and the Council‘s efforts have greatly contributed in raising Water higher on the political agenda.
Water is finally being acknowledged as a worldwide priority. During the 2012 Rio+20 Earth Summit, a Sustainable Development Dialogue was dedicated to Water. The Council’s aim is now to keep water on the table of high level discussions in view of the post-2015 Sustainable Development Goals. | <urn:uuid:2e9ea735-fb5c-443e-98e9-7a2c7306d79a> | CC-MAIN-2013-20 | http://www.worldwatercouncil.org/index.php?id=93&L=0%20%2C%2024%25%20title%25 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697974692/warc/CC-MAIN-20130516095254-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.966889 | 487 | 2.546875 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
The definition of binocular is something that uses both eyes at the same time.(adjective)
An example of something binocular is the vision you use to look through 3D glasses; binocular vision.
A binocular is defined as a device used to view things far away, often referred to as binoculars.(noun)
An example of a binocular is a set of opera glasses.
See binocular in Webster's New World College Dictionary
Origin: < L bini, double (see binary) + ocularis, of the eyes < oculus, eye
See binocular in American Heritage Dictionary 4
pair of binoculars
Learn more about binocular | <urn:uuid:0649a085-1e99-48ac-8169-decf85f55b3d> | CC-MAIN-2013-20 | http://www.yourdictionary.com/binocular | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697974692/warc/CC-MAIN-20130516095254-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.859586 | 142 | 3.109375 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
story to find out more.
John Ewart (left),
an aquaculture/fisheries specialist (University of Delaware), and ARS
microbiologist Gary Richards examine freshly harvested oysters on board the
Center for the Inland Bays' work boat before transport to the laboratory.
Click the image for more information about it.
Research Reveals Functions of Harmful Shellfish
Pathogens By Jim
Core March 4, 2005
Providing safer shellfish is the goal of Agricultural Research Service
(ARS) scientists who are studying the
means by which pathogenic bacteria enter shellfish.
In the United States, two pathogenic bacteria from the genus
Vibrio are of concern: V. vulnificus and V.
parahaemolyticus. These bacteria are naturally found in shellfish and
seawater, particularly when water temperatures are warm, and can lead to
serious health concerns.
ARS scientists at the
Safety of Aquaculture Products Center of Excellence in Dover, Del., are
studying these bacteria with the goal of keeping them out of shellfish.
Richards, a microbiologist and the center's lead scientist, wants to
identify Vibrio enzymes that may help the organism enter shellfish--and,
eventually, a human host.
Richards, who leads a group of scientists from
Delaware State University and the
National Institutes of Health, recently
discovered in V. vulnificus an enzyme called phosphoglucose isomerase.
This enzyme could provide a way for Vibrio to spread more easily.
He also detected the enzyme in virtually all species of Vibrio
tested, but not in non-Vibrio pathogens. The enzyme is capable of
producing what are called vasoactive peptides, which could contribute to rapid
spread of V. vulnificus in humans. A study of V. vulnificus in
oysters suggests that strains virulent to humans may be more invasive to--and
The Dover center, a field location of the ARS
Regional Research Center in Wyndmoor, Pa., also studies methods to detect
norovirus and the hepatitis A virus in shellfish. It also develops
high-pressure processing techniques to inactivate enteric viruses in
This research may provide better diagnostic capabilities and treatment
strategies to further reduce shellfish-related illnesses.
more about this research in the March issue of Agricultural Research
ARS is the U.S. Department of
Agriculture's chief scientific research agency. | <urn:uuid:6fa6a989-209b-4026-9db8-88d0ba695779> | CC-MAIN-2013-20 | http://ars.usda.gov/is/pr/2005/050304.htm | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.904747 | 537 | 3.015625 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
This Week’s Creature Feature ... Susquehanna Flats B&B Open for Businesstesttest
Housing stock is on the rise for the young fish and crabs who’ll be sheltering at the top of the Bay come spring. The vast grass-filled Susquehanna Flats, the circular area where the Susquehanna River meets the Bay, appeared unexpectedly healthy in aerial survey images made late last year.
The valuable Bay habitats seem to have survived fall 2011’s deluge of runoff and sediment.
That was a welcome surprise. During Hurricane Irene and Tropical Storm Lee, monitors saw large tangles of all varieties of uprooted grasses floating downstream. Remembering the devastation caused by Tropical Storm Agnes almost 40 years ago, scientists feared the worst.
“Back on those days of Tropical Storm Lee, looking at the deluge of water over the Conowingo Dam, I would’ve bet that we had lost the Flats grasses entirely,” said Rich Batiuk of the Chesapeake Bay Program.
Had that been the case, over-wintering waterfowl would have lost a favorite table. Many juvenile Bay creatures would have been homeless come spring.
The grasses’ survival is good news not only for the creatures that feed on and live among them, but also for the Bay.
“That large, dense beds can survive extreme conditions is another indicator of the Bay’s resilience,” Batiuk said. | <urn:uuid:d2e09ba4-11f7-40a0-8a15-5e7d54ddf071> | CC-MAIN-2013-20 | http://bayweekly.com/articles/creature-features/article/weeks-creature-feature-susquehanna-flats-bb-open-business | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.926523 | 313 | 2.546875 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
Reduced visibility can play a key role in traffic accidents. Lowered visibility can occur because of darkness or weather conditions such as snow or rain. No matter the cause, motorists often aren’t as careful as they should be.
The bottom line: driving in poor weather adds to the risk factor, boosting the possibility of skidding off the road, being involved in a crash and other similar events. However, there are things you can do to reduce the possibility of an accident.
Twenty-five percent of the average person’s driving is night driving, which is a more challenging time to travel.
According to PennState Environmental Health and Safety:
• Car crash fatalities happen three times more often at night
• More than half (55%) of fatal accidents happen at night
• Pedestrian fatalities happen much more often after dark (62%)
Some useful safe driving tips in times of reduced visibility, such as night driving, include:
• Slowing down
• Staying alert
• Using headlights
• Putting a safe distance between your car and the vehicle ahead of you; this is especially important when it’s a large truck, as their spray can cause additional problems with visibility
• Choosing the middle lane during wet driving conditions
• Taking advantage of tracks in the snow made by other vehicles and driving in those tracks
• Avoiding puddles
What should you do now?
• Set up a regular schedule to check your windshield wipers. New wipers are available at Advance Auto Parts. Get free installation with purchase.*
• Always keep a supply of extra windshield washer fluid.
• Check your car lights periodically.
• If your headlights are foggy or dim, purchase a headlight restoration kit.
• Use Rain-X on your windshield. Rain-X acts as a repellant on your windshield for rain, sleet or snow.
• Always carry an emergency car kit.
Editor’s note: Wow, that’s a lot to think about. Make it easy on yourself by heading to your local Advance Auto Parts store for safe driving tips and answers on how to keep your vision in check this winter.
*Most vehicles, most store locations. | <urn:uuid:820c0ff5-bac7-4b97-8790-81d512ac5b37> | CC-MAIN-2013-20 | http://blog.advanceautoparts.com/tag/safe-driving-tips/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.947975 | 456 | 2.921875 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
The emergence of low cost computers in the UK market in the early 1980s kick started many a career in IT. The early market was not dominated by one type of machine but rather one full of choices from a myriad of companies. School playgrounds across the country soon became split between two camps, you either loved the Spectrum or the BBC Micro (which quickly became known as the Beeb). There were friends with other computers (Vic 20, Dragon, Commodore 64 to name a few) but these people were in the minority and viewed as weird.
Today marks the day the BBC Micro was first launched on the market. At the time it was expensive compared to the other machines on the market but it was supported by the BBC in the form of a TV series about computers and their uses.
At the time the BBC Micro was launched I had already been programming for several years but it is this machine which I remember with fondness. I had a great time learning how this machine worked and even purchased the Advanced BBC Micro handbook. It was this handbook which allowed me to get closer to the hardware. I even wrote my own disc operating system. This also taught me a very valuable lesson, always backup your work – I accidently tested the format command on the disc containing the only copy of the source code. To my dismay it was one of those occassions where I had manged to write 200 lines of assembler which worked perfectly first time.
The early industry meant that schools had to quickly put together a programme of lessons which taught pupils about the new machines and how to use them. The lack of software such as spreadsheets, presentation software etc. meant that children were taught about the machines and how they worked. Something which is lacking today. This lack of understanding about how computers actually work is slowly being recognised here in the UK and it appears that the government is starting to recognise that something needs to be done. One group of people who remember those early days are already working on a small computer for the education market. Check out the Raspberry Pi for more information on the project.
You can read more about the BBC Micro in this article on the BBCs news web site.
Happy Birthday BBC Micro | <urn:uuid:1d234c6f-e904-4c99-8325-d6188767599f> | CC-MAIN-2013-20 | http://blog.mark-stevens.co.uk/?cat=11 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.986002 | 447 | 2.78125 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
Filtering Posts By: "bias voltage"
02.05.2007| By Shure Notes|
Many users of professional audio equipment believe there is no difference between phantom power and bias voltage. Not true! Phantom and bias are not interchangeable. This bulletin explains the differences between phantom and bias, and addresses common misconceptions. Phantom power is a dc voltage (11 – 48 volts) which powers the preamplifier of a condenser microphone. Phantom power is normally supplied by the microphone mixer, but may also be supplied by a separate phantom power supply. Phantom requires a balanced circuit in which XLR pins 2 and 3 carry the same dc voltage relative to … | <urn:uuid:3d13451c-16dc-4cd7-abc2-4ae7b947d04d> | CC-MAIN-2013-20 | http://blog.shure.com/tag/bias-voltage/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.896237 | 134 | 2.640625 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
These collections contain over 80,000 rare books, magazines and government publications from the 1600s to the 1940s.
This rare collection of documentary heritage will be of interest to scholars, genealogists, history buffs and anyone who enjoys reading about Canada's early days.
The Early Canadiana Online collection of rare books, magazines and government publications has over 80,000 titles (3,500,000 pages) and is growing. The collection includes material published from the time of the first European settlers to the first four decades of the 20th Century.
You will find books written in 21 languages including French, English, 10 First Nations languages and several European languages, Latin and Greek.
The Early Canadian Periodicals collection includes over 1,000 magazines, totaling over 65,000 issues. It covers a wide range of topics such as political satire, agriculture, religion, medicine and health, as well as many men’s, women’s and children’s popular magazines. This collection even includes the first magazine ever published in Canada, The Nova Scotia Magazine (1789-1792). It offers a remarkable record of the development of thought and opinion on diverse issues of the nation in its formative years. Many of Canada's initial prominent poets, novelists, scientists and great minds were first known through their works published in these magazines. They give an entertaining window into society and individual lives of the early Canadians with their stories, articles, advertisements, cartoons, drawings and photographs. Browse this collection »
This online collection consists of 60 publications focused on the lives of the early Governors General of Canada. Browse this collection »
The Early Official Publications collection includes over 1.5 million digitized pages of historical pre-1901 colonial and federal government documents. This collection includes government acts, bills, committee reports, court rules, debates, journals, ordinances, a selection of official publications from France and Great Britain, sessional papers, regulations, royal commission reports, and treaties. Browse this collection »
This collection of 875 works includes fiction, drama, songs, and poetry, as well as biography, travel literature and exploration accounts. It is comprised of books published from 1697 to 1900, and from a variety of countries (Canada, United Kingdom, United States, Switzerland). Browse this collection »
This collection of periodicals and books relates to the field of health and medicine and covers almost 100 years of medical thought, news, practice and research in Canada. Here you will find writings on: public health, human anatomy, promotion of health, pharmacology, diet, physical fitness, dentistry, surgery, obstetrics, childbirth, pediatrics, etc. Browse this collection »
The 732 French language books in this collection relate to the history of French settlement and French culture in Canada. In the collection are books published from 1575 to the early 20th century, and from a variety of countries (Canada, France, United Kingdom, Netherlands). Topics covered include: the discovery and exploration of Canada; religious works, including those of the Jesuits; history of Acadia; First Nations settlements; scholarly writings on the French language; French Canadian songs and poems; education; biographies; geography; politics; law; social life and customs; commerce, and natural resources. Browse this collection »
The Hudson's Bay Company (HBC) collection consists of 160 titles (20,000 pages) that detail the rich history of one of the oldest and still active companies in the world. Browse this collection »
The Jesuit Relations is a 73-volume set of books (22,500 pages) in the original Italian, Latin and French with commentary and translation into English by Reuben Thwaites (1853-1913). Most of the Relations are annual missionary reports written between 1632 and 1678 by the Jesuits in New France for their superiors in France. Through their Relations, the Jesuits provide details of colonial life during the French regime in Canada. Browse this collection »
This collection of 900 titles relating to Canada’s early First Nations Peoples was published from 1558 to 1900 in a variety of countries (Canada, Germany, Switzerland, United Kingdom, United States) and in a variety of languages (e.g. Micmac, Iroquois, Mohawk, Chipewyan, Nootka, Chinook, Ojibwa). Here you will find writings on: customs, folklore, spirituality, history, languages, treaties, battles, biographies, relations with the government, cultural assimilation, education, etc. Browse this collection »
This collection of 683 titles consists of the early published writings of Canadian women authors, as well as Canadian publications written about women or "women's issues". The collection covers many genres, including memoirs, diaries and collected letters, drama, exploration and travelers' accounts, printed ephemera, political pamphlets, and much more. Comprised of books published from 1677 to 1900, and from a variety of countries (Canada, France, United Kingdom, United States). Browse this collection » | <urn:uuid:be6595ab-2e66-4abf-acae-d1a21986bfdf> | CC-MAIN-2013-20 | http://eco.canadiana.ca/?usrlang=en | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.934597 | 1,027 | 2.890625 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
|Part of a series on|
The Nyāya Sūtras are an ancient Indian text on of philosophy composed by Akṣapāda Gautama (also Gotama; c. 2nd century BCE). The sutras contain five chapters, each with two sections. The core of the text dates to roughly the 2nd century BCE, although there are significant later interpolations.
The Nyaya is sometimes called Tarka-Vidyā or the Science of Debate, Vāda-Vidyā or the Science of Discussion. Tarka is the special feature of the Nyāya. Thus some of its features and categories are better understood from that perspective. Gotama is sometimes given the honorific titles "Akṣapāda" (probably in the sense "having his eyes fixed in abstraction on his feet") and "Dīrghatapas" ("performing long penance"). He is also sometimes accorded the religious titles "Ṛṣi" or "Maharṣi".
In the Nyāya Sutras Gotama developed and extended the Vaiśeṣika epistemological and metaphysical system through 528 aphorisms. Later commentaries expanded, expounded, and critically discussed Gotama's work, the first being by Vātsyāyana (c.450–500 CE), followed by the Nyāyavārttika of Uddyotakāra (c. 6th–7th century), Vācaspati Miśra's Tātparyatīkā (9th century), Udayana's Tātparyapariśuddhi (10th century), and Jayanta's Nyāyamañjarī (10th century).
Purpose of the Nyaya Sutras
"Gautama Ṛṣi, in his Nyāya Sūtras, proposes that one can attain liberation by negating both illusion and unhappiness: duhkha-janma-pravṛtti-dosa-mithyā-jnananam uttarottarapaye tad-anantarabhavad apavargah. "By successively dispelling false conceptions, bad character, entangling action, rebirth and misery -- the disappearance of one of these allowing the disappearance of the next -- one can achieve final liberation." (Nyāya Sūtra 1.1.2) But since Nyaya philosophers believe that awareness is not an essential quality of the soul, they teach that a liberated soul has no consciousness. The Nyāya idea of liberation thus puts the soul in the condition of a dead stone. This attempt by the Nyāya philosophers to kill the soul's innate consciousness is here called sato mrtim by the personified Vedas. But the Vedānta-sutra (2.3.17) unequivocally states, jno 'ta eva: "The jīva soul is always a knower." In the opening sūtra of the Nyāya Sūtra, it was claimed that the ultimate purpose of it is the attainment of liberation (niḥśreyasa), attained by knowledge of the sixteen categories (padārtha), which are:
- means of valid knowledge (pramāṇa);
- objects of valid knowledge (prameya);
- doubt (saṃśaya);
- purpose (prayojana);
- example (dṛṣṭānta);
- conclusion (siddhānta);
- the constituents of a syllogism (avayava);
- argumentation (tarka);
- ascertainment (nirṇaya);
- debate (vāda);
- disputations (jalpa);
- destructive criticism (vitaṇḍa);
- fallacy (hetvābhāsa);
- quibble (chala);
- refutations (jāti); and
- points of the opponent's defeat (nigrahasthāna).
Means of attaining valid knowledge
According to the Nyaya Sutras, there are four means of attaining valid knowledge: perception, inference, comparison, and verbal testimony. The sutra ultimates implicitly develop a theory of causation. Cause and effect should be homogeneous in nature, and yet the effect is a new beginning and was not already contained in the cause.
The Buddhist thesis that all things are negative in nature (inasmuch as a thing's nature is constituted by its differences from others) is rejected, as is the view that all things are eternal or that all things are noneternal. Both these latter views are untrue to experience.
Thus, the resulting metaphysics admits two kinds of entities: eternal and noneternal. The whole is a new entity over and above the parts that constitute it. Also, the idea that God is the material cause of the universe is rejected. God is viewed as the efficient cause, and human deeds produce their results under the control and cooperation of God.
The five part syllogism
The Nyaya Sutra supports a five-part syllogism, widely followed in the Indian tradition:
- This hill is fiery (pratijñā: a statement of that which is to be proved).
- Because it is smoky (hētu: statement of reason).
- Whatever is smoky is fiery, as is a kitchen (udāharaṇa: statement of a general rule supported by an example).
- So is this hill (upanaya: application of the rule of this case).
- Therefore this hill is fiery (nigamana: drawing the conclusion).
The characteristic feature of the Nyaya syllogism is its insistence on the example, which suggests that the Nyaya logician wanted to be assured not only of formal validity but also of material truth.
Types of logical error
Five kinds of fallacious "middle" (hetu) are distinguished:
- the inconclusive (savyabhicara), which leads to more conclusions than one;
- the contradictory (viruddha), which opposes that which is to be established;
- the controversial (prakaranasama), which provokes the very question that it is meant to settle;
- the counterquestioned (sadhyasama), which itself is unproved; and
- the mistimed (kalatita), which is adduced "when the time in which it might hold good does not apply".
- Nandalal Sinha, Mahamahopadhyaya Satisa Chandra Vidyabhusana, The Nyaya Sutras of Gotama, The sacred books of the Hindus, 1930; Motilal Banarsidass, 1990 reprint, ISBN 978-81-208-0748-8; Munshiram Manoharlal reprint, 2003, ISBN 978-81-215-1096-7.
- Ganganatha Jha, Nyaya- Sutras of Gautama (4 vols.), Motilal Banarsidass, 1999 reprint, ISBN 978-81-208-1264-2.
Sources and reading
- Sue Hamilton, Indian Philosophy: A Very Short Introduction (Oxford University Press, 2001) ISBN 0-19-285374-0
- B.K. Matilal, Epistemology, Logic, and Grammar in Indian Philosophical Analysis (Oxford University Press, 2005) ISBN 0-19-566658-5
- J.N. Mohanty, Classical Indian Philosophy (Rowman & Littlefield, 2000) ISBN 0-8476-8933-6
- B. K. Matilal "Perception. An Essay on Classical Indian Theories of Knowledge" (Oxford University Press, 1986), p. xiv.
- Encyclopædia Britannica (2007)
- All About Hinduism by Sri Swami Sivananda
- Chattopadhyaya, D. (1986). Indian Philosophy: A popular Introduction, New Delhi: People's Publishing House, ISBN 81-7007-023-6, p.163 | <urn:uuid:6cce618a-a06f-4ea3-8ff0-b47fde562b3a> | CC-MAIN-2013-20 | http://en.wikipedia.org/wiki/Aksapada_Gautama | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.851343 | 1,732 | 3.46875 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
What Is Air Pollution?
in its great magnitude has existed in the 20th century from the
coal burning industries of the early century to the fossil burning technology in
the new century. The problems of
air pollution are a major problem for highly developed nations whose large
industrial bases and highly developed infrastructures generate much of the air
Every year, billions of tonnes of pollutants are released into the
atmosphere; the sources include power plants burning fossil fuels to the effects
of sunlight on certain natural materials. But
the air pollutants released from natural materials pose very little health
threat, only the natural radioactive gas radon poses any threat to health.
So much of the air pollutants being released into the atmosphere are all
results of man’s activities.
In the United Kingdom, traffic
is the major cause of air pollution in British cities. Eighty six percent of families own either one or two
vehicles. Because of the
high-density population of cities and towns, the number of people exposed to air
pollutants is great. This had led
to the increased number of people getting chronic diseases over these past years
since the car ownership in the UK has nearly trebled. These include asthma and respiratory complaints ranging
through the population demographic from children to elderly people who are most
at risk. Certainly those who are
suffering from asthma will notice the effects more greatly if living in the
inner city areas or industrial areas or even near by major roads.
Asthma is already the fourth biggest killer, after heart diseases and
cancers in the UK and currently, it affects more than three point four million
In the past, severe pollution in London during 1952 added with low winds
and high-pressure air had taken more than four thousand lives and another seven
hundred in 1962, in what was called the ‘Dark Years’ because of the dense
dark polluted air.
is also causing devastation for the environment; many of these causes are by man
made gases like sulphur dioxide that results from electric plants burning fossil
fuels. In the UK, industries and
utilities that use tall smokestacks by means of removing air pollutants only
boost them higher into the atmosphere, thereby only reducing the concentration
at their site.
These pollutants are often transported over the North Sea and produce
adverse effects in western Scandinavia, where sulphur dioxide and nitrogen oxide
from UK and central Europe are generating acid rain, especially in Norway and
Sweden. The pH level, or relative
acidity of many of Scandinavian fresh water lakes has been altered dramatically
by acid rain causing the destruction of entire fish populations.
In the UK, acid rain formed by subsequent sulphur dioxide atmospheric
emissions has lead to acidic erosion in limestone in North Western Scotland and
marble in Northern England.
In 1998, the
London Metropolitan Police launched the ‘Emissions Controlled Reduction’
scheme where by traffic police would monitor the amount of pollutants being
released into the air by vehicle exhausts.
The plan was for traffic police to stop vehicles randomly on roads
leading into the city of London, the officer would then measure the amounts of
air pollutants being released using a CO2 measuring reader fixed in
the owner's vehicle's exhaust. If the
exhaust exceeded the legal amount (based on micrograms of pollutants) the driver
would be fined at around twenty-five pounds.
The scheme proved unpopular with drivers, especially with those driving
to work and did little to help improve the city air quality.
In Edinburgh, the main causes of bad air quality were from the vast
number of vehicles going through the city centre from west to east.
In 1990, the Edinburgh council developed the city by-pass at a cost of
nearly seventy five million pounds. The
by-pass was ringed around the outskirts of the city where its main aim was to
limit the number of vehicles going through the city centre and divert vehicles
to use the by-pass in order to reach their destination without going through the
city centre. This released much of
the congestion within the city but did little very little in solving the
city’s overall air quality.
To further decrease the number of vehicles on the roads, the government
promoted public transport. Over two
hundred million pounds was devoted in developing the country's public transport
network. Much of which included the development of more bus lanes in
the city of London, which increased the pace of bus services.
Introduction of gas and electric powered buses took place in Birmingham
in order to decrease air pollutants emissions around the centre of the city.
Because children and the elderly are at most risk to chronic diseases,
such as asthma, major diversion roads were build in order to divert the vehicles
away from residential areas, schools and elderly institutions.
In some councils, trees were planted along the sides of the road in order
to decrease the amount of carbon monoxide emissions.
Other ways of improving the air quality included the restriction on the
amounts of air pollutants being released into the atmosphere by industries;
tough regulations were placed whereby if the air quality dropped below a certain
level around the industries area, a heavy penalty would be wavered against them.
© Copyright 2000, Andrew Wan. | <urn:uuid:ea6c54fe-1f6e-4a4c-bcb5-4f4c9e0fb6de> | CC-MAIN-2013-20 | http://everything2.com/user/KS/writeups/air+pollution | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.948933 | 1,097 | 3.25 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
I love this document. It's a survey of property allotted to Hassanamisco Nipmuc Sarah Robins who married Peter Muckamaug. Though Native, Peter was not from Hassanamesit so the land could not be allotted to (or owned by) him. When Sarah Robins died, the land passed to her children.
The Muckamaug allotment was originally 106 acres. The land came from the division of the Hassanamisco Praying Plantation. Praying Plantations, or towns, were the colonial Massachusetts equivalent to today's reservation system. The Praying Town at Hassanamesit was 8000 acres. In 1728, the MA Bay government allowed those 8000 acres to be divided up between 40 English proprietors and 7 Native families. Land was also set aside for a Native church and school and stipulations made for a minister and teacher. The 7 Native families received 1200 acres in separate parcels. The rest was sold to the 40 proprietors and monies from the sale deposited for use by the Hassanamiscos. Since it was not believed that Native people could control their own resources, guardians were appointed to oversee their assets. Native people throughout Massachusetts could not sell their land or spend even the interest on their money without asking their guardians to petition the legislature until 1869.
Another map from the collections of American Antiquarian Society showing part of the 1728 allotments. This was posted on a Grafton, MA town webpage.
Part of the Muckamaug allotment is now owned by the town of Grafton and is preserved as "Hassanamesit Woods".The Fiske Center for Archaeological Research is conducting an archaeological dig in Hassanamesit Woods where the Muckamaug's great-granddaughter's house stood from at least 1790 to 1923 when it was bulldozed over. The story of 4 generations of Nipmuc women living on this land will be coming to this blog soon!
(You may have noticed that sometimes I write Hassanamisco and sometimes Hassanamesit. Hassanamesit refers to the land and means "the place of many small stones". Hassanamisco refers to the people of that land.)
Until next time, | <urn:uuid:148a8548-174a-4f78-97fd-ad31f8c9dedf> | CC-MAIN-2013-20 | http://forallmyrelations.blogspot.com/2012/08/hassanamisco-indians.html?showComment=1346810207768 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.96723 | 450 | 2.671875 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
Imagine having hands so sensitive to cold that each winter they would swell and split open, so that just grabbing a carton of milk out of the refrigerator makes them whiten and throb with pain. Then imagine learning to raise the temperature in your hands so that you could hold the carton of milk and do it without any pain. This is an example of what biofeedback training is attempting to accomplish for certain medical problems, such as Raynaud's disease, a circulatory disorder that can cause its victims extreme discomfort and debilitation. For Raynaud's disease, this therapy has not been found to be clearly effective, but there may be benefits for some other conditions.
Currently, incomplete but encouraging evidence suggests that biofeedback may indeed offer at least modest benefits for a variety of conditions, including anxiety , low back pain , insomnia , and female stress incontinence. There is mixed evidence as to whether biofeedback helps with migraine and tension headaches.
The major advantages of biofeedback are that it is noninvasive, has virtually no side effects, and is possibly effective over the long-term. The major disadvantage for some is that it requires effort, commitment, and involvement on the part of patients.
How Biofeedback Works
Every time you scratch an itch, grab a snack when you're hungry, or use the bathroom when you feel the urge, you are responding to biofeedback cues from your body about your physiological state.
With biofeedback training, however, you are cued by sensors attached to your body. These sensors measure heart rate, the temperature of your extremities, the muscle tension in specific muscle groups, or, in neurofeedback, the kinds of brain waves you are emitting. This information is conveyed by visual displays or sounds. Using imagery and mental exercises, you learn to control these functions, using the feedback provided by the sensors as a gauge of success. With practice, you can learn to "tune in" without instrumentation and control these functions at will during ordinary life.
For example, in a biofeedback training session for headache, temperature sensors would be attached first to your hands, then to your feet, and finally to your forehead, if needed. Your goal would be to increase blood flow away from the brain by raising the temperature in your hands and feet and eventually lowering it in your temples. Other sensors might monitor your electrodermal or galvanic skin response, how easily you sweat or get goose bumps, because this affects your ability to alter your skin temperature.
To warm up your hands and feet, you might imagine basking in the sun on a beach while listening to a script like "I feel warm…my hands are growing warm and heavy…" Both the image and the script would be tailored to you personally to evoke a vivid and relaxing mental image. After your training session, you would be sent home with an audio version of the script and small thermometers to use for your daily practice.
Who Needs to Be Involved With Biofeedback?
Any biofeedback treatment program should involve your primary healthcare provider and relevant specialists, such as urologists, cardiologists, or neurologists. The training is often most effective when integrated with other types of therapy, such as medicine or cognitive-behavioral therapy.
Neurofeedback, also called EEG feedback, is the most controversial form of biofeedback therapy, largely because so few controlled clinical trials have been able to assess its efficacy. Neurofeedback is the "retraining" of brainwave patterns. Although controversial, it is experiencing a resurgence of interest in the treatment of a variety of disorders, including depression, fibromyalgia, attention-deficit hyperactivity disorder (ADHD), and alcoholism.
In a neurofeedback training session, several sensors that measure your brain's electrical activity are attached to your scalp. You relax and play a video game, which is controlled just by your brain waves and responds favorably to brain waves of the desired pattern. As you play the game, your trainer observes your electroencephalogram (EEG), transmitted to a separate video terminal. Most practitioners recommend at least 20 sessions to obtain significant, long-lasting results, although improvement is usually noted early on if the treatment protocol is right for you.
A note of caution: Be sure that the practitioner that you choose to work with has training and experience in using neurofeedback. Ask lots of questions and talk with your primary care doctor before starting a treatment program.
- Reviewer: Brian Randall, MD
- Review Date: 12/2011 -
- Update Date: 12/28/2011 - | <urn:uuid:ed843a53-3adf-4646-97a8-d0af35f62ec1> | CC-MAIN-2013-20 | http://medtropolis.com/your-health/?/13550/biofeedback | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.943535 | 942 | 3.0625 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
A crowd awaits a ship at Station Pier, Port Melbourne.
Source: Italian Historical Society - Co.As.It.
Find out why this landmark has become such an evocative symbol of Victoria's immigration history.
Station Pier is one of Australia's longest operating passenger piers. It holds iconic significance in Victoria's heritage, and is particularly significant to Victoria's post-war immigrants for whom it is an ongoing symbol of their arrival and the start of their new life.
The exhibition provides an historical overview of Station Pier, including its early days as Railway Pier in the 1850s, and its upgrade in the 1920s in response to the growing needs of the city and port of Melbourne. | <urn:uuid:b9d46c6f-d3e0-4144-ab12-52f44d5a2d11> | CC-MAIN-2013-20 | http://museumvictoria.com.au/immigrationmuseum/whatson/past-exhibitions/station-pier/?reply=15128&sort=newest&googleminiexclude=1 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.970324 | 140 | 2.9375 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
[en] The efficiency of the transmission of surface plasmon waves by use of a dielectric diffraction grating is discussed. The Kretschmann device allows us to obtain a surface plasmon resonance that consists of an absorption peak in the reflection spectrum. When surface plasmon resonance occurs, the TM-polarization mode of the incident electromagnetic wave is neither transmitted nor reflected. The procedure to transform an absorption peak into a transmission peak is described. Transmittivity of 68% is obtained for a simple structure that consists of a thin-film layer of Ag coated on a volume diffraction grating and embedded between two dielectric media. The results presented herein were obtained by numerical simulations that were carried out by use of an algorithm based on the rigorous coupled-wave theory.
Service de Physique Générale, Hololab
Fonds pour la formation à la Recherche dans l'Industrie et dans l'Agriculture (Communauté française de Belgique) - FRIA | <urn:uuid:abf25383-07bd-4879-8bed-60a2b7af74d1> | CC-MAIN-2013-20 | http://orbi.ulg.ac.be/handle/2268/96932 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.844198 | 214 | 2.78125 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
Description: In Oracle, you can create an autonumber field by using sequences. A sequence is an object in Oracle that is used to generate a number sequence. This can be useful when you need to create a unique number to act as a primary key.
Once you've created a sequence object, to retrieve the next value in the sequence order you need to use NEXTVAL.
Language: PL/SQL Highlight Mode: PLSQL Last Modified: March 14th, 2009
CREATE SEQUENCE <sequence_name>
MAXVALUE <integer>/ NOMAXVALUE
MINVALUE <integer>/ NOMINVALUE
CYCLE / NOCYCLE
CACHE <#>/ NOCACHE
ORDER/ NOORDER;-- basic autonumber with sequence:INSERTINTO<table_name>(<column_name>)VALUES(<sequence_name>.NEXTVAL);-- basic autonumber with sequence demo.-- these insert statements will insert 2 new records into -- the 'test_bed' table. The user_id field would be assigned -- the next number from the seq__user_id sequence. CREATE SEQUENCE seq_user_id;SELECT seq_user_id.NEXTVALFROM dual;INSERTINTO test_bed
(user_id, class_type, room_location)VALUES(seq_user_id.NEXTVAL,'Underwater Basketweaving','RM1205');SELECT*FROM test_bed;INSERTINTO test_bed
(user_id, class_type, room_location)VALUES(seq_user_id.NEXTVAL,'Creative Anarchy','RM3111');SELECT*FROM test_bed;
SQL University.net courses meet the most demanding needs of the business world for advanced education
in a cost-effective manner. SQL University.net courses are available immediately for IT professionals
and can be taken without disruption of your workplace schedule or processes.
Compared to traditional travel-based training, SQL University.net saves time and valuable corporate
resources, allowing companies to do more with less. That's our mission, and that's what we deliver. | <urn:uuid:52e97a82-5b3b-4a6b-9318-9e823f04d72a> | CC-MAIN-2013-20 | http://psoug.org/snippet/SEQUENCE-Demo-code-and-Examples_885.htm | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.747597 | 468 | 3.046875 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
The study involved 66 spider-phobic women who watched a video of a spider 14 times. The participants were randomly divided into different groups to either watch the video every two hours or every 12 hours, and either in the morning or evening, or after spending a night sleeping or a full day awake.
The researchers also sounded off a loud noise during some of the videos and then measured the participants’ palm sweat in response.
Overall, women who managed to get a good night’s sleep after watching the spider videos — before being shown the spiders again — were less likely to rate the spider high on a scale of “fearfulness, disgust, and unpleasantness,” according to the Harvard Gazette.
On the other hand, subjects who stayed awake for 12 hours after watching the spider videos and were then shown the videos again at the end of the day exhibited a stronger stress response.
There was no evident difference in reaction between participants who viewed the spider videos in the morning or the evening.
“Thus, sleep following exposure therapy may promote retention and generalization of extinction learning,” the researchers wrote in the study.
The researchers added that REM sleep in particular could be responsible for the effect.
Recently, a Proceedings of the National Academy of Sciences study showed that severely arachnophobic adults who participated in just one session of therapy experienced brain changes that allowed them to hold a tarantula in their hands. The effect lasted six months after the therapy session.
“Before treatment, some of these participants wouldn’t walk on grass for fear of spiders or would stay out of their home or dorm room for days if they thought a spider was present,” study researcher Katherina Hauner, Ph.D., postdoctoral fellow in neurology at Northwestern University Feinberg School of Medicine, said in a statement.
“But after a two or three-hour treatment, they were able to walk right up and touch or hold a tarantula. And they could still touch it after six months,” Hauner said.
The study is published in the Journal of Psychiatric Research.
Source: Journal of Psychiatric Research | <urn:uuid:e8a6bdb6-961b-44c2-8a74-f1329ca39adf> | CC-MAIN-2013-20 | http://psychcentral.com/news/2012/07/29/sleep-enhances-exposure-therapy-for-spider-phobia/42301.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.951118 | 444 | 2.96875 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
For over a decade, information technologies have significantly affected the
banking industry. Banks and other financial institutions have improved their
functions as a financial intermediary through adopting various information technologies
(Chang, 2002; Gourlay and Pentecost,
2002; Hannan and McDowell, 1984; Haynes
and Thompson, 2000; VanHoose, 2003).
Generally, when the information technologies combine with functions of banks
and financial institutions, it is called electronic banking. Electronic banking
technologies have led banks and financial institutions to improve effectiveness
of distribution channels through reducing the transaction cost and increasing
the speed of service (Chang, 2002; VanHoose,
2003). Globalization of finance, integration, advances in information technologies
and financial innovations in the last couple of decades have deeply changed
banking business not only in Iran but in also other markets and forced the state
authorities to deregulate national financial systems. Deregulation allowed banks
to flourish their businesses and enter into new markets with new technologies
involving both individual and institutional costumer interaction (DeYoung
et al., 2004). In addition, developments of modern computer technology
have also enabled banks to lessen the cost of bank transactions by having the
client interact with an e-banking facility rather than with a human being. E-banking
applications, which include Automated Teller Machine (ATM), telephone banking,
mobile banking, digital television, debit and credit cards, internet banking,
etc., became one of the main battlefields of the banking industry. For instance,
Hanson and Kalyanam (2007) points out that e-banking grew
rapidly, ATMs made costumer visits to a branch less necessary and then in the
late 1990s the rapid growth in banking web sites made a wide range of services
available from almost everywhere. Among various banking technologies, Internet
banking which is the act of conducting financial intermediation on the Internet,
is the latest banking technology and the most rapidly diffused banking technology
in the Iran. Internet banking has advantages for banks to maintain competition,
to save costs, to enhance mass customization, marketing and communication activities
and to maintain and attract consumers (Daniel and Storey,
1997; Mols, 2000; Read, 1998;
Sheshunoff, 2000; Tomkin and Baden-Fuller,
1998). The primary advantage of Internet banking is to save time and cost.
Lee and Lee (2001) indicated that Internet banking allows
consumers easier access to their bank accounts, lower service charges and time
saving. Moreover, Chang (2002) showed that Internet banking
had a low transaction cost and a high speed of service when compared to other
banking services. For example, while the cost of transaction for money transfer
was 95¢ for checking and 27¢ for ATM, while it was only 1¢ for
Internet (Chang, 2002). Hence, internet is increasingly
becoming a diverse global marketplace with global business opportunities for
financial services delivery as well as challenges.
Financial sector is the spinal cord of sovereign economy of any country. Iran
is no exception; the technology adaption in banking operations in Iran was a
few decades behind that of in developed countries. In terms of international
and global comparison, Internet usage in Iran is still in the infancy stage.
Presently in Iran, an important function of e-commerce is the handling of payment
Over the Internet. Most e-commerce involves the exchange of some form of money
for goods and services. Implementation of payment system currently competes
for dominant the results of research could help bank managers to make informed
decisions, thereby providing better service to their customer and formulate
more efficacious strategies to ensure rapid migration of customers to Internet
Customer satisfaction: Early concepts of satisfaction research have
typically defined satisfaction as a post choice evaluative judgment concerning
a specific purchase decision (Churchill and Surprenant,
1992; Oliver, 1980). Most researchers agree that
satisfaction is an attitude or evaluation that is formed by the customer comparing
their pre-purchase expectations of what they would receive from the product
to their subjective perceptions of the performance they actually did receive
(Oliver, 1980). Several authors have defined satisfaction
in a different way. Satisfaction is a persons feelings of pleasure or
disappointment resulting from comparing a products perceived performance
(or outcome) in relation to his or her expectations (Kotler,
2000) Customer satisfaction is a collective outcome of perception, evaluation
and psychological reactions to the consumption experience with a product/service
Satisfaction formation: In marketing literature (Churchill
and Surprenant, 1992; Oliver, 1980) as well as in
recent information system studies (McKinney et al.,
2002), the disconfirmation theory emerges as the primary foundation for
satisfaction models. According to this theory, satisfaction is determined by
the discrepancy between perceived performance and cognitive standards such as
expectation and desires. Oliver (1980) described the
process by which satisfaction judgments are reached in the expectancy-disconfirmation
framework. Buyers form expectations of the specific product or service before
purchase and perceived quality level which is influenced by expectations (Khalifa
and Liu, 2003). Customer expectation can be defined as customers pretrial
beliefs about a product (McKinney et al., 2002).
Expectations are viewed as predictions made by consumers about what is likely
to happen during impending transaction or exchange (Zeithaml,
1988). Perceived performance is defined as customers perception of
how product performance fulfills their needs, wants and desire (Cadotte
et al.,1987). Perceived quality is the consumers judgment about
an entitys overall excellence or superiority (Zeithaml,
1988). Disconfirmation is defined as consumer subjective judgments resulting
from comparing their expectations and their perceptions of performance received
(Mckinney et al., 2002; Spreng
et al., 1996). Ho and Wu (1999) identified
five antecedents of customer satisfaction to be appropriate for online shopping
on the Internet. These are logistical support, technical characteristics, information
characteristics, home page presentation and product characteristics. Eastin
(2002) presented the model that demonstrate the adoption of four ecommerce
activities currently available to Internet users: (1) online shopping, (2) online
banking, (3) online investingand (4) electronic payment for an Internet service
(i.e., access to exclusive sites). Author also explained six attributes common
to the model. These are-perceived convenience and financial benefits, risk,
previous use of the telephone for a similar purpose, self efficacy and Internet
use and all six attributes play a significant role in the adoption processes.
Online service quality: Oppewal and Vriens (2000)
developed an application for measuring retail banking service quality, which
consists of 28 attributes including four service quality dimensions such as:
accessibility; competence; accuracy and friendliness; and tangibles. The accuracy
and friendliness dimension turned out to be the most important factor out of
four determining banking preference, followed by competence, tangiblesand accessibility.
Kamilia and Nantel (2000) proposed an alternative measure
of perceived service quality in retail banking that comprises 31 items with
six underlying key dimensions. These dimensions are: Effectiveness and assurance,
access, price, tangibles, service portfolio and reliability. Madu
and Madhu (2002) proposed 15 dimensions of online service quality dimensions
based on literature review: Performance, features, structure, aesthetics, reliability,
storage capacity, serviceability, security and system integrity, trust, responsiveness,
product/service differentiation and customization, web store policies, reputation,
assurance and empathy. Wolfinbarger and Gilly (2003)
have found four online retailing service quality dimensions through focus group
interviews and an online survey. These are web site design, reliabilityand privacy/security
and customer service. They found that reliability and fulfillment is the strongest
predictor of customer satisfaction.
Internet banking: Berger (2007) argued that
a sound understanding of client is required for improvement of e-banking. Thus,
all relevant information about the clients should be taken into account and
a client-centric strategy should be developed by Confirming Berger
(2007). Electronic banking research has attracted much attention from marketing
researchers about client perception (Maenpa et al.,
2008), client attitudes (Liao and Cheung, 2002; Mols,
1998), client satisfaction (Gonzalez et al.,
2004) service quality Bauer et al. (2005)
but it attracts relatively less attention from the finance and banking researchers
about the economic consequences of e-banking. One of the papers that examine
the economic outcome of e-banking is that of Parker and
Parker (2008) who investigated the money velocity in Finland following wide
spreading of e-banking in Finland. Their results interestingly show that money
velocity has decreased despite the expectations. Durukan
(2003) evaluated the impact of internet banking on the performance of Turkish
commercial banks. Adoption, perception and usage of internet banking by consumers
is one of the topics heavily examined in e-banking literature. Centeno
(2004) argued that speed, the convenience of remote access, 7/24 availability
and price incentives are the main motivation factors for the consumers to use
internet banking. Durkin et al. (2008) noted
that the simplicity of the products offered via internet banking facilitates
the adoption of internet banking by consumers. Calisir and
Gumussoy (2008) compared the consumer perception of internet banking and
other banking channels and report that internet banking, ATM and phone banking
substitute each other. Maenpaa et al. (2008)
examined the consumer perceptions of internet banking in Finland and their findings
indicate that familiarity has a moderating role in the perception. Guerrero
et al. (2007) examined the usage of internet banking by Europeans
and their results indicate that ownership of diverse financial products and
services, attitude towards finances and trust in the internet as a banking channel
influence clients usage of internet banking. Sohail
and Shanmugham (2003) documented accessibility of internet, awareness of
e-banking and resistance to change are found to be influencing Malaysians
use of internet banking. Another factor that promotes clients usage of internet
banking is seller support (Nilsson, 2007). While the
adoption of e-banking by clients is heavily researched there is less research
on the supply side of e-banking. We can list the advantages of e-banking as
the competitive advantage, member/client retention, increased revenues and reduced
costs (Esser, 1999). The Woolwich Bank case study conducted
by Shah and Siddiqui (2006) revealed that understanding
clients, organisational flexibility, availability of resources, systems security,
established brand name, having multiple integrated channels, e-channel specific
marketing, systems integration, systematic change management, support from top
management and good client services are the factors critical to success in e-banking.
Aktan and Teker (2009) examined the usage of internet
in Turkey to make a basic due-diligence investigation for the financial institutions,
including banking, stock trading, insurance and provision of financial information
within the framework of internet banking by using statistics compiled mostly
from the Bank Association of Turkey over the period 2005 and 2008. The findings
show that internet usage in Turkey with its young population has continued to
grow dramatically in financial services. Sudha et al.
(2007) studied the banking customers perception towards security concern
and Internet banking adoption. They research reveals that the customers have
much concern about security and privacy issue in adoption of Internet banking,
whether the customers are adopted Internet banking or not. Amiri
et al. (2009) investigated the effective factors on improving e-banking
by using Fuzzy Topsis in Parsian Bank. They present a method at solving MCDM
problems in which the weights of criteria are unequal. They results shows factors
of operational, technical and strategic have the most effect on Improving of
e-banking. Sarlak et al. (2009) examined the
factors that can speed up the successful implementation of electronic banking
innovations in the Irans country. They research revealed that there is
a meaningful and significant relationship between co-structural, content and
context factors and the successful implementation of e-banking in Iran. Pour
Mirza et al. (2009) in their study showed an understanding of Iranian
customers attitude and adoption of Internet Banking services. They only
survey Internet Banking users and non-users of Mellat Bank of Tehran. The results
revealed significant differences between demographic profiles and attitudes
of users and non-users groups.
The main purpose of this research is to identify the customer preferences towards the online banking and to find out the various service quality dimensions, which affect the customer satisfaction. This study also tried out to find out the relationship between the various demographic variables and satisfaction level of customers.
Development of hypotheses: Researcher developed the hypotheses to identify
the relation between age, profession, gender, preferences of bank and satisfaction
||There is no significant relation between age and choice of
||There is no significant relation between profession of customer and preference
||There is no significant relation between gender and number of banks usage
||Factors determining satisfaction level of respondents are independent
of their age
||Factors determining satisfaction level of respondents are independent
of their profession
||Factors determining satisfaction level of respondents are independent
of their gender
||Factors determining satisfaction level of respondents are independent
of Status of usage
||Factors determining satisfaction level of respondents are independent
of no. of Bank usage
Sampling and sample size: For achieving the objective, a descriptive
study was conducted. Primary data were collected of six kinds of banks (Saman,
Parsian, Melli, Keshavarzi (agri Bank), Tejarat and Sepah) in Iran at spring
2010, from Internet banking users of public and private banks in Tehran district,
with the help of structured questionnaire. A sample of 300 respondents who actually
use internet banking was selected by following non-probabilistic convenience
sampling technique as it is appropriate for exploratory studies.
Research instrument: Questionnaire was designed after reading of SERVQUAL
.The Service Quality (SERVQUAL) scale developed in an attempt to measure the
perception of quality of service (Parasuraman et al.,
1988; Zeithaml et al., 2001) has been gaining
momentum in application among various service sectors. Still that scale has
undergone several revisions, extensionsand modifications to suit different sectors
needs. The authors, based on qualitative research, formulated a measure of service
quality derived from data on a number of services, instead of counting on early
dimension of goods quality in the manufacturing sector. The entire approach
was formulated on the tenet that the customers entertain expectations of performance
perceptions. The authors defined service quality as the degree of discrepancy
between customers normative expectations for the service and their perceptions
of the service performance. Concept and after interacting with bank employees
and customer who generally use internet banking. Questionnaire had a list of
21 statements related to efficiency, tangibility, responsiveness, reliability
and empathy. Respondent has to choose one option of each statement depending
on whether he or she is Strongly disagree, Disagree, Neutral ,Agree ,or Strongly
Agree with statement.
Analysis of data: Data presentation and analysis were done with the
help of various statistical tools by using SPSS. Percentage, frequencies, Cross
Tabulation and factor analysis methods were used for analysis. For testing of
hypotheses, ANOVA and F-test were used.
RESULTS AND DISCUSSION
Demographic profile of respondent: Fifty seven percent of respondent are young, having age less than 30 years. Majority of respondent (84%) were men and 85% respondent belong to Service class. 61% of respondent were using the Internet banking from last one Year. Majority of respondent (89%) having bank account in 1 bank only, while 11% respondents have bank account in 2 or more banks (Table 1). Out of 89 respondent 32 respondents have account in SAMAN bank, 25 in PARSIAN bank, 21 respondents have account in MELLI bank.
Preference of customer towards banks: Table 2 reveals
that there is no specific bank preference of customers of all age groups and
in Table 3, hypothesis testing also revealed that there is
no significant relation between age and preference of Banks, thus null hypothesis
(1) is accepted (Sig = 0.201>0.05) and (F = 36.741/23.349 =1.574).
|| Demographic profile of respondents
|Source: From primary data
|| Cross-tabulation between age and customers preference
|| ANOVA and F-test for age and customers preference of
||Cross tabulation between profession and customers preference
||ANOVA and F-test for profession and customers preference
|| Cross tabulation between Gender and number of bank usage
|| ANOVA and F-test for Gender and number of Bank usage
|| KMO and Bartletts test
Twenty seven percent of service class customers and 5% of business class Customers have account in SAMAN bank (Table 4). Table 5 reveals that there is no significant relation between profession of customer and preference of banks means null hypothesis (2) is also accepted (Sig = 0.922>0.05) and (F = 1.964/24.204 = 0.081)
After doing Cross tabulation between Gender and number of Bank usage (Table 6), it was found that most of the customers whether male or female prefer to have account only in one bank. But hypothesis testing (Table 7) revealed that there is no significant relation between genders and number of banks usage thus the null hypothesis (3) is also accepted (Sig = 0.335>0.05) and (F = 0.163/0.173 = 0.94).
Factors determining satisfaction level of customers: Factor analysis
is applied on responses provided by respondent. Factor analysis is a set of
techniques, which by analyzing the correlation between variables, reduces their
number into few factors, which explain much of the original data, more economically
According to Table 8 Measure of Sampling Adequacy such as
Bartlett's Test of Spherecity (Approx. Chi-Square is 1183.031, Degree of freedom
is 210, significance is 0.000) and Kaiser-Meyer-Olkin Measure of Sampling Adequacy
(KMO) value is 0.818 showed that data were fit for factor analysis. Table
8 indicated the appropriateness of factor analysis i.e., the sample was
adequate. Similarly, Cooper and Schindler (2003) argued
that while the correlation coefficients in matrix table is less than 0.80, the
multicollinearity could be ignored.
For extracting the factors, Principal Component Analysis was used and 5 factors were retained as their Eigen values is more than 1 (Table 9).
|| Total variance explained
|Extraction method: Principal component analysis
|Extraction method: Principal component analysis.
KMO and Bartletts Sphericity used to test the sample appropriateness. The variables, which had loadings of less than 0.5, were excluded and dimensions with Eigen values of 1 or above; were retained.
Thus, five factors have been extracted. Extraction communalities are estimates of variance in each variable accounted for by the factors in the factor solution. According to Table 10 all the variables are fit well in factor solution as all factors have value more than 0.40.
Next task is interpretation and naming of factors. It is done by identifying the variables that have high loading on individual factors. For this purpose, Rotated factor matrix (Table 11) is used. Values close to the 1 represent high loading and close to 0 represent low loading.
Table 12 show the Naming of Factors that:
Factor 1 responsiveness: Total variance explained (Table
9) has revealed that this factor explained variance of 20.357%. 7 variables
(12, 13, 14, 15, 16, 17 and18) were loaded on this factor. Researcher has named
this factor as Responsiveness as it includes bank and employees willingness
to help the customers.
Factor 2 reliability: It has been found that 2nd important factor have explained variance of 15.521% and 4 variables (8, 9, 10 and 11) are loaded on this factor. As the variables related to reliability and accuracy of bank websites, are loaded on this factor, thus this factor is named as Reliability.
Factor 3 efficiency: This is 3rd important factor, which accounts for 13.865% of the variance and 5 variables were loaded on this factor. As the variables related to speed and efficiency of bank website was loaded on this factor, this factor is named as Efficiency.
Factor 4 privacy of transactional information: 3 variables loaded on this factor and together they account for 11.573% of the variance. Variables related to collection and security of customers personal information was loaded high on this factor and thus researcher has named it as Privacy of Transactional Information.
Factor 5 easiness to use: Two variables load on this factor and together
they account for 6.365% of the variance. Easy to navigate and easiness to find
information on website load high on this factor and thus researcher has named
this factor as Easiness to use.
ANALYSIS OF VARIABLE AND F-TEST BETWEEN FACTORS AND DEMOGRAPHIC VARIABLES
Comparative age-wise analysis: Table 13 indicates
that hypothesis (4) is rejected partially. Thus it can be said that all factors
determining the satisfaction level of customers except efficiency and privacy
of information are independent of age.
Post-hoc analysis (Table 13a and b)
further revealed that satisfaction level of customers belonging to age group
31-50 years are effected by efficiency of bank website and privacy of information
as compared to customers of age groups of less than 30 years and above 50 years.
|| Rotated factor matrix
|Note: extraction method: Principal component analysis. Rotation
method: Varimax with kaiser normalization. a Rotation converged in 17 iterations
|| Naming of factors
|| ANOVA and F-test between age and factors
Comparative customers profession-wise analysis: Table 14 indicate hypothesis (5) is completely accepted. Thus it can be said that all the factors determining the satisfaction level of customers are independent of profession.
Comparative gender-wise analysis: According to Table 15, hypothesis (6) is partially rejected. Thus, it can be said that all the factors except Easiness to use website, determining the satisfaction level of customers are independent of gender.
Comparative status of usage analysis: Table 16 revealed
that hypothesis (7) is also partially rejected. So it can be said that all the
factors except Reliability of website, determining the satisfaction level of
customers are independent of Status of Usage.
||Post hoc analysis: Age and efficiency
|Note: The mean difference is significant at the 0.05 level
||Post hoc analysis: age and privacy of information
|Note: The mean difference is significant at the .05 level.
|| ANOVA and F-test between customers profession and factors
|| ANOVA and F-Test between gender and factors
|| ANOVA and F-Test between status of usage and factors
Post-hoc analysis (Table 16a) further revealed that satisfaction
level of customers who are using the internet banking from last 2 years are
more satisfied and influenced by the reliability of bank website.
Comparative status of number of banks usage: Table 17 indicates that hypothesis (8) is again partially rejected. Thus it can be said that all the factors except Responsiveness determining the satisfaction level of customers are independent upon the number of bank usage.
The increasingly competitive environment in the financial services market has resulted in pressure to develop and utilize alternative delivery channels. The most recent delivery channel to be introduced is electronic or online banking. The term electronic banking is used to describe the provision of information or services by a bank to its customers, the majority of customers are very comfortable and willing to use IB services. Hence, it is very important for Iranian banks to have online banking services. It is well-accepted fact that, providing good customer service will increase the number of adopters after a while.
Several scholars have analyzed the demographic characteristics of IB customers
(Pour Mirza et al., 2009) but emphasis has been
placed on analyzing behavioral, attitudinal and social characteristics of the
bank clients. The empirical findings of the current study show that these characteristics
have effective impacts on adoption of IB services. In terms of personal and
social characteristics, this study contributes to this purpose, by identifying
the Iranian customers attitude toward IB services.
Finding of demographic characteristics of the research reveals that Reliability
and Efficiency are important factors in level of customers satisfaction
and there is a significant relation between these two variables with age and
status of usage. This also supports the findings of Ramayah
et al. (2002) which found that most of the individuals are reluctant
to use Internet banking as they concerns over security and privacy issues. This
is also supported by the findings of Al-Sabbagh and Molla
(2004), who found that perceived security and trust have emerged as the
top issues inhibiting Internet banking adoption.
The finding about the impact of age on adoption of online banking services
indicates that the effect of age is not prominent. Therefore, age is not a crucial
variable for banks that are planning to offer IB services. Gefen
and Straub (2003) and Pour Mirza et al. (2009)
confirm this argument. Moreover (Gefen and Straub, 2000),
indicate gender has not been found to have a direct effect on adoption of technology
in general, also the results of current study uphold this matter.
||Post hoc analysis
|Note: The mean difference is significant at the .05 level
|| ANOVA and F-test between number of banks usage and factors
The research show, customers do not trust e-banking for some reasons especially
due to lack of the security of the system. Also (Rotchanakitumnuai
and Speece, 2003; Pour Mriza et al., 2009)
revealed that all the customers are very concerned about security in transaction
processes. This results is in consistent with the results, which have been reported
earlier by other scholar (Black et al., 2001;
Lee and Turban, 2001; Polatoglu and
Ekin, 2001; Alam et al., 2007).
Indeed the purpose of this study is to show how the demographic factors are associated with individuals benefits and costs of adopting Internet banking. This research have a general results for managers and customers, because researcher surveyed the public and private banks of Iran instead of only one bankand therefore can complete other studies of IB in Iran.
The present study was aimed to identify the customer preferences towards the online banking and to find out the various service quality dimensions, which affect the customer satisfaction .Factor analysis, reveals that the five factors that influence the satisfaction level of customers are Responsiveness, Reliability, Efficiencyand Privacy of Information and Easiness to use.
Hypothesis testing results show that first null hypothesis (1) is accepted and it can be concluded that there is no significant relation between age and preference of Banks. Twenty seven percent of service class customers and 5% of business class customers have account in SAMAN bank. The 2nd null hypothesis stating that there is no significant relation between profession of customer and preference of banks is also accepted. The third hypothesis, stating that there is no significant relation between genders and number of banks usage is also accepted.
Hypothesis (4) stating that all factors determining the satisfaction level
of customers except efficiency and privacy of information are independent of
age is rejected partially. Post-hoc analysis revealed that satisfaction level
of customers belonging to age group 31-50 years are effected by efficiency of
bank website and privacy of information as compared to customers of age groups
of less than 30 years and above 50 years. That mean customers in the middle
age group are more concern about the efficiency of bank website and privacy
of their personal information. Banks should adopt various tools to improve the
efficiency of website.
The 5th hypothesis, factors determining the satisfaction level of customers is independent of profession, is completely accepted. The hypothesis (6) is partially rejected, it can be said that all the factors except Easiness to use website, determining the satisfaction level of customers are independent of gender.
Hypothesis (7) stating that all the factors except Reliability of website, determining the satisfaction level of customers are independent of Status of usage is also partially rejected. Post-hoc analysis further revealed that satisfaction level of customers who are using the internet banking from last 2 years are more satisfied and influenced by the reliability of bank website. That means the customers who are using the internet banking from less than 2 years have not trust on websites and afraid of using internet banking.
The last Hypothesis (8) is again partially rejected. Thus it can be said that all the factors except Responsiveness determining the satisfaction level of customers are independent upon the number of bank usage.
The website is an important element in a banks marketing communications
activities and giving better customer experience. It is therefore important
to use it in an appropriate way and to provide rich contentand to keep it updated
to attract and maintain customers. Banks should consider that it is beneficial
to spend time on the design because this can help the company attract visitors,
which in turn can become customer. Banks should conduct surveys and self assessment
tests which should be actually related to the product and service line, which
would in turn make the customers more educated about the companies offeringsand
this could be done just by starting a blog or chat for the customers. Banks
should create platforms wherein customer can be free to express their opinion
or give the feedback to the banks. And it is believed that firms who try to
create such interaction are considered to be most successful in business. Automated
e-mail and instant massage should be used more extensively than it is at present.
It is essential to assess the effectiveness of a website. By doing this, banks
can improve their site and that helps to provide positive web experience to
Managers must know that ability and opportunity cost of time have significant impacts in explaining consumers adoption behavior for Internet banking. Also, consumers benefit and cost associated with attitude should be considered to decide the determinants of Internet banking adoption and attend to consumers past consumption pattern, current situationand future expectations influenced Internet banking adoption. Although managers must analyzed variables by comparison between individuals benefit and costand find out the nature of each variable is based on the past, presentand future consumption. Attention to this matter is essential that all of the various financial institutions can have the same functions in the financial market. Therefore, the financial institutions have tried to exert competitive power in the market through various ways such as affiliations with other financial companies, downsizing their physical facilitiesand expanding their service scope. In this situation, Internet banking has been attractive to the financial sector. Companies can expect to save a lot of the cost of maintaining their large physical distribution systems by adopting Internet banking. Although many financial companies have realized the advantages of Internet banking and launched this service, the companies have not obtained a lot of benefits yet because some consumers have not been ready to adopt Internet banking. Therefore, financial companies need to make an effort to provide information about Internet banking based on accurate customer segmentation. Usage of other banking technologies had a significant impact on Internet banking adoption. This means that customers, who have mainly depended on traditional banking services such as checks, mail and phone, have lower probabilities to adopt Internet banking. Therefore, at first, retailers or marketers in banks and other financial companies should focus on customers who have already used other banking technologies to boost usage of Internet banking. However, if financial companies have not had various banking services, it is difficult to grasp which consumers have experience of other banking technologies. Financial companies need to have various banking services within a consolidated distribution system to grasp and to meet customers needs. If a financial company has only a few functions or a small number of distribution channels, the company will find it difficult to survive in the market.
Internet banking is growing. Affiliations and business alliances can be an efficient way to increase Internet banking use because marketers or retailers in the financial companies can segment customer groups more accurately based on customers various use of banking services.
In conclusion, the study shows that Internet Banking is an integral part of web communication and provides a starting point for future studies to explore the issue of web standardization or localization for Unity Internet Banking (UIB) in the word. This research study encourages managers to understand global consumers perception of Internet Banking and their preference so as to understand the users psychology and then design UIB to target the global audience.
LIMITATIONS OF THIS STUDY
As only one country has been taken for this study, it is not sure whether the findings will apply to other countries. Due to the limitation of finance and time, a sample of only 300 respondents was taken which may not be representative of the whole population.
SCOPE FOR FURTHER RESEARCH
Rather than offering a complete answer for global Internet Banking strategy, I hope my study opens possibilities for future studies that go beyond description and pursue further to predict global Internet Banking strategies and tactics. In addition, future research can explore the results by considering the standardization of dimensions of Internet Banking for other countries also like Japan, China, Singapore, Malaysia, Dubai, Indian, Australia, Canada, UK, USA, etc. The findings are sure to provide evidence for the robustness of the framework across countries as a basis for future applications.
I would like to acknowledge and express my gratitude to Mr. Hadi Gharoei for his magnificent support during this project. | <urn:uuid:6872f91d-e319-40f5-93fc-cbcca3266109> | CC-MAIN-2013-20 | http://scialert.net/fulltext/?doi=jas.2011.426.437&org=11 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.923761 | 7,210 | 2.875 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
Free Search (10904 images)
The Canadian Arctic Archipelago
Rating: 0.00/5 (0 votes cast)
- Title The Canadian Arctic Archipelago
- Released 29/02/2008 2:53 pm
- Copyright ESA
This Envisat image features the Canadian Arctic Archipelago, which lies to the north of mainland Canada and consists of 94 major islands and more than 36 000 minor ones. Visible in centre and lower half of image, Victoria Island is only slighter smaller than the island of Great Britain and is Canada’s second largest island and the world’s 9th largest. This image was acquired by Envisat’s Medium Resolution Imaging Spectrometer (MERIS) instrument on 19 September 2007 working in Full Resolution mode to provide a spatial resolution of 300 metres. | <urn:uuid:a48cda3e-1ff3-4e21-9b8c-b727518cdfc8> | CC-MAIN-2013-20 | http://spaceinimages.esa.int/Images/2008/02/The_Canadian_Arctic_Archipelago | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.870721 | 170 | 2.5625 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
Sarah Dazley - Murder
The development of forensic science in the 19th century
A case study for Key Stage 3, Britain 1750 - 1900 and GCSE History
This case study outlines the case of Sarah Dazley, a young widow, who at the age of 28, was tried and found guilty of the murder of her 2nd husband, William Dazley.
The case is interesting in many ways:
- Forensic Evidence was used to make the case against Sarah - this was an early use of forensic science to determine the cause of death.
- Heresay gossip from villagers counted against her.
- Sarah Dazley was the last woman to be publicly hanged at Bedford Gaol.
In this section you will find background information and activites relating to the case of Sarah Dazley, the detection of crime and the treatment of those accused of murder in the 19th century.
The KS 3 & 4 activities are aimed at students but provide a wealth of additional information and insight to the life of a young woman during the 19th century.
A case study for Key Stage 3, Britain 1750 - 1900 and GCSE History. The materials can also be used for general interest.
This section has reports and documents relating to the life of Sarah Dazely that can be used for research or for completing the activities provided with this case study. | <urn:uuid:3c2a0b03-339c-479a-a7cd-0f1a31020ad7> | CC-MAIN-2013-20 | http://vcp.e2bn.org/case_studies/casestudy11232-sarah-dazley-murder.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.932189 | 281 | 2.609375 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
By Julie Steenhuysen
An influential U.S. panel has called for routine HIV screening for all Americans aged 15 to 65, a change that could help reduce some of the stigma about getting tested for the sexually transmitted infection that causes AIDS.
The draft recommendations, released on Monday by the U.S. Preventive Services Task Force, a government-backed group of doctors and scientists, also called for routine HIV testing for all pregnant women.
"The prior recommendations were for screening high-risk adults and adolescents," said task force member Dr Douglas Owens who is a medical professor at Stanford University.
"The current recommendation is for screening everyone, regardless of their risk," said Owens, who is also affiliated with the Veterans Affairs Palo Alto Health Care System in California.
Nearly 1.2 million people in the United States are infected with HIV, yet 20 to 25 percent of them do not know it.
"This marks a monumental shift in how HIV in the United States can be prevented, diagnosed and treated," said Carl Schmid, deputy executive director of The AIDS Institute, an AIDS advocacy group.
The new guidelines by the task force are expected to affect the reimbursement of HIV testing, removing one of the barriers to the tests, Schmid's group said in a statement.
Under the Affordable Care Act, insurers are required to cover preventive services that are recommended by the task force. The change brings the group more in line with the U.S. Centers for Disease Control and Prevention, which in 2006 recommended HIV testing for everyone between 13 and 64.
The recommendations, which had been expected, are based on the latest evidence showing the benefits of early HIV testing and treatment. Recent studies have shown that HIV treatment can reduce transmission of the virus to an uninfected partner by as much as 96 percent.
"Treatment has two benefits. One is to the person who has HIV, and also treatment helps prevent transmission and protects a person's partner," Owens said.
Dr. Jeffrey Lennox, a professor of medicine at Emory University School of Medicine and chief of infectious disease at Grady Memorial Hospital, an inner-city hospital in Atlanta, said under the current recommendations, many doctors simply fail to offer the tests.
"In our practice, we see patients every week who are newly diagnosed with HIV - people who have seen many physicians in the past 10 years and none of them had ever offered testing," Lennox said.
Many of these patients have far advanced disease, that could have been caught earlier and successfully treated.
Owens said he hopes the change will make it easier for doctors to offer testing.
"You are offering this to adolescents and adults and everyone. The conversation you have with people is likely to be easier," he said.
The draft recommendations are based on a study of the most recent evidence on the risks and benefits of HIV testing published in the Annals of Internal Medicine.
The guidelines will be available for a 30-day public comment period before final recommendations are released, likely some time next year. | <urn:uuid:35ee1a50-e65e-4410-9152-266b58f96e79> | CC-MAIN-2013-20 | http://vitals.nbcnews.com/hiv-testing | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.972158 | 619 | 2.71875 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
Calorie Needs: Calculate Your Basal Metabolic Rate
Your BMR (basal metabolic rate) is the number of calories your body needs each day to simply perform basic functions. From the time you go to sleep one night until you go to sleep the next night, your body is using calories to fuel the body. Nearly 75 percent of the calories you eat each day are used by the body for this purpose.
You expend energy no matter what you're doing -- even when you are sleeping. It takes calories each day to breathe, build new red and white blood cells, build muscle tone, pump blood throughout the body, think, raise or lower your body temperature, and all other basic body functions -- not to mention the calories needed for moving around, working, reading and everything else you do in a day.
If you've noticed that every year, it becomes harder to eat whatever you want and stay slim, you've learned that your BMR decreases as you age. Likewise, depriving yourself of food in hopes of losing weight also decreases your BMR, as your body adjusts how it burns fuel depending upon the amount of fuel it is given.
If you eat more calories than your body metabolism needs, you will gain weight. There are 3,500 calories in every pound of body fat. So, if you eat 500 calories more a day than your body needs, you will gain one pound every week.
Knowing your BMR can help you maintain your weight, because you will know approximately how many calories you need each day to perform basic bodily functions; and help you determine your exercise needs.
Your BMR is influenced by many factors:
Gender -- Men have a greater muscle mass and a lower body fat percentage. This means they have a higher basal metabolic rate
Medications -- Some drugs slow down the BMR dramatically
Genes -- Some people are born with faster metabolisms, some with slower metabolisms; this genetic metabolic fact cannot be changed
Age -- BMR reduces with age. After age 20, it drops about 2 per cent per decade
Exercise -- Physical exercise influences body weight by burning calories, but it also helps raise your BMR by building extra lean tissue (lean tissue is more metabolically demanding than fat tissue), so you burn more calories even when sleeping
Weight -- The more your weight, the higher your BMR; for example: the metabolic rate of obese women is 25 percent higher than the metabolic rate of thin women
Body Surface Area -- The greater your body surface area factor, the higher your BMR, i.e., tall, thin people have higher BMRs
Body Fat Percentage -- The lower your body fat percentage, the higher your BMR; the higher body fat percentage in the male body is one reason why men generally have a 10-15 percent higher BMR than women
Diet -- Starvation, eating disorders or serious abrupt calorie-reduction can dramatically reduce BMR by up to 30 percent; restrictive low-calorie weight loss diets may cause your BMR to drop by as much as 20 percent
Other Factors -- Other factors include: body temperature and health, hormones, external temperature, and glands/ glandular function
A regular routine of cardiovascular exercise can increase your BMR, improving your health and fitness when your body's ability to burn energy gradually slows down.
Calculating Your BMR
Calculate calories for basic needs.
Multiply your weight in pounds by 10 (for women) and 11 (for men).
___ lbs. x 10 = _____ calories for basic needs
Calculate calories for physical activity.
Use the chart below to determine your activity level.
_____calories for basic needs x ___% activity level = ____calories for activity
||Examples of Activities
||Sitting, driving, sleeping, reading, typing
||Light exercise, < 2 hours per day
||Moderate exercise, gardening, dancing, little sitting
||Active in physical sports or labor-intensive job, such as construction worker
Calculate calories for digestion of food.
Add calories for basic needs (#1) and calories for activity level (#2), then multiply by 10%.
(___calories for basic needs + ____calories for activity) x 10% = ___calories for digestion
Calculate total energy needs.
Add calories from each section to get total energy needs.
___calories for basic needs + ___calories for activity +___calories for digestion = ____total energy needs
To lose weight, you need to take in fewer calories than your total energy needs. To gain weight, you need to take in more calories than your total energy needs. | <urn:uuid:e95fee7b-1bed-4ad2-bc09-8994d50b5049> | CC-MAIN-2013-20 | http://www.bjchealth.org/hfyh_wellness.aspx?id=1993 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.906186 | 958 | 3.453125 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
EṣfahānArticle Free Pass
Eṣfahān, also spelled Isfahan, major city of western Iran. Eṣfahān is situated on the north bank of the Zāyandeh River at an elevation of about 5,200 feet (1,600 metres), roughly 210 miles (340 km) south of the capital city of Tehrān. Eṣfahān first thrived under the Seljūq Turks (11th–12th century) and then under the Persian Ṣafavid dynasty (16th–18th century). In addition to being an important regional and provincial capital (of Eṣfahān province), the city is one of the most important architectural centres in the Islamic world. In 1979 Eṣfahān’s Maydān-e Emām (Persian: “Imam’s Square”; formerly Maydān-e Shāh, “Royal Square”) was designated a UNESCO World Heritage site. Pop. (2006) 1,602,110.
What made you want to look up "Esfahan"? Please share what surprised you most... | <urn:uuid:09abce61-2d02-43d0-9c0e-e0f9db9936bc> | CC-MAIN-2013-20 | http://www.britannica.com/EBchecked/topic/192452/Esfahan | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.908024 | 258 | 2.546875 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
Girls learn about fun of science, math and engineering at camp
By Cheryl Cottrill, Executive Director of WiN-Canada
Have you ever mined chocolate chips from a cookie or made a machine from recycled materials that would make flavoured water?
Last week at the Girls in Real Life Science (GIRLS) Camp, 25 girls aged eight to 13 took on the role of scientists and inventors in a number of science- and engineering-based activities. The day camp, run by Camp GEMS (http://www.gemscamp.org) (Girls Engineering Math Science) took the girls though a week-long program incorporating engineering, math and science principles in a hands-on and fun environment. Bruce Power sponsored the camp through the local Women in Nuclear (WiN)-Bruce chapter (www.wincanada.org).
“The girls’ collective intelligence and creativity was absolutely amazing as they brainstormed their way through various projects,” said Bruce Power’s Laurie Glover, a volunteer at the camp. “It was a great experience, watching these young minds solve complex problems together as a team.”
Each day the girls began working on a group project called ‘Rube Goldberg Machine’ to design a machine that could perform an activity. By the end of the week the machines were able to pop balloons, turn on a fan, sharpen a pencil, dunk a ball, pour water into a cup and make flavoured water. All were very ingenious and creative projects!
A little science magic was worked into the morning program so the girls could impress their siblings and parents with disappearing pennies, exploding Mentos and Coke and changing the colour of milk with a Q-tip and soap.
The campers learned everything from chromatography – separating colours from M&M candy – to telling time using homemade sundials, to the economics of mining using chocolate chip cookies, and to designing and building a Popsicle stick house on a budget.
The biggest hit of the week was ‘science tie and dye’ when the girls brought white items of clothing and applied permanent markers and rubbing alcohol to create colourful designs.
Mentors from Bruce Power, Ontario Power Generation and Ian Martin Limited helped out each day, providing the girls with female role models who are successful in science and technology.
Additional information and pictures from the camp may be found on the WiN-Canada website at www.wincanada.org.
A second camp will run July 23-27 at the Whitney Crawford Community Centre in Tiverton. There are currently two spots available. For further information, contact Kate McKenzie at [email protected] or call 519-361-2673 ext 17126. | <urn:uuid:bda758cb-610a-42cc-a9f4-f8bebfd37576> | CC-MAIN-2013-20 | http://www.brucepower.com/6263/community-blog/girls-learn-about-fun-of-science-math-and-engineering-at-camp/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.936962 | 568 | 3.28125 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
Students of Heather Hanson, Class of 2011, thought a recent ABC News story, “A Hidden America: Children of the Plains,” did not give an accurate depiction of the life of Native American children living on reservations.
They wanted to do something to help set the record straight and share the message that “we are more than that.” Heather teaches English and speech at Todd County High School in Mission, S.D., which is located on the Rosebud Reservation. The ABC story hosted by Diane Sawyer depicted how children in the Lakota Sioux tribe on the Pine Ridge Reservation struggle in the face of poverty, alcoholism and related issues.
“I watched the 20/20 special and many of my students did as well,” says Heather. “Then we watched the video in class and had a discussion about ‘single stories’ and what image we want to represent us when we get out into the world outside of the reservation.”
“Many of my students were upset by the ABC story but were not entirely sure how to respond,” she adds. “So, I gave them choices. They could write a letter to Diane Sawyer, make a video, or tell a story about some of the great things that we do here.” They decided to produce a video, which was scripted and filmed entirely by her students. The video can be seen at http://www.youtube.com/watch?v=FhribaNXr7A&feature=share
Heather thinks it is important for her students to present their side of the story, because they have a voice that needs to be heard. “They live here, they know what goes on. This is their hometown and this is their life. Diane Sawyer cannot capture the pride of the Lakota people in 45 minutes and she cannot voice what my students have to offer because one year will never beat a life time of rising above.”
“There are many negative statistics circling the reservations yet there are still people who are proud of who they are and where they are from, which they should be,” says Heather. “The American Indians are a proud people with a strong past that has been stifled by so many people and I personally am tired of people not listening to my students when they say, ‘I am more than that.’ I think they need to let the world know that this is their hometown and though negatives are here, there are negatives everywhere and those negatives do not define who you are. They want to succeed and they need to tell people that.”
“They did a wonderful job with the video and have gained back an enormous sense of pride,” adds Heather. | <urn:uuid:d551b0a5-f7d5-4f55-8e0f-d921a8d1d178> | CC-MAIN-2013-20 | http://www.bvu.edu/about/news/detail.dot?id=6a020af2-254c-4298-9da8-3cb239e45ee2 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.98431 | 566 | 3.046875 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
Cleveland Metroparks is committed to maintaining the health and diversity of the natural resources within the Park District by:
- Appropriately managing native plant and wildlife populations to promote balanced and naturally functioning ecosystems
- Identifying, protecting, and managing endangered species and habitats within the Park District
- Substantially improving water quality within the Park District through monitoring and advocacy of appropriate improvement measures
- Promoting fisheries in appropriate bodies of water within the Park District
Protecting the Resources
Healthy, functioning ecosystems provide services for a healthy, functioning human society. While this statement is clear from the perspective of ecology, it is not always apparent in human-dominated landscapes where issues related to the day-to-day repair and maintenance of our built infrastructure (e.g. water, wastewater, transportation, energy) appear separated from natural ecosystem processes.
Naturally functioning and sustainable ecosystems provide services that support human activities in the region. For example, forests, wetlands, and natural lakes slow storm water runoff and reduce flooding while also providing habitat for native plants, mammals, birds, amphibians, and fish.
Replacing natural infrastructure with human engineered infrastructure requires a large initial development investment and perpetual repair and replacement costs from human society. Protecting, conserving, and restoring natural ecosystem structure and function represent a cost-effective way to maintain and improve the benefits humans derive from the ecosystems they inhabit.
Cleveland Metroparks provides leadership in protecting existing and also additional open space throughout Northeast Ohio with special attention to areas adjacent to existing reservations. Through partnership, cooperative efforts, and the support of other agencies, the Park District aggressively pursues the protection of the remaining major river valleys within the seven counties of the Northeast Ohio region. To this end, the Natural Resource Division assists with the evaluation of tracts of land that are candidates for protection through acquisition, easement, or other means.
The mission of the Natural Resources Division is guided by Cleveland Metroparks primary responsibility for the conservation of natural resources:
The Board of Park Commissioners may acquire lands either within or without the Park District for conversion into forest reserves and for the conservation of the natural resources of the state, including streams, lakes, submerged lands, and swamplands, and to those ends may create parks, parkways, forest reservations, and other reservations and afforest, develop, improve, protect, and promote the use of the same in such a manner as the board deems conducive to the general welfare.
John Mack, Chief of Natural Resources
Jennifer Grieser, Senior Natural Resource Area Manager Urban Watersheds
Robert Golias, Natural Resource Area Manager Central
John Krock, Natural Resource Area Manager West
Ed Kuilder, Natural Resource Area Manager South
Erik Shaffer, Natural Resource Area Manager East
Jennifer Hillmer, Invasive Plant Coordinator
Terry Robison, Manager of Field Research
Mike Durkalec, Aquatic Biologist
Claire Weldon, Aquatic Research Coordinator
Constance Hausman, Plant and Restoration Ecologist
John Reinier, Wetland Ecologist | <urn:uuid:11647bf3-9b26-46c0-8e36-ee612445fff7> | CC-MAIN-2013-20 | http://www.clevelandmetroparks.com/Main/NaturalResources.aspx | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.893687 | 622 | 2.671875 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
(CNN) -- The World Health Organization cautioned that the swine flu outbreak could gain momentum in the months ahead, despite claims by the health secretary of Mexico -- the epicenter of the outbreak -- that the virus "is in its declining phase."
The number of confimed cases of the H1N1 virus continue to multiply.
The outbreak is only about 10 days old, and even if the illness is declining, it could return, said Gregory Hartl, the WHO spokesman for epidemic and pandemic diseases, at a briefing Sunday.
"I ... would like to remind people that in 1918 the Spanish flu showed a surge in the spring, and then disappeared in the summer months, only to return in the autumn of 1918 with a vengeance," Hartl said. "And we know that that eventually killed 40 million to 50 million people."
Mexican authorities believe the virus's most active period in Mexico was between April 23 and April 28, and Mexican Health Secretary Jose Cordova described the outbreak as being in decline in his country.
As of late Sunday, Mexican health officials reported 568 cases and 22 fatalities linked to the flu. WHO says it has confirmed 506 cases and 19 deaths in Mexico.
The world has 898 confirmed cases of the virus, known to scientists H1N1 virus, in a total of 18 countries, WHO said Sunday.
The United States has reported 226 confirmed cases in 30 states. The U.S. cases include one death -- a Mexican toddler visiting relatives in the United States.
According to WHO, Canada has 70 confirmed cases; the United Kingdom has 15; Spain has 13; Germany has 6; New Zealand has 4; Israel has 3; France has 2; and Austria, China, South Korea, Denmark, Netherlands, Switzerland, Costa Rica and Ireland each have one.
In China, officials have quarantined 68 people, including 13 crew members, who were passengers of a Mexico City to Shanghai flight, which carried a passenger who tested positive for the virus, China's state-run Xinhua news agency reported Sunday. None of the other passengers has exhibited any flu-like symptoms, one health official said.
About another 110 people who were on the Aeromexico plane went on to other destinations, and may face quarantines elsewhere, the news agency said. Fifteen have been quarantined at a Beijing hotel.
Shanghai's airport is now barring other Aeromexico planes from landing there, a representative of the airline told CNN. Aeromexico is suspending flights to Shanghai until May 15, the representative said. The airline does not fly to Hong Kong or Beijing.
In the United States, New York has the most confirmed cases, with 63, according to the Centers for Disease Control and Prevention. Texas has 40; California has 26; Arizona 18; South Carolina 15; Delaware 10; Massachusetts and New Jersey each have seven; Colorado has four; Florida, Illinois, Indiana, Ohio, Virginia, Wisconsin each have three; Connecticut, Kansas and Michigan each have two; Alabama, Iowa, Kentucky, Minnesota, Missouri, Nebraska, Nevada, New Hampshire, New Mexico, Rhode Island, Tennessee and Utah each have one.
California officials suspended visitation and other "nonessential activities" at Centinela State Prison in Imperial County after an inmate was suspected of having swine flu. The case has yet to be confirmed with lab testing.
On Sunday, health officials in North Carolina and Pennsylvania announced the first confirmed cases in those states, and Louisiana's governor said his state had seven confirmed cases. The cases from those three states were not immediately included in the CDC tally.
In Washington, U.S. Secretary of Health Kathleen Sebelius, appearing on CNN's "State of the Union," warned that even if the flu outbreak wanes, "it could come back with greater force in the winter and fall, when we get into flu season."
"So, this is no time for complacency," she said. "We want to stay out ahead of this."
Dr. Anne Schuchat, the CDC's interim deputy director for public health, told reporters Sunday that she was "heartened" by Mexican authorities' reports but still is "very cautious."
"I know that influenza can be surprising, and the time course here in the United States is later. We believe we're just on the upswing here, and in several parts of Mexico, cases began quite a while ago," Schuchat said.
"From what I know about influenza, I do expect more cases, more severe cases and I do expect more deaths," she added. "And I'm particularly concerned about what will happen in the fall."
Acting CDC Director Richard Besser, also speaking on "State of the Union," said U.S. health officials are examining whether people who received flu shots for the swine flu in 1976 may have some level of protection from the current swine flu.
"That's going to play in very, very big as we move forward with our plans around vaccines, because that may help guide some of the issues around who is most at risk at getting this in the future," Besser said.
Offering a general picture of the state of U.S. efforts to combat the virus, Besser said "there are encouraging signs."
"We're not out of the woods yet," he said. "But what we've learned about the virus itself -- it doesn't contain the factors that we know are seen in much more severe flu strains."
While the new virus strain in the recent outbreak has affected humans, Canadian officials said it has shown up at a pig farm in Alberta, Canada.
Officials said the pigs may have been infected by a Canadian farmer who recently returned from a trip to Mexico, the epicenter of the outbreak. The pigs have since been quarantined.
"We have determined that the virus H1N1, found in these pigs, is the virus which is being tracked in the human population," said Dr. Brian Evans of the Canadian Food Inspection Agency. iReport.com: How should H1N1 be handled?
Evans and other officials said it is not uncommon for flu viruses to jump from humans to animals, and that it does not pose a risk for consuming pork. The number of pigs infected was not disclosed.
The infected farmer had flu-like symptoms, but he is recovering, Evans said. Learn about the virus »
|Most Viewed||Most Emailed||Top Searches| | <urn:uuid:f9fb107d-88dc-4f58-80d1-e3c38221f5fb> | CC-MAIN-2013-20 | http://www.cnn.com/2009/HEALTH/05/03/swine.flu/index.html?iref=mpstoryview | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.97576 | 1,336 | 2.515625 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
- Study at Deakin
- Campus life
- Industry and community
- About Deakin
1 June 2009
With one of the world’s largest populations of consumers, mainland China is a potentially lucrative market for many advertisers, but to successfully communicate their message to Chinese consumers advertisers need a visual strategy that does more than simply ‘stick a dragon on the box’ according to Deakin University lecturer in graphic design Dr Lisa Scharoun.
“Chinese consumers are open to western products and ideas, but if the wrong approach is used it can lead the audience to misinterpret the visual message and be highly offended as a result,” she said.
From 2003 to 2005, Dr Scharoun was a lecturer at the Raffles Design Institute in Shanghai and she said it was during this time she became particularly interested in the advertising western companies used in China.
“Living there I realised how completely at odds western style advertising was with Chinese culture.”
In her recent paper Made for China: Global Collaboration and Understanding in Advertising Design, Dr Scharoun refers to a number of examples where the misuse of culturally significant symbols in advertising offended Chinese consumers – for instance dragons portrayed as sinister, frightening creatures.
“The western interpretation of a dragon as an ‘evil demon’ doesn’t work in China because, while dragons are highly significant to the Chinese and are seen as possessing great power, they are considered to be good-natured. It’s a bit like presenting a kangaroo as an evil protagonist to an Australian audience,” Dr Scharoun said. Even the appropriateness of the research methods themselves need to be evaluated.
“Often an advertising agency or a company will take a strategy that works well in the west and try and use it in China without researching whether it is suitable for that market.
“Generally in the west, we have an individual mindset whereas in mainland China there is more of a collective mindset. For instance, if you were to run a focus group in mainland China, participants are less likely to express their own feelings and more likely to look to the group’s leader for their response,” Dr Scharoun said.
Understanding the Chinese market not only has implications for advertisers and their agencies, Dr Scharoun says, but also for the teachers of design.
“It’s very important that design students are given the opportunity to gain an understanding of the complexities surrounding advertising in China.” Dr Scharoun believes cross-cultural collaboration at the undergraduate level could be one of the ways to overcome this type of cultural misunderstanding.
“Global Design Strategies: China is a proposed 12-week course for Deakin University graphic design students providing an in-depth exploration of Chinese culture, history and design,” Dr Scharoun said.
As part of the course, it is planned for Deakin students to be paired with ‘design mentors’ from DongHua University in Shanghai, collaborations Dr Scharoun says she hopes will be ongoing.
“Hopefully through these collaborations students will form relationships they can take forward into their careers. Then when they are presented with a brief for developing advertising for China they can draw on the contacts they made through the course and on the knowledge they gained to develop work that is culturally sensitive and not just stick a dragon on the box.”
Deakin Media Relations
03 5227 71301 or 0488 292 644 | <urn:uuid:349cfa74-9946-44d7-a052-556d2f6b85b6> | CC-MAIN-2013-20 | http://www.deakin.edu.au/news/2009/010609china.php | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.950087 | 715 | 2.59375 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
If gas prices reached $5, $6, or even $7 a gallon, would you respond by purchasing a hybrid? How about an electric car? Some consumers are already contemplating their responses to those questions. And the news is that alternative fuel vehicles have apparently begun creeping into the mainstream consciousness.
A Consumer Reports survey conducted this year proves that. The magazine didn't query its respondents about what they would do if gas prices skyrocketed. It merely asked what they would look for in their next vehicle. The responses showed that they are concerned about the future of gasoline-burning cars.
GM's Chevy Volt: Are more consumers willing to switch to alternative powertrains?
(Source: General Motors)
Thirty-seven percent of the survey respondents told Consumer Reports that fuel economy was their most important consideration -- more important than quality, safety, value, performance, styling, or technological innovation. The majority of those surveyed said they expect to get better fuel economy from a gasoline-burning engine. Many expressed a desire to buy a smaller car.
But almost three-quarters of the respondents said they're ready to consider an alternative powertrain, and that's where the results got interesting. Among those, the most popular alternative choice was electric/hybrid at 43 percent, followed closely by flex fuel engines (which can run on E85) at 42 percent. Other alternatives cited by respondents included natural gas (21 percent), hydrogen fuel cells (18 percent), and diesel engines (15 percent). Up until now, consumers haven't shown much interest in plug-in hybrids and pure electric cars. GM sold just 1,462 Volts in April, and Nissan sold just 370 Leafs.
Clearly, though, survey respondents were open to the idea of new powertrain technologies. Among those willing to consider a hybrid/electric car, 58 percent expressed interest in a conventional hydrid powertrain (like that of the Prius). Twenty-one percent said they'd consider a plug-in hybrid, and 13 percent were willing to look at a pure electric car.
The bottom line is that many consumers have apparently reached a tipping point. About 80 percent of them said they support the idea of a government-mandated fuel standard of 55mpg, and an equal percentage said they would be willing to pay extra for a fuel-efficient vehicle if they could recoup that investment through lower operating costs. That's significantly different from what we're seeing in the marketplace. Hybrids are hovering at around 3 percent of new vehicle sales, and pure electrics comprise such a small category that it's almost immeasurable.
But if there's a takeaway from the Consumer Reports survey, it's that some consumers are already considering a plan of action if gas prices climb too high. They may not fully understand the available choices, but they're beginning to think an alternative powertrain isn't such a bad idea, after all.
Do you agree with the survey respondents? If gas prices reached $6 or $7 per gallon, what kind of powertrain would you consider? Tell us in the comments section below. | <urn:uuid:93a8078c-1802-4558-88ee-78924c2d417c> | CC-MAIN-2013-20 | http://www.designnews.com/author.asp?section_id=1366&doc_id=244669&piddl_msgid=726401 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.962668 | 624 | 2.546875 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
Response to Intervention (RTI)
The purpose is to provide support, guidance and technical assistance for intervention systems in districts and schools. Response to Intervention (RTI) is a multi-tier approach to the early identification and support of students with learning and behavior needs. The RTI process begins with high-quality instruction and universal screening of all children in the general education classroom. Struggling learners are provided with interventions at increasing levels of intensity to accelerate their rate of learning. These services may be provided by a variety of personnel, including general education teachers, special educators, and specialists. Progress is closely monitored to assess both the learning rate and level of performance of individual students. Educational decisions about the intensity and duration of interventions are based on individual student response to instruction. RTI is designed for use when making decisions in both general education and special education, creating a well-integrated system of instruction and intervention guided by child outcome data. | <urn:uuid:a759308c-0615-4435-98e7-66601feee99e> | CC-MAIN-2013-20 | http://www.doe.nv.gov/Response_Instruction/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.94775 | 188 | 3.40625 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
Organic EDEN Wild Blueberries are from low-bush wild blueberry fields called 'barrens' in northern Québec that have been organically managed since 1996. Formerly heavily forested, just a few years after logging they became filled with native wild low-bush blueberries. Blueberries are handpicked in August, washed, cleaned, sorted, and quick frozen. Later they are thawed and infused with organic apple juice concentrate to a targeted sweetness or 'Brix'. Infused blueberries are rinsed, slowly dried, and misted with organic sunflower oil to prevent clumping. They require no refrigeration.
Wild blueberries have been gathered from fields and forests by Americans for at least centuries, used in stews, soups, cooked with corn, sweetened with maple syrup or honey, and worked into jerky. The blossom or calyx of each berry forms a five pointed star. Native Americans called it 'star berry', and elders told stories of the Great Spirit bringing star berries to comfort children. Blueberry juice was used to ease "old coughs," and to dye rugs, blankets, and clothing. They made smoked berries, sun-dried berries, and blueberry powder to add to their meats and other dishes. Leaves and roots where used to make tea. Native Americans taught Pilgrims how to grow, store, and use native plants. Wild berries were important food of early settlers.
There are more than 450 plants in the blueberry family Vaccinium, but just a few are native to North America: the wild low-bush sweet blueberry Vaccinium angustifolium; two high-bush varieties now used to cultivate blueberries Vaccinium corymbosum and Vaccinium ashei; and the sour New England variety Vaccinium myrtilloides. The wild low-bush blueberry is native to northeastern North America growing from Minnesota to Maine, and from southern Canada to as far north as the Arctic. It grows in cooler regions producing small blueberries on a dwarf plant 1 to 2 feet high. Cultivated blueberries are a much taller bush grown in many areas and are planted like an orchard. Wild blueberry plants are not planted. They develop from native stands and their habitat is simply protected.
Although both types of blueberries contain antioxidants, it is the wild, low-bush blueberry that is far higher in antioxidant activity. USDA uses a system called Oxygen Radical Absorbance Capacity (ORAC). By testing the ability of foods and other compounds to subdue oxygen free radicals, USDA determines antioxidant capability. The ORAC value of wild blueberries is 2,400. The highest of the 20 common fruits tested.
Unlike commercial dried fruit, organic EDEN Wild Blueberries contain no added refined sugar or high fructose corn syrup. They are free of sulfites, chemical preservatives, or any other additives.
Organic EDEN Wild Blueberries are a healthy snack food great for lunches, camping, and hiking, or just a real good snack anytime. There's no limiting them to a snack though. Use them in hot or cold cereals, cakes, scones and muffins, in pie fillings and puddings, and in grain and bread stuffing. Sprinkle them on salads. They're great in granola, muesli, granola bars, popcorn balls, and caramel corn. | <urn:uuid:cd58fe77-27f7-47ad-80e6-51fdc9c3f2c5> | CC-MAIN-2013-20 | http://www.edenfoods.com/store/product_details.php?cPath=75_98&products_id=403288&eID=42ac641909f4e7c4d2c582280d0bc263 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.947445 | 697 | 2.9375 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
Wednesday May 22, 2013
Library Hours: 7:30am to 10:00pm
Eastern Michigan University Library
Why use scholarly sources?
Because of the level of authority and credibility evident in scholarly sources they contribute a great deal to the overall quality of your papers. Use of scholarly sources is an expected attribute of academic course work.
In all disciplines, knowledge is built by responding to the ideas and discoveries of those who came before us. Scholarly journal articles are unique in that they require authors to document and make verifiable the sources of the facts, ideas, and methods they used to arrive at their insights and conclusions. Scholarly articles also strive to identify and discuss the merits of alternative explanations and viewpoints for the positions they espouse. This makes it easier to assess the truth, as well as the strengths and weaknesses, of the claims made in a paper. This is the case for those with knowledge of a subject (for example, your professor), as well as for those just beginning to learn about a subject (for example, you).
As you know, anyone can say just about anything in articles posted on the web. While you might agree with the conclusions of a paper found on the web, you are often not given the chain of evidence you need to assess the truth of those conclusions. Likewise, articles published in popular magazines, while they provide information and opinions, are not required to document evidence that either supports or negates their conclusions. Scholarly journal articles, unlike web-based or popular magazine articles, are designed and structured to provide the elements necessary to most thoroughly evaluate the validity and truth of an author's position. | <urn:uuid:e0b45a9f-e399-4a66-8e9a-caf4c35e935c> | CC-MAIN-2013-20 | http://www.emich.edu/library/help/scholarly.php | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.956774 | 330 | 3 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
Learn the ins and outs of an Individualized Education Program (IEP).
A grrateful Jacob Landers tells how his mother's support and advocacy on his behalf led him out of struggles with school and substance abuse.
New federal initiatives aim to improve early reading instruction in schools across the country.
If your child has an IEP, you should understand the legal provisions for disciplining him at school.
The key to performing well on tests is preparation - weeks, not hours, in advance. Learn to take good class notes, read to comprehend, and plan a test review schedule.
Get the information that drives school decisions about your child. Find out how to obtain your own copies of your child's school records.
Expert advice for parents on starting early to help kids with learning disabilities prepare for success in the workplace.
Sometimes your child doesn't pay attention or follow directions, but is it AD/HD? A guide to diagnosing and dealing with this disorder.
Researchers analyzed thousands of email exchanges between kids to get the insider view of life with a learning disability.
Expert strategies for working with your child's teacher on an effective classroom plan. | <urn:uuid:2161dad7-35cf-4ea2-b9fb-01691465a2e7> | CC-MAIN-2013-20 | http://www.greatschools.org/articles/?p=7&topics=225 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.954196 | 237 | 3.125 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
Learning standards describe what students should learn at each grade in a particular subject. State standards are created by the state's department of education.
Show me standards for a different state
Learn more: Why are standards important?
National standards are created by national education organizations. They are voluntary, and students are not held accountable to them. Some states use them as guidelines for creating their own state standards or simply adopt them. | <urn:uuid:5e21667d-a603-418e-8f16-d32ea8faf99a> | CC-MAIN-2013-20 | http://www.greatschools.org/content/stateStandards.page?state=OK | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.973099 | 84 | 3.796875 | 4 | HuggingFaceFW/fineweb-edu/sample-100BT |
Pythons are thought to be slithering around southern Florida like crazy but so far a contest to catch them has produced a paltry 21 of the invasive snakes.
The first week of the state's 2013 Python Challenge ended Friday with fewer than two dozen Burmese pythons received by the University of Florida even though 777 people signed up.
Wildlife experts say Burmese pythons are a threat to the Everglades ecosystem and are looking to whittle down their population, thought to number in the thousands on state lands alone.
Burmese pythons, native to Asia, are constrictors that can grow to 26 feet long and are known to be voracious predators of mammals, birds and reptiles. That diet makes it hard on the state's native predators such as foxes and bobcats.
The non-venomous Burmese pythons have been reported in extreme south Florida since the 1980s, and now are established mainly within the bounds of Everglades National Park.
The python-catching event runs through Feb. 10. The person who kills the most Burmese pythons by that date will receive a check for $1,500.
Most Popular Stories
- SEO Traffic Lab Celebrate Wins at Digital Marketing Event 'Internet World 2013' in London
- Social Media Initiatives Should Follow Customers' Lead
- Apple CEO: Offshore Units Not a 'Tax Gimmick'
- U.S. Senate Accuses Apple of Large-scale Tax Avoidance
- UTEP Water Recycling Project Wins Venture Titles
- Marketo Makes a Mint in IPO: Stock Shoots Up More than 50 Percent
- Bieber Booed at Billboard Awards
- Crude Oil Up, Gasoline Down
- Austin Startup Compare Metrics Raises $3.5 Million for Expansion
- Why So Many Top 'Car Guys' Are Actually Women | <urn:uuid:a977461e-8be4-451a-944b-6bb923f96bee> | CC-MAIN-2013-20 | http://www.hispanicbusiness.com/2013/1/21/python_challenge_yields_only_21_serpents.htm | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.919123 | 392 | 2.96875 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
The Impact of Evolution on the Humanities and Science
by John N. Moore, M.S., Ed.D.
The novels of Jack London, the plays of George Bernard Shaw, and even the poetry of Alfred Tennyson contain a seemingly convincing basis for belief in the "evolution" of humankind.1 Tennyson had expressed an evolutionary viewpoint actually some time before Darwin's book appeared in 1859. But the writings of these "greats" of literature, and authors of other belles lettres as well, were strongly instrumental in adding to the impact of Darwin's second book, The Descent of Man, in converting nineteenth century intellectuals to acceptance of the concept of the so-called evolution of human beings.
Actually both London and Shaw were English socialists and followers of the thinking of the Fabian Society, which came into existence due to the work and effort of Beatrice and Sidney Webb, who in turn were followers in England of Karl Marx. Thus the "web" of selected indoctrination and inter-relationship of propagandists for an evolutionary viewpoint or world outlook can be extended. And both London and Shaw used their literary works to present Marxian socialistic views as most plausible and to illustrate the struggle for existence concept. London especially popularized the "red tooth and claw" phrase through the struggles he wrote about in White Fang and The Call of the Wild. The latter book has been repopularized by way of television dramatization in the late 1970's. Continued use of evolutionary thinking by novelists can be shown in the works of Veblen, Norris, Dreiser and Michener, whose Centennial is a par excellence example of misapplication of "historical" geology in early chapters.
In philosophy the impact of evolutionary thought can be traced through the increasingly broad application of criticism of nineteenth century classification systems involving archetypes as possible created kinds of plants or animals. According to the evolutionist's position there has been a slow, gradual change between organisms as one kind supposedly had joint ancestry with another kind and all present kinds that are known today gradually came into existence over a great expanse of time.
As if that position were grounded in proper, orderly science, philosophers have mistakenly accepted that viewpoint and used it as a basis for their attitude that categories cannot be clearly defined and that absolutes are not identifiable, that is, all things are relative. Hence confusion has been introduced into logic as basic Aristotelian principles of thinking have been challenged by systems of multivalued logic. Further confusion has been fostered in ethics and aesthetics also by acceptance of evolutionary thinking in philosophy. Mention must be made especially of the importance of the writings of John Dewey, who fully accepted evolutionary thinking, because his views2 were very influential in development of the "new" philosophy of the twentieth century that has strongly contributed to the despair of existentialism, the New Consciousness, and "openness" to mysticisms of Eastern religions.3
By tracing acceptance of the concept of inheritance of acquired characteristics by Sigmund Freud, a good beginning is made toward showing the impact of evolutionary thinking in psychology and psychiatry. In the late edition of his book, The Origin of Species, Darwin utilized the concept of inheritance of acquired characteristics fostered by Lamarck, who believed that characteristics acquired during the lifetime of an individual were transmitted somehow to offspring. Though this idea is now fully discredited and completely rejected by leading biologists and geneticists, when Freud accepted the idea, he gave significant impetus to the environmentalist inclination so prominent in psychology. According to environmentalists, an individual's behavior is the consequence of the environment in which growth and development have occurred. Today, B. F. Skinner, and also Robert Ardrey, Konrad Lorenz, and Desmond Morris, reflect broad acceptance of the environmentalist approach which is based upon the unscientific idea of an evolutionary origin of humankind.4
In the multiple sub-fields of the scientific discipline the impact of evolutionary thought has been almost complete. The influential writings of such leaders as the late Julian Huxley, Theodosius Dobzhansky, and Pierre Teilhard de Chardin in support of the infusion of evolutionary thinking into all facets of biology and associated sciences still have great impact in the training programs of young scientists and in the mass communications media as well. In addition to their influence, G.G. Simpson still serves as a strong guide to almost ubiquitous application of evolutionary thought.
However, weaknesses and deficiencies in Darwinism, Neo-Darwinism, and even the modern synthetic "theory" of evolution have been published by scientists5 in every decade since The Origin of Species was published in 1859. Yet such criticisms have not been included to any significant extent in science textbooks. Actually specific impetus inaugurated in the 1960's to expand and augment the teaching of evolutionary origins in the secondary schools in the United States has really been an important cause in the 1970's for the development of creationism teaching, that is, explanation of the scientific basis or support of the creation account of origins.6
The "prime mover" of modern education, John Dewey, showed a broad acceptance of Darwinism in his extensive writings. He viewed the human being as an "evolved" creature that was slowly improving physically and mentally. According to Dewey, the environment in which schooling occurred was most important. Because Dewey stressed an evolutionary outlook in many if not all of his books, and since several generations of educators have followed Dewey's thinking in one form or another, environmentalism has become a strong viewpoint in the development of educational principles and policies in the public schools in the United States. The human being has been treated as an intelligent animal developing as a consequence of interaction with the environment, as a "survivor" by use of its wits.7
Finally, even the modern-day study of theology has been largely controlled by evolutionary ideas. Wherever acceptance of the Graff-Wellhausen "hypothesis" regarding criticism of Biblical texts can be shown, then evidence is gained for broad impact of evolutionary thinking. According to that view the Bible content has "evolved." A most influential spokesman for the view of "evolution" of the Bible was Harry Emerson Fosdick.8 He wrote extensively on the theme that man's worship of God "evolved" from the worship of a sun god and moon god, to a mountain god and river god, to a crop god, to a tribal god, to an Omnipotent God. Actually polytheistic worship has been a degenerate derivation of ancient, initial monotheism in all groups of peoples on the earth as can be shown by reference to outstanding present-day scholarships.9 The whole position of higher criticism and form criticism of the twentieth century is rooted in an evolutionary viewpoint.
1 Conner, Frederick W., 1949, Cosmic Optimism (A Study of the Interpretation of Evolution by American Poets from Emerson to Robinson), Gainesville, Florida: University of Florida Press; Leo J. Henkin 1940. Darwinism in the English Novel. N.Y.: Corporate Press, Inc.; Bert J. Loewenberg 1964. Darwinism: Reaction or Reform? N.Y.: Holt, Rinehart and Winston; Stow Parsons (Editor) 1956. Evolutionary Thought in America, N.Y.: George Braziller, Inc.; Georg Roppen 1956. Evolution and Poetic Belief. Oslo, Norway: Oslo University Press; Lionel Stevenson 1963. Darwin Among the Poets. N.Y.: Russell and Russell. See also Zirkle, Conway 1959. Evolution, Marxian Biology and the Social Scene. Philadelphia: University of Pennsylvania Press, especially Chapter 10, "Marxian Biology in the Communist World."
2 See various Dewey books such as Reconstruction in Philosophy (1920) and The Quest for Certainty (1929).
3 Schaeffer, Francis A. 1968. Escape from Reason. Chicago: Inter-Varsity Press; and James W. Sire 1976. The Universe Next Door (A Basic World View Catalog). Downers Grove, Illinois: Inter-Varsity Press.
4 Skinner, B.F. 1971. Beyond Freedom and Dignity. Toronto, N.Y. Bantam Books, N.Y.: Vintage Books; Robert Ardrey 1970. The Social Contract. N.Y.: Atheneum and African Genesis.1962. N.Y.: Atheneum; Konrad Lorenz 1966. On Aggression. N.Y.: Harcourt, Brace and World; Desmond Morris 1967. The Naked Ape. London: Cape. See Francis A. Schaeffer 1972. Back to Freedom and Dignity. Downers Grove, Illinois: InterVarsity Press in which he responds to the Skinner Book as well as to Jacques Monod's 1971 Chance and Necessity. N.Y.: Knopt and to Francis Crick's 1966 Of Molecules and Men. Seattle: University of Washington Press.
5 An accumulative computerized bibliographic compilation is available for one dollar upon request to Dr. Moore. These materials were gathered while using six research grants from Michigan State University over twelve years under the title, "Library Search for Representative Statements by Scientists on Organic Evolution, Natural Selection, and Related Topics since 1859."
6 Books published by Creation-Life Publishers, such as Origins: Two Models by Richard Bliss; Streams of Civilization, Vol. One. Ancient History to 1572 A.D. by Albert Hymn and Mary Stanton; Scientific Creationism by Henry M. Morris, Editor; or Biology: A Search for Order in Complexity Edited by John N. Moore and Harold S. Slusher. 1974. Grand Rapids, Michigan: Zondervan Publishing House.
7 White Morton. 1943. The Origins of Dewey's Instrumentalism. N.Y.: Columbia University Press. Among many books by John Dewey see his Essays in Experimental Logic (Chicago: University of Chicago Press, 1916) and Logic: The Theory of Inquiry (N.Y.: Henry Holt & Co., 1938). See also Zirkle, Op. Cit., Reference 1.
8 McDowell, Josh. 1972. Evidence That Demands A Verdict (Historical Evidence for the Christian Faith). San Bernardino: Campus Crusade for Christ, International. Also excellent on the Graff-Wellhausen thesis is Oswald T. Allis, 1943. The Five Books of Moses. Philadelphia: Presbyterian and Reformed Publishing Company; and Clifford Wilson, 1977. Ebla Tablets: Secrets of a Forbidden City. San Diego: Master Books. | <urn:uuid:87ae2471-0ceb-48f3-8fed-4966889bfb04> | CC-MAIN-2013-20 | http://www.icr.org/articles/view/135/316/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.933231 | 2,162 | 3.1875 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
.: My Research
The universe entered a dark age 300,000 years after the big bang as the primordial radiation cooled and shifted into the infrared. Darkness remained until the first non-linearities developed, eventually evolving into the galaxies that illuminate the universe today. To understand how the galaxies in the early universe evolved into those that we see locally requires an understanding of the chemical and star formation history of galaxies. I study how the amount of metals and star formation changes in galaxies over cosmic time using spectroscopy from the optical and near-infrared spectrographs on the Keck and Subaru telescopes on Mauna Kea. I compare the observed star formation and chemical properties of galaxies with detailed theoretical models including stellar evolution synthesis models and detailed photoionization models.
Web site contents © Copyright Lisa Kewley 2006, All rights reserved. | <urn:uuid:bd9a13c3-1332-426e-9f03-aae118bb8d44> | CC-MAIN-2013-20 | http://www.ifa.hawaii.edu/~kewley/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.861471 | 169 | 2.75 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
What is a pediatrician and who do they treat?
Pediatricians diagnose and treat a wide range of illnesses or injuries in children who range from newborns to young adults up to 21. Pediatricians -- also called pediatric doctors -- manage the prevention, early detection, and treatment of various conditions, including congenital defects, developmental disorders, behavioral issues, eating disorders (anorexia and bulimia), and familial and social stresses (including child abuse), as well as depression and anxiety disorders. They also oversee the general health of their patients by administering physical examinations and immunization shots
Pediatric doctors may also collaborate with other medical specialists and healthcare professionals to provide for the health and emotional needs of children. They may also specialize in fields such as adolescent medicine, pediatric cardiology, pediatric endocrinology (treating diseases such as diabetes), pediatric oncology (treating cancer in children), neonatal/perinatal medicine, and orthopedics (treating disorders of the musculoskeletal system), among other specialties.
Following graduation from medical school, pediatric doctors complete three years of education in an accredited pediatric residency program. A pediatric doctor is then eligible for board certification by the American Board of Pediatrics, and recertification is required every seven years.
When would I take my child to see a pediatrician, and what conditions does a pediatrician treat?
You will need to visit your pediatric doctor right after your baby is born to make sure your new child is healthy and growing properly. During this examination, the doctor will weigh and measure the baby, give appropriate immunization shots, explain the proper care of your baby (including care of the umbilical cord and, if applicable, circumcision), make sure the baby is feeding properly (breastfeeding or bottle-feeding), and address any concerns you may have. Your pediatrician may visit the hospital to examine your baby for the first time a day or two after he or she is born. Otherwise, you should schedule your first appointment within the first few days after you take your child home from the hospital.
In the first two years of your child’s life, you can expect a minimum of eight visits to the pediatrician: a one-month check-up, two-month check-up, four-month check-up, six-month, nine-month, one-year, 15-month, 18-month, and two-year check-up. During these visits, your child will be measured and weighed, receive a physical examination and health assessment, and receive all required immunization shots.
After age two, your child will visit the pediatrician annually for a physical examination until age 21. During these examinations, your child will also be measured and weighed, examined for overall health, and given any immunization shots to attend school, if required. You should also visit your pediatrician when your child is sick or injured, exhibits symptoms of a sleep disorder or behavioral problem (bed-wetting, depression, or hyperactivity), or needs a physical examination and health assessment to participate in sports.
Common conditions a pediatric doctor will treat include colic and failure to thrive
, attention deficit disorder
or attention deficit hyperactivity disorder (ADD/ADHD), vomiting and diarrhea, sleep issues
, poisoning and other conditions. Pediatricians may also answer any questions you have regarding your child’s development, including how to handle a bully, the proper way to discipline a child, and the effects of TV and video games on children.
Kids with stubborn asthma may have food allergy
10 Ways You’re Making Your Child Fat | <urn:uuid:e7f66433-51b6-4936-8929-bfaa738f03ff> | CC-MAIN-2013-20 | http://www.lifescript.com/Doctor-directory/genetics-specialist/park-ridge-illinois-il-debra-ann-rita-md.aspx | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.945665 | 738 | 3.109375 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
a combination of one or more elementary reaction steps which start with the appropriate reactants and end with the appropriate product(s)
a description of the path, or sequence of steps, by which a reaction occurs
a description of the path that a reaction takes
a detailed description of how a chemical reaction occurs
a detailed description of the way a reaction occurs and is based on the known experimental data about the reaction
a detailed (theoretical) description of how we think the chemical reaction proceeds
a series of elementary reactions or elementary steps that lead from reactants to products
a set of steps at the molecular level
a step by step description of the separate steps that occur during a chemical reaction
a stepwise description of the reaction path
mechanism. A list of all elementary reactions that occur in the course of an overall chemical reaction.
In chemistry, a reaction mechanism is the step by step sequence of elementary reactions by which overall chemical change occurs. | <urn:uuid:7ae3a60b-341f-4a49-8f9d-b5b4588f2f8d> | CC-MAIN-2013-20 | http://www.metaglossary.com/meanings/3337605/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.941426 | 195 | 3.671875 | 4 | HuggingFaceFW/fineweb-edu/sample-100BT |
Medicinal Mushrooms and Cancer
Mushrooms are not just a tasty addition to a salad or casserole. They are much, much more. Most, of an estimated 38,000 species of mushrooms, provide a wealth of protein, fiber, B vitamins, and vitamin C, as well as calcium and other minerals. At least three of these species have demonstrated phenomenal healing potential: maitake, shiitake, and reishi. These medicinal mushrooms have been shown to lower the risk of cancer; promote immune function; ward off viruses, bacteria, and fungi; boost heart health; reduce inflammation; combat allergies; help balance blood sugar levels; and support the body’s detoxification mechanisms.
Medicinal mushrooms have several overlapping properties: all support cardiovascular health, all boost immune function, and all show promise in lowering the risk of, or treating, cancer. Maitake is specifically recommended for stomach and intestines, as well as blood sugar levels; shiitake helps with nutritional deficiencies and liver ailments, while reishi promotes respiratory health and spirituality.
Many of the medicinal mushrooms, including chaga mushroom, maitake mushroom, ganoderma (also known as gano) mushroom, and cordyceps mushroom, contain cancer-preventive and cancer-fighting actions. Along with research on polysaccharides with beta 1,3 glucan linkages, other mushroom extracts have been shown to have clinical effectiveness against human cancers, these being D-fraction extracted from the Maitake mushroom, and extracts from the split gill, turkey tail and Reishi mushrooms.
Medicinal mushrooms are sources of antitumor and immunity-modulating polysaccharides (a type of carbohydrate) that have been extensively researched. Cancer patients may also wish to investigate medicinal mushrooms (such types as reishi, shiitake, cordyceps, maitake, agaracus, and coriolus) as immune-boosting companions to chemotherapy.
Shiitake, as with many of the medicinal mushrooms, has been shown to be of benefit as an adjuvant cancer therapy. It has been shown to improve specific immune markers (including natural killer cells, tumor necrosis factor, T-helper cells, and a variety of interleukins), and patient outcomes.
Reishi can be used to treat cancer patients due to its ability to activate NK cells, macrophages, T-lymphocytes, and cytokines, all important immune system components. Kee Chang Huang reports that reishi “exerts a synergistic effect with other anticancer chemothera-peutic agents or radiotherapy, to augment the clinical therapeutic effect in the treatment of cancer patients.” | <urn:uuid:d4cdeec3-48c7-418e-b1ab-a98a832cf7c7> | CC-MAIN-2013-20 | http://www.mushroomcoffeecanada.com/medicinal-mushrooms-cancer/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.920223 | 560 | 2.96875 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
Relationships by their nature promote natural health-
it is considered that every positive relationship enhances a happy
and healthy lifestyle.
Welcome to Relationships
at Natural Earth
We all relate. We cannot be "out" of a relationship-
even with a person we 'hate'. The act or thought of hating is a
process of relating.
of a relationship.
a) Uncertainty reduction - through eye contact, identification,
opening disclosure, etc.
b) Perceptual - notice how a person looks at the other and their
c) Interactional cues - nodding, maintaining eye contact, etc.
d) Invitational - encouraging the relationship (e.g. asking if they
want to meet up later for coffee)
e) Avoidance strategies - if one person discloses and the other
does not, minimal response, lack of eye contact, etc.
a) Feelers - hints or questions (ex. asking about family)
b) Intensifying strategies - further the relationship (ex. meeting
old friend, bringing the other to meet family, becoming more affectionate,
c) Public - seen in public together often (ex. if in a romantic
relationship, may be holding hands)
3) Intimacy -very close, may have exchanged some sort of personal
belonging or something that represents further commitment. (ex.
may be a promise ring in a romantic relationship or a friendship
necklace symbolizing two people are best friends)
4) Deterioration - things start to fall apart. In a romantic relationship,
after six months, people are out of what is sometimes referred to
as the "honeymoon stage" and start to notice flaws. The
way this is dealt with determines the fate of the relationship.
love can be returned or unrequited. In the former case, the mutual
expressions of love can lead to marriage or to the establishment
of a permanent relationship, which in most cases will include passionate
sexual love. Where the love is one-sided (unrequited), the result
can be damaging to the esteem and/or the psychological welfare of
the spurned lover.
One aspect of romantic love is the randomness of the encounters
which lead to love. It may be for this reason that some in Western
society have historically emphasized romantic love far more than
other cultures in which arranged marriages are the tradition. However,
the globalization of Western culture has spread Western ideas about
love and romance.
Romantic love became a recognized passion in the Middle Ages, when
in some cases insurmountable barriers of morality or convention
separated the lovers. The effect of physical attraction and impossibility
of intimacy resulted in an excessive regard of the beloved as extremely
precious. Winning the love, or at least the attention, of the beloved,
motivated great efforts of many kinds, such as poetry, song or feats
Properties of romantic love purported by Western culture include:
* It must take you by surprise (the result of a random encounter).
* It cannot be easily controlled.
* It is not overtly (initially at least) predicated on a desire
for sex as a physical act.
* If requited it may be the basis for a lifelong commitment.
While romantic love as discussed above is a dream of many, some
claim that such love as is depicted in books and movies rarely,
if ever, occurs. They point to the modern practice of dating, where
often the goal is to have sexual intercourse as soon as possible
instead of building a lasting relationship. Often, the rigorous
demands of careers in the modern world rob people of the time to
find such ideal companions, and mental disorders such as social
anxiety disorder prevent people from approaching others. In addition,
the high prevalence of divorce in western society may be an additional
deterrent for individuals seeking long-term, romantic relationships
with the possibility of marriage.
here to read more about Relationships
PLEASE NOTE: Natural-Earth.com
does not necessarily endorse any of the treatments and therapies
in the natural health, natural medicine and lifestyles directory.
The material on this web site has been provided for your information
and we urge you to be discriminating in making your choice of complementary
or alternative therapy. We wish you Good Luck... and Good Health. | <urn:uuid:2998eb13-98f2-4e18-ad84-ca68ee16dc4c> | CC-MAIN-2013-20 | http://www.natural-earth.com/relationships.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.912574 | 910 | 2.84375 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
The Cassini probe may have already collected data that could reveal the presence of life on Saturn's moon Enceladus, a new study argues. But mission scientists say teasing out the subtle signature of life may prove difficult.
Researchers have been fascinated with Enceladus since July 2005, when Cassini revealed a dramatic plume of ice particles and water vapour shooting out from the moon's south pole.
The plume's origin is still being debated, but some models suggest the moon holds an ocean of liquid water beneath its surface. This ocean could be a potential habitat for extraterrestrial life.
Now, a team led by Christopher McKay of NASA's Ames Research Center in Moffett Field, California, says Cassini could offer up the first evidence that life exists or once existed on the 500 km-wide moon.
Though the probe was never designed to look for life, it could do so by studying organic chemicals such as methane in the plume, the team says.
"If you think about what you need for life, you need water, energy, organic material, and you need nitrogen, and they're all coming out of the plume," McKay told New Scientist. "Here is a little world that seems to have it all."
Life could take the form of methane-producing microbes, or methanogens, similar to those that have been seen buried under kilometres of ice in Greenland.
Cassini could potentially find evidence for such life by studying the relative abundances of methane and heavier organic chemicals, such as propane and acetylene.
Organic, carbon-containing molecules, including methane, are produced in various ways.
Abiological processes include the breakup of large, complex molecules called tholins, and the chemical buildup of carbon monoxide and hydrogen into organic molecules of varying weights.
None of these abiological methods should strongly favour the formation of methane over that of heavier organic molecules, McKay's team argues. Biological processes, in contrast, should produce much higher amounts of methane than heavier organic compounds, they say.
Researchers have taken advantage of this disparity to trace the source of organic compounds on Earth. Earlier this year, it was used to rule out a biological origin for oils and gases released from the "Lost City" hydrothermal vents at the bottom of the Atlantic Ocean.
McKay and colleagues believe a similar study could be carried out on Enceladus using data from Cassini's Ion and Neutral Mass Spectrometer (INMS), which can measure the concentration of different molecules in the plume.
That hints that the moon's methane was created early on, perhaps in clouds of gas that predate the solar system.
"That doesn't mean there's not a biological signal hidden under the other stuff, but we don't have any evidence to suggest that is the case," says INMS lead scientist Hunter Waite of the Southwest Research Institute in San Antonio, Texas.
"It's not a clear-cut, hands-down winner for biology," McKay acknowledges.
To better understand what a biological signal on Enceladus might look like, McKay has reconfigured a chamber previously used to simulate conditions on Saturn's moon Titan to simulate non-biological ways of making methane and other organic molecules. The signatures could help researchers interpret Cassini's results, McKay says.
Waite says the best way to search for evidence of life may be to return to Enceladus with more sensitive instruments. In 2009, NASA will choose between two competing ideas for the next mission to the outer planets.
One mission would send two orbiters to Jupiter and its moon Europa. The other would send an orbiter to Saturn and a probe that could descend to the surface of Saturn's moon Titan. The Titan-Saturn mission would also include a number of flybys of Enceladus, Waite told New Scientist.
Journal reference: Astrobiology (vol 8, p 909)
View a slideshow of Cassini's best images, narrated by imaging team leader Carolyn Porco.
If you would like to reuse any content from New Scientist, either in print or online, please contact the syndication department first for permission. New Scientist does not own rights to photos, but there are a variety of licensing options available for use of articles and graphics we own the copyright to.
Have your say
Only subscribers may leave comments on this article. Please log in.
Only personal subscribers may leave comments on this article
Get To It Then
Tue Nov 04 08:39:59 GMT 2008 by Supernova
It would only be the discovery of the Century.
Not Quite Panspermia
Tue Nov 04 10:54:37 GMT 2008 by Constantino
Its Tuesday morning and im letting my imagination get carried away with itself, but what if the conditions underneath Enceladus are perfect life-starting condtions with plumes spewing out jets of "biological starter packs" that over time ended up on the friendlier earth where they were able to develop and evolve.
That's assuming that conditions on earth have never been quite right to actually start biological processes, see where I'm going with this?
Anyway I'm fairly certain my last assumption is incorrect so I will file this idea under whimsical fantasy but it is nice to think of our solar system as all connected and "one big process"
Tue Nov 04 15:32:30 GMT 2008 by Larian Lequella
I am enthralled at the innovative thinking going on here. Considering the news that I have been force-fed for nearly 2 years, and the historic events taking place at US polls, I find this to be the most awe inspiring and significant news of the day!
I've seen Dr. McKay on a few NatGeo and Discovery Channel specials as of late. Best of luck!
Constantino, no harm in that sort of speculation. I am interested in seeing what sort of actual results come through though before making any fanciful leaps of the imagination. But if your whimsical fantasy bears out, I guess we're all aliens! INS will have a heck of a time deporting us! :P
All comments should respect the New Scientist House Rules. If you think a particular comment breaks these rules then please use the "Report" link in that comment to report it to us.
If you are having a technical problem posting a comment, please contact technical support. | <urn:uuid:a714a25f-fea9-48fc-aa9f-dfa118b5d1ca> | CC-MAIN-2013-20 | http://www.newscientist.com/article/dn15113 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.939343 | 1,308 | 3.96875 | 4 | HuggingFaceFW/fineweb-edu/sample-100BT |
Tuesday, November 22, 2011
They could lead the way to Hi-Def displays that are large, almost paper thin, and portable. While everyone is fully cognizant of the more common terms, such as LCD (Liquid Crystal Display) and Plasma; which fortunately is not an acronym, but a rather a descriptive term of the weird, futuristic, fourth state of matter science going on behind the flat panel, there continue to be new sets of letters, and the latest seem to end in “ed”. Since the attack of the “eds” is all good news for lovers of state-of-the-art technology, I will attempt to elucidate some of the important points in an easy to understand way beginning with OLED.
Surprisingly, OLED is already in use in some smaller video applications such as cell phones and digital camera displays. It could have an extremely bright future in FPD (flat panel display), but its debut into the world of widespread mass production and sales in television is still a year or two off. Samsung has released a prototype 40-inch HDTV using OLED that is extremely thin. In the future, we could see an OLED set that is twice as large and only a fraction of an inch thick! It will even be possible to roll up these extremely thin screens and carry them around!
OLED works by conducting electrons through layers of organic materials that emit light to create the standards of current high definition television. Photons (particles of light) are emitted as electrons are sent from a cathode layer across two or three layers of organic material (the “o” in oled) to the anode layer. The colors of the HDTV are determined by the type of organic material used in the emissive layer and the brightness of the picture seen by the viewer’s eye is controlled by the level of voltage used. The “O” in OLED stands for organic material, which in this case means a carbon based chain of molecules, also known as a polymer.
OLED promises to give us extremely wide screen, HD televisions that could be only a few millimeters thick and use very little electricity. The tiny amounts of electrical power needed to power this type of display can solve the problem of hot operating temperatures in today’s LCD and Plasma sets. Newer generations of HD (High Definition) technologies are constantly being invented. There are already at least six types of OLED technology now in existence. It will be fascinating to view the subsequent forms of flat panel displays using OLED, as they begin to populate our world. | <urn:uuid:9bd90462-6d95-4021-878f-1d442556a648> | CC-MAIN-2013-20 | http://www.newtechnologytv.com/index.php?itemid=952 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.958495 | 527 | 3.046875 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
The Function and Strategy of Problem Solving
By Chris Bach and The Third Way – The Next Generation in Reinforcement Training
Last month, we moved into a very important area of dog training, PROBLEM SOLVING. Chris shared her theory on the “function and strategy" for teaching dogs.
We are continuing our discussion on Problem Solving. This month Chris explains her theory on the “function and strategy of problem solving”.
The function of problem solving is different than teaching and much more complex. Problem solving involves the entire teaching process but only as one of its components. It also entails totally changing and therefore totally controlling the consequences of a response. In addition, the trainer must also eliminate the emotional fluctuation brought on by the presence of specific stimuli as well as “stimulation” itself.
Changing a dog’s response to stimuli, both operantly and classically is infinitely more difficult than teaching new consequences, or keeping emotional fluctuations to a minimum in the first place.
Because the function of problem solving is changing rather than just teaching, strategies are also different and much more complex.
The strategy for problem solving has four keys:
- The dog is NEVER to blame.
- The problem response must never occur again.
- A new incompatible response must be taught and proofed in a separate venue.
- When this new response is reliable, it is cued before the problematic response can occur.
I always accept the blame if my dog fails to conform to my expectations or requirements. My expectations are wrong, not my dog. My dog is perfect. I have failed to either adequately teach him what I want, or to recognize some limitation that prevents him from meeting my goals. It is up to me to teach him properly and/or modify my expectations.
The problem solving process begins with people taking full responsibility for their dog’s actions. Next, people must recognize that there is a problem only because the dog is failing to meet some human-imposed expectation. Dogs are and always will be PERFECT at being dogs and at being their individual self. They are imperfect only in the minds of people.
Once people accept responsibility for there being a problem, they must precisely identify the problem and then explore their options for dealing with it.
The purpose of this is to assist dog owners and caretakers in identifying the real problem and exploring the options available. Then once an option is chosen, a viable and realistic program that the dog owner or caretaker can accept and/or implement can be developed.
The Third Way’s PROBLEM SOLVING FUNCTIONS and STRATEGIES
Problem Solving Function:
Modify the contingencies for a response and/or modify the contingencies for an emotional state change.
Problem Solving Strategy:
- Take responsibility for the problem
- Identify the problem
- Consider the Four Options (which will be discussed in up coming columns)
- Commit to the chosen option
- Design a program
- Management program for Option Two
- Problem Solving Program for Option One
(c) THE THIRD WAY ~ Chris Bach ~ 2002. All rights reserved. | <urn:uuid:4d4fada2-1bf7-4938-b32a-100c9734322a> | CC-MAIN-2013-20 | http://www.pawsativechoice.com/trainingtips-aug2002/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.945838 | 653 | 2.796875 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
Man in Space is an episode of Disneyland which originally aired on March 9, 1955. It was directed by Disney animator Ward Kimball.
Kimball was famous for his creation of the character Jiminy Cricket, The Cheshire Cat, The March Hare, The Mad Hatter, and for redesigning Mickey Mouse in 1938. He joined the Disney Studios in 1934, and rose up in the ranks to become a directing animator on such classics as “Snow White and the Seven Dwarfs,” “Pinocchio,” “Fantasia” and “Peter Pan.” He directed Disney Oscar-winning shorts “Toot, Whistle, Plunk and Boom” in 1953 and “It’s Tough To Be a Bird” in 1969.
This Disneyland episode (set in Tomorrowland), was narrated partly by Kimball and also by such famed scientists as Dr. Willy Ley, Dr. Heinz Haber, Dr. Wernher von Braun, and Dick Tufeld of Lost in Space fame.
The show talks briefly about the lighthearted history of rockets and is followed by discussions of satellites, a practical look (through humorous animation) at what spacemen will have to face in a rocket (both physically and psychologically, such as momentum, weightlessness, radiation, even space sickness) and a rocket takeoff into space.
Both Haber and Wernher von Braun were involved with Operation Paperclip and intimately a part of the Nuremberg medical tribunal, which saw former Nazis war criminals rescued to the United States, ultimately resulting in a considerable contribution to the development of NASA.
Operation Paperclip was the Office of Strategic Services program used to recruit the scientists of Nazi Germany for employment by the United States in the aftermath of World War II (1939–45). It was conducted by the Joint Intelligence Objectives Agency, and in the context of the burgeoning Soviet–American Cold War.
Unknown to many Disney watchers, Kimball was also student of UFOs and Outer Space.
Kimball worked with technical advisor Werhner Von Braun to write and direct three key outer space documentaries for the “Disneyland” television series. The three documentaries were, “Man in Space,” “Man and the Moon,” and “Mars and Beyond.” Kimball referred to them as, “the creative highpoint of my career. According to Disney spokesman Howard E. Green, the three outer space documentaries are “often credited with popularizing the concept of the government’s space program during the 1950s.
The first of these, the 1955 “Man in Space, was so popular (viewed by over 42 million people) that according to Kimball, President Eisenhower phoned Walt Disney from the White House looking for a copy of the production. When Disney asked Eisenhower why he wanted it Eisenhower replied, “Well, I’m going to show it to all those stove-shirt generals who don’t believe we’re going to be up there!
It was Kimball, who at the July 1979 MUFON UFO symposium in California, told of his interest in the subject of UFOs. Then to a stunned audience he related the story of how the American government had approached Walt Disney himself prior to Sputnik to make a UFO documentary to help acclimatize the American population to the reality of extraterrestrials. | <urn:uuid:a82259ad-0ec1-41c4-84b7-d4d2a04a28d4> | CC-MAIN-2013-20 | http://www.republicmedia.tv/?p=4887 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.963645 | 708 | 2.6875 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
It is fair to say that the struggle for power in the USSR between 1924 and 1929 was partially to do with the economic policy because the way in which different members of the Communist Party treated the economic policy depended how much support they got from fellow members of the Communist party. However, there were other factors involved such as a lack of democratic elections, the nature of leadership and fear of a divided party.
You could argue that the struggle for power was due to the differing economic policies, this is because different key players in the power struggle wanted different things. For example, the Bukharinite model wanted gradualism – to allow market forces to drive the economy forward and so letting the peasants gain wealth individually. He believed this would lead to a prosperous consumer market and heavy industry that is centrally controlled, planned economy run by a proletariat dictatorship. This would please the peasantry and results in political and economic growth as well as increased trade. Trotsky and his leftist model agreed that the party must recognise the role of the market forces during the gradual change to socialism. However, in 1926 he became increasingly critical of the gradualist approach and didn’t approve of peasants who had no obligation to sell if the market wasn’t right and therefore wanted a slightly more capitalist approach to the economic policy so that the government had greater control over produce. This created a power struggle because different people wanted different things and approached economic policy in certain ways and whilst Bukharin was trying to ensure the happiness of the public, Trotsky was trying to ensure the wealth and growth of the USSR as a trade nation. Although these two models were important in why there was a power struggle in those years it is not the most important reason.
Secondly, you could say it... [continues]
Cite This Essay
(2012, 05). The Struggle for Power in the Ussr. StudyMode.com. Retrieved 05, 2012, from http://www.studymode.com/essays/The-Struggle-For-Power-In-The-994323.html
"The Struggle for Power in the Ussr" StudyMode.com. 05 2012. 05 2012 <http://www.studymode.com/essays/The-Struggle-For-Power-In-The-994323.html>.
"The Struggle for Power in the Ussr." StudyMode.com. 05, 2012. Accessed 05, 2012. http://www.studymode.com/essays/The-Struggle-For-Power-In-The-994323.html. | <urn:uuid:61e8d025-162a-4646-af75-1a56f8e565cc> | CC-MAIN-2013-20 | http://www.studymode.com/essays/The-Struggle-For-Power-In-The-994323.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.962565 | 533 | 3.21875 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
The World Health Organization (WHO) released a worldwide health alert Sunday (September 23) after the United Kingdom’s Health Protection Agency (HPA) confirmed that a newly identified virus—genetically related to the SARS virus—has infected a second patient, who was last reported in critical condition in London.
The virus was first identified this summer in Saudi Arabia following the death of a 60-year-old pneumonia patient. It is a type of coronavirus, a group that includes cold viruses as well as the SARS virus, which caused a global outbreak of severe respiratory illness between 2002 and 2003, killing more than 700 people. So far, health experts are optimistic that the new virus will not have the same tragic spread.
“SARS was very quick off the mark, infecting hospital staff etc., and this new virus does not to me appear to be in the same 'big bang' group,” John Oxford, a virology expert at Queen Mary, University of London told BBC News.
The London patient had recently traveled to Saudi Arabia where it is suspected he picked up the virus; the two confirmed infections shared 99.5 percent sequence identity. Experts are investigating other suspected cases in the Middle East and preparing outbreak responses if needed, but the WHO has yet to issue any travel restrictions or advice.
“For the moment, we're just assuming there were two individual infections, probably from some animal reservoir,” Ron Fouchier, a virologist at Erasmus MC in Rotterdam in the Netherlands and a lead researcher on one of the two recently publicized H5N1 papers, told ScienceInsider. “They occurred 3 months apart, which is too long for one to have infected the other,” added Fouchier, who sequenced the new virus's genomes from the two confirmed cases. “So let's keep both feet on the ground and not blow this out of proportion.” | <urn:uuid:b00c8db8-2bb9-4c90-9835-c1a3c528b013> | CC-MAIN-2013-20 | http://www.the-scientist.com/?articles.view/articleNo/32668/title/Outbreak-Watch/flagPost/66021/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.958446 | 399 | 2.921875 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
The city of Coos Bay has drafted an ordinance to allow wind turbines in town.
The World of Coos Bay reports that turbines have been under a moratorium, but the city plans to take public comment in early 2013.
The draft ordinance would allow turbines no higher than 70 feet - industrial wind turbines are more than 250 feet.
For large turbines, residents would have to show that noise would be minimal, viewsheds would not be disturbed and that the device would meet tough safety standards. Restrictions would be reduced for smaller devices.
An Oregon State University expert tells the paper that urban settings aren't generally favorable for turbines: Both wind speed and elevation are low. | <urn:uuid:70b94cd6-2b4d-4de5-87a4-586933891caa> | CC-MAIN-2013-20 | http://www.thedove.us/news/2012/11/16/draft-proposal-accept-wind-turbines-coos-bay?page=146 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.962928 | 136 | 2.546875 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
AKBARPUR KHUDAL, village 6 km northeast of Bareta (29°52'N. 75°42'E), in Mansa district of the Punjab, is sacred to Guru Gobind Singh, who came here in November 1706 to rescue a Sikh from captivity. According to Giani Gian Singh, Twaiikh Guru Khalsa, Gulab Singh, a goldsmith of Akbarpur Khudal, had been imprisoned by the village chief in a basement of his house on a false charge. The news of the Sikh in distress reached Guru Gobind Singh while he was at Sirsa, 80 km away, as the crow flies, already on his way to the South. But he turned his footsteps immediately with five of his Sikhs and, reaching Khudal by a forced march, rescued Gulab Singh and instructed the chief, Nabi Bakhsh, in the path of virtue and justice. Guru Gobind Singh then returned to Sirsa. A gurdwara was later established outside the village. The Maharaja of Patiala endowed it with 50 acres of land. The house of the chief inside the village was acquired after Independence, and Gurdwara Bhora Sahib Patshahi 10 was constructed on the site in February 1951 by a Sikh landlord of the area, Harchand Singh Jeji, who also made an endowment. The Gurdwara, handed over to the Shiromani Gurdwara Parbandhak Committee in 1977, has a domed sanctum, within a hall, on the first floor. The bhora or underground cell, in which Gulab Singh is believed to have been kept, is a small square cellar in the basement. | <urn:uuid:eb99bba5-5f77-4e3f-acdb-78e5b176f87e> | CC-MAIN-2013-20 | http://www.thesikhencyclopedia.com/akbarpur-khudal | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.982254 | 358 | 2.703125 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
It comes as no surprise that one forward step for man equals one big step backward for nature as studies show a link between cell phone usage and the death of bees. Apparently the radiation from cell phones is wreaking havoc on the eco system of bees and this has the potential to rock our world too - after all, bees pollinate more than flowers... they pollinate crops and crops equal food.
The long term effects could mean food shortages on a worldwide scale putting into effect a chain reaction of higher prices and suffering the world over.
Cell Phones Killing Bees
9,887 clicks in 317 w
More Stats +/- | <urn:uuid:3a894576-2931-45a5-98cb-456d57263040> | CC-MAIN-2013-20 | http://www.trendhunter.com/trends/technology-vs-nature-cell-phones-killing-bees | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.914724 | 125 | 2.53125 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
While we would all like to have the kind of healing factor that Wolverine possesses, we all know that this is but a pipe dream at the moment. What we can rely on, however, would be advances made in the medical field such as this laser-activated plaster that was specially designed to replace stitches for wounds. The “miracle” patch is known as SurgiLux, where it functions as some sort of biological Band-Aid. Using a material derived from chitin, the very same substance required for crab shells and insect exoskeletons to remain stiff and rigid, SurgiLux’s ultimate aim is to far outperform stitches or sutures for wounds and surgeries, considering how it remains atop the skin instead of threading underneath.
John Foster, a biotech researcher at the University of New South Wales who is working on SurgiLux, said, “Though sutures have a superior strength to SurgiLux, sutures are physically invasive. SurgiLux is a thin film, so you do not end up with any physical invasion or further damage to the tissue, thus allowing more complete healing.”‘
Sounds like this is not a one-size-fits-all solution, but would come in more handy for delicate operations. Even better is if this does not leave that much of scar tissue compared to regular stitches. Will the phrase “a stitch in time saves nine” be relevant should the SurgiLux surge in popularity?
Medbox Dispenses Marijuana
Melon Headband Improves Your Focus By Reading Your Brain Waves
Humans Welded Together Could Mean The End Of Stitches
Smart Cover Magnets Can Apparently Disable Implanted Defibrillators | <urn:uuid:0c6c1d16-303b-4d34-881d-f17490392d38> | CC-MAIN-2013-20 | http://www.ubergizmo.com/2012/10/surgilux-laser-activated-plaster-ups-your-healing-factor/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.944716 | 364 | 2.578125 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
Nausea and vomiting - adults
Nausea is the feeling of having an urge to vomit. It is often called being sick to your stomach.
Vomiting or throwing up is forcing the contents of the stomach up through the esophagus and out of the mouth.
Emesis; Vomiting; Stomach upset; Upset stomach
Many common problems may cause nausea and vomiting:
Nausea and vomiting may also be early warning signs of more serious medical problems, such as:
Once you and your doctor find the cause, you will want to know how to treat your nausea or vomiting
. You may be asked to take medicine, change your diet, or try other things to make you feel better.
It is very important to keep enough fluids in your body. Try drinking frequent, small amounts of clear liquids
If you have morning sickness during pregnancy, ask your doctor about the many possible treatments.
The following may help treat motion sickness:
- Lying down
- Over-the-counter antihistamines (such as Dramamine)
- Scopolamine prescription skin patches (such as Transderm Scop) are useful for extended trips, such as an ocean voyage. Place the patch 4 - 12 hours before setting sail. Scopolamine is effective but may produce dry mouth, blurred vision, and some drowsiness. Scopolamine is for adults only. It should NOT be given to children.
Call your health care provider if
Call 911 or go to an emergency room if:
- You think vomiting is from poisoning
- You notice blood or dark, coffee-colored material in the vomit
Call a health care provider right away or seek medical care if you or another person has:
Been vomiting for longer than 24 hours
Been unable to keep any fluids down for 12 hours or more
Headache or stiff neck
Not urinated for 8 or more hours
Severe stomach or belly pain
Vomited three or more times in 1 day
Signs of dehydration include:
- Crying without tears
- Dry mouth
- Increased thirst
- Eyes that appear sunken
- Skin changes -- for example, if you touch or squeeze the skin, it doesn't bounce back the way it usually does
- Urinating less often or having dark yellow urine
What to expect at your health care provider's office
Your health care provider will perform a physical examination, and will look for signs of dehydration.
Your health care provider will ask questions about your symptoms, such as:
- When did the vomiting begin? How long has it lasted? How often does it occur?
- Does it occur after you eat, or on an empty stomach?
- What other symptoms are present -- abdominal pain, fever, diarrhea, or headaches?
- Are you vomiting blood
- Are you vomiting anything that looks like coffee grounds?
- Are you vomiting undigested food?
- When was the last time you urinated?
Other questions you may be asked include:
- Have you been losing weight?
- Have you been traveling? Where?
- What medications do you take?
- Did other people who ate at the same place as you have the same symptoms?
- Are you pregnant or could you be pregnant?
The diagnostic tests may be performed:
Depending on the cause and how much extra fluids you need, you may have to stay in the hospital or clinic for a period of time. You may need fluids given through your veins (intravenous or IV).
Malagelada J-R, Malagelada C. Nausea and vomiting. In: Feldman M, Friedman LS, Brandt LJ, eds. Sleisenger & Fordtran's Gastrointestinal and Liver Disease. 9th ed. Philadelphia, Pa: Saunders Elsevier; 2010:chap 14.
Mcquaid K. Approach to the patient with gastrointestinal disease. In: Goldman L, Schafer AI, eds. Cecil Medicine. 24th ed. Philadelphia, Pa: Saunders Elsevier; 2011:chap 134.
This article uses information by permission from Alan Greene, M.D., © Greene Ink, Inc.
George F. Longstreth, MD, Department of Gastroenterology, Kaiser Permanente Medical Care Program, San Diego, California. Also reviewed by David Zieve, MD, MHA, Medical Director, A.D.A.M., Inc. | <urn:uuid:75d285a6-c97b-4e25-92fc-e2e11fe8a399> | CC-MAIN-2013-20 | http://www.upmc.com/health-library/Pages/ADAM.aspx?GenContentId=003117&ProductId=108&ProjectId=1 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.897959 | 923 | 3.375 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
Learn to make smart food choices on a limited budget. All it takes is a little planning and creativity.
Plan out your meals to keep stress low, surprises rare, and more money in your pocket.
Learn budget-survival strategies for the grocery store.
Shop and Save Online Course — Families can learn to save money at the grocery store with this short, free online course. Are you in the MFIP/TANF program? This course counts as one hour of Core TANF activity for Life Skills Training.
Simply Good Eating — Classes that help people with limited income discover how to make healthy food choices while stretching food dollars and be more active.
Cooking Matters® Minnesota — Hands-on, cooking based nutrition education programs that help low-income families prepare healthy and tasty meals.
Resource Management for Daily Life — Builds personal resource management skills through decision-based education and online resources.
Families in Tough Times — Resource for families experiencing, avoiding, or recovering from tough times. Materials on farm families, stress, disaster recovery, and more.
Supplemental Nutrition Assistance Program (SNAP) and Food Assistance Programs — Minnesota Department of Human Services — Learn how to apply for food assistance and other food support.
Find Hunger and Food Resources— Hunger Solutions Minnesota — Find a food shelf, Meals on Wheels, Summer Food Service Program, food support office, or WIC program near you.
Women, Infants, & Children (WIC) Program — Minnesota Department of Health — Supplemental food program for pregnant women, infants and children. Find an office near you: English | Spanish | Hmong | Somali | <urn:uuid:a8179549-cd4d-443c-b08d-4b39746802ad> | CC-MAIN-2013-20 | http://www1.extension.umn.edu/family/health-and-nutrition/for-families/smart-shopping/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.872114 | 333 | 2.53125 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
Annual Report to Congress FY 2004
|MS Word (417 KB)|
MAKING A DIFFERENCE
Congress enacted the civil rights laws as a mandate to bring the formerly
excluded into the mainstream of American education. These laws also are designed
to carry out the U.S. Department of Education's commitment to assuring access
to equal educational opportunity for every individual.
The federal civil rights laws have helped bring about profound changes in American education and improved the educational opportunities of millions of students. Many barriers that once prevented minorities, women and girls, and individuals with disabilities from freely choosing the educational opportunities and careers they would like to pursue have been eliminated.
While we applaud this progress, we recognize that there are persons who continue to be denied equal access to quality education. However, behind statistical data and research findings is a human face—a student hoping for a chance to learn and excel. This hope is expressed eloquently in the letter below from a college student with a disability. The statement serves as a reminder of the potential impact of the civil rights laws in making a difference in improving individual lives.
I am one of the millions of students who have a learning disability, dyslexia, and I also have health problems that make ordinary daily living a challenge….
The life I live is hard but not impossible. I am not looking for pity or sympathy or platitudes. I do not want undeserved special treatment. I am not an exception, a freak, a statistical abnormality. I am a real person with real disabilities. The problems I live with are hard for you to see. I have no wheelchair, white cane or hearing aid. If you use your imagination, maybe you can picture my life, wanting to talk, to listen, to read, to learn, and not being able to. Now add to that the confusion of harsh, chronic pain and frequent loss of motor control. This is my condition, a condition compounded by stress and frustration.
All I ask is a little respect in a world where people and institutions are allowed to discriminate against disabled persons in the interest of convenience and conformity. I can achieve anything, learn to do anything, but not in an environment of censure and bureaucratic red tape. I am asking for a chance, a fair chance, to get an education. I am willing to fight for my future. I should not be penalized by the attitudes of people who are allowed to sweep the disabled under a rug, refusing them their rights as individuals.
I am presenting this matter to you so that you might better understand the position of disabled persons. We are fighting for our lives, every day, both literally and figuratively. We have to fight for justice, both for ourselves and for each other, because, whether our disabilities are visible or not, we are easy to ignore. I pray that you will help me complete my education and that you will work to ensure the rights of all disabled students….
Letter from a college student forwarded to OCR | <urn:uuid:c7f95678-e7b7-4332-8b64-37c9effda9f6> | CC-MAIN-2013-20 | http://www2.ed.gov/about/reports/annual/ocr/annrpt2004/report_pg20.html?exp=7 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.954348 | 608 | 3.203125 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
Cloning coast redwoods
William J. Libby, U.C., Berkeley.
California Agriculture 36(8):34-35. DOI: 10.3733/ca.v036n08p34b.
Not available – first paragraph follows:
In a redwood breeding program, time is a problem. Between germination (or planting) and harvest as a renewable source of wood, a redwood must survive and grow in a minimally managed environment for three to eight decades. Trees in park and amenity plantings may be expected to grow for centuries, or even millenia. Redwood foresters thus, and properly, tend to be conservative.
William J. Libby, Professor, Genetics, U.C., Berkeley. | <urn:uuid:4367b58a-d5dc-4f8c-a8c8-4ae895e3701c> | CC-MAIN-2013-20 | http://californiaagriculture.ucanr.org/landingpage.cfm?article=ca.v036n08p34b&abstract=yes | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705195219/warc/CC-MAIN-20130516115315-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.860317 | 155 | 2.828125 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
UNIT TITLE: Integrating Website Activities in Math for Elementary Teachers
Unit Goal: To integrate web-based activities with text and hands-on manipulatives in the teaching of mathematics content to pre-service teachers
Unit Summary: The four modules contained in this unit represent templates for the inclusion of content based, interactive websites throughout a semester long mathematics course for pre-service teachers. The modules’ sequence is based on Chapters 2-5 of Mathematics for Elementary School Teachers(Houghton Mifflin, 2nd Ed) by Tom Bassarear. This text is supplemented by the text author’s Mathematics for Elementary School Teachers: Explorations and a Start with Manipulatives Kit from ETA/ Cuisenaire. In each module, students are asked to explore and reflect on a given content based website prior to classroom instruction. (A recommended site is given for each module) Following content instruction (which include additional web-based activities and hands-on manipulatives, investigations and lecture) students are required, in teams, to research other web sites which provide additional opportunities for content enhancement. Their findings are then reported back to the class at the close of the semester.
Grade Level (K-16): 13-15
General Subject Area(s): Math for Elementary School Teachers
Minimum time required for the unit: 1 Semester
Concepts learned across all unit modules:
- Accessing and evaluating interactive web sites
- Communicating student understanding of different pedagogical styles via journal writing
- Demonstrating competencies in addition, subtraction, multiplication, and division with respect to the given numeration system
- Recognizing patterns and properties of the fundamental operations
- Demonstrating competencies in whole, integer, rational and real number operations
Standards addressed by unit modules:
Mathematics Curriculum, Instruction, and Assessment
Teaching strategies and activities that will aid in the development, delivery, and evaluation of the following:
Conceptual Knowledge and Procedural Knowledge
- Curriculum components – for example, scope and sequence of skills and materials; appropriate materials and technology; learner objectives
- Use of manipulatives and developmentally appropriate materials; variety and reliability
- Pre-number and number concepts – for example, counting objects, comparing objects; classifying objects; exploring sets; ordering sets; number patterns
- Problem solving – for example, investigate and understand content; formulate problems from everyday situations; develop strategies applicable to a wide range of problems; verify and interpret results; build student confidence; identify and solve problems that are developmentally appropriate
- Content specific pedagogy – for example, theories necessary for implementing a sound instructional program such as accessing prior knowledge, constructing knowledge, modeling, informal reasoning, graphic organizers
- Addition and subtraction of whole numbers – for example, computational procedures; relationships between addition and subtraction; relationship between subtraction and division; regrouping; modeling the operations; story problems
- Multiplication and division – for example, modeling the operations, interpretations for the operations; computational procedures; skill development; story problems
- Concepts related to number theory – for example, factors, multiples, primes and composites, remainders, odd and even
- Rational numbers – for example, fraction and decimal equivalence; computation; modeling
Demonstrate number sense and operation sense, that is, an understanding of the foundational ideas of numbers, number properties, and operations defined on numbers.
Formal Mathematical Reasoning
- Order: demonstrate an understanding of order among whole numbers, fractions, and decimals
- Equivalence: demonstrate an understanding that a number can be represented in more than one way
- Numeration and place value: demonstrate an understanding of how numbers are named, place value, and order of magnitude of numbers
- Number properties: demonstrate an understanding of the properties of whole numbers without necessarily knowing the names of the properties
- Computation: perform computations; adjust the result of a computation to fit the context of a problem; identify numbers or information or operations needed to solve a problem
- Equations: solve simple equations and inequalities; predict the outcome of changing some number or condition in a problem
- Estimation: estimate the result of a calculation; determine the reasonableness of an estimate
- Algorithmic thinking: demonstrate an understanding of the algorithmic point of view — that is, follow a given procedure; recognize various ways to solve a problem; identify, complete, or analyze a procedure; discover patterns in a procedure
Demonstrate an ability to use the basics of logic in a quantitative context.
- Logical connectives and quantifiers: interpret statements that use logical connectives (and, or, if – then) as well as quantifiers (some, all, none)
- Validity of arguments: use deductive reasoning to determine whether an argument (a series of statements leading to a conclusion) is valid or invalid
- Generalization: identify an appropriate generalization, an example that disproves an inappropriate generalization, or a hidden assumption
Demonstrate the ability to:
- Use technology tools and information resources to increase productivity, promote creativity, and facilitate academic learning.
- Use content-specific tools (e.g., software, simulation, environmental robes, graphing calculators, exploratory environments, Web tools) to support learning and research.
- Use technology resources to facilitate higher order and complex thinking skills, including problem solving, critical thinking, informed decision making, knowledge construction, and creativity.
- Use technology to locate, evaluate, and collect information from a variety of sources.
- Observe and experience the use of technology in their major field of study.
Technology needed in unit modules:
- Computer with internet access
- Computer with Power Point software
- Projection device for computer
Technology-enhanced instructional strategies employed:
- Technology-enriched problem-based learning
- Computer-based simulations/games/role-playing
- Web-based learning
- Electronic portfolio development
- Technology-enhanced demonstrations
Title of Each Module:
#1 – Fundamental Concepts
#2 – Four Fundamental Operations
#3 – Number Theory
#4 – Extending the Number System
Unit Culminating Activity: Student groups (four person) will present their website research results for the four chapters. These presentations will include: demonstrations of the web sites, evaluation of the websites, a comparison of website activity to text’s and hands-on manipulatives’ approaches (as applicable) to the content area, and a written commentary. The commentary is to include: a summary of the individual chapter reflections, a personal reflection of their individual process in the acquisition of their chosen websites, a comparison of website activity to text’s and hands-on manipulatives’ approaches (as applicable) to the content area and a description of the content skill(s) could be enhanced by a student using the web-based activities.
View the Culminating Activity Rubric
Unit Authors: John August | <urn:uuid:fb4afe04-7af4-4584-84e4-6a3507175b1e> | CC-MAIN-2013-20 | http://destiny.mbhs.edu/edgrid/webmath/webunit.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705195219/warc/CC-MAIN-20130516115315-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.8648 | 1,449 | 3.703125 | 4 | HuggingFaceFW/fineweb-edu/sample-100BT |
- copy data to or from a kernel image or running system
cc [ flag… ] file… -lkvm [ library…] #include <kvm.h> ssize_t kvm_read(kvm_t *kd, uintptr_t addr, void *buf, size_t nbytes);
ssize_t kvm_write(kvm_t *kd, uintptr_t addr, void *buf, size_t nbytes);
The kvm_read() function transfers data from the kernel image specified by kd (see kvm_open(3KVM)) to the address space of the process. nbytes bytes of data are copied from the kernel virtual address given by addr to the buffer pointed to by buf.
The kvm_write() function is like kvm_read(), except that the direction of data transfer is reversed. To use this function, the kvm_open(3KVM) call that returned kd must have specified write access. If a user virtual address is given, it is resolved in the address space of the process specified in the most recent kvm_getu(3KVM) call.
The kvm_read() and kvm_write() functions are obsolete and might be removed in a future release. The functions described on the kvm_kread(3KVM) manual page should be used instead.
On success, these functions return the number of bytes actually transferred. On failure, they return -1.
See attributes(5) for descriptions of the following attributes: | <urn:uuid:292c837e-cd91-4327-99d8-a8a4aee2066c> | CC-MAIN-2013-20 | http://docs.oracle.com/cd/E18752_01/html/816-5172/kvm-write-3kvm.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705195219/warc/CC-MAIN-20130516115315-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.82233 | 330 | 3.109375 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
The ex-gay movement is a controversial movement that consists of people and organizations that seek to encourage people to refrain from entering or pursuing same-sex relationships, to eliminate homosexual desires, to develop heterosexual desires, or to enter into a heterosexual relationship. The "ex-gay" movement relies on the involvement of individuals who formerly identified themselves to be gay, lesbian, or bisexual but no longer do; these individuals may either claim that they have eliminated their attraction to the same sex altogether or simply that they abstain from acting on such attraction. There have been various scandals related to this movement, including some self-claimed ex-gays having been found in same-sex relationships despite having denied this, as well as controversies over gay minors being forced to go to ex-gay camps against their will, and over admissions by organizations related to the movement that conversion therapy does not work.
A large body of research and global scientific consensus indicates that being gay, lesbian, or bisexual is compatible with normal mental health and social adjustment. Because of this, major mental health professional organizations discourage and caution individuals against attempting to change their sexual orientation to heterosexual, and warn that attempting to do so can be harmful.
Definition of change
Various ex-gay organizations have working definitions of change. Exodus International describes change as, "attaining abstinence from homosexual behaviors, lessening of homosexual temptations, strengthening their sense of masculine or feminine identity, correcting distorted styles of relating with members of the same and opposite gender." People Can Change defines change as, "any degree of change toward greater peace, satisfaction and fulfillment, and less shame, depression and darkness", and emphasizes that for most people, heterosexuality is not the ultimate goal.When the term ex-gay was introduced to professional literature in 1980, E. Mansell Pattison defined it as describing a person who had "experienced a basic change in sexual orientation". Some ex-gays advocate entering (or remaining) in a heterosexual marriage as part of the process. Some in mixed-orientation marriages acknowledge that their sexual attractions remain primarily homosexual, but seek to make their marriages work anyway. The president of Exodus International said that he agrees that people cannot necessarily change their sexual orientation, but he said that they can, "live in accord with their beliefs and faith".
Motivation of participants
The American Psychological Association reported that some ex-gay groups may help counteract and buffer minority stress, marginalization, and isolation in ways similar to other support groups, such as offering social support, fellowship, role models, and new ways to view a problem through unique philosophies or ideologies. Additionally, the same researchers also found that people joined ex-gay groups due to: a lack of other sources of social support; a desire for active coping, including both cognitive and emotional coping; and access to methods of sexual orientation identity exploration and reconstruction. The same report found that some have described the ex-gay groups as, "a refuge for those who were excluded both from conservative churches and from their families, because of their same-sex sexual attractions, and from gay organizations and social networks, because of their conservative religious beliefs." According to the APA report, "Ex-gay groups appear to relieve the distress caused by conflicts between religious values and sexual orientation and help participants change their sexual orientation identity, but not their sexual orientation." The APA goes on to report that some believed that by, "taking on 'ex-gay' cultural norms and language and finding a community that enabled and reinforced their primary religious beliefs, values, and concerns", that they could resolve identity conflicts by, "(a) adopting a new discourse or worldview, (b) engaging in a biographical reconstruction, (c) embracing a new explanatory model, and (d) forming strong interpersonal ties." One of the APA's sources for the report found that, "ex-gay groups recast homosexuality as an ordinary sin, and thus salvation was still achievable." Another one of their sources is summarized as having observed that, "such groups built hope, recovery, and relapse into an ex-gay identity, thus expecting same-sex sexual behaviors and conceiving them as opportunities for repentance and forgiveness." The APA report warns however that, "some [ex-gay] groups may reinforce prejudice and stigma by providing inaccurate or stereotyped information about homosexuality."
Ex-gay organizations
The first ex-gay ministry, Love in Action, was formed in 1973. Three years later, with other ex-gay organizations, it formed Exodus International, the largest ex-gay organization and the largest organization under the Exodus Global Alliance. Other ex-gay organizations cater to a specific religious groups, such as Courage International for Catholics, Evergreen International for Mormons (LDS), and JONAH for Jews.
Some groups follow a specific technique, such as Homosexuals Anonymous, modeled after the Alcoholics Anonymous twelve-step program. Other ex-gay organizations include Parents and Friends of Ex-Gays and Gays.
People associated with the ex-gay movement
||This section has multiple issues. Please help improve it or discuss these issues on the talk page.
- Joe Dallas is the program director of Genesis Counseling. He has written six books on human sexuality.
- Donnie McClurkin wrote about his experience with homosexuality in his book, Eternal Victim, Eternal Victor. He describes himself as going through a process by which he became "saved and sanctified." McClurkin has been criticized for stating homosexuality is a curse. He speaks openly about sexual issues since becoming the biological father of a child with a woman to whom he was not married. He uses these experiences in his concerts and speaking engagements. In 2004, he sang at the Republican National Convention. The appearance generated criticism for the event organizers and McClurkin for his statements on homosexuality.
- Jeffrey Satinover is an American psychiatrist, psychoanalyst, and physicist. He is a member of the Scientific Advisory Committee of NARTH.
- Charles Socarides was an American psychiatrist, psychoanalyst, physician, educator, and author. He helped found NARTH in 1992.
People who no longer support the ex-gay movement
- Günter Baum originally founded an ex-gay ministry in Germany. Later he formed Zwischenraum, which helps gay Christians to accept their sexuality and to reconcile it with their beliefs.
- John Paulk, then leader of Focus on the Family's Love Won Out conference and chairman of the board for Exodus International North America, was spotted visiting a Washington, D.C. gay bar in September 2000. He was photographed outside of the bar from behind by Wayne Besen, and later stepped down from the two organizations. In 2013, he formally apologized for his involvement in promoting the ex-gay concept and for the harm his work had done.
- Anthony Venn-Brown is a former Australian evangelist in the Assemblies of God and an author whose book describes his experience in Australia’s first ex-gay program. Venn-Brown co-founded "Freedom 2 b[e]" which offers support to GLBT people from church backgrounds and who have been displaced from the ex gay movement. In 2007 he co-ordinated the release of a statement from five Australian ex-gay leaders who publicly apologized for their past actions.
- John Smid was the leader of Love In Action in Memphis. He resigned that position in 2008, and in 2010 apologized for any harm that he'd caused, noting that his teen program "further wounded teens that were already in a very delicate place in life." He has announced that he is still homosexual and admitted never seeing a man successfully converting to heterosexuality in his group.
- Warren Throckmorton is a past president of the American Mental Health Counselors Association. He wrote and produced the documentary I Do Exist about ex-gay people, but subsequently came to "believe that categorical change in sexual attractions, especially for men, is rare" and repudiated some of the claims he made in the film.
- Peterson Toscano is an actor who was involved in the ex-gay movement for 17 years. He performs a related one-man satire titled Doin' Time in the Homo No Mo Halfway House, and with Christine Bakke co-runs Beyond Ex-Gay, a support website for people coming out of ex-gay experiences.
Sexual orientation change efforts
Some ex-gay organizations, such as Exodus International, recommend to their members that they undertake sexual orientation change efforts, such as conversion therapy. Exodus warns against going to counselors that tells the patient that they "can definitely eliminate all attractions to your same gender, or that you can definitely acquire heteroerotic attractions." Evergreen International does not advocate any particular form of therapy, and warns that "therapy will likely not be a cure in the sense of erasing all homosexual feelings."
SOCE are controversial and the American Psychological Association reported that, "the available evidence, from both early and recent studies, suggests that although sexual orientation is unlikely to change, some individuals modified their sexual orientation identity (i.e., individual or group membership and affiliation, self-labeling) and other aspects of sexuality (i.e. values and behavior)." Virtually all major mental health organizations have adopted policy statements cautioning the profession and the public against treatments that purport to change sexual orientation. The National Association for Research & Therapy of Homosexuality, an ex-gay organization, argues that mainstream health and mental health organizations have, in many cases, taken public positions on homosexuality and same-sex marriage that are based on their own social and political views rather than the available science.
In 2012, the Pan American Health Organization (the North and South American branch of the World Health Organization) released a statement cautioning against services that purport to "cure" people with non-heterosexual sexual orientations as they lack medical justification and represent a serious threat to the health and well-being of affected people, and noted that the global scientific and professional consensus is that homosexuality is a normal and natural variation of human sexuality and cannot be regarded as a pathological condition. The Pan American Health Organization further called on governments, academic institutions, professional associations and the media to expose these practices and to promote respect for diversity. The World Health Organization affiliate further noted that gay minors have sometimes been forced to attend these "therapies" involuntarily, being deprived of their liberty and sometimes kept in isolation for several months, and that these findings were reported by several United Nations bodies. Additionally, the Pan American Health Organization recommended that such malpractices be denounced and subject to sanctions and penalties under national legislation, as they they constitute a violation of the ethical principles of health care and violate human rights that are protected by international and regional agreements.
Controversy over teenagers
A controversial aspect of the ex-gay movement has been the focus of some ex-gay organizations on gay teenagers, including occasions where teenagers have been forced to attend ex-gay camps against their will by their parents. A 2006 report by the National Gay and Lesbian Taskforce outlined evidence that ex-gay and conversion therapy groups were at the time increasingly focusing on children. Several legal researchers have responded to these events by arguing that parents who force their children into aggressive conversion therapy programs are committing child abuse under various state statutes.
One case of emancipation involved Lyn Duff. Duff was admitted to Rivendell Psychiatric Center in West Jordan, Utah on December 19, 1991, at age fifteen, after being involuntarily transported there at her mother’s behest. Duff was subjected to a regimen of conversion therapy, including aversion therapy, hypnosis, psychotropic drugs, solitary confinement, therapeutic messages linking lesbian sex with "the pits of hell", behavior modification techniques, unreasonable forms of punishment for small infractions, and "positive peer pressure" group sessions in which patients demeaned and belittled each other for both real and perceived inadequacies. On May 19, 1992, after 168 days of incarceration, Duff escaped from Rivendell and traveled to San Francisco, where she lived on the streets and in safe houses. In 1992, Duff initiated legal action against the facility and her mother.
The ex-gay organization Love in Action was involved in a controversy surrounding a teenager. In July 2005, The New York Times ran a feature story about 16-year-old Zachary Stark, whose parents forced him to attend an ex-gay camp run by the group. In July 2005, Stark was released from the camp. An investigation of the camp by the Tennessee Department of Children's Services did not uncover signs of child abuse. In September 2005, Tennessee authorities discovered that unlicensed staff had been administering prescription drugs. A settlement was reached shortly thereafer. LIA closed the camp in 2007.
See also
- Environment and sexual orientation
- Mixed-orientation marriage
- American Family Association v. City and County of San Francisco
- "Just the Facts about Sexual Orientation & Youth". American Psychological Association. Retrieved 2011-04-02.
- "Bachmann Silent on Allegations Her Clinic Offers Gay Conversion Therapy". ABC News. Retrieved June 13, 2011.
- "What's your "success rate" in changing gays into straights?". Retrieved 2007-03-27.[dead link]
- What Do We Mean by Change[dead link]
- Throckmorton, Warren; Pattison, M. L. (June 2002). "Initial empirical and clinical findings concerning the change process for ex-gays". Professional Psychology: Research and Practice (American Psychological Association) 33 (3): 242–248. doi:10.1037/0735-7028.33.3.242.
- "No easy victory". Christianitytoday.com. March 11, 2002. Retrieved November 13, 2011.
- Ex-gay or just exploited?, Orange County Register, June 17, 2007
- APA Task Force on Appropriate Therapeutic Responses to Sexual Orientation. (2009). "Report of the Task Force on Appropriate Therapeutic Responses to Sexual Orientation." Washington, DC: American Psychological Association. Accessed August 2, 2011
- Levine, M., Perkins, D. D., & Perkins, D. V. (2004). Principles of community psychology: Perspectives and applications (3rd ed.). New York: Oxford University Press.
- Folkman, S., & Lazarus, R. S. (1980). An analysis of coping in a middle-aged community sample. Journal of Health and Social Behavior, 21, 219–239.
- Ponticelli, C. M. (1999). Crafting stories of sexual identity reconstruction. Social Psychology Quarterly, 62, 157–172.
- Wolkomir, M. (2001). Emotion work, commitment, and the authentication of the self: The case of gay and ex-gay Christian support groups. Journal of Contemporary Ethnography, 30, 305–334.
- Erzen, T. (2006). Straight to Jesus: Sexual and Christian conversions in the ex-gay movement. Los Angeles:University of California Press.
- History. Retrieved April 14, 2007.
- "Homosexuals Anonymous Fellowship Services – Home". Ha-fs.org. Retrieved November 13, 2011.
- Kwon, Lillian (June 25, 2007). "Exodus Freedom Speaker Warns of 'The Gay Gospel'". Christian Post.
- "Joe Dallas l Genesis Counseling l Sexual Addiction Recovery". Joedallas.com. Retrieved November 13, 2011.
- DL Foster ((ISBN 1-56229-162-9)). "Eternal Victim/Eternal Victor: Making the Case for Victory".
- Richard Leiby (August 29, 2004). "Donnie McClurkin, Ready to Sing Out Against Gay 'Curse'". The Washington Post.
- Lawton, Kim (May 6, 2005). "PROFILE: Donnie McClurkin (Interview)". PBS Religion & Ethics NewsWeekly.
- "The Donnie McClurkin Story:From Darkness to Light". Donnie McClurkin. November 23, 2004.
- "News :: GLBT". EDGE Boston. October 24, 2007. Retrieved November 13, 2011.
- "Dr. Jeffrey Satinover Testifies Before Massachusetts Senate Committee Studying Gay Marriage". April 28, 2003. Retrieved August 21, 2011.
- "A Tribute to Charles W. Socarides". Retrieved August 21, 2011.
- Evangelical Press with additional reporting by Jody Veenker (October 1, 2000). "Ex-Gay Leader Disciplined for Gay Bar Visit". Christianity Today. Retrieved 2007-08-29.
- Besen, Wayne (2003). Anything but Straight: Unmasking the Scandals and Lies Behind the Ex-Gay Myth. Harrington Park Press. ISBN 1-56023-445-8.
- "Anthony Venn-Brown: Book".
- Freedom 2 b[e]
- "Former "Ex-Gay" Leaders in Australia Apologize, Claim That Ex-Gay Conversion Does More Harm Than Good". Soulforce.org. Retrieved November 13, 2011.
- Branston, John. "Fly on the Wall | The Fly-By". Memphis Flyer. Retrieved November 13, 2011.
- Jason says: (March 30, 2010). "Ex-gay leader apologises | Star Online". Starobserver.com.au. Retrieved November 13, 2011.
- "Where is the repentance?". Grace Rivers. October 7, 2011. Retrieved November 13, 2011.
- "I Do Exist FAQs". 2008. Retrieved August 21, 2011.
- "A new test of orthodoxy". Wthrockmorton.com. Retrieved November 13, 2011.
- Exodus International Policy Statements, Exodus International. Retrieved July 4, 2007.
- "How to Find the Right Counselor for You – Exodus International". Exodusinternational.org. January 11, 2010. Retrieved November 13, 2011.
- Evergreen Myths The Bottom Line: Evergreen does not advocate any particular form of therapy."
- "Therapy-Evergreen International-Helping Latter-Day Saints overcome same-sex attraction (homosexuality)". Evergreeninternational.org. Retrieved November 13, 2011.
- "Expert affidavit of Gregory M. Herek, PhD" (PDF). Retrieved November 13, 2011.
- Royal College of Psychiatrists: Royal College of Psychiatrists’ Position Statement on Sexual Orientation
- Letter from the Attorney General of the United States to the Speaker of the U.S. House of Representatives, RE: DOMA, February 23, 2011,"Second, while sexual orientation carries no visible badge, a growing scientific consensus accepts that sexual orientation is a characteristic that is immutable"
- ""Therapies" to change sexual orientation lack medical justification and threaten health". Pan American Health Organization. Retrieved May 26, 2012. archived here.
- Cianciotto, J.; Cahill, S. (2006). "Youth in the crosshairs: the third wave of ex-gay activism" (PDF). National Gay and Lesbian Task Force. Retrieved 2007-08-29.
- Hicks, A (1999) Reparative Therapy: Whether Parental Attempts to Change a Child's Sexual Orientation Can Legally Constitute Child Abuse; Retrieved January 29, 2011
- Talbot, T. Reparative therapy for homosexual teens: the choice of the teen should be the only choice discussed, 27 J. Juv. L. 33. 2006.
- Cohan, J. Parental Duties and the Right of Homosexual Minors to Refuse "Reparative" Therapy, 11 Buff. Women's L.J. 67, 2002.
- Mirken, Bruce (June 1994). "Setting Them Straight". San Francisco: 10 Percent. pp. 54–60.
- PRESS CLIPSVillage Voice (New York, NY), October 06, 1998, 1595 words, by Andy Hsiao
- Chris Holmlund & Justin Wyatt (2005) "Contemporary American independent film: from the margins to the mainstream" page 190. Psychology Press. http://books.google.com/books?id=9sYDqH2FAcsC&pg=PA190&dq=%22Lyn+Duff%22&hl=en&ei=dIP5TOu4IdK5hAfMmvSSCQ&sa=X&oi=book_result&ct=result&resnum=8&ved=0CEkQ6AEwBw#v=onepage&q=%22Lyn%20Duff%22&f=false
- "Gender identity problems; Gays angered about doctors forcing issue" The Houston Chronicle, August 2, 1995, Wednesday, 2 STAR Edition, HOUSTON; Pg. 3, 1310 words, CAROLE RAFFERTY; Knight-Ridder Tribune News
- Pela, Robert L. (November 11, 1997). "Boys in the dollhouse, girls with toy trucks". The Advocate. pp. 55–59.
- . The Lambda Update. Fall 1993. p. 4. Missing or empty
- David B. Cruz (1999) "Controlling Desires: Sexual Conversion and the Limits of Law" Southern California Law Review 72:1297. http://www-bcf.usc.edu/~usclrev/pdf/072502.pdf
- CHURCHER, Sharon (1998) "GOING STRAIGHT." Sunday Mail (Queensland, Australia), September 6, 1998, Sunday, NEWS; Pg. 40, 1274 words
- Ladie Terry. (1994) 'ORPHANS' SPEAK OUT. San Jose Mercury News (California) Tuesday MORNING FINAL EDITION. December 13, 1994. EDITORIAL; Pg. 7B
- Family Law, Public Policy and New Federalism by Steven K. Wisensale. Retrieved July 10, 2007.
- Williams, Alex (July 17, 2005). "Gay Teenager Stirs a Storm". New York Times. Retrieved 2007-10-06.
- Palazzolo, Rose (June 28, 2005). "Ex-Gay Camp Investigation Called Off". ABC News. Retrieved November 13, 2011.
- Ex-GayTruth.com, presents issues related to the ex-gay movement from a conservative Christian perspective
- Christian Perspectives on Homosexuality and Bisexuality at the Open Directory Project
- Views Opposing Homosexuality and Bisexuality at the Open Directory Project
- Beyond Ex-Gay Support website co-run by Peterson Toscano and Christine Bakke, for people coming out of ex-gay experiences
- Cure for Love, a National Film Board of Canada documentary | <urn:uuid:0a602731-86d0-446c-b588-47fc66f98d5e> | CC-MAIN-2013-20 | http://en.wikipedia.org/wiki/Ex-gay_movement | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705195219/warc/CC-MAIN-20130516115315-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.917492 | 4,708 | 3.09375 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
Exposure to radiation short term and infrequently does not do significant harm. Chronic long term exposure to even lower levels can cause significant cellular damage leading to mutations and cancer.
There are certain nutrients which protect the cells from the compounds making up radiation such as: cesium-137 and radioactive iodine. Potassium Iodide (KI) is most well-known to protect the thyroid from radioactive iodine. Given that most Americans are Iodine deficient, supplementing with 200 mcg a day of Potassium Iodide may do the general population some good in general - even without radioactive fallout concerns. Over half of pregnant women in the USA are iodine deficient which sets up the newborn to mental retardation. However, potassium iodide is by far not the only nutrient needed to protect the body from radioactive fallout.
Complete trace minerals are needed. When the body is deficient in minerals, the more apt it is to absorb heavy metals and radiation. Sulfur compounds such as n-acetyl-l-cysteine and MSM are also useful in protecting the liver, lungs and kidneys.
Taking hot Epsom salt baths to help sweat and pull out heavy metals is good. Adding Moor Mud to enhance sweating and detoxification is even better. Make sure to replace electrolytes and additional minerals after profuse sweating.
Probiotics are known to protect the intestines from radiation-induced diarrhea and likey also help prevent absorption of heavy metals found in radioactive fallout. Supplementing with L-Glutamine to prevent damage and/or heal the small intestine may be necessary. Sodium Butyrate or Cal/Mag Butyrate may be needed to help heal the large intestine from radiation-induced intestinal and colon damage.
Greens such as spirulina, wheat grass, chlorella along with Miso, tempeh, kombu and other seaweeds are excellent detoxifiers and supporters of healthy iodine levels.
Questions about Radiation Exposure? Please post at the Radiation Exposure Forum and your questions will be answered.
The Radiation Exposure Forum has some excellent documents available for download to help you prepare further. Do visit this forum and download. Again, questions, do ask. | <urn:uuid:e1beccbb-f3c6-468c-8f4d-17096b5b8e8c> | CC-MAIN-2013-20 | http://healthygoods.com/natural-treatment-products/radiation-exposure-detox.html?food_restrictions=325&hypoallergenic=32542 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705195219/warc/CC-MAIN-20130516115315-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.918099 | 442 | 3.21875 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
Cardio and weight training are two important components of well-balanced fitness plans. Knowing which types of exercises fall into which category can help you construct your workouts more effectively, and can give you more options so you don’t get bored with your workouts. When designing your fitness plan, consider adding some stretching and flexibility training. Simply add a few minutes of stretching at the end of your cardio and weight training workouts.
Cardio, or aerobic, exercises require you to move the large muscle groups in your hips, legs and arms. The movement must be continuous and rhythmic, and you must move for a sustained period. The Centers for Disease Control and Prevention recommends that adults get at least 2 1/2 hours of moderate-intensity cardio exercise each week. Alternately, you can perform an hour and 15 minutes of vigorous cardio exercise. By regularly performing cardio exercise, you can improve your cardiovascular health, manage your weight more easily and enjoy a sense of well-being.
Examples of Cardio Exercises
Examples of cardio exercise include basketball, biking, brisk walking, dancing, jogging, jumping rope, rowing, running, swimming, tennis and water aerobics. Even some household chores -- such as mowing the lawn -- can count as cardio. The intensity with which you perform these activities determines whether they are moderate or vigorous. Moderate-intensity cardio exercises will raise your heart rate and make you breathe faster, while still allowing you to talk. When performing vigorous cardio exercises, you will find it difficult to say more than just a few words before pausing to breathe.
Weight Training Exercises
In weight-training exercises, you generally focus on one muscular group at a time, doing enough repetitions of the exercise to tire the muscles. The Centers for Disease Control and Prevention recommends that adults do weight-training exercises at least twice a week. Ideally, target all your major muscle groups: chest, shoulders, arms, abdomen, back, hips and legs. By performing weight-training exercises, you can build strength in your muscles, increase the amount of lean muscle in your body, manage your weight more easily and lower your risk of injury.
Examples of Weight-Training Exercises
You can perform weight-training exercises with free weights -- dumbbells and barbells. Examples of these exercises include biceps curls and squats. Weight machines offer other options for weight training. You can perform leg presses, standing calf raises, chest flyes and pull-down exercises on these machines. Other types of weight-training exercises require you to move your own body weight. These include triceps dips, situps and pushups. Although technically not weight-training exercises, resistance band exercises offer more options for strength training. You can perform variations on traditional weight-training exercises -- such as biceps curls, lunges, chest flyes and overhead presses -- with these resistance bands. | <urn:uuid:f10a38f2-0a57-4cdb-9af8-38889e1e30a2> | CC-MAIN-2013-20 | http://healthyliving.azcentral.com/examples-cardio-weight-training-exercises-6050.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705195219/warc/CC-MAIN-20130516115315-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.936896 | 586 | 3 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
"Earth's north magnetic pole is drifting away from North America and toward Siberia at such a clip that Alaska might lose its spectacular Northern Lights in the next 50 years, scientists said Thursday.
Despite accelerated movement over the past century, the possibility that Earth's modestly fading magnetic field will collapse is remote. But the shift could mean Alaska may no longer see the sky lights known as auroras, which might then be more visible in more southerly areas of Siberia and Europe.
The magnetic poles are part of the magnetic field generated by liquid iron in Earth's core and are different from the geographic poles, the surface points marking the axis of the planet's rotation.
Scientists have long known that magnetic poles migrate and in rare cases, swap places. Exactly why this happens is a mystery." | <urn:uuid:ce523f79-8529-46ef-b3cd-13f41acb24f6> | CC-MAIN-2013-20 | http://hisnibs.blogspot.com/2005/12/earths-magnetic-pole-drifting-quickly.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705195219/warc/CC-MAIN-20130516115315-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.938425 | 159 | 3.265625 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
by Oliver LaMère
retold by Richard L. Dieterle
When the villagers found out about this they went hunting for the raccoon. As hard as he tried, Raccoon could not control his laughter, and soon the villagers found him. After they shot him dead, they took his hide and fastened it to a tree trunk.
Commentary. "fell into the lake" — raccoons have the odd habit of taking their prey and "washing" them in water before eating them. (Few scientists actually believe that they are washing their food, but just what they are doing is a subject of speculation.) Thus the raccoon causes many other animals to take an unwilling bath, in a way that looks like a cruel joke.
"Raccoon could not control his laughter" — in contemporary America, raccoons are noted for the mischief they cause in invading trash cans to eat discarded food. They generally come out only in the dark when all humans are blind, but the noise they make in the course of this mischief usually gives them away, making it easy for hunters to dispatch them.
"a tree trunk" — ne other waiką associates tree trunks with raccoons. The association may derive at least partly from raccoons using the water that collects in tree stumps to emerse their food before eating it. However, there is probably much more to it.
Comparative Material: A Lakota story has some interesting similarities to our Hočąk tale. One day as Hare was wandering about, he encountered a solitary lodge that looked very much like an oak tree. There inside he found an old man who had gone completely blind. The grandfather told Hare that the Great Spirit had provided for him by giving him bags of food of the very best kind so that he would not be in want; furthermore, a rope path had been constructed to the lake, and another one out into the woods where firewood could be gathered. Hare thought this an idyllic life, and offered to trade his own eyes for the grandfather's lodge. The grandfather warned him, but Hare would not be dissuaded. So the two of them made the trade. Hare loved the easy and tasty food, but had to go to the lake to fetch some water. Unlike the old grandfather, Hare walked briskly and when he stumbled, he pulled half the rope down. Soon he was navigating without any guide and suddenly fell down a slippery slope into the lake. Later he went out to fetch firewood, but broke that rope too, and could not find his way back. So he called upon his brother, who could always hear him, for aid. His brother brought the grandfather back and the traded back again. The old man liked the bow and arrow, but was too feeble to easily use them and was glad to be back to his lodge in the oak tree.
The Hidatsa story replaces Raccoon with Coyote. One day Coyote was traveling about when he came across a lodge with a string attached to it leading down to the river bank. There he saw an old man fishing. Inside the lodge was another very old man sleeping. He soon discovered that both these men were blind. The man at the river caught a fish, but Coyote quietly scooped it up and brought it back to the lodge. The other man got up and began to prepare a kettle for the fish he found inside. Meanwhile, the other old man noticed his fish was missing. The second man told him that he had a fish, and that they could share it, but Coyote had taken the fish and eaten everything but the bones, which he threw back into the pot. When they took out the fish, they found only bones. Each accused the other of having eaten it. Coyote swatted each with a hot poker, and they were soon fighting one another. Eventually, they realized that they had been hit with a single stick, but by then Coyote had gone back to the village.
Stories: featuring raccoons as characters: The Abduction and Rescue of Trickster, The Were-fish, Lake Wąkšikhomįgra (Mendota): the Origin of Its Name, The Spirit of Maple Bluff, Bladder and His Brothers, The Raccoon Coat, Trickster and the Mothers; mentioning blind people: A Raccoon Tricks Four Blind Men, Hare Visits the Blind Men, The Raccoon Coat, Big Eagle Cave Mystery, The Roaster, Eats the Stinking Part of the Deer Ankle, Owl Goes Hunting.
Themes: blindness:The Raccoon Coat, A Raccoon Tricks Four Blind Men, Hare Visits the Blind Men, Big Eagle Cave Mystery, Thunderbird and White Horse; people are led astray by a raccoon: A Raccoon Tricks Four Blind Men, Bladder and His Brothers; people who can't see are misdirected: Trickster Eats the Laxative Bulb; a spirit tricks men into fighting one another: A Raccoon Tricks Four Blind Men, Hare Visits the Blind Men.
Charles Edward Brown, Moccasin Tales (Madison, Wisc.: State Historical Museum, 1935) 4-5. Informant: Oliver LaMère of the Bear Clan.
Zitkala-Ṣa, "Mastin, the Rabbit," Old Indian Legends (Lincoln: Univesity of Nebraska Press, 1901) 147-151.
Mrs. Good Bear, "38. Coyote and Two Blind Men," in Martha Warren Beckwith, Mandan and Hidatsa Tales: Third Series (Poughkeepsie: Vassar College, 1934) 287. | <urn:uuid:1cd5451f-9df4-4431-b9f7-bdb97779975a> | CC-MAIN-2013-20 | http://hotcakencyclopedia.com/ho.RaccoonAndBlindmen.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705195219/warc/CC-MAIN-20130516115315-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.974801 | 1,179 | 2.703125 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
Download Full Text (640 KB)
Decision-making problems in water resources are often associated with multiple objectives and multiple stakeholders. To enable more effective and acceptable decision outcome, it is required that more participation is ensured in the decision making process. This is particularly relevant for flood management problems where the number of stakeholders could be very large. Although application of multi-objective decision-making tools in water resources is very wide, application with the consideration of multiple stakeholders is much more limited. The solution methodologies adapted for multi-objective multi-participant decision problems are generally based on aggregation of decisions obtained for individual decision makers. This approach seems somewhat inadequate when the number of stakeholders is very large, as often is the case in flood management.
The present study has been performed to have an overview of existing solution methodologies for multi-objective decision making approaches in water resources. Decision making by single and multiple stakeholders has been considered under both deterministic and uncertain conditions. It has been found that the use of fuzzy set theory to represent various uncertainties associated with decision making situations under multi-objective multiple-participant environment is very promising. Coupled with multi-objective methods (e. g. compromise programming and goal programming), fuzzy approach has also the ability to support group decisions, to reflect collective opinions and conflicting judgments.
Department of Civil and Environmental Engineering, The University of Western Ontario
London, Ontario, Canada
Overview, Multiple objectives, Multiple stakeholders, Decision-making, Flood management
Civil and Environmental Engineering
Akter, Taslima and Simonovic, Slobodan P., "A General Overview of Multi-objective Multiple-participant Decision Making for Flood Management" (2002). Water Resources Research Report. Book 4. | <urn:uuid:5b18e500-d11b-4eb5-a6be-701a29cd8ec5> | CC-MAIN-2013-20 | http://ir.lib.uwo.ca/wrrr/4/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705195219/warc/CC-MAIN-20130516115315-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.920057 | 352 | 2.625 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
Contrary to what you may have heard, acne is not caused by dirty skin. Acne is caused by overactive oil glands in the skin and an accumulation of oil, dead skin cells, and bacteria, which leads to inflammation in pores.
Oil glands become stimulated when hormones become active during puberty, which is why people are likely to get acne in their teens. Because the tendency to develop acne is partly genetic, if other people in your family had (or have) acne, you may be more likely to develop it too.
Although there is no surefire way to prevent acne, try these tips to help reduce the number and severity of your breakouts:
Washing your skin is essential (it helps remove excess surface oils and dead skin cells that can clog your pores), but washing too much can actually cause damage by overdrying your skin or irritating existing acne.
Remember to wash after exercising because sweat can clog your pores and make your acne worse. If you work around greasy food or oil or if you've been sweating from heat or because you've been working hard, wash your face and other acne-prone areas as soon as possible.
If you use skin products, such as lotions or makeup, look for ones that are noncomedogenic or nonacnegenic, which means that they don't clog pores.
If you can't live without your hair spray or styling gel, be sure to keep them away from your face as much as possible. Many hair products contain oils that can make acne worse. Try to use water-based products.
If you get acne on areas such as your chest or back, avoid wearing tight clothes, which can rub and cause irritation.
For some people, over-the-counter (OTC) products work to help clear up acne. It may take some time to find one that works best for you — some may not do the trick and others may cause irritation. OTC acne products come in different strengths. The most popular and effective OTC acne-fighting ingredient is benzoyl peroxide. Another ingredient, salicylic acid, can help to dry up pimples.
If you find OTC products aren't working for you, it's best to seek a doctor's advice. A doctor can prescribe special gels or creams, pills, or a combination of both. It may feel a bit awkward or embarrassing to talk about your acne with someone, but your doctor is trained to help get your skin looking its best.
What about pimples you already have? It's tempting, but popping or squeezing a pimple usually won't get rid of the problem. Squeezing can actually push infected material and pus further into the skin, which can lead to more swelling and redness (not what you want before a big date!), and even scarring, which can be permanent.
If you're taking a prescription acne medication, finish your entire prescription even if your skin clears up, unless your dermatologist says you can stop. If you stop too early, there's a chance your skin could break out all over again.
Eating nutritious foods can help keep you healthy, of course, and your skin will benefit from getting enough vitamins and minerals. But the bottom line is that you don't need to be obsessive about what you eat or how often you wash your face to control acne. If you don't find an OTC product that works for you, talk to your doctor or a dermatologist for some advice on living through the acne years. | <urn:uuid:dd229a25-4cfa-4ed4-ba81-bf5cd254f650> | CC-MAIN-2013-20 | http://kidshealth.org/PageManager.jsp?dn=PrimaryChildrensMedicalCenter&lic=5&cat_id=20118&article_set=20281&ps=204 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705195219/warc/CC-MAIN-20130516115315-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.963999 | 717 | 2.921875 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
"The Free Application for Federal Student Aid (known as the FAFSA) is a form that can be prepared annually by current and prospective college students (undergraduate and graduate) in the United States to determine their eligibility for student financial aid (including the Pell Grant, Federal student loans and Federal Work-Study).
Despite its name, the application is not for a single federal program, being rather the gateway of consideration for:
- the nine federal student-aid programs
- the 605 state aid programs
- most of the institutional aid available" (Wikipedia)
A searchable list of the school codes used to complete the Free Application for Federal Student Aid (FAFSA). From the U.S. Department of Education.
"Five federal agencies -- U.S. Department of Agriculture, U.S. Department of Education, U.S. Department of Housing and Urban Development, U.S. Small Business Administration, and the U.S. Department of Veterans Affairs -- have come together to create this single point of access for federal loan information on the Web." Browse or search for loans for farming, businesses, students, disaster relief, and more. Includes a glossary of loan terms and links to additional resources."
This site from the U.S. Department of Education's Federal Student Aid (FSA) program describes funding and loan repayment considerations relating to attending schools from elementary through graduate. Also find information about preparing for college, selecting a school, and applying to a program. Provides information for students, parents, and counselors. Available in English and Spanish. Searchable.
Shelf Location: Reference LB 2337.4S3536 2010-2012
Shelf Location: Reference LB 2337.2 M663 2010-2012
Shelf Location: Reference LB 2337.2 M667 2010-2012
Shelf Location: Reference LB 2338 S35 2012
Provides information on financial aid for the student who is completing high school; who is starting or is already enrolled in post-secondary education; who is a graduate student, a post-graduate student, a researcher, or a student of law, medicine, dentistry or veterinary medicine.
Shelf Location: General Collection LB 2338 T36 2012
Resource center for re-entry and nontraditional students, with lots of information about everything from choosing a college to using academic reference materials.
"National Security Education Program (NSEP) is a unique scholarship opportunity for U.S. undergraduates to gain knowledge of languages and cultures in areas of the world less frequently studied."
A free website for finding scholarships. This requires an extensive registration.
This scholarship application site is for currently enrolled Truman students to apply for scholarships that will be awarded in subsequent semesters at Truman.
Peterson's Undergraduate Financial Aid Database is a comprehensive source of information about college- administered financial aid sources for undergraduate students. The data elements included describe the kinds of aid these students receive at a given institution, and how much aid of each type—need- based and non-need based (specific characteristics, special talents, or achievements)—is typically awarded, as well as self-help options like work-study jobs and various college-administered loan programs. Also included are data describing aid awarded to the entering freshman class and undergraduate international students. Required financial aid forms and filing deadlines, notification dates, and reply deadlines are also contained in this database.
This site has information for Truman students about automatic scholarships; competitive scholarships and scholarship renewal.
Features information about the programs, scholarships, and member colleges of this "minority higher education assistance organization." Include a timeline of the organization, information about scholarships for students attending historically Black colleges and universities, and profiles of member colleges (browsable by name and discipline).
Tel: (660) 785-7417
= Restricted resource
= Some full text
= OpenURL enabled
= Video files
= Audio files | <urn:uuid:55af01f2-9acd-4834-b978-0d7439137c94> | CC-MAIN-2013-20 | http://library.truman.edu/subsplus/subjects/guide.php?subject=fellowships | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705195219/warc/CC-MAIN-20130516115315-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.92012 | 802 | 2.625 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
There's big doings down there in Corvallis, Oregon as Oregon State University begins construction on an ambitious $5 million facility to test a "hot" new nuclear technology. Although a number of new tech designs incorporating small size and passive water-cooled systems - making them meltdown-proof - have been tested (and Corvallis spinoff NuScale has reportedly begun marketing such modular systems), the design this facilty will test is a new "superhot" version, cooled by helium.
Operating temperature is about 2000 degrees; three times hotter than other nuke plants, but the design precludes meltdowns while producing electricity some 50% more efficiently than current alternatives - with half the waste. Moreover, than can also produce hydrogen for fuel cells, and efficiently desalinate water.
And the apocalyptic Greenies will love this part: it produces zero "greenhouse gas" emissions. Better yet, the system's being built in Newberg, Oregon. Sort of like "farm to fork" science. Think of the reduction in "carbon footprint" achieved by buying locally!
There is one teeny problem: the planet's running out of helium, and man-made global warming aside, we're presently too cold to make more of the stuff. If this tech takes off, we may need to send robot ships off-planet to capture and return more. | <urn:uuid:ea5fcebf-207e-4d42-8fac-30ee90da00db> | CC-MAIN-2013-20 | http://maxredline.typepad.com/maxredline/2013/02/green-energy-at-osu.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705195219/warc/CC-MAIN-20130516115315-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.91472 | 279 | 2.5625 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
The formation of counties was one of the first matters attended to by the Lords Proprietors after they received their charter in 1663 from King Charles II for the vast tract of land in America he called the province of Carolina. In 1664 the Proprietors formed "all that parte of the province which lyeth on the north east side or starboard side entering of the river Chowan now named by us Albemarle River together with the Islands and Isletts within tenn leagues thereof" into a county that they named Albemarle County for George Monck, the duke of Albemarle, himself one of the Proprietors. This was the site of the first permanent settlement in Carolina. They then divided the new county into four precincts: Currituck , Perquimans , Pasquotank , and Chowan . Albemarle County was subsequently enlarged, and in 1696 the area south of Albemarle Sound was removed from Albemarle and made into a new county, named Bath, which in turn was divided into the precincts of Beaufort , Hyde , Craven and Carteret .
The primary reason for establishing counties (or precincts) was to provide local seats of government where citizens could record documents, such as deeds or wills, and participate in court proceedings. At the same time, the sheriff was provided with a home base from which to fulfill his basic responsibilities of collecting taxes and maintaining law and order.
By 1738 Albemarle and Bath Counties had been dissolved and the 14 precincts then in existence became counties, a designation that has remained since the seventeenth century. Throughout the remainder of the colonial period, as settlement spread westward and population increased, older counties were divided and new ones formed. With statehood came an even greater rate of growth, and by 1800 the number had risen to 59 counties covering all of the state. In many cases, the dividing of counties caused heated political controversy, as eastern counties were often divided to maintain that region's majority in the state legislature against expanding representation from the piedmont and mountain regions. Shifts in population continued throughout the nineteenth century and into the twentieth century, resulting in even more counties. Larger counties were divided, and those in turn were sometimes divided yet again, until the seemingly magical figure of 100 was reached in 1911. (For a time, the number of counties was actually greater than 100, but some of these were ceded to Tennessee in 1789 and others were absorbed into other counties or never fully developed.) The number remained at 100, although in 1933 the General Assembly authorized the consolidation of existing counties subject to approval of the electorate. This could have resulted for the first time in a decrease from the 100 county figure, but as of the early 2000s there had been no such consolidations.
Initially, county government and judicial matters were in the hands of justices of the peace , who formed a body known as the Court of Pleas and Quarter Sessions . The justices were appointed by the governor, with strong input from the members of the colonial Assembly from the affected county, leaving the average citizen with no say as to who would run the government of the county in which he lived. At first the Court of Pleas and Quarter Sessions met wherever it was convenient to assemble a quorum, usually in a private home. A 1722 act of the Assembly instructed the justices to pick a site for a permanent seat of government for each precinct, where they were to buy an acre of land and build a courthouse. Whether in the early precinct days, or after the name of the local government entity was changed from precinct to county, the justices had the support of a sheriff for law enforcement, as well as a clerk of court and a register of deeds. Of the three, both the clerk of court and the register of deeds needed to remain in their offices in the courthouse, which left only the sheriff free to travel about the county. Accordingly, he was also designated tax collector, a position sheriffs continued to hold until the latter part of the twentieth century.
The general system of county government of the early colonial period, with the appointed members of the Court of Pleas and Quarter Sessions running things, was carried over into statehood, and little changed until the adoption of the North Carolina Constitution of 1868 . The system called for by the new constitution, known as the Township and County Commissioner Plan, gave control of county government to five commissioners, to be elected at large by the county's voters. In addition, each county was divided into townships whose residents elected two justices to serve as the township's governing body, as well as a three-member school committee and a constable. The new system significantly reduced the General Assembly's control of county government, since the legislators no longer appointed the justices of the peace who made up the county court.
The Township and County Commissioner Plan, patterned after one previously adopted in Pennsylvania, did not prove universally popular in North Carolina and lasted less than a decade. At a constitutional convention in 1875, the General Assembly was authorized to change the system, and in the session of 1877 townships were reduced to little more than geographic and administrative subdivisions of the counties. This seriously reduced the authority of county commissioners.
The modern system of county government, in which an elected board of commissioners is responsible for managing a county's affairs, including setting the rate and collecting taxes and determining where funds should be expended, dates to the early twentieth century. Periodically after that, the General Assembly conferred additional authority and responsibility on the county commissioners, until at the end of the century they had been provided with such a wide range of "home-rule" statutes that many counties found it impossible to run their greatly expanded business without professional help. This led to the adoption by many counties of the County Manager Plan. Under this plan, commissioners employ a county manager to serve as a sort of chief executive of the county business-in some instances, the largest business in the county-with the manager having certain independent authority, including that of hiring and firing employees.
As with other matters, the state determines what sources the counties may tap for income. Traditionally, the real estate tax has been the primary revenue source for North Carolina counties. However, especially in the last half of the twentieth century, counties were able to prevail on the General Assembly to let them collect from a variety of other sources, among those favored being local sales taxes, land transfer taxes, meals taxes, and occupancy taxes.
A. Fleming Bell, ed., County Government in North Carolina (3rd ed., 1989).
David LeRoy Corbitt, The Formation of the North Carolina Counties, 1663-1943 (1969).
1 January 2006 | Stick, David | <urn:uuid:59d1379a-70ad-4360-a62a-5e2f17f7c1b4> | CC-MAIN-2013-20 | http://ncpedia.org/print/2268 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705195219/warc/CC-MAIN-20130516115315-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.978285 | 1,382 | 3.90625 | 4 | HuggingFaceFW/fineweb-edu/sample-100BT |
European Painting before 1900, Johnson Collection
Triptych showing scenes from the Martyrdom of Saint Barbara and scenes from the Life of Christ
Master of the Laufen High Altarpiece, Austrian (active Salzburg), dated work 1467
Oil and gold on panels
EW1993-127-2a--cPurchased with the W. P. Wilstach Fund, the George W. Elkins Fund, and Museum funds, 1993
As described in The Golden Legend, written in about 1267 by Jacopo da Voragine, Saint Barbara converted to Christianity against the wishes of her pagan father. Locked in a tower by him, she ordered workmen to construct a third window inthe building to symbolize the Christian trinity. Enraged, her father turned her over to the Roman authorities for torture, and when her execution was ordered,he himself beheaded her. The left and right panels on the front of this triptychillustrate episodes from Barbara’s gruesome martyrdom.
These graphic depictions are intended to help the viewer equate Barbara’s physical torments with those of Christ, whose crucifixion is depicted in the top center composition. The figures at the top left and right, probably the apostles John and Luke, hold sayings taken from the last words of Christ on the cross, which here apply also to Barbara’s death. The bottom center panel shows Barbara enthroned in heaven, wearing a crown and holding a palm frond as symbols of victory over death. A tower and chalice, her identifying attributes, appear nearby.
Barbara’s martyrdom is paralleled on the reverse by the resurrected Christ standing in the tomb. The left and right panels of the back, which are movable and can be folded shut to appear on the front, show the angel Gabriel announcing the incarnation of Christ to the Virgin Mary.
Social Tags [?]austrian [x] gabriel [x] gold [x] martyr [x] three [x] trinity [x] triptych [x] [Add Your Own Tags]
* Works in the collection are moved off view for many different reasons. Although gallery locations on the website are updated regularly, there is no guarantee that this object will be on display on the day of your visit. | <urn:uuid:d0c2650c-5237-4c11-985b-4a7f8802ba14> | CC-MAIN-2013-20 | http://philamuseum.org/collections/permanent/103020.html?mulR=10862%7C2 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705195219/warc/CC-MAIN-20130516115315-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.924155 | 477 | 2.6875 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
Phlebotomy training is necessary for those individuals who want to develop specialized skills in order to collect blood from the patient with least amount of pain. Phlebotomy training is relatively new specialized procedure for collecting blood from the veins. The demand for trained phlebotomist grew within last two decades. Phlebotomy classes learning has made the procedure of blood collection a very safe and sterile method. Phlebotomy training is very important for those who are willing to get an extremely good job in a reputed hospital, research laboratories, research institutes, etc. This training involves providing guidance for handling and controlling biohazardous materials such as blood sample, unused sterile needles and used needles. Phlebotomy training is all about collecting, testing and transporting the blood samples with getting them spoiled.
Phlebotomy training classes
In Phlebotomy training, the students learns in detail about the human anatomy, creating patient rapport, needle technique, medical safety and the process of keeping the records. In addition to the theoretical knowledge, the student is also given practical training about handling several medical equipments including container of biohazardous waste containers, biohazardous spill kits, syringes of various sizes, dermal puncture devices, vacuum tubes, blood culture bottles, bandages, tapes, tourniquets, looking arm rest, etc. This kind of training can be done in the same way as other medical training programs. Phlebotomy training can be done as 4 year bachelors degree or a two year associate degree. Some hospitals, community colleges, research institutes also provide vocational programs from Phlebotomy training.
Phlebotomy Training : Work and Salary
After taking Phlebotomy training along with cardiopulmonary resuscitation, a person may get $10 per hour and this amount of salary increases with time and experience of the phlebotomist. It can be up to $30 per hour. The salary figure after a Phlebotomy training depends on the kind of job and the place the person is working on.
Details of Phlebotomy training
Phlebotomy training is done in order to become a certified phlebotomist. Phlebotomy certification is the best certification for a person seeking a good career in hospital field in which a person can help reduce the pain of the patient in taking blood out of patient’s body. It is done through venipuncture. Venipuncture is the process of collecting venous blood which is through anti cubital vein of the forearm. Depending on the test, almost five to six millimeters of blood is extracted from the patient. To take this training there are certain requirements which has to be fulfilled by the candidate. The very basic requirement includes high school graduate or GED. But there a certain other requirements which depends on the institution a person is applying for. The time limit for the training varies from state to state but the basic time limit is mainly 2 to 4 months of sincere training. During the Phlebotomy training, the candidate must do at least 100 unassisted blood withdrawals. Along with blood withdrawals, different uses of instruments are also taught. The candidate must take an entrance test after the training so that the candidate can take phlebotomy certification. Phlebotomy training comprises of theoretical as well as clinical interaction. | <urn:uuid:54233858-eae5-4f84-be35-59407a1c866d> | CC-MAIN-2013-20 | http://phlebotomytrainingschool.com/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705195219/warc/CC-MAIN-20130516115315-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.949455 | 682 | 2.90625 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
Women who experienced a short but severe decrease in their food intake during the 1944–1945 Dutch famine have an increased risk of breast cancer compared with women whose caloric intake was not as greatly affected, according to a study in the April 7 issue of the Journal of the National Cancer Institute.
Several animal studies have found that reducing caloric intake by one-third to one-half for the animals' lifetime prevents various types of cancer, but the implications of short-term caloric restriction are largely unknown. However, reproducing these types of studies in humans raises ethical and practical issues.
During World War II, a famine in the western part of The Netherlands resulted from a food embargo imposed by German authorities. Between 1983 and 1986, about 15,000 women participating in a Dutch breast cancer screening program who were between ages 2 and 33 during the 1944–1945 famine responded to a questionnaire about their famine experience. Sjoerd G. Elias, Ph.D., of the Julius Center for Health Sciences and Primary Care at the University Medical Center Utrecht, The Netherlands, and colleagues used data gathered from these women to study the effects of the famine on subsequent breast cancer risk.
Women were given a famine exposure score--absent, moderate, or severe exposure to famine--based on information about hunger, cold, and weight loss. The risk of breast cancer increased with increasing severity of famine exposure. For example, women who experienced severe exposure to famine had a 48% increased risk of breast cancer compared with women who were not affected by the famine. The association between famine exposure and breast cancer risk was highest among women who were between ages 2 and 9 during the famine compared with women exposed at older ages. The risk was also stronger among women who never gave birth compared with women who had children.
Although a mechanism for the increased breast cancer risk among women exposed to short-term famine is unknown, the authors suggest that several endocrine systems may adapt to the extreme conditions of the famine, particularly while such systems are developing in young children, and are consequently inadequately developed to respond to a much higher caloric intake later on in life.
"Although the 1944–1945 famine is a black page in Dutch history, it provides a unique situation in which to study the long-term consequences of a short but severe famine in humans," the authors write.
Source: Eurekalert & othersLast reviewed: By John M. Grohol, Psy.D. on 21 Feb 2009
Published on PsychCentral.com. All rights reserved.
It's so hard when I have to, and so easy when I want to.
-- Annie Gottlier | <urn:uuid:fa18dd2b-a8dd-4348-b2d1-05311016195d> | CC-MAIN-2013-20 | http://psychcentral.com/news/archives/2004-04/jotn-etf040104.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705195219/warc/CC-MAIN-20130516115315-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.971028 | 530 | 3.0625 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
← Hinduism Test
5 Written Questions
5 Matching Questions
- Rig Veda
- a a collection of over two hundred texts composed of between 900 and 200 BC that provide philosophical commentary to the Vedas
- b pleasure, especially sensual love; one of the four goals of life.
- c a collections of 1, 017 Sanskrit hymns composed about 1500BC earlier; Hinduism's oldest text.
- d the lowest of the four classes of the caste system, traditionally made up of servants and laborers.
- e a wandering ascetic who has advanced to the fourth and highest stage of life.
5 Multiple Choice Questions
- an incarnation, or living embodiment, or a deity, usually Vishnu, who is sent to earth to accomplish a divine purpose; Krishna and Rama are the most popular avatars.
- the third of the four classes of the caste system, traditionally made up of producers, such as farmers, merchants, and artisans.
- the eternal essence of reality and the source of the universe, beyond the reach of human perception and thought.
- traditional division of Hindu society into various categories; there are four main varnas; or classes:Brahmin, kshatriya, vaishya, and shudra; each class contains certain subgroups, resulting in more than three thousand categories.
- the moral law of cause and effect of actions; determines the nature of one's reincarnation.
5 True/False Questions
bhakti marga → - the most popular of the three Hindu paths to salvation, emphasizing loving devotion to one's chosen god or goddess.
dharma → the moral law of cause and effect of actions; determines the nature of one's reincarnation.
sati → cosmic illusion brought about by divine creative power.
brahmin → the highest of the four classes of the caste system, traditionally made up of priests.
Atman → pleasure, especially sensual love; one of the four goals of life. | <urn:uuid:2c840f84-d407-4483-a242-3450a637b4cf> | CC-MAIN-2013-20 | http://quizlet.com/6875551/test/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705195219/warc/CC-MAIN-20130516115315-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.890619 | 413 | 3.375 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
Wisps Before Craters
January 31, 2011
Saturn's ''wispy'' moon Dione lies in front of the cratered surface of the moon Tethys, as seen by the Cassini spacecraft.
Dione is closest to the spacecraft here. At the top of the image, the bright ''wispy'' fractures are visible on Dione (1,123 kilometers, or 698 miles, across). See Dione's Icy Wisps and Highest Resolution View of Dione to learn more. Beyond wispy Dione, the large crater Penelope can be seen near the equator of Tethys (1,062 kilometers, or 660 miles, across). See Penelope Crater for a closer view of Penelope.
Lit terrain seen here is on the trailing hemispheres of the two moons. The image was taken in visible red light with the Cassini spacecraft narrow-angle camera on Dec. 6, 2010.
The view was obtained at a distance of approximately 2.1 million kilometers (1.3 million miles) from Dione and at a Sun-Dione-spacecraft, or phase, angle of 75 degrees.
The view was obtained at a distance of approximately 2.2 million kilometers (1.4 million miles) from Tethys and at a Sun-Tethys-spacecraft, or phase, angle of 75 degrees. Scale in the original image was 12 kilometers (7 miles) per pixel on Dione and 13 kilometers (8 miles) per pixel on Tethys. The image was contrast enhanced and magnified by a factor of two to enhance the visibility of surface features.
The Cassini-Huygens mission is a cooperative project of NASA, the European Space Agency and the Italian Space Agency. The Jet Propulsion Laboratory, a division of the California Institute of Technology in Pasadena, manages the mission for NASA's Science Mission Directorate in Washington. The Cassini orbiter and its two onboard cameras were designed, developed and assembled at JPL. The imaging team is based at the Space Science Institute, Boulder, Colo.
Credit: NASA/JPL/Space Science Institute | <urn:uuid:ec77cc15-10d2-4cb2-b041-e1783d5ff714> | CC-MAIN-2013-20 | http://saturn.jpl.nasa.gov/photos/imagedetails/index.cfm?imageId=4237 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705195219/warc/CC-MAIN-20130516115315-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.910405 | 442 | 3.59375 | 4 | HuggingFaceFW/fineweb-edu/sample-100BT |
Opossums are marsupial (carries its young in a pouch). They breed in late January or early February (some will breed again in May). Females have one to two litters per year. The average litter size is seven to eight young. The female gives birth to underdeveloped young approximately 13 days after mating. At this stage, the young are about the size of a bumblebee and they must crawl to their mother's pouch where they continue to develop. Young opossums leave the pouch when they are two to three months old but remain near the female so that they can return to her pouch to nurse. By the time they are three months old, they will be weaned and on their own. The ones you found sound like they are recently weaned and on their own (about 3 months old). Sometimes the young will buddy up together for awhile after the female has weaned them and they are on their own. The female is probably not still in the garage, but you could just use a broom to Gently direct her out the door if she's still there. They hiss and show all of their teeth, but opossums are pretty much all show. | <urn:uuid:01ff31c2-e2fd-4d66-b2c3-561415618ed9> | CC-MAIN-2013-20 | http://web.extension.illinois.edu/askextension/thisQuestion.cfm?ThreadID=17900&catID=219&AskSiteID=90 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705195219/warc/CC-MAIN-20130516115315-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.98794 | 241 | 3.484375 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
Search for native plants by scientific name, common name or family. If you are not sure what you are looking for, try the Combination Search or our Recommended Species lists.
Search native plant database:
Marcus, Joseph A.
Tecoma stans (L.) Juss. ex Kunth
Yellow bells, Yellowbells, Esperanza, Yellow trumpetbush, Yellow trumpetflower, Trumpetbush, Trumpetflower, Yellow elder
USDA Symbol: test
USDA Native Status: Native to U.S.
Esperanza or Yellow bells is an irregularly shaped, deciduous shrub, normally 3-6 ft. tall in the US but more southerly varieties can reach 9 ft. It has several stems and slender, erect branches. Clusters of large, trumpet-shaped, yellow flowers are very showy against the lance-shaped, olive-green leaves. Long, thin pods are conspicuous in autumn. It has an enormous natural range, extending from south Texas west to Arizona and south through Mexico and Central America to South America as far as northern Argentina, as well as in southern Florida south through much of the Caribbean. Plants native to the southwestern US and adjacent Mexico are Tecoma stans var. angustata, which is shorter, more drought-tolerant, and more cold-tolerant than some of the tropical varieties sold in nurseries.
Anyone who has seen this plant in bloom can understand why one of its names is Yellow bells, as it produces great, attention-grabbing, yellow blossoms. In recent years, it has become a popular landscaping plant, valued as much for its drought-tolerance as for its spectacular appearance.
Bloom InformationBloom Color: Yellow
Bloom Time: Apr , May , Jun , Jul , Aug , Sep , Oct , Nov
AZ , FL , NM , TX Native Distribution:
South-central Texas west to Arizona, south through Mexico and Central America to South America as far as northern Argentina. Southern Florida south through the Caribbean. Native Habitat:
High elevations, hillsides, slopes, canyons USDA Native Status: L48(N), HI(I), PR(N), VI(N)
Growing ConditionsWater Use:
Low Light Requirement:
Sun , Part Shade Soil Moisture:
Dry CaCO3 Tolerance:
High Drought Tolerance:
High Cold Tolerant:
Well drained, rocky, limestone, sand, and loam soils Conditions Comments:
North American native
varieties of this species can survive winters within their natural range but may die to the ground during especially harsh winters even there. Varieties sold in nurseries may be from tropical stock and not do so well in US cold. Yellow bells is drought tolerant and Southwestern varieties are adapted to monsoon rains with dry spells between. They may flower better if such conditions are emulated in planned landscapes, so allow ground to dry out between waterings. It is tolerant of confinement if containers are at least 12 inches in diameter and thus makes a good potted specimen.
A showy, attractive, long-blooming accent shrub
for rock gardens, perennial
gardens, and other home landscapes within its range Use Wildlife:
Nectar-insects, bees, hummingbirds. Seeds-Small mammals. Leaves-browsed by mammals. Conspicuous Flowers:
Butterflies , Hummingbirds Larval Host:
Dogface butterfly Nectar Source:
Butterflies and Moths of North America (BAMONA)
is a larval host and/or nectar source for:
PropagationPropagation Material: Seeds , Softwood Cuttings
Seed Collection: Collect late summer to fall after pods are no longer green.
Seed Treatment: Air dry at room temperature to store over winter. Sow soon after harvest in loose, moist-but-not-soggy, fine soil for quick germination.
Commercially Avail: yes
Maintenance: Cut back to the ground if dies back in winter. Prune and pinch spent flowers and pods to encourage blooming and bushiness.
From the National Suppliers Directory
According to the inventory provided by Associate Suppliers, this plant is available at the following locations:
Hill Country Natives
- Leander, TX
From the National Organizations Directory
According to the species list provided by Affiliate Organizations, this plant is either on display or available from the following:
Lady Bird Johnson Wildflower Center
- Austin, TXSibley Nature Center
- Midland, TXNative Plant Society of Texas
- Fredericksburg, TXTexas Parks and Wildlife Department
- Austin, TXNPSOT - Fredericksburg Chapter
- Fredericksburg, TXNPSOT - Austin Chapter
- Austin, TXNational Butterfly Center
- Mission, TXNative Seed Network
- Corvallis, ORNPSOT - Williamson County Chapter
- Georgetown, TX, TX
Herbarium Specimen(s)NPSOT 0684
Collected Nov 22, 1993 in Bexar County by Mike Fox
Recommended Species Lists
Find native plant species by state. Each list contains commercially available species suitable for gardens and planned landscapes. Once you have selected a collection, you can browse the collection or search within it using the combination search.
View Recommended Species page
Record Modified: 2010-11-08
Research By: LAL, LAS, GDG | <urn:uuid:62203c08-465b-46f8-af8a-672dc5b9bc7e> | CC-MAIN-2013-20 | http://wildflower.org/plants/result.php?id_plant=test | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705195219/warc/CC-MAIN-20130516115315-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.894273 | 1,137 | 3.078125 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
It's been said often enough that Hindus celebrate everything. So they do. The birth of gods, death of asuras, victory of the gods, marriage of the gods, the new year, new months, full moons, new moons, harvests, birthdays, initiations, marriages, deaths, anniversaries - you name the event, and it is reason for music, dance, processions, and what have you.
And there is the religious bit lurking behind it all. The reasons for this lie deep, in the origin of Hinduism as an organic religion. Its followers have over time considered anything, animate or inanimate, to be sacred and aspects of divinity.
That is also why even secular events like harvests take on religious overtones, with the patron deity presiding over the festivities. As soon as something happens, there is a kind of thanksgiving to the divine that follows it.
Apart from the universally celebrated festivals like Dussehra, Diwali and Ganesh Chaturthi, there are others that are observed in specific communities or geographical areas. Hindu holidays are also confined to particular regions by the importance a certain god enjoys.
Worship of Kartikeya (as during the festival of Skanda Shashti) is predominant in Tamil Nadu, where the god is considered a patron of the region. Onam is a good example of a festival that is celebrated solely by Keralites. Another interesting aspect of Onam is that it is perhaps the only major Hindu festival that celebrates the reign of an asura king, although a benevolent one.
The profusion of legends and the contradictions inherent in them is reflected in festivals too. Travel around the country, and you will hear people tell you a variety of legends involving different gods behind a single festival. Besides, you will also find versions of the same festival being celebrated under different names in different regions.
All this adds that facet of unending novelty and constant change to the strikingly colorful kaleidoscope that is India. You might end up thinking the thought: "The more things change, the more they remain the same", which is something often said about India and its magical agelessness.
With so many holy days and more than 20 major Hindu festivals, the calendar should be liberally sprinkled with them. But it isn't so. There is a distinct festival season, which runs from late August through December. This is when there is a fever of celebrations, with a string of important festivals following one another in a rush.
But the major festivals are not the only ones that the people celebrate. Browse through the Hindu almanac, and you will find a mention of holiness or sacredness against almost every day of the year. Most of the lesser festivals are lesser because they have a private rather than public face. There are rituals for phases of the moon, solar and lunar eclipses, days of the week, a person's auspicious star or zodiac sign.
|11||Thursday||Bikrami Samvat (Hindu New Year)|
|13||Monday||Akshaya Tritiya/ Akha Teej|
|21||Wednesday||Rakhi / Raksha Bandhan|
|28||Wednesday||Sri Krishna Janmashtami|
|11||Friday||Durga Puja Begins|
|06||Wednesday||Chhath Puja Begins (Nahai Khai)|
|08||Friday||Chhath Puja Ends (Suryodaya Argh)| | <urn:uuid:3cd7d6b3-1c52-47fa-994b-b0bd5f9ac341> | CC-MAIN-2013-20 | http://www.4to40.com/culture/index.asp?p=Hindu_Festivals_Calendar&k=Deaths | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705195219/warc/CC-MAIN-20130516115315-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.895069 | 722 | 2.765625 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
|Plot Summary of Little Women |
|"Little Women is the story of four young girls Meg, Jo, Beth and Amy who grow into being young women during the civil war. The girls are especially self sufficent for the times on their own with their mother. The novel focuses on their growing up and the loss of innocence at the death of Beth. Jo rejects the next door neighbor as a husband and he becomes Amy's husband. "
Daniela Lo Presti, Resident Scholar
|"The four March sisters, Meg, Jo, Beth, and Amy, struggle against poverty with their Marmee while their father is away serving as a doctor during the Civil War.
The story charts the childhood games, whims, and lessons of four young girls becoming young women. Jo faces many obstacles familiar to all of us--saying goodbye to her sister Meg when she gets married, saying goodbye to her sister Beth, who dies young, and striving to become something great in the world--a famous writer."
Megan E. Davis, Resident Scholar
|"Little Men is the follow-up to Louisa May Alcott's book, Little Women. At the end of Little Women, Jo March inherits her Aunt March's estate, Plumfield. With the help her husband, a German professor, she turns the building into a school. The school has both rich pupils whose parents pay tuition, and pupils taken in a charity cases. Of course, all are treated with the same respect.
Some of the main characters include the sensitive Nat, tough Dan, saintly Daisy, wise Demi, and beautiful Bess. Fans of Little Women will enjoy learning about the children of some that books characters: Daisy and Demi are Meg's children, and Bess is Amy and Laurie's daughter. There is no overriding conflict besides trying to keep the boys in some kind of order and to educate them.
Katy Pape, Resident Scholar
|"Little Women is the story of four march sisters, Jo, Beth, Meg and Amy who struggle against poverty with their Marmee and grow into reponsible young women, while their father is away working as a doctor during the civil war.
The girls show their self sufficience during this period with their mother. This story charts the childhood games, whims and lessons of the four young girls into becoming young women.
Jo faces many challenges from bidding her sister Meg bye when she gets married, saying a painfull bye to her sister Beth who dies young and striving to become someone great who is a famous writer."
TEDDY MOGAKA, Resident Scholar
|" Four sisters - Meg, Jo, Beth and Amy - grow up living in poverty, but their family is far more tightly knit and loving than most. The book explores the sisters' relationship with their mother (Marmee), their home-from-the-war father, each other, and friends and acquaintances who are much wealthier than they. Alcott explores the chasm between rich and poor of the era through the friendship of the Alcott's next-door neighbor, Laurie, a boy about Jo's age who becomes her best friend and the means through which two of her sisters find love. "
Cindy Dashnaw, Resident Scholar
|Review Analysis of Little Women |
Our unique search engine provides a wealth of detail about books by breaking them down into many different literary elements, all of which are searchable (click here).
Ratings are on a 1-10 scale (Low to High)
Tone of book?
- very sensitive (sigh)
Time/era of story
- 19th century
Family, loving relations
Special relationship with
Is this an adult or child's book?
- Adult or Young Adult Book
GROUP of women story?
- a teen
Is this an ordinary person caught up in events?
- White (American)
How sensitive is this character?
- sensitive to others' feelings
Sense of humor
- Strong but gentle sense of humor
- Average intelligence
- average physique
How much descriptions of surroundings?
- 4 ()
Small town people:
- nice, like Andy/Opie/Aunt Bee
- mostly 3rd
Accounts of torture and death?
- generic/vague references to death/punishment
- No single main character?
Amount of dialog
- roughly even amounts of descript and dialog
- significantly more descript than dialog | <urn:uuid:78bf7add-da26-4e47-a04e-9e4fe754b786> | CC-MAIN-2013-20 | http://www.allreaders.com/Topics/Info_21251.asp | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705195219/warc/CC-MAIN-20130516115315-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.953094 | 916 | 2.84375 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
Vocalisation has been recognised as one of the important modes of animal communication. In one anabantoid fish, the croaking gourami Trichopsis vittata, both sexes produce loud, croaking sounds during agonistic encounters and courtship. It is known that sound emission of this fish is mostly involved with the ritualised portion of the contest, which is likely to convey information between the opponents about their respective strength and status. The sound is produced by a complex mechanism that involves two modified tendons, located behind each pectoral fin. Due to the external position of these soft structures, parasites, sickness, or injury from fights can easily damage the tendons, leading to muteness. Reduction or even loss of the croaking ability may result in a substantial decreasing of the overall fitness. Experiments were designed to test whether or not croaking gouramis can repair damaged tendons and regain fully functional sound producing organs, as well as to evaluate the effect of muting and recovery on the outcomes of agonistic interactions. Fishes were muted by surgically cutting one or both the tendons that connect the "sonic'' muscle with the fin rays. The occurrence and timing of recovery was evaluated for 30 specimens of T. vittata after surgical muting. Croaking sounds produced by the fish were recorded during staged contests after recovery. Sound from each specimen was previously recorded before and after muting as well, for comparison. The elapsed time of reconnection of each tendon to the relative fin ray was also recorded. Some fishes were found to recover completely within less than 30 days, while others needed up to three months. However, evidence for the beginning of the recovery process was noticed as early as 4 days after operation. Behavioural performance after recovery was normal. Details of sounds produced and changes of behavioural repertoires are discussed (supported by National Organization for Hearing Research, NIMH-58198, Institute of Museum and Library Service-LL90187).
Nicola Novarini, Tomonari Akamatsu & Hong Y. Yan (2002). Effects of muting and recovery on sound production in the croaking gourami Trichopsis vittata (Pisces: Anabantoidei) [abstract]. Bioacoustics 13(2): 202-203 | <urn:uuid:bafd458e-5038-40d8-ba3a-0f4ec4e3a901> | CC-MAIN-2013-20 | http://www.bioacoustics.info/article/effects-muting-and-recovery-sound-production-croaking-gourami-trichopsis-vittata-pisces | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705195219/warc/CC-MAIN-20130516115315-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.971942 | 469 | 3.1875 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
Yet the experience of that year was not lost. It was the first instance of a company of settlers in that northern climate passing the winter without illness, discord or trouble with the Indians. Later, in the little new settlements of Quebec and Montreal, some of the colonists met again under the wise and kindly rule of Champlain. Little Helene lived to bring her own roses to a garden in New France, and teach Indian girls the secrets which old Jacqueline taught her. And it is recorded in the history of the voyageurs, priests and adventurers of France in the New World that wherever they went they were apt to take with them seeds and plants of wholesome garden produce, which they planted along their route in the hope that they might thus be of service to those who came after them.
Amsterdam’s the cradle
where the race was rocked—
All the ships of all the world to her harbor flocked.
Rosy with the sea-wind, solid, stubborn, sweet,
Played the children by canals, up and down the street.
Neltje, Piet and Hendrik, Dirck and Myntje too,—
Little Nick of Leyden sailed his wooden shoe.
“Quarter-deck and cabin—rig
Thus he murmured wisely as he launched his craft.
“Cutlass, pike and musquetoun, howitzer and shot—
But our knives and mirrors and beads are worth the lot.”
Room enough for cargo to last a year or two,
In the round amidships of a wooden shoe!
Bobbing on the waters of the
See the bantam galleot, short and broad and high.
Laden for the Indies, trading all the way,
Frank and shrewd and cautious, fiery in a fray,—
Sagamore and mandarin are all the same to you,
Little Nick of Leyden with your wooden shoe!
THE FIRES THAT TALKED
All along the coast of Britain, from John o’ Groat’s to Beachey Head, from Saint Michael’s Mount to Cape Wrath, twinkled the bonfires on the headlands. Henry Hudson, returning from a voyage among icebergs, guessed at once what this chain of lights meant. The son of Mary Queen of Scots had been crowned in London.
Hudson’s keen eyes were unusually grave and thoughtful as the Muscovy Duck sailed up to London Pool on the incoming tide. The sailors looked even more sober, for most of them were English Protestants, with a few Flemings, and John Williams the pilot was an Anabaptist. It was he who asked the question of which all were thinking. | <urn:uuid:cc12c454-72a9-4ff7-9ae7-3fbcff68c3ba> | CC-MAIN-2013-20 | http://www.bookrags.com/ebooks/18038/143.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705195219/warc/CC-MAIN-20130516115315-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.966304 | 565 | 2.609375 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
Technical Report on CDC Guidance for Responses to Influenza for Institutions of Higher Education during the 2009-2010 Academic Year
This website is archived for historical purposes and is no longer being maintained or updated. For updated information on the current flu season, see the CDC Seasonal Flu website.
February 22, 2010 2:00 PM ET
CDC has released guidance to help decrease the spread of influenza (flu) among students, faculty, and staff of Institutions of Higher Education (IHE) and post-secondary educational institutions during the 2009-2010 academic year. The guidance expands upon earlier guidance for these settings by providing a menu of tools that IHE and health officials can choose from based on conditions in their area. It recommends actions to take now (during this academic year), suggests strategies to consider if flu severity is increasing compared with April through December 2009 of the 2009 H1N1 influenza outbreak, and provides a checklist for making decisions. Based on the severity of 2009 H1N1 flu-related illness thus far, this guidance also recommends that students, faculty, and staff with flu-like illness remain home until 24 hours after resolution of fever without the use of fever-reducing medicines. For the purpose of this document, IHE is used to refer to public and private, residential and nonresidential, degree-granting and non-degree-granting institutions providing post-secondary education in group settings regardless of the age of their students. Portions of this guidance pertaining to dormitories and residence halls may be useful for residential (boarding) schools providing primary and secondary education, with adaptations as needed for their younger population. This guidance represents CDC’s current thinking on this topic. It does not create or confer any rights for or on any person or operate to bind the public.
This Technical Report includes a more in depth explanation of the strategies presented in the CDC Guidance for Responses to Influenza for Institutions of Higher Education during the 2009-2010 Academic Yearand gives suggestions on how to use them. The guidance is designed to decrease exposure to regular seasonal flu and 2009 H1N1 flu while limiting the disruption of day-to-day activities and the vital learning that goes on in Institutions of Higher Education (IHE).
More than 17 million students attend the 4,300 degree-granting post-secondary institutions in the United States and more than 3 million people work as faculty and staff. An additional 2,222 non-degree-granting institutions offer vocational post-secondary education. IHEs are extremely varied and include:
- Public and private institutions
- Residential and nonresidential institutions
- Degree-granting and non-degree-granting institutions
- Educational or training programs that last from a few weeks to 4 or more years
- Student population sizes ranging from fewer than one hundred to tens of thousands
- Community colleges and vocational education and training programs that serve their local communities
- Colleges and universities with students from across the country and around the world
Institutions will need to tailor the guidelines to their own unique circumstances, taking into account the size, diversity and mobility of their student body, faculty, and staff; their location and physical facilities; programs; and student and employee health services.
Decisions about which strategies to implement should balance the goal of reducing the number of people who become seriously sick or die from flu with the goal of minimizing educational and social disruption.
IHEs should examine and revise, as necessary, their current crisis or pandemic plans and procedures, including updating contact information for students, their families, faculty, and staff. Communication plans should be shared with students, their families, faculty, and staff before an outbreak so that they know how the IHE will contact them and what types of information to expect. Establishing mechanisms to contact students’ families in the event of a flu outbreak on campus, or to notify them that their student is sick, may decrease the number of inquiries coming into the IHE and therefore the burden on IHE staff.
IHEs also should communicate with vendors who supply critical products or services to plan for continuation of those services throughout the flu season. Critical services may include food service, hygiene supplies, security, and personal protective equipment for staff. This planning is especially important when suppliers may be small businesses in the local area that could also be affected by a flu outbreak. Visit http://www.flu.gov/plan/school/collegeschecklist.html for the Colleges and Universities Pandemic Influenza Planning Checklist.
The purpose of this document is to provide updated guidance for reducing the spread of flu in IHEs. We provide recommendations for the 2009-2010 flu season, assuming that severity of illness is similar to what was seen during April through December 2009 of the 2009 H1N1 flu outbreak, as well as recommendations that could be added if the severity of illness worsens. Flu is unpredictable. CDC will continue to monitor the spread of flu, the severity of the illness it is causing, and for possible changes in flu viruses; CDC will provide periodic updates of these assessments. If the information CDC gathers indicates that flu is causing more severe disease than during April through December 2009 of the 2009 H1N1 flu outbreak, or if other developments indicate more aggressive mitigation measures should be taken, CDC may recommend additional strategies.
Flu Symptoms, Transmission, and Risk:
Symptoms of flu can include fever, cough, sore throat, runny or stuffy nose, body aches, headache, chills, and fatigue, and sometimes diarrhea and vomiting. People may be infected with the flu, including 2009 H1N1 flu and have respiratory symptoms without a fever. Like seasonal flu, 2009 H1N1 flu infection in humans can vary in severity from mild to severe. Visit http://www.cdc.gov/H1N1flu/qa.htm for more information on flu symptoms.
Like seasonal flu, the 2009 H1N1 flu virus is spread mainly from person to person through coughs or sneezes of infected individuals. People may also become infected by touching something – such as a surface or object – with flu virus on it and then touching their mouth, nose, or eyes.
Some people are at higher risk than others for serious complications from flu.
These people include:
- children younger than 5 years old, but especially children younger than 2 years old
- people aged 65 years or older
- pregnant women
- adults and children who have:
- neurological and neurodevelopmental conditions
- chronic lung disease
- heart disease
- blood disorders
- endocrine disorders (such as diabetes)
- kidney, liver, and metabolic disorders
- weakened immune systems due to disease or medication
- people younger than 19 years of age who are receiving long-term aspirin therapy
For more information on people at high risk for flu complications, visit http://www.cdc.gov/h1n1flu/highrisk.htm.
The most important things IHEs can do are to encourage flu vaccination for all those recommended for vaccination; suggest early treatment for people at higher risk for flu complications; facilitate use of respiratory etiquette and hand hygiene by students, faculty, and staff; and to separate sick and well people as soon as possible. Administrators should frequently remind students, faculty, and staff about the importance of these. Educational materials (for example, posters) to enhance compliance with recommendations should be visible in the IHE setting. Examples of these materials are available at http://www.cdc.h1n1flu/flyers.htm. There are many ways to employ these strategies; not all can be described in this document. The following recommendations provide a framework to determine the most appropriate and feasible strategies for each IHE.
Isolating sick people is a critical strategy for addressing 2009 H1N1 flu for two reasons: (1) 2009 H1N1 flu may result in more serious complications for people at higher risk for flu complications and these measures help protect these people (see list below); and (2) a widespread pandemic may result in many more hospitalizations and medical care visits than usually associated with seasonal flu. Measures to limit the spread of flu, if effective, may reduce demand on the healthcare system. Other measures, such as suspending classes, are recommended for conditions of increased flu severity, but might also be necessary during periods of increased flu activity with the same severity as during April through December 2009 of the 2009 H1N1 flu outbreak in the community, on a case-by-case basis, if the IHE is not able to maintain normal functioning.
IHEs should review, and revise if necessary, their current crisis or pandemic plans and procedures; develop contingency plans to cover key positions when staff are absent from work; update contact information for families and staff; and share their plans with students, faculty, staff, and community. Administrators should review and revise, if necessary, their sick leave policies to remove barriers to faculty and staff staying home while sick or to care for a sick family member. For students, IHEs may consider altering policies on missed classes and examinations and late assignments so that students’ academic concerns do not prevent them from staying home when sick or prompt them to return to class or take examinations while still symptomatic and potentially infectious. Do not require a healthcare provider’s note for students, faculty, or staff to validate their illness or to return to work, as healthcare provider offices and medical facilities may be extremely busy and may not be able to provide such documentation in a timely way. Distance learning or web-based learning may also help students maintain self-isolation. IHEs should determine quantities of supplies and space needed to facilitate self-isolation for example, hygiene supplies, masks and other personal protective equipment.
IHEs should take opportunities at the beginning of campus events to remind attendees about the importance of self-isolation when sick; early evaluation by a healthcare provider for those who become sick, especially for people at higher risk for flu complications; respiratory etiquette; and hand hygiene. Educational materials such as posters and flyers to enhance compliance with recommendations should be visible throughout the campus. Information and links to credible sources should be posted on the IHE website. Examples of these materials are available at www.cdc.gov/h1n1flu.
The recommendations that follow are divided into two groups: 1) recommendations to use now, during this academic year, assuming a similar severity to April through December 2009 of the 2009 H1N1 flu outbreak, and 2) recommendations to consider adding if the flu begins to cause more severe disease.
Recommended strategies to use now, for flu conditions with severity similar to April through December 2009 of the 2009 H1N1 flu outbreak
Encourage vaccination against the flu:
The best way to protect against the flu is to get vaccinated. The vaccine for seasonal flu is produced every year. Groups that should be vaccinated against seasonal flu include: everyone 6 months through 18 years of age; all people 50 years of age and older; women who will be pregnant during flu season; people age 18 through 49 with certain medical conditions that put them at higher risk for flu complications; healthcare workers; and household contacts and caregivers of people who are at increased risk of severe illness from flu, including children less than 5 years of age, pregnant women, people 65 and older, and anyone with certain medical conditions.
Facilitate self-isolation of residential students with flu-like illness in their residence halls, dormitory rooms, the campus health service, or other locations, and help them stay away from others for the full recommended period:
Promote self-isolation at home by non-resident students, faculty, and staff:
Emphasize respiratory etiquette:
Flu viruses are thought to spread mainly from person to person in respiratory droplets of coughs and sneezes. This can happen when droplets from a cough or sneeze of an infected person are propelled through the air and deposited on the mouth or nose or are inhaled by people nearby. CDC recommends covering the nose and mouth with a tissue when coughing or sneezing and throwing the tissue in the trash after use. Wash hands promptly after coughing or sneezing. If a tissue is not immediately available, coughing or sneezing into one’s elbow or shoulder (not into one’s hand) is recommended. To encourage respiratory etiquette, students, faculty and staff should have access to tissues and must be educated about the importance of respiratory etiquette, including keeping hands away from the face.Visit: http://www.cdc.gov/flu/protect/covercough.htm for more information on respiratory etiquette.
Promote hand hygiene:
Perform and encourage routine environmental cleaning:
- Doorknobs, handrails, elevator buttons
- Desks, tables, chairs
- Counters and surfaces in cafeterias, meeting rooms, and offices
- Remote controls
- Telephone receivers and touch-tone pads
- Promote early treatment of students and staff at higher risk for flu complications:
- Discourage the public and visitors with flu-like illness from attending IHE events until they have been free of fever for at least 24 hours:
- Considerations for specific student populations:
- Students studying abroad:
- Early/Middle College students:
- Students with disabilities:
- Sports teams, bands, and other large student groups:
- Health-care profession students:
Permit students, faculty, and staff at higher risk for flu complications to stay home:
Increase social distances:
If flu severity increases, IHEs should explore innovative methods for increasing social distances while continuing to meet their educational mission. The goal should be for there to be at least 6 feet of distance between people at most times. This is not a simple or easy strategy and would typically require considerable flexibility. Possible options to increase the amount of space between students include moving desks farther apart, leaving vacant seats between students, holding classes outdoors, and using distance learning methods.
At an increased level of severity, IHEs should consider whether to suspend or modify public events such as lectures, films, concerts, sporting events, worship services, and commencement or baccalaureate ceremonies. IHEs could also discourage large gatherings that are not sponsored by the IHE, such as fraternity parties.
Consider postponing campus events:
Extend the self-isolation period:
Consider suspending classes:
- Large gatherings:
- Residential students:
- Resuming classes:
- CDC will continue to work with state and local partners to monitor the spread and severity of flu illness, monitor for changes in circulating flu viruses that may confer increased severity of disease, identify promising methods for reducing morbidity and mortality, assist state and local health and education agencies to implement those methods and evaluate their effectiveness, and provide timely updates on new scientific findings as well as additional guidance as the conditions warrant.
- The U.S. Department of Education (ED) will collaborate with federal, state, and local agencies as well as non-governmental entities to disseminate new guidance, provide support to state education agencies, and work with states to provide flexibility in regulations around funding.
- IHEs should:
- Work with state and local public health and education agencies to decide which strategies to implement and when, collect and share data, and disseminate emerging guidance.
- Establish collaborative relationships with local colleges of medicine, hospitals, urgent care centers, and emergency departments.
- Assure campus health services have established plans for triage, treatment, vaccination, and education of students.
- Examine and revise, as necessary, their current crisis or pandemic plans and procedures.
- Examine and revise, as necessary, sick leave policies for faculty and staff to allow them to stay home when sick and policies on missed classes and examinations and late assignments so that students’ academic concerns do not prevent them from staying home when sick.
- Serve as resources for their students, parents, faculty, staff, visitors, and wider communities by providing education about ways to reduce the spread of flu.
- Students, faculty, and staff must take personal responsibility for staying home when sick and practicing respiratory etiquette and hand hygiene.
- Identify the decision-makers. In some communities, local and state health, education, and homeland security agencies may have relevant decision-making responsibilities. Public IHEs will have different types of decision-makers than private institutions.
- Identify the stakeholders. Stakeholders will vary between IHEs, but may include: staff from campus health services and mental health services, emergency management, student affairs, residential life, security, communications, physical plant operations, and food service; students; faculty; other staff; community representatives; and students’ families.
- Do you have a process for regular input and collaboration on decisions?
- Are there strong, open communication channels between decision-makers and stakeholders? Does this include frequent information sharing?
- Do you regularly review your crisis and pandemic plans? Do you revise as needed?
- What is the severity and extent of spread of the disease in the state or locality? How many people are making outpatient visits for flu-like illness? How many people are being hospitalized for flu-like illness? Are the numbers of hospitalizations or deaths increasing? What percent of these hospitalized patients require admission to intensive care units? How many flu deaths have occurred in the community? Are some groups being disproportionately affected?
- How busy are local healthcare providers and emergency departments? How many visits are they getting for flu-like illness? Are they able to meet the increased demand for care from people with flu-like illness? Are local healthcare providers or emergency departments becoming overburdened?
- Are the hospital and intensive care unit (ICU) beds full with flu patients? Is there available space in the ICUs? Are there enough ventilators?
- Do the hospitals have enough staff to provide care? Is there increasing absenteeism in healthcare workers due to flu-like illness in themselves or their family members?
- Is there enough antiviral medicines in the community to treat sick patients at higher risk for flu complications?
- What are the plans for seasonal and 2009 H1N1 flu vaccination clinics?
- What are student absenteeism rates? Rates for faculty? Staff?
- How busy is the campus health service? How many visits are they getting for flu-like illness? Are they able to meet the increased demand for care from people with flu-like illness? Are beds available for students who need to self-isolate?
- What resources are available? Do you have access to the funds, personnel, equipment, and space needed?
- How long will the strategies take to implement? How long can the strategies be sustained?
- Are changes to policy needed? How feasible are these changes?
- How can you most clearly communicate with the IHE community about steps students, faculty, staff, and students’ families need to take and the reasons for recommendations?
- How are public concerns affecting the community? Are rumors circulating about the flu? About the strategies you are considering? What can you do to counter false rumors?
- What can you do to empower personal responsibility for protective actions? What can you do to increase buy-in?
- Will the community support the strategies under consideration? What can you do to increase support?
- What secondary effects (for example, job security, financial support, health service access, and educational progress) might result from the strategies under consideration? Can these secondary effects be mitigated?
Vaccination to protect against the 2009 H1N1 flu virus should be encouraged. CDC’s Advisory Committee on Immunization Practices (ACIP) has recommended that initial doses of the 2009 H1N1 flu vaccine be prioritized for 5 primary target groups: pregnant women, people who live with or care for children younger than 6 months of age, healthcare and emergency medical services personnel, people age 6 months through 24 years, and people age 25 through 64 years who have certain medical conditions that put them at higher risk for flu complications. Due to increased vaccine availability, everyone, including those over age 65 years, can now be vaccinated.
Students and staff should be encouraged to receive the seasonal flu vaccine and the 2009 H1N1 flu vaccine. For more information on the ACIP recommendations, visit http://www.cdc.gov/mmwr/pdf/rr/rr58e0821.pdf.
IHEs should contact their local health officials to determine where vaccine will be administered and to discuss the possibility of a vaccination clinic at the IHE.
CDC recommends that individuals with flu-like illness remain at home and away from other people until at least 24 hours after they are free of fever (100° F [37.8° C] or greater when measured orally), or signs of a fever, without the use of fever-reducing medicines. If possible, residential students, faculty, or staff members who live relatively close to the campus should return to their home to keep from making others sick. Those leaving the IHE to go to a private home to recuperate should be instructed to do so in a way that limits contact with others as much as possible. For example, travel by private car or taxi would be preferable over use of public transportation.
While the campus infirmary would be an ideal location for sick people, few IHEs have them and such facilities could be rapidly overwhelmed during a flu outbreak. Students with single rooms and private bathrooms should stay in their rooms. Students living in suite-type living quarters should remain in their own rooms and receive care and meals from a single person, if possible. Students could be asked to establish a “flu buddy scheme” in which students pair up as the identified caregiver if one or the other becomes sick. Sick students should limit their contact with others and, to the extent possible, maintain a distance of 6 feet from people with whom they share living space. Shared bathrooms should be avoided or receive frequent cleaning. If close contact with others cannot be avoided, CDC recommends people with known, probable, or suspected flu or flu-like illness to use a facemask if available and tolerable, or otherwise to cover their noses and mouths with a tissue when coughing or sneezing (or an elbow or shoulder if no tissue is available). For those caring for people with flu-like illness, CDC has recommendations for use of personal protective equipment. Visit http://www.cdc.gov/h1n1flu/masks.htm for information on appropriate personal protective equipment.
Close contact, for the purposes of this document, is defined as having cared for or lived with a person with flu-like illness or being in a setting with a high likelihood of contact with respiratory droplets and/or body fluids of such a person. Close contact typically does not include activities such as walking by an infected person or sitting across from a symptomatic patient in a waiting room or office.
For those who cannot leave campus, and who do not have a private room, IHEs may consider providing temporary, alternate housing where those who are sick can stay until 24 hours after they are free of fever. When logistically necessary, because sick students do not need to stay away from other sick students, some IHEs have considered temporarily converting a gym or other large space to housing for sick people. Local emergency management agencies might be able to assist with planning and arranging for necessary equipment, such as sleeping cots. Locations should have good access to bathrooms (which ideally should not be shared with well people) and security services; meals and medicines (if indicated) should be provided. Internet access might allow students to continue their class work when feeling better but still self-isolating. Some IHEs have explored pre-arranging contracts with hotels or local landlords for temporary use of off-campus space.
IHEs should establish a method for maintaining contact with students who are in self-isolation. If resources permit, student affairs, housing staff, or healthcare providers (for example, nurses or nursing assistants) could be assigned to make daily contact with each student who is in self-isolation for flu-like illness in a dormitory or other university residential setting. For some IHEs, residential advisors also may serve this function. Possible contact methods include e-mail, text messaging, phone calls, or room visits. Sick students should be provided guidance that reinforces hygiene and self-isolation. Some IHEs may choose to also check on roommates, suitemates, and others who come in close contact with the sick person to determine if they have also fallen sick.
Students should be instructed to promptly seek medical attention if they have a medical condition that places them at higher risk for flu complications, are concerned about their illness, or develop severe symptoms. Severe symptoms include increased fever, shortness of breath, chest pain or pressure, rapid respirations, cyanosis (bluish skin color), vomiting, dizziness, or confusion. Campus health services can communicate to the IHE community about these symptoms, how to contact health services, and groups of people at higher risk for flu complications.
Guidance for caring for flu patients in the home can be applied in the dormitory or residence hall as well. Visit: http://www.cdc.gov/h1n1flu/guidance_homecare.htm for more information on caring for sick people in the home.
Students, faculty, and staff should be vigilant in identifying people who appear to be sick. These individuals should be encouraged by anyone who encounters them to self-isolate and to talk with a healthcare provider about whether they have flu, appropriate treatment, and actions to take if they experience severe symptoms.
CDC recommends that individuals with flu-like illness remain at home until at least 24 hours after they are free of fever (100° F [37.8° C] or greater), or signs of a fever, without the use of fever-reducing medicines. If possible, students, faculty, and staff with flu-like illness should be asked to stay at home or at a friend or family member’s home and avoid contact with other people until at least 24 hours after they are free of fever. Students leaving the IHE to go to a private home to recuperate should be instructed to do so in a way that limits contact with others as much as possible. For example, travel by private car or taxi would be preferable over use of public transportation. If he or she can tolerate it, the sick person should wear a facemask while in close contact with others.
Visit http://www.cdc.gov/h1n1flu/guidance/exclusion.htm for more information on staying home while sick.
Flu may spread via contaminated hands or inanimate objects that become contaminated with flu viruses. CDC recommends that students, faculty, and staff be encouraged to wash their hands often with soap and water, especially after coughing or sneezing. If soap and water are not available, alcohol-based hand rubs can also be used. However, hand rubs should not be used when hands are visibly soiled.
Soap and paper towels are critical for proper hand washing and should be readily available throughout the campus. IHEs should educate all students, faculty, and staff about good hand hygiene through direct education as well as posting and disseminating communications materials such as signs, posters, and flyers.
Visit: www.cdc.gov/cleanhands for more information on hand hygiene.
Promote routine cleaning of frequently touched surfaces, and ensure adequate supplies of soap and paper towels. Provide no-touch wastebaskets and empty them frequently. Establish regular schedules for frequent cleaning of high-touch surfaces:
Provide disposable wipes so that commonly used surfaces can be wiped down by students before each use. High-use surfaces include:
Encourage students to frequently clean their living quarters. Students living together should regularly clean frequently used surfaces such as doorknobs, refrigerator handles, remote controls, computer keyboards, countertops, faucet handles, and bathroom areas.
IHEs should ensure that custodial staff and others who use cleaners or disinfectants read and understand all instruction labels and understand safe and appropriate use. Instructional materials and training should be provided in languages other than English as locally appropriate. CDC does not believe any additional disinfection of environmental surfaces beyond the recommended routine cleaning is required.
The EPA provides a list of EPA-registered products effective against flu: http://www.epa.gov/oppad001/influenza-disinfectants.html
People at higher risk for flu complications who become sick with flu-like illness should speak with their healthcare provider as soon as possible to determine if they need antiviral treatment. It’s very important that antiviral drugs be used early to treat flu in people who are very sick (for example people who are in the hospital) and people who are sick with flu and have a greater chance of getting serious flu complications. Other people may also be treated with antiviral drugs by their doctor this season. CDC recommends that IHEs encourage sick students, faculty, and staff at higher risk for flu complications to seek early treatment.
Students and staff at higher risk for flu complications who have had close contact with others who are sick with a flu-like illness should contact their healthcare provider to discuss whether they may need to take antiviral medicines.
People on antiviral treatment may still shed flu viruses and therefore may still transmit the virus to others. These flu viruses may develop resistance to antiviral medicines. To lessen the chance of spreading flu viruses that are resistant to antiviral medicines, people on antiviral treatment should remain in self-isolation according to the current recommendations and adhere to good respiratory etiquette and hand hygiene.
Visit: http://www.cdc.gov/h1n1flu/recommendations.htm for more information on antiviral medicines.
IHE events that draw the public and other visitors, such as football games or concerts, may pose a high risk of exposure and transmission of flu. IHEs should use a variety of communication methods such as e-mail, posters, flyers, and media coverage to discourage people with flu-like illness from attending these events until they have been free of fever for at least 24 hours without the use of fever-reducing medicines and to encourage adherence to respiratory etiquette and hand hygiene. Materials should be made available in the language(s) spoken by the IHE community, including those for whom English is not their primary language. IHEs can also look for ways to modify these events to reduce close contact and increase distances between participants and may need to consider cancelling if modification is not possible and there is a high level of flu activity in the community.
IHEs should review their policies for study abroad programs, including how students can access health services abroad, how illness will be reported to the IHE, access to resources for students abroad who are unable to travel back to the U.S., and any legal liability issues. Visit http://www.cdc.gov/travel for more information on considerations for travel.
IHE plans and policies should consider high school students taking college classes for credit; students and families touring the IHE; and other K-12 students who regularly come to campus. IHEs should communicate with their partner K-12 schools about their plans, policies, and strategies they are implementing.
More than 11% of undergraduates reported some type of disability in 2003-2004; 7.5% of these students reported a specific learning disability. IHEs should determine if they need to use special communication strategies for these students.
IHEs should review their policies for sports teams, bands, and other large groups of students who spend a great deal of time together in close proximity. IHEs may need to consider cancelling or postponing travel to off-campus events if there is a high level of flu activity in the community.
IHEs that train healthcare professionals such as physicians, dentists, and nurses represent environments with the potential for greater exposure and to amplify transmission to populations at higher risk for flu complications. Students in the heath care professions who spend any time in a clinical setting should be reminded to self-monitor for symptoms of flu-like illness, practice respiratory etiquette and good hand hygiene, and use appropriate personal protective equipment. Visit http://www.cdc.gov/h1n1flu/clinicians for guidance for healthcare settings.
Recommended strategies to add in the event of increased flu severity compared to April through December 2009 of the 2009 H1N1 flu outbreak
CDC will work with state and local health departments to continue to assess the severity of illness caused by 2009 H1N1 flu and disseminate the results of these ongoing assessments. If global, national, or regional risk assessments indicate an increased level of severity compared with the April through December 2009 of the 2009 H1N1 flu outbreak, CDC will consider the need to recommend additional strategies.
Decisions to add strategies should be based on information on the severity of illness reported in global, national, and regional assessments, local goals, epidemiology, and healthcare system capacity, bearing in mind the feasibility and acceptability of the strategies being considered. The following strategies use a variety of methods for increasing social distance, while attempting to maintain operability of most IHEs. Feasibility and acceptability of these strategies will vary considerably. Although the following strategies have not been scientifically tested in the IHE setting, they are grounded on basic principles of infection control. Implementing these strategies is likely to be more difficult and to have more disruptive effects than the previously described strategies. These strategies should be considered if flu severity increases and are meant for use in addition to the strategies outlined above.
If flu severity increases, students, faculty, and staff at higher risk for flu complications may consider staying home while flu transmission is high in their community. Such people should make this decision after consulting with their healthcare provider. People who elect to stay home should also attempt to decrease their exposure in other ways -- for example, by avoiding large public gatherings.
IHEs should consult with their boards and legal counsel about policy accommodations that might be necessary. For example, IHEs might be able to make provisions for distance learning methods such as conference calls and internet-based lessons or students at higher risk for flu complications might be allowed to withdraw for the semester without penalty. Sick leave policies might be tailored to address the needs of faculty and staff at higher risk for flu complications. Work responsibilities and locations potentially could be modified to keep people at higher risk for flu complications from coming into contact with potentially sick individuals. To the extent possible, telecommuting and distance learning could be made more widely available.
At an increased level of severity, IHEs should consider whether to suspend or modify public events such as lectures, films, concerts, sporting events, worship services, and commencement or baccalaureate ceremonies. IHEs could also discourage large gatherings that are not sponsored by the IHE, such as fraternity parties.
If flu severity increases, individuals with flu-like illness should self-isolate at home for at least 7 days after symptom onset, even if symptoms resolve sooner. Individuals who are still sick 7 days after they become sick should continue to self-isolate until at least 24 hours after symptoms have resolved.
This recommendation is based on viral shedding information. Flu virus shedding generally occurs for 5 to 7 days for seasonal flu infection. Longer periods of exclusion of people who have flu symptoms also may be considered based on setting- and population-specific characteristics.
See information above for self-isolation for residential and non-residential students.
Visit http://www.cdc.gov/h1n1flu/guidance/exclusion.htm for more information about staying home while sick.
CDC recommends that IHEs review and revise, as necessary, pandemic flu plans that can be readily implemented if flu severity increases. Officials should balance the risks of flu in their community with the disruption suspending classes will cause in both education and the wider community. IHE officials should work closely and directly with their local and state public health officials to revise their plans, to make sound decisions based on local conditions, and to implement strategies in a coordinated manner. When IHEs suspend classes, they should use multiple channels to communicate a clear message about their reasons for doing so and the implications for the students, faculty, staff, and the community.
Reactive class suspension might be appropriate when IHEs are experiencing high rates of absenteeism due to flu-like illness among students, faculty, or staff, when a large number of students are visiting campus health services for flu-like illness, or when the IHE is not able to maintain normal functioning due to severe flu conditions in the community.
Preemptive class suspension can be used to decrease the spread of flu virus or to reduce demand on the healthcare system. IHEs might be asked to suspend classes to decrease the spread of flu virus if global, national, or regional risk assessments indicate an increased level of severity compared with the April through December 2009 of the 2009 H1N1 flu outbreak. Suspending classes is likely to be more effective in decreasing the spread of flu virus in the community when used early in relation to the appearance of the virus in the community and when used in conjunction with other strategies.
IHEs should consider whether they can allow faculty and staff to continue to use their facilities while classes are not being held. Keeping facilities open may allow faculty to develop lessons and materials, to continue teaching through distance learning methods, to advise students using methods such as telephone calls and e-mail, and to engage in other essential activities, such as research projects.
Visit http://www.cdc.gov/h1n1flu/vaccination for more information on the 2009 H1N1 flu vaccination. If an increase in community-wide transmission occurs shortly before vaccine-induced immunity is anticipated, or before a scheduled break, some IHEs may consider suspending classes temporarily.
If classes are suspended preemptively, other large gatherings should be cancelled or postponed. This would include sporting events, dances, performances, commencement ceremonies, and other events that bring large groups of people into close proximity with one another. Large gatherings might also need to be cancelled, postponed, or modified during a reactive class-suspension period.
IHEs with residential students should plan for ways to continue essential services such as meals, custodial services, security, and other basic operations for students who remain on campus. When possible, dismiss students, faculty, and staff who can drive home or who can go to the nearby home of a relative, close friend of the family, or an international student’s host family. Students leaving the IHE should be instructed to do so in a way that limits contact with others as much as possible. For example, travel by private car or taxi would be preferable over use of public transportation. International students and others who do not have easy access to alternative housing should stay on campus, but increase the distance between people and minimize crowding to decrease the likelihood of flu transmission. For example, if multiple roommates remain on campus, one might be able to move to a friend’s vacant room for this time period. Additionally, IHEs can explore distance-based learning methods to facilitate continued education both for students who remain on campus and those who leave. Faculty and staff should be allowed continued use of their facilities while classes are not being held.
The length of time classes should be suspended will vary depending on the reason for suspending classes as well as the severity and extent of illness.When the decision is made to suspend classes, CDC recommends doing so for at least 5 to 7 calendar days. Before the end of this period, the IHE, in collaboration with public health officials, should reassess the epidemiology of the disease and the benefits and consequences of continuing the suspension or resuming classes. Based on this reassessment, the IHE may decide either to extend the period for which classes are suspended (and reassess again) or to resume classes. In the event that global, national, and regional risk assessments indicate a much higher severity than that seen in April through December 2009 of the 2009 H1N1 flu outbreak, IHEs should plan for more prolonged periods of class suspension. Complete closing of the campus (which would include suspension of research activities) is not possible or desirable for most IHEs and is unlikely to be recommended. However, IHEs should plan for ways to care for animals and maintain critical research activities while minimizing contact between people.
Collaboration is essential: many different stakeholders have important roles to play in the decision-making process, implementing strategies, and ensuring their effectiveness.
To decrease exposure of students, faculty, and staff to the flu virus, CDC recommends a combination of targeted, layered strategies applied early and simultaneously as the best means to reduce spread of flu. The selection of strategies should be based on trends in the severity of the disease, characteristics of the virus, feasibility, and acceptability. A course of action should be determined through collaborative decision-making involving public health agencies, IHE faculty and staff; students; students’ families, and the wider community.
CDC and its partners will continuously look for changes in the severity of flu and will share what is learned with state and local agencies, the public, and other stakeholders. However, states and local communities can expect to see a lot of differences in disease patterns from community to community.
Every IHE has to balance a variety of objectives to determine the best course of action to help decrease the spread of flu. Decision-makers should explicitly identify and communicate their objectives which might be one or more of the following: (a) protecting overall public health by reducing community transmission; (b) reducing transmission among students, faculty, and staff; and (c) protecting people at higher risk for flu complications. Some strategies can have negative consequences in addition to their potential benefits. The following questions can help begin discussions and lead to decisions.
Decision-Makers and Stakeholders
Are all the right people involved in the decision-making process?
What is the process for working together?
Information Collection and Sharing
Can local or state health officials determine and share information about the following?
What does the IHE know about the following?
Do you have the resources to implement the strategies being considered?
Have you determined how to address the following challenges to implementing the strategies?
Get email updates
To receive weekly email updates about this site, enter your email address:
- Centers for Disease Control and Prevention
1600 Clifton Rd
Atlanta, GA 30333
TTY: (888) 232-6348
24 Hours/Every Day | <urn:uuid:ddd65ef3-3eb7-4097-b087-9f86526c6647> | CC-MAIN-2013-20 | http://www.cdc.gov/H1N1flu/institutions/guidance/technical.htm | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705195219/warc/CC-MAIN-20130516115315-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.948607 | 8,825 | 2.71875 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
These are poly-aromatic compounds, insoluble in n-heptane, with a number of carbon atoms greater than 50. The asphalthene content of a crude may be the cause of deposits in inter-changers and/or lines. In fact, the mix of a crude having a high asphalthene content with a paraffinic crude can displace the balance of the asphalthenes, precipitating them. A high asphalthene content ensures that the vacuum pitch will be suitable for producing asphalt.
ASTM D86 distillation is a test that measures the volatility of gasoline, kerosene and diesel.
Basic Sediment and Water (BSW)
The BSW relates to the content of free water (not dissolved) and sediments (mud, sand) in the crude. It is important that its reading is low in order to avoid dirtiness and difficulties during the crude processing, in which the steam produced by the free water can damage the oven. It is reported as a percentage in volume over the crude.
This is the weight of the residue remaining after the combustion of a fuel sample. It represents the facility of a heavy fuel to produce particles during combustion.
This is the measurement of the mass of a volume. It is expressed in kilograms per liter, or grams per cubic centimeter. Density depends on the temperature as this affects the volume of the substances.
Temperature at which a liquid stops flowing when cooled, through the precipitation of crystals of solid paraffin.
The draining temperature is very important as, in the unloading of paraffinic crudes using sea terminals with underwater pipelines of a certain length, the temperature of the crude can fall below the draining point, creating deposits of wax or solid paraffin in the pipelines, thus obstructing the flow.
This is the minimum temperature at which the vapors of a product flash or detonate momentarily when a flame is applied in controlled conditions. It represents the maximum temperature at which a product can be stored or transported in safe conditions.
This is the temperature at which the crystals formed during the cooling of a product sample disappear completely when the temperature rises in a controlled way
The metals content of a crude, vanadium and nickel, gives us an indication of their content in the heaviest products obtained in the refining. This is important because, for example, the metals in gas oil in vacuum are poison for the catalytic and hydro-cracking catalysts. A high vanadium content or metals in the combustible oil may cause oven and boiler tube breakage problems because they form corrosive products during combustion.
Number of cetane
This measures the ease with which the spontaneous ignition occurs of diesel oil using a standardized engine and a reference fuel.
The cetane rating is determined by making a comparison of the ignition time of a mix of cetane (C16)) and hepta-methyl-nonane (C 15), which has the same delay time in ignition as the fuel being examined. The cetane rating measured is the percentage of the cetane compound in the cetane/hepta-methyl-nonane mix.
The C16 has a cetane rating equal to 100 (it is an easily-ignited paraffin) and C15 has a cetane rating equal to 0 (as being a slow-combustion aromatic).
A high cetane rating represents a high ignition quality or a short delay time between the fuel injection and the start of combustion.
The diesel engine uses a high compression ratio to produce the spontaneous ignition of the diesel, instead of a spark as in the case of the internal combustion engine. The compressed air temperature in the diesel engine is sufficiently high to fire the diesel.
The lineal paraffins have a high cetane rating and therefore burn well; on the other hand, the aromatics are of a low cetane rating and burn badly, producing deposits of carbon and the production of black smoke. For that reason, high-quality diesel should have an aromatic content compatible with the specified cetane rating.
The cetane rating can be calculated based on the volatility (corresponding to the temperature of 50% distilled) and the density of the diesel and is called Calculated Cetane Rating. The reason for using the formula is the high cost of the cetane engine.
Octane number (NOR)
The RVP and NOR are the most important parameters of gasoline quality. The NOR measures the resistance of the gasoline to self-ignition or premature detonation in an engine's functioning conditions.
Self-ignition is noted for the hammering or noise produced when the gasoline self-ignites, detonating before the cylinder compresses all the gasoline and air mixture, losing power. The detonation produces sound waves that are detected using special microphones.
The octane rating is measured by comparing the noise of the detonation made by a reference fuel mixture in a standardized engine with that for which the fuel examined is made. The reference fuels are iso-octane (2, 2, 4 trimethyl pentane), with an octane rating equal to 100 (high resistance to hammering) and the n-heptane which has an octane rating of zero (very low resistance). The octane rating determined is the percentage in volume of iso-octane in the iso-octane/heptane mixture.
Fuels with a high octane rating have greater resistance to premature detonation than those of a lower octane rating. In addition, fuels with a high octane rating can be used in engines with a high compression ratio, which are more efficient.
There are two types of engine for the determination of the octane rating of gasoline. One uses the Research method and the other the Motor method.
The Research method represents the behavior of an engine in cities at low and moderate speeds. The Motor method represents situations with fast acceleration, like climbing gradients or overtaking.
There is another way of expressing the octane rating of a gasoline which is called Highway Octane. The Highway Octane rating is expressed as the sum of the Research octane and the Motor octane ratings divided by 2. The Highway Octane rating is used in the United States while the Research method is used in Chile.
Reid Vapor Pressure (RVP)
The Reid vapor pressure is an empirical test that measures the pressure in pounds per square inch (psi) exercised by the vapors or light components of the crude or of an oil product, in a closed container at a temperature of 100 °F (38 °C).
A high vapor pressure of the crude tells us that light products are present in it and that they will burn in the torch in the processing if there is no suitable recovery system. In the case of an internal combustion engine, excessive vapor pressure will cause a blockage which will impede the flow of gasoline.
Crude oil contains salt (NaCI) which comes from the oil fields or the sea water used as ballast by oil tankers. It is necessary to extract the salt with desalination equipment before the crude oil can enter the atmospheric distillation oven in order to avoid corrosion that is produced in the upper part of the atmospheric tower. The salt decomposes and produces chlorhydric acid. It is expressed in grams of salt per cubic meter of crude.
The temperature at which some products inflame spontaneously in contact with the air (without flame), probably due to the heat the show oxidation produces, which accumulates, raising the temperature to the inflammation point. Fortunately, the oil distillers have very high self-ignition temperatures and are therefore difficult to achieve; this is 450ºC in gasoline. Oily rags, on the other hand, self-ignite easily and cause fires and so should be suitably destroyed.
The ratio of the weight of a substance and the weight of an equal volume of water at the same temperature. In oil, the API specific gravity is used which is measured with hydrometers that float in the liquid. The API grades are read directly on the scale that stands above the liquid at the flotation line point. The API scale arose from the facility of graduating the hydrometer rod uniformly.
°API =141.5/(specific gravity) -131.5
The °API determines whether the crude or product is light or heavy and enables us to calculate the tons of this unloaded. A light crude has an API of 40-50 while a heavy one has 10-24.
Sulfur and the API are the properties with the greatest influence on the price of crude.
This is the resistance to degradation through heat or oxidation of an oil product. Products containing olefinic material are unstable and susceptible to degradation.
The sulfur content permits the foreseeing of difficulties in meeting product and atmospheric emission specifications, as treatment units are needed to meet these; it is also poison for some catalysts. It also enables us to see whether the plant metallurgy is the most suitable for processing it. It is expressed as a percentage in weight of sulfur.
Sulfuric acid (H2S)
A prior knowledge of the sulfuric acid content of the crude permits preventive actions and avoids accidents to people. The sulfhydric acid is very dangerous because it anesthetizes the olfactory nerve which prevents people from being aware of the situation and is mortal in small quantities. Personnel working in contact with the crude have therefore to wear protection equipment and personal sulfhydric acid sensors.
This is the degree of resistance of a liquid to flow. The greater the viscosity, the greater the resistance to flow. Viscosity is affected by the temperature, reducing it when the latter rises. It is measured by using special viscosimeters and is expressed in USS (Universal Saybolt Seconds), FSS (Furol Saybolt Seconds) and in centi-stokes.
Viscosity is important for fuel injection in engines and burners. It is also critical in the pumping of crude oil and products by pipeline. A higher viscosity than that designed for will reduce the desired flow and make a greater pump motor capacity necessary. The viscosity also affects measuring instrument factors, altering the readings.
The measurement of the facility with which a product vaporizes. Volatile products have high steam pressure and a low boiling point. It is measured through the ASTM D86 test and is expressed as the temperature at which certain volumes are distilled. | <urn:uuid:af7864c1-8a24-425f-8b7a-b3fc220bcc94> | CC-MAIN-2013-20 | http://www.enap.cl/english/glosario/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705195219/warc/CC-MAIN-20130516115315-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.917328 | 2,152 | 2.796875 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
Commentaries on Alice Walker's "Everyday Use" typically center on Mama's awakening to one daughter's superficiality and to the other's deep-seated understanding of heritage. Most readers agree that when Mama takes the quilts from Dee and gives them to Maggie, she confirms her younger daughter's self-worth: metaphorically, she gives Maggie her voice. Elaine Hedges, for example, refers to the "reconciliation scene" in which "Mama's gift of the family quilts to Maggie empowers the previously silenced and victimized daughter." The text underscores such a reading by stating that immediately...
(The entire page is 1609 words.)
Want to read the whole thing?
Subscribe now to read the rest of this article. Plus, get access to:
- 30,000+ literature study guides
- Critical essays on more than 30,000 works of literature from Salem on Literature (exclusive to eNotes)
- An unparalleled literary criticism section. 40,000 full-length or excerpted essays.
- Content from leading academic publishers, all easily citable with our "Cite this page" button.
- 100% satisfaction guarantee READ MORE | <urn:uuid:6d54c81a-f419-46c3-8ba9-64e830597a94> | CC-MAIN-2013-20 | http://www.enotes.com/everyday-use/alice-walkers-everyday-use | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705195219/warc/CC-MAIN-20130516115315-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.923892 | 240 | 3.125 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
The Evolution Deceit
The ability to think is one of the greatest blessings granted to people because only by thinking can people be aware of Allah's boundless power and the beauty of the universe He created. Only a thinking person realizes that the world has been created by divine wisdom in every detail, that death is near, and that there are certain obligations that are required to be met in this life. We are told in a large number of Qur'anic verses that only thinking people can heed advice and that they alone are capable of seeing the proofs of Allah's existence. Indeed, the very purpose of the revelation of the Qur'an is for people to think carefully about its verses, as is stated here: "It is a Book We have sent down to you, full of blessing, so let people of intelligence ponder its Signs and take heed." (Surah Sad: 29)
However, a large proportion of humanity regards thinking as a hardship. These people even believe that thinking is damaging to their lives and their set ways. According to this opinion, "the greatest damage" lies in reminding people of their responsibilities in this life and taking them out of the slumbering, empty minded state of heedlessness in which they find themselves. Like a kind of magic spell, this sleep makes people forget why they exist, that there is a purpose in life, and that one day they will die. Another form of this sleep is to be inundated by the daily routines. Perhaps these people feel they spend a great deal of time thinking, making decisions and finding answers, but in fact what they think about does not go beyond the details of their day-to-day needs and impulses. Their thoughts are not related to the purpose of human creation, how the world came into being or the fact that one day every living thing will be buried in the ground. Actions, statements and behaviour learned by rote, taught, and become accustomed to, have such a hold on these people that they do not even feel a need to think about more fundamental realities.
Just as they evade thought, so too do these people escape hastily from warnings given by others; they turn their faces from belief in Allah, thinking about the verses of the Qur'an, and living by His guidance.
But nothing and nobody has been put on the face of the earth for an empty purpose. Allah created every detail in the universe for people to think about. In fact in the Qur'an, Allah announces that he created "… death and life to test which of you is best in action…" (Surat al-Mulk: 2) In this fleeting life, one is put to the test by all his or her deeds. A person has a great responsibility towards Allah Who created him and will resurrect him after death and call for an accounting for his deeds. Reading the Qur'an, taking heed of it, thinking about the verses and comprehending and applying them are amongst every person's principal responsibilities. Allah draws attention to this truth with the verse which reads,"Do they not ponder these words? Has anything come to them that did not come to their ancestors the previous peoples?" (Surat al-Mu'minun: 68)
Thinking people will conclude that such fine detail in the universe and its examples of flawless design mean that it cannot have come into being by accident and that there exists a Creator of all things. By thinking deeply about the miracles created around them and other proofs of Allah's existence, and observing the divine wisdom in the details which He has created, they will give themselves over to Him and live solely for the purpose of earning His approval. Aware of this truth, Satan wants them to live their lives in heedlessness, keep away from Allah's verses and hence to refrain from thought. Allah describes this purpose of Satan's in a verse of the Qur'an:
[Satan said], "… I will lie in ambush for them on your straight path. Then I will come at them, from in front of them and behind them, from their right and from their left... (Surat al-A'raf: 16-17)
In order to achieve this ultimate aim, Satan prepares very special situations to sink people into a state of heedlessness. For this purpose, he makes plans using people's weaker aspects, and attempts to make evil deeds attractive to people's egos. Unlike the faithful, people distanced from religious morality can end up in a state of spiritual heedlessness by forgetting Allah and not thinking about their purpose in life.
For example, Satan can easily waylay people in places of entertainment, because such places are conducive to wasting time and not thinking about anything. In these places what assumes the most importance are the clothes and accessories people wear, the money they spend, and the people around them. With the music so loud that people cannot hear one another, the air so full of smoke they cannot see one another, exploding flashbulbs, loud conversation and yelling, an environment is formed in which people who have no fear of Allah certainly cannot concentrate their attention or think.
Of course it is a great blessing for people to enjoy themselves and come together with others they enjoy talking to. But these days places of entertainment are not those where the name of Allah is mentioned and where people recall their purpose in life. The purpose of creation is entirely forgotten. People who feel no fear of Allah in their hearts and spend their time in such places experience an atmosphere of heedlessness and are left in no condition to consider or understand warnings. In fact, one of the reasons why such people prefer these places is to forget everything and avoid thought, and they often say so. While a person who comes to such a place to, as he expresses it, escape from the troubles of the world, may have been behaving sensibly ten minutes earlier, now he starts to regard any excess as normal. In the name of enjoying themselves, these people see immorality of all kinds as reasonable and become insensitive to what is happening around them. In fact, in environments of this type, breaking plates, overturning tables, throwing napkins, attacks on others with obscene language, and fights reflect only a small part of the kind of heedlessness and immorality into which people can sink.
Concert arenas, football stadiums and other places where large crowds gather only magnify this effect of heedlessness. A large number of people go to such places not to enjoy themselves or to watch an entertaining game or to listen to a beautiful voice but to shout, to fight and to cause trouble, in short to display ugly behaviour of every kind. In such environments, it is utterly impossible for people with no fear of Allah to extract from their minds a single useful thought. It only remains to be said that people in such an uncontrolled environment that encourages violence and immorality, are wide open to the whisperings of Satan so that the obedience of people to Satan's "Don't think!" order is ensured. Allah draws attention to this method of Satan's with this verse: "Stir up any of them you can with your voice and rally against them your cavalry and your infantry and share with them in their children and their wealth and make them promises!.." (Surat al-'Isra: 64)
People whose lives are filled with work and going out to such places of entertainment, where heedlessness reigns, forget that one day they will meet the angel of death. And when they do, it is too late, because this person has passed his worldly life in pursuit of empty practices and has fled from consideration of the verses of the Qur'an. For a person who thinks about death, the transitory nature of life and his responsibilities towards Allah, it is impossible ever to accept such a heedless state. A person who knows that Allah can take his life at any moment and that there will be a reckoning for his every word, thought and action never lets these realities slip his mind in any environment whatsoever and does not surrender to heedlessness.
For a person to continue a life of heedlessness resembles his seeing a truck with brake failure hurtling towards him and failing to get out of the way-even though this is possible-while being fully aware that it is going to hit and crush him. During his life, a person can indulge in excess hundreds or thousands of times, can even spend his entire life in this way, but when death takes him, everything he has experienced is left behind. If a person has passed his time in heedlessness of the existence of Allah, he will realize on the day of his death that this way of life, described in ignorant societies as "making the best of life," has brought him nothing but loss. He will feel regret for all the excesses he indulged in because he forgot Allah and the Day of Judgement. But heedless people ignore Allah's warnings:
Mankind's Reckoning has drawn very close to them, yet they heedlessly turn away. No fresh reminder comes to them from their Lord without their listening to it as if it was a game. Their hearts are distracted... (Surat al-Anbiya': 1-3)2009-08-15 22:15:33 | <urn:uuid:68808cbb-e9b6-412a-aed9-44ee67706f46> | CC-MAIN-2013-20 | http://www.evolutiondeceit.com/en/Daily-Comments/16535/Satans-command-Dont-think | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705195219/warc/CC-MAIN-20130516115315-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.975276 | 1,867 | 2.578125 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
Storage Area Networks (SAN)
The management of storage has become a key issue for IT systems in the last few years. As the amount of storage increases and the demands for high availability of storage becomes more prevalent, having disparate pools of storage across many servers becomes ever more complex to manage.
In the last few years, we have seen an increase in the availability of the Storage Area Network (SAN). In simple terms, this takes all the local disk storage usually found in servers and consolidates it into a single, large pool. However, these devices are more than just a simple NAS box. They concentrate on making that storage highly available as well as providing the tools to carve it up into appropriate capacities.
One of the biggest management headaches with traditional server storage is we typically find large pools of unused storage, while pools on other servers are bursting to the seams. A lot of support time can be spent relocating data and then having to change application configurations (which point to that storage), user short-cuts, shares and drive mappings as well as backup configurations.
The SAN allows these key servers to be provisioned with only a small amount of local storage to hold the operating system. Using a high performance network data access protocol (iSCSI), the required storage is then carved out on the SAN and accessed across the network by the server.
The SAN devices can be made redundant and a well designed solution will be able to suffer the outage of a SAN server with no downtime or performance impact to the network.
SAN is also a key component in designing a redundant VM network. The Virtual Machine hard drives are placed on the SAN storage. The Virtual Hosts then run the virtual machines from the SAN. Systems like VMware VMotion then allow these virtual machines to be moved from one host to another in real-time while they are operating.
After a significant amount of market research, Exmos selected Lefthand Networks (now part of HP) as their partner for SAN. Left Hand Networks were the first SAN OEM to provide high performance iSCSI on their devices (having been built for iSCSI from the ground up).
As well as providing traditional SAN server appliances, HP Lefthand also makes their SAN solution available as a virtual machine (VM). While initially this may seem a somewhat strange idea, it is the ideal starter solution for building a fully redundant VM network running on as few as two traditional servers (whereas with appliances it would require two SAN appliances and two servers). This brings the benefits of SAN/VM easily into the mid range of the SME market place and giving these organisations network redundancy capabilities that just a few years ago were purely in the realm of the enterprise organisation. | <urn:uuid:257fef2d-972e-4c38-9dbd-c627a7be2345> | CC-MAIN-2013-20 | http://www.exmos.com/Systems/SAN/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705195219/warc/CC-MAIN-20130516115315-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.954878 | 548 | 2.671875 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
|Allegro CL version 9.0|
Unrevised from 8.2 to 9.0.
This document contains the following sections:1.0 Garbage collection introduction
Lisp does its own memory management. The garbage collector is part of the memory management system. It disposes of objects that are no longer needed, freeing up the space that they occupied. While the garbage collector is working, no other work can be done. Therefore, we have made the garbage collector as fast and unobtrusive as possible. Allegro CL uses a version of the generation-scavenging method of garbage collection. Because optimal performance of generation-scavenging garbage collection depends on the application, you have a great deal of control over how the garbage collector works. In this section, we will describe the user interface to the garbage collector, and suggest how to tune its performance for an application. In what follows, the generation-scavenging garbage collection system will be abbreviated gsgc, and the act of garbage collecting will be abbreviated gc.
The Allegro CL garbage collector is a two-space, generation-scavenging system. The two spaces are called newspace and oldspace. Note that, as we describe below, newspace is divided into two pieces, called areas, and oldspace may be divided into a number of pieces, also called areas. Generally, when we say newspace, we mean both newspace areas and when we say oldspace, we mean all oldspace areas. We try to use the word area when we want to refer to a single area, but please note that this naming convention is new and you may run into text that uses `oldspace' to refer to an oldspace area. Usually, the context should make this clear.
The two pieces of newspace are managed as a stop-and-copy garbage collector system. The two areas are the same size. At any one time, one area is active and the other is not. A newspace area is filled from one end to the other. Imagine, for example, a book shelf. Existing books are packed together on the right side. Each new book is placed just to the left of the leftmost book. It may happen that books already placed are removed, leaving gaps, but these gaps are ignored, with each new book still being placed to the left of the location of the last new book. When the shelf fills up, the other shelf (newspace area) is used. First, all books remaining are moved to the other shelf, packed tight to one side, and new books are placed in the next free location.
So with Lisp objects in newspace areas. All existing objects are packed together on one side of the area and new objects are placed in the free space next to the existing objects, with gaps left by objects which are no longer alive being ignored. When the area fills up, Lisp stops and copies all live objects to the other area, packing them tight. Then the process is repeated.
The process of copying objects from one newspace area to the other is called a scavenge. We will discuss the speed of scavenges below, but scavenges are supposed to be so fast that humans usually barely notice them.
A scavenge happens in one of the following cases:
:allocation :lispstatic-reclaimable, for example, see cl:make-array in implementation.htm), or a weak-vector or finalization will cause aclmalloc space to be freed (see Section 10.0 Weak vectors, finalizations, static arrays, etc.).
The first listed cause is under user-control. The second and third causes are under system control and the resulting scavenge cannot be prevented if the system determines it must occur.
The system keeps track of the age of objects in newspace by counting the number of scavenges that the object has survived. The number of scavenges survived is called the generation of an object. When objects are created, they have generation 1, and the generation is increased by 1 at each scavenge.
Of course, many objects become garbage as time passes. (An object is garbage when there are no pointers to it from any other live object. If there are no pointers to an object, nothing can reference or access it and so it is guaranteed never to be looked at again. Thus, it is garbage.) The theory of a generation scavenging garbage collector is that most objects that will ever become garbage will do so relatively quickly and so will not survive many scavenges.
The problem with a stop-and-copy system is that objects that survive have to be moved and moving objects takes time. If an object is going to be around for a while (or for the entire Lisp session), it should be moved out of newspace to some place where it does not have to be moved (or is moved much less often). This is where the other half of the generation scavenging algorithm comes into play. Once an object has survived enough scavenges, it is assumed to be long-lived and is moved to oldspace. Oldspace is not touched during scavenges and so objects in oldspace are not moved during scavenges, thus saving considerable time over a pure stop-and-copy system.
Part of a scavenge is checking the age (generation) of surviving objects and moving those that are old enough to oldspace. The remaining objects are moved to the other newspace area. The age at which objects are tenured is user-settable. Its initial value is 4 and that seems to work for many applications. We will discuss below how changing that (and many other) settings can affect gc performance.
The process of moving an object to oldspace is called tenuring and the object moved is said to be tenured. At one point, oldspace was also called tenured space and you may see that term occasionally in Allegro CL documents.
Note the assumption: objects that survive a while are likely to survive a long while.
If one could know exactly how long an object is going to survive, one could provide the best possible garbage collection scheme. But that knowledge is not available. Objects are created all the time by different actions and users and even application writers typically do not know what actions create objects or how long those objects will live. Indeed, that information often depends on future events that are hard to control -- such as the behavior of the person running the application.
So the algorithm makes that assumption: if an object survives for a while, it is likely to survive for a long while, perhaps forever (forever means the length of the Lisp session). Of course, for many objects this assumption is wrong: the object may become garbage soon after it is tenured. However, as we said above, scavenges (which are automatic and cannot be prevented by a user although they can be triggered by a user) do not touch oldspace. In order to clear garbage from oldspace, a global garbage collection (global gc) must be done. An interface for automating global gc's is provided in Allegro CL and different interfaces are easy to implement (see below for more information), but the two important points about global gc's are:
The Lisp heap grows upwards (to higher addresses). Oldspaces are at low addresses and newspace occupies addresses higher than any oldspace area. This means that newspace can grow without affecting oldspace and oldspace can grow (usually by creating a new oldspace area) by having newspace move up as far as necessary.
Why might newspace grow? Suppose, for example, a newspace area is 600 Kbytes and you want to allocate a 1 Mbyte array. Newspace has to grow to accommodate this.
Why might oldspace grow? As objects are tenured to oldspace, it slowly fills up. Even with regular global gc's, it can fill up. When it does, newspace moves up and a new old area is created. (New areas are created rather than a single area being expanded for various technical reasons. We discuss below how to reduce sizes dynamically. See Section 3.5 Can other things be changed while running?.)
We will not describe the internal algorithms of the garbage collector because they cannot be changed or modified by users in any way. But let us consider how newspace might be moved, as this might make the process clearer. Suppose the current scavenge is about to move live objects to the high address area. Before anything is moved, Lisp can compute how much space the live objects need, how much space objects waiting to be allocated need, and how much space a new old area needs. From that information, it can compute the highest address of the high address newspace area. It requests from the Operating System that the area be allocated (using malloc or sbrk), and once the Operating System confirms the allocation, starts copying the live objects to that high address, filling toward lower addresses. When all live objects have been moved and new objects are allocated in the high address newspace area, the new oldspace area (if one is required) can be created and the location of the low address newspace area can be determined. Recall that high address newspace area is active so the low address newspace area does not contain anything of importance.
A consequence of what we just said about newspace moving when it has to grow or when a new oldspace area is needed is that the size of the Lisp image can grow while it is running. This is usually normal, indeed what you want. It allows images to start small and grow as much (but no more) than they need. It also allows the same image to run effectively on machines with different configurations.
But, sometimes growth can be unexpected and the image can want to grow to a size larger than the Operating System can handle (usually because there is not enough swap space).
The growth is often necessary, because of the type of application being run. What is important is that the growth be managed and be no more than is really needed.
In earlier releases, space for foreign code loaded into the image, space for foreign objects, and direct calls to malloc all could cause a gap to be placed above newspace. If a new oldspace or a larger newspace was needed, it had to be placed above the gap, causing in some cases a small need for additional space to result in a multimegabyte increase in image size. Now, malloc space is placed away from the new and old spaces and so the Lisp heap (new and old spaces together) are unaffected and can grow incrementally as needed. There is a Lisp heap size specified by the lisp-heap-size argument to build-lisp-image (see building-images.htm). The OS will try to reserve this space when Lisp starts up. If more space is needed, Lisp will request it from the OS but it is possible more space will not be available. If this happens, you might increase the original request.
The space reserved in a running Lisp is reported as 'resrve' on the
'Lisp heap' line of the output of
(room t). If the
heap grows larger than that size, gaps may appear. If you see gaps in
your application, you should consider starting with an image with a
larger heap size.
Application writers and users can control the behavior of the garbage collector in order to make their programs run more efficiently. This is not always easy, since getting optimal behavior depends on knowing how your application behaves and that information may be difficult to determine. Also, there are various paths to improvement, some of which work better than others (but different paths work better for different applications).
One thing to remember is that (unless the image needs to grow larger than available swap space), things will work whether or not they work optimally. You cannot expect optimal gc behavior at the beginning of the development process. Instead, as you gather information about your application and gc behavior, you determine ways to make it work better.
The automated gc system is controlled by switches and parameters (they are listed in Section 5.0 System parameters and switches below). There is not much difference between a switch and a parameter (a switch is usually true or false, a parameter usually has a value) and there probably should not be a distinction, but these things are hard to change after they are implemented. The functions gsgc-switch and gsgc-parameter can be used to poll the current value and (with setf) to set the value of switches and parameters.
The function gsgc-parameters prints out the values of all switches and parameters:
cl-user(14): (sys:gsgc-parameters) :generation-spread 4 :current-generation 4 :tenure-limit 0 :free-bytes-new-other 131072 :free-percent-new 25 :free-bytes-new-pages 131072 :expansion-free-percent-new 35 :expansion-free-percent-old 35 :quantum 32 (switch :auto-step) t (switch :use-remap) t (switch :hook-after-gc) t (switch :clip-new) nil (switch :gc-old-before-expand) nil (switch :next-gc-is-global) nil (switch :print) t (switch :stats) t (switch :verbose) nil (switch :dump-on-error) nil cl-user(15):
gsgc-switch can poll
and set switches while gsgc-parameter can poll and set parameters:
Here we poll and set the
cl-user(15): (setf (sys:gsgc-switch :print) nil) nil cl-user(16): (sys:gsgc-switch :print) nil cl-user(17): (setf (sys:gsgc-switch :print) t) t cl-user(18): (sys:gsgc-switch :print) t cl-user(19):
The gc function can be used to toggle some of the switches.
The system will cause a scavenge whenever it determines that one is necessary. There is no way to stop scavenges from occurring at all or even to stop them from occurring for a specified period of time.
However, you can cause a scavenge by calling the gc function with no arguments:
(excl:gc) ;; triggers a scavenge
You can also cause a scavenge and have all live objects tenured by
calling the gc function with
:tenure, like this
Global gc's (a gc of old and new space) are not triggered automatically (but triggering can be automated). You can trigger a global gc by calling gc with the argument t:
(excl:gc t) ;; triggers a global gc
See section Section 6.0 Global garbage collection for information on other ways to trigger a global gc and ways to automate global gc's.
The function room provides
information on current usage (it identifies oldspaces and newspace and
free and used space in each). Setting the
:verbose switches causes the system to print
information while gc's are occurring. See
Section 5.4 Gsgc switches and
Section 3.1 How do I find out when scavenges happen?.
(room t) provides the most
information about the current state of memory management. Here is a
(room t) output from a Allegro CL image that has
been doing a fair amount of work. This is from a UNIX machine and was
done immediately after a global gc, so some of the oldspaces have
significant free space.
CL-USER(1): (room t) area area address(bytes) cons other bytes # type 8 bytes each (free:used) (free:used) Top #x106a0000 New #x10598000(1081344) 134:13113 340128:582984 New #x10490000(1081344) ----- ----- 1 Old #x10290000(2097152) 0:0 2095952:0 0*Old #x10000e80(2683264) 0:68273 0:2124792 Tot (Old Areas) 0:68273 2095952:2124792 * = closed old area Root pages: 61 Lisp heap: #x10000000 pos: #x106a0000 resrve: #x10fa0000 Aclmalloc heap: #x64000000 pos: #x64011000 resrve: #x640fa000 Pure space: #x2d1aa000 end: #x2d747ff8 code type items bytes 112: (SIMPLE-ARRAY T) 6586 930920 28.3% 1: CONS 80502 644016 19.6% 8: FUNCTION 8432 520192 15.8% 7: SYMBOL 17272 414528 12.6% 117: (SIMPLE-ARRAY CHARACTER) 2259 259984 7.9% 96: (SHORT-SIMPLE-ARRAY T) 17498 151736 4.6% 18: BIGNUM 2966 139928 4.3% 125: (SIMPLE-ARRAY (UNSIGNED-BYTE 8)) 31 87816 2.7% 12: STANDARD-INSTANCE 3291 52656 1.6% 9: CLOSURE 2301 39688 1.2% 15: STRUCTURE 666 24944 0.8% 127: (SIMPLE-ARRAY (UNSIGNED-BYTE 32)) 9 9920 0.3% 108: (SHORT-SIMPLE-ARRAY CODE) 16 7368 0.2% 10: HASH-TABLE 108 3456 0.1% 17: DOUBLE-FLOAT 120 1920 0.1% 111: (SHORT-SIMPLE-ARRAY FOREIGN) 51 1216 0.0% 16: SINGLE-FLOAT 141 1128 0.0% 118: (SIMPLE-ARRAY BIT) 11 296 0.0% 20: COMPLEX 11 176 0.0% 80: (ARRAY T) 7 168 0.0% 11: READTABLE 8 128 0.0% 123: (SIMPLE-ARRAY (SIGNED-BYTE 32)) 1 88 0.0% 13: SYSVECTOR 3 48 0.0% 85: (ARRAY CHARACTER) 1 24 0.0% total bytes = 3292344 aclmalloc arena: max size free bytes used bytes total 112 3472 112 3584 496 3472 496 3968 1008 2016 2016 4032 2032 0 12192 12192 4080 0 8160 8160 9200 18400 18400 36800 total bytes: 27360 41376 68736 CL-USER(2):
Newspace is divided into two equal size parts (only one of which is
used at any time). There can be numerous oldspaces: two are shown in
the example, but many more are common after Lisp has run for a
while. Oldpsaces are numbered. The gsgc-parameter
:open-old-area-fence takes such a number as an
Section 5.1 Parameters that control generations and tenuring
for information on gsgc-parameters).
The 0th old area in the output is closed, as indicated by the
asterisk. If there are no closed old areas
:open-old-area-fence) returns 0) then no asterisks show
up and the "* = closed old area" note isn't given. When asterisks are
shown, they denote any old areas that are closed. See the discussion
of :open-old-area-fence in
Section 5.1 Parameters that control generations and tenuring
and also the note on closed old areas after the table for information
on closed and open old areas.
Root pages: 61
Root pages contain information about pointers from oldspace to newspace.
Lisp heap: #x10000000 pos: #x106a0000 resrve: #x10fa0000 Aclmalloc heap: #x64000000 pos: #x64011000 resrve: #x640fa000 Pure space: #x2d1aa000 end: #x2d747ff8
The first value is the starting address of the specified heap in memory. The `Pure space' line only appears in Lisps which use a pll file (see pll-file), showing where the pll files is mapped.
In the first two lines, pos (position) is the highest-use location; this is one byte larger than the highest memory used by the lisp. Some operating systems will only commit (assign physical pages) to memory between base (inclusive) and position (exclusive). This is a hexadecimal address value. resrve (reserved) is the number of bytes lisp thinks is reserved to it in virtual memory space. On some operating systems which support it, addresses greater than position, but less than starting location+reserved, will not be overwritten by shared-libraries, other memory mapping operations, etc.
The Lisp heap reserved size is a true limit only for certain free products. With paid license images (and some free products), this value is important only because if the heap grows larger than this limit, gaps in the heap may appear. See Section 1.8 The almost former gap problem for more information. This value is not a limit in any sense on how big the image can grow.
The Aclmalloc heap was called the "C heap" in earlier releases but its name was changed to reflect its real nature. It is the aclmalloc area used for space allocated by the aclmalloc function. That function differs from malloc() in that it ensures that Lisp will remember the location of aclmalloc'ed allocations and preserve it through dumplisp and restarts, thus guaranteeing that aclmalloc addresses remain valid.
More information on aclmalloc and regular malloc():
malloc()space is always started fresh when a Lisp starts up, so addresses used by malloc calls must never be used across dumplisps.
aclmalloc()is aclmalloc. There is no Lisp interface to
malloc()(there is an internal function called excl::malloc, but it calls
aclmalloc(), and not
malloc(), which is why it is not exported). Foreign definitions for
free()can be made in order to gain access to these functions. However, calling
malloc()in a Lisp environment is dangerous, and should only be done after careful consideration of the above.
The type counts are as if printed by print-type-counts:
code type items bytes 112: (SIMPLE-ARRAY T) 6586 930920 28.3% 1: CONS 80502 644016 19.6% 8: FUNCTION 8432 520192 15.8% 7: SYMBOL 17272 414528 12.6% 117: (SIMPLE-ARRAY CHARACTER) 2259 259984 7.9% 96: (SHORT-SIMPLE-ARRAY T) 17498 151736 4.6% 18: BIGNUM 2966 139928 4.3% 125: (SIMPLE-ARRAY (UNSIGNED-BYTE 8)) 31 87816 2.7% 12: STANDARD-INSTANCE 3291 52656 1.6% 9: CLOSURE 2301 39688 1.2% 15: STRUCTURE 666 24944 0.8% 127: (SIMPLE-ARRAY (UNSIGNED-BYTE 32)) 9 9920 0.3% 108: (SHORT-SIMPLE-ARRAY CODE) 16 7368 0.2% 10: HASH-TABLE 108 3456 0.1% 17: DOUBLE-FLOAT 120 1920 0.1% 111: (SHORT-SIMPLE-ARRAY FOREIGN) 51 1216 0.0% 16: SINGLE-FLOAT 141 1128 0.0% 118: (SIMPLE-ARRAY BIT) 11 296 0.0% 20: COMPLEX 11 176 0.0% 80: (ARRAY T) 7 168 0.0% 11: READTABLE 8 128 0.0% 123: (SIMPLE-ARRAY (SIGNED-BYTE 32)) 1 88 0.0% 13: SYSVECTOR 3 48 0.0% 85: (ARRAY CHARACTER) 1 24 0.0% total bytes = 3292344
The aclmalloc arena describes allocation of space for aclmallocs and foreign data. It is divided into chunks of various sizes to allow allocation of requests of various sizes without fragmentation. (Space allocated by aclmalloc is freed by aclfree.)
aclmalloc arena: max size free bytes used bytes total 112 3472 112 3584 496 3472 496 3968 1008 2016 2016 4032 2032 0 12192 12192 4080 0 8160 8160 9200 18400 18400 36800 total bytes: 27360 41376 68736
As a user, or as an application writer, how can you get the garbage collector to work best for you? At first, you do not have to do anything. The system is set up to work as delivered. You will not run out of space, global gc's will happen from time to time (as described below, see Section 6.0 Global garbage collection), the image will grow as necessary, and assuming you do not run out of swap space, everything will work.
Of course, it will not necessarily work as well as it could. As delivered, the garbage collector is set to work best with what we assume is a typical application: objects, none of which are too big, are created as needed. Most objects that survive a while are likely to survive a long while or perhaps forever, and so on. If your application's use of Lisp has different behavior, performance may be suboptimal.
So what to do? One problem is that optimizing gc behavior is a multidimensional problem. Factors that affect it include
Optimization in a multidimensional environment is always complicated.
The first step is always to gather the information necessary to do the tuning. Information like:
Section 3.1 How do I find out when scavenges happen?
Section 3.2 How many bytes are being tenured?
Section 3.3 When there is a global gc, how many bytes are freed up?
Section 3.4 How many old areas are there after your application is loaded?
Section 3.5 Can other things be changed while running?
There are three gsgc switches (these control the behavior of the
garbage collector) that affect printing information about the garbage
(setf (sys:gsgc-switch :print) t)
will cause a short message to be printed whenever a scavenge
happens. Unless the
t, no message will be printed.
switches control the amount of information printed. If the
:stats switch is true, the message contains more
information but the information is compact. If the
:verbose switch is also true, a longer, more easily
understood message is printed.
;; In this example, we cause a scavenge with all flags off, ;; then with :print true, then :print and :stats true, ;; and finally :print, :stats, and :verbose all true. cl-user(5): (gc) cl-user(6): (setf (sys:gsgc-switch :print) t) t cl-user(7): (gc) gc: done cl-user(8): (setf (sys:gsgc-switch :stats) t) t cl-user(9): (gc) gc: E=17% N=17536 T+=0 A-=0 cl-user(10): (setf (sys:gsgc-switch :verbose) t) t cl-user(11): (gc) scavenging...done eff: 15%, copy new: 1664 + tenure: 16064 = 17728 Page faults: gc = 0 major + 2 minor cl-user(12):
:stats true, the message contains
much more information, but it is coded -- E means Efficiency, N means
bytes copied in newspace, T means bytes copied to oldspace (i.e. bytes
:verbose also true, the same information is
displayed in expanded form and additional information (about page
faults) is provided.
Efficiency is defined as the ratio of cpu time not associated with gc to total cpu time. Efficiency should typically be 75% or higher, but the efficiencies in the example are low because we triggered gc's without doing anything else of significance.
It is usually desirable to have
:stats true while developing software. This allows you to
monitor gc behavior and see if there seems to be a problem.
That information is shown when the
:stats switches are true, but perhaps the real
question is whether things are being tenured that would be better left
in newspace (because they will soon become garbage). This often
happens when a complex operation (like a compile of a large file) is
being carried out. This question, in combination with the next can
tell you if that is the case.
In the following, copied from above, 0 bytes are tenured in the first gc (T+=0) and 16064 in the second (tenure: 16064):
cl-user(9): (gc) gc: E=17% N=17536 T+=0 A-=0 cl-user(10): (setf (sys:gsgc-switch :verbose) t) t cl-user(11): (gc) scavenging...done eff: 15%, copy new: 1664 + tenure: 16064 + aclmalloc free: 0 = 17728 Page faults: gc = 0 major + 2 minor cl-user(12):
switches are true, the amount of space freed by a global gc is printed
at the end of the report. Here is an example. The form
t) triggers a global gc.
cl-user(13): (gc t) gc: Mark Pass...done(1,583+66), marked 128817 objects, max depth = 17, cut 0 xfers. Weak-vector Pass...done(0+0). Cons-cell swap...done(0+67), 346 cons cells moved Symbol-cell swap...done(17+0), 1 symbol cells moved Oldarea break chain...done(83+0), 40 holes totaling 6816 bytes Page-compaction data...done(0+0). Address adjustment...done(1,400+67). Compacting other objects...done(150+0). Page compaction...done(0+0), 0 pages moved New rootset...done(667+0), 20 rootset entries Building new pagemap...done(83+0). Merging empty oldspaces...done, 0 oldspaces merged. global gc recovered 9672 bytes of old space. gc: E=0% N=1504 T+=0 A-=0 pfg=54+187 cl-user(14):
The next to last line reports on what was recovered from oldspace (9672 bytes). The value is often much higher. It is low in this example because we have not in fact done anything significant other than test gc operations.
There is plenty of other information but we will not describe its meaning in detail. It is typically useful in helping us help you work out complicated gc problems.
The amount of space freed is a rough measure of how many objects
are being tenured that perhaps should be left for a while longer in
newspace. If the number is high, perhaps things are being tenured too
quickly (increasing the value of the
switch will keep objects in newspace longer, as will a larger
The output printed by room
shows the two newspace areas and the various oldspace areas. Here is
an example of room
output. (room takes an
argument to indicate how much information should be displayed). The
following is the output of
(cl:room t), which
causes the most information to be displayed.
cl-user(3): (room t) area area address(bytes) cons other bytes # type 8 bytes each (free:used) (free:used) Top #x569a000 New #x5134000(5660672) 5:95781 597040:4239616 New #x4bce000(5660672) ----- ----- 7 Old #x498e000(2359296) 458:18903 31904:2170416 6 Old #x494e000(262144) 0:1019 0:253648 5 Old #x478e000(1835008) 0:41779 0:1498064 4 Old #x474e000(262144) 0:23437 0:73424 3 Old #x45ce000(1572864) 0:27513 0:1350736 2 Old #x454e000(524288) 0:7133 0:466512 1 Old #x448e000(786432) 0:4076 0:753104 0 Old #x4000d00(4772608) 0:97824 0:3983672 Tot (Old Areas) 458:221684 31904:10549576 Root pages: 158 Lisp heap: #x4000000 pos: #x569a000 resrve: 23699456 Aclmalloc heap: #x54000000 pos: #x54027000 resrve: 1024000 code type items bytes 96: (simple-array t) 76658 3864816 22.8% 108: (simple-array code) 8699 3608136 21.3% 1: cons 314901 2519208 14.9% 99: (simple-array (unsigned-byte 16)) 10938 2242320 13.2% 101: (simple-array character) 38383 1632920 9.6% 8: function 21721 1284216 7.6% 7: symbol 36524 876576 5.2% 107: (simple-array (signed-byte 32)) 264 264336 1.6% 12: standard-instance 14244 227904 1.3% 9: closure 8854 145448 0.9% 98: (simple-array (unsigned-byte 8)) 44 105184 0.6% 97: (simple-array bit) 49 103952 0.6% 15: structure 830 33144 0.2% 100: (simple-array (unsigned-byte 32)) 12 10264 0.1% 10: hash-table 225 7200 0.0% 18: bignum 410 4480 0.0% 16: single-float 505 4040 0.0% 111: (simple-array foreign) 103 2464 0.0% 17: double-float 124 1984 0.0% 64: (array t) 22 528 0.0% 65: (array bit) 13 312 0.0% 13: sysvector 14 224 0.0% 20: complex 12 192 0.0% 11: readtable 7 112 0.0% 69: (array character) 1 24 0.0% total bytes = 16939984 aclmalloc arena: max size free bytes used bytes total 48 3024 48 3072 496 3968 0 3968 1008 4032 0 4032 2032 2032 2032 4064 4080 8160 36720 44880 5104 10208 10208 20416 9200 27600 9200 36800 20464 20464 20464 40928 total bytes: 79488 78672 158160 cl-user(4):
The output shows the two equal size newspace areas, only one of which is being used. It also shows eight oldspaces and provides information about what is in the oldspaces. Then information is printed about other objects such as the number of root pages (a root page keeps information on pointers from oldspace to newspace -- these pointers must be updated after a scavenge), and the locations of the Lisp and C heaps. Then, there is a table showing the types and numbers of objects. Finally, used and available malloc space is displayed.
Yes. The function resize-areas can be used to rearrange things while running. It is typically useful to call this function, for example, after loading a large application. If you know desirable old- and newspace sizes for your application, it is preferable to build an image with those sizes (using the :oldspace and :newspace arguments to build-lisp-image, see building-images.htm for more information). However, you may not know until runtime what the best sizes are, in which case you can call resize-areas on application startup. Be warned that it may take some time.
Another use of resize-areas is when you wish to dump an image (with dumplisp) into which your application has been loaded. You call resize-areas just before dumplisp in that case.
The initial sizes of newspace and oldspace are determined when the image is built with build-lisp-image. See building-images.htm (where build-lisp-image is fully documented -- the page on it is brief to avoid two sources for the same complex discussion) The :newspace argument to build-lisp-image controls the initial size of newspace and the :oldspace argument the initial size of oldspace.
An image dumped with dumplisp inherits new and oldspace sizes from the dumping image. See dumplisp.htm.
resize-areas will restructure old and newspace sizes in a running image.
The garbage collector will automatically resize old and newspace when it needs to. The amount of resizing depends on space required to allocate or move to oldspace live objects, and also on the parameters that relate to sizes.
The parameters and switches described under the next set of headings control the action of the garbage collector. You may change them during run time to optimize the performance of the Lisp process. All parameters and switches values may be set with setf. However, some values should not be changed by you. The descriptions of the parameters say whether you should change their values. By default, the system does automatically increase the generation number. You may find that it is useful to step it yourself at appropriate times with a call to gsgc-step-generation.
There is really no difference between a parameter and a switch
other than the value of switches is typically
nil while parameters
often have numeric values. However, once both were implemented, it
became difficult to redo the design.
The function gsgc-parameters prints the values of all parameters and switches. gsgc-switch and gsgc-parameter retrieve the value of, respectively, a single switch or a single parameter, and with setf can set the value as follows.
(setf (sys:gsgc-parameter parameter) value) (setf (sys:gsgc-switch switch) value)
Switches and parameters are named by keywords.
The first three parameters relate to the generation number and when
objects are tenured. Please note that of the three parameters, you
should only set the value of
The fourth parameter, which is setf'able, allows closing off some old
areas, meaning that no objects will be tenured to them. Old areas are
now numbered, allowing for some to be closed off.
||The value of this parameter is a 16 bit unsigned integer. New objects are created with this generation tag. Its initial value is 1, and it is incremented when the generation is stepped. The system may change this value after a scavenge. Users should not set this value. Note: Both the current generation number and the generation of an individual object are managed in a non-intuitive way. While it is conceptually correct that the generation number increases, the actual implementation works quite differently, often resetting the generation number toward 0.|
||The value of this parameter is a 16 bit integer. During a scavenge, objects whose generation exceeds this value are not tenured and all the rest are tenured. Users should not set this value. Its initial value is 0, and it is constantly being reset appropriately by the system.|
||The value of this parameter is the number of distinct generations that will remain in newspace after garbage collection. Note: objects that are marked for tenuring and objects that are to stay in newspace permanently do not belong to a specific generation. Setting the value of this parameter to 0 will cause all data to be tenured immediately. This is one of the most important parameters for users to set. Its initial value is 4 and its maximum effective value is 25.|
||The value of this
parameter is always a non-negative integer which is the number of the
oldest old area that is open (not closed). Old areas are numbered
with 0 as the oldest old area.
This parameter is setfable,
either with the number of the old-area that is desired to be the first
open-old-area, or with a negative number, for which the old-areas are
counted backward to set the fence. For example,
See the note on closed old areas just after this table for more information.
Old areas can be marked as closed. When an old area is closed, no objects are newly tenured into a closed old-area; it is as if the area is full. Also, no dead object in a closed old area is collected while the area is closed, and data pointed to by that object is also not collected.
See the description of the
the table just above for details on how to specify old areas as
The intended usage model for closing old areas is this: a programmer with an application, such as a VAR, will load up their application, perform a global-gc and possibly a resize-areas, and then close most of the old-areas, leaving room for their users' data models to be loaded into the open-areas. When the user is done with the data model, it can be thrown away and a fast global-gc performed, making way for the next data model.
The following parameters control the minimum size of newspace and when
the system will allocate a new newspace. At the end of a scavenge, at
:free-bytes-new-other bytes must be free, and at
:free-percent-new percent of newspace must be
free. If these conditions are not met, the system will allocate a new
newspace, large enough for these conditions to be true after
allocating the object that caused the scavenge, if there is
one. (Unless explicitly called by the user, a scavenge occurs when the
system is unable to allocate a new object.) Note that there is no
system reason why there are two parameters,
:free-bytes-new-other -- differences were
anticipated in the original specification but none was never
implemented. The two parameter values are added to get total free
||The value of this parameter is a 32-bit integer which represents the minimum amount of space (in 8 Kbyte pages) that will be requested for a new new or old space and the granularity of space requested (that is space will be requested in multiples of :quantum pages). Its initial value is 32. This parameter value is overshadowed by the other size-related parameters described immediately below, and for that reason, we do not recommend that you change this value.|
||This is one of the parameters which determine the minimum free space which must be available after a scavenge. Its initial value is 131072.|
||This is one of the parameters which determine the minimum free space which must be available after a scavenge. Its initial value is 131072.|
||This parameter specifies the minimum fraction of newspace which must be available after a scavenge, or else new newspace will be allocated. Its initial value is 25.|
The final two parameters control how large new newspace (and new oldspace) will be. If newspace is expanded or a new oldspace is allocated, then at least the percentage specified by the appropriate parameter shall be free, after, in the case of newspace, the object that caused the scavenge has been allocated, and after, in the case of oldspace, all objects due for tenuring have been allocated. There are different concerns for the newspace parameter and the oldspace parameter.
Let us consider the oldspace parameter first. In the case where no
foreign code is loaded, then oldspaces are carved out of newspace, and
newspace grows up into memory as needed. If each new oldspace is just
large enough, the next time an object is tenured, another oldspace,
again just large enough, will be created, and the result will be a
bunch of small oldspaces, rather than a few larger ones. This problem
will not occur if there is foreign code, since some oldspaces will be
as large as previous newspaces. If the function room shows a bunch of
little oldspaces, you might try increasing the
:expansion-free-percent-old parameter to cure the
problem. However, resize-areas can be used instead to coalesce
the oldspaces into one.
The newspace parameter is more complicated, since newspace can grow
incrementally (assuming growth is not blocked by foreign code). Since
growing newspace takes time, you want to ensure that when newspace
grows, it grows enough. Therefore, it is essential that
:expansion-free-percent-new be larger than
:free-percent-new. Otherwise, you might find
newspace growing just enough to satisfy
:free-percent-new, and then having to grow again at
the next scavenge, since allocating a new object again reduced the
free space below the
||At least this percentage of newspace must be free after allocating new newspace. The system will allocate sufficient extra space to guarantee that this condition is met. Its initial value is 35.|
||At least this percentage of space must be free in newly allocated oldspace (note: not the total oldspace). Its initial value is 35.|
There are several switches which control the action of gsgc. The
value of a switch must be
nil. The function gsgc-switch takes a switch name as an
argument and returns its value or with setf, sets its
also prints out their values. The switches can be set by evaluating
(setf (sys:gsgc-switch switch-name) nil-or-non-nil)
||If this switch is set true, then before
expanding oldspace, the system will do a global garbage collection (that is, it will
gc oldspace) to see if the imminent expansion is necessary. If enough space is free after
the garbage collection of oldspace the expansion will not occur. Initially
|If true, print a message when a gc occurs. Can be set by
excl:gc. The length of the message is determined by the next two switches. If both are
||If true and
||If true, make the message printed (when :print is true) more
||This is the most important of the switches. If true, which is its initial value, gsgc-step-generation is effectively called after every scavenge. Thus (with the default :generation-spread) an object is tenured after surviving four scavenges.|
||If this switch is true, the function object
bound to the variable
If this switch is set true, the next gc will
be a global gc (that is both newspace and oldspace will be gc'ed). After the global gc,
the system will reset this switch to
The difference between setting this switch and causing a global gc explicitly with the function excl:gc is that setting this switch causes the system to wait until a scavenge is necessary before doing the global gc while calling the function causes the global gc to occur at once. The system uses this switch under certain circumstances.
The scavenger maintains a new logical pool of memory in
newspace called `reserved'. When the
If :print and :verbose are both true, information about the action triggered by this switch is printed. The information refers to `hiding' (moving space to the reserved bucket) and `revealing' (moving space to the free bucket).
If this switch is set true and the operating system on which Allegro CL is running supports it, then physical memory pages that are no longer used after a garbage collection are given back to the operating system in such a fashion that paging is improved.
Specifically, when this switch is true and the currently used half of newspace is copied to the unused half, the following things are done with the previously-used memory area: (1) the operating system is advised to ignore the page reference behavior of those addresses, and (2) the memory is unmapped and then is remapped, after being filled with zeros. The zero filling is necessary for security reasons, since the memory given back to the operating system will potentially be given to another process that requests virtual memory, without first being cleared. If it were not for (2), then remapping would always be advantageous and there would be no switch to control this behavior. As it is, there may be certain situations where zero filling will be too expensive, especially on machines which have a very large amount of physical memory and the decrease in locality does not effect the runtime performance of the Allegro CL application, or where the mmap() implementation is flawed.
If this switch is set true, then a core dump is automatically taken when an internal garbage collection error occurs. The core dump will fail, however, if (1) there is a system imposed limit on the size of a core dump and dumping the image would exceed this limit or (2) there is some other system impediment to dumping core, such as the existence of a directory named core. We assume that you can prevent the second limitation. Here are a few more words on the first limitation. In the C shell, the limit command and its associates can be used to set a higher limit or no limit for the maximum size of a core dump.
If the value of this switch is
These examples show the effect on gc messages of
nil, a message like the following is printed during a
:verbose is also true but
the message is:
:stats is true and
nil, the message is similar to:
gc: E=34% N=30064 T+=872 A-=0 pfu=0+101 pfg=1+0
The same message with
:verbose true would be:
scavenging...done eff: 9%, new copy: 148056 + tenure: 320 + aclmalloc free: 0 = 148376 Page faults: non-gc = 0 major + 1 minor
abbreviations are used. Their meanings are explained when
:verbose is true. T or Tenure
means bytes tenured to oldspace. A and alcmalloc free
refer to malloc space (see aclmalloc).
E or eff. is efficiency: the ratio of non-gc time and all time (the efficiency is low in our example because we forced gc's in order to produce the example; as we say elsewhere, efficiencies of less than 75% are a cause for concern when the gc is triggered by the system).
The copy figures are the number of bytes copied within newspace and to oldspace.
X means "expanding", so XO means "expanding oldspace" and XN means "expanding newspace". XMN means "expanding and moving newspace".
Page faults are divided between user (pfu or non-gc) caused and gc (pfg or gc) caused. See the Unix man page for getrusage for a description of the difference between major and minor page faults.
Here are a couple of more examples (with
on and off in a fresh Lisp each time):
cl-user(1): (gc :print) t cl-user(2): (setf (sys:gsgc-switch :verbose ) t) t [...] cl-user(7): (defconstant my-array (make-array 10000000)) scavenging...expanding new space...expanding and moving new space...done eff: 36%, copy new: 7533984 + old: 85232 = 7619216 Page faults: non-gc = 1 major + 0 minor my-array ;; And in a fresh image with :verbose off: cl-user(1): (gc :print) t cl-user(2): (defconstant my-array (make-array 10000000)) gc: XN-XMN-E=32% N=7522488 T+=85632 A-=0 pfu=4+0 my-array
|Function or variable||Arguments of functions||Brief Description|
|gsgc-step-generation||Calling this function, which returns the new value of
:current-generation, increases the current generation number and, if necessary, the value
|gc||&optional action||Called with no arguments, perform a scavenge; called with
|print-type-counts||&optional (location t)||Prints a list of quantities and sizes of lisp objects in the specified location in the heap, along with type names and type codes of each object type printed. See the print-type-counts page for location details.|
|lispval-storage-type||object||Returns a keyword denoting where object is stored. See the lispval-storage-type page for interpretation of the returned value and examples. (In earlier releases, the function pointer-storage-type performed this function. It is still supported, but its use is deprecated. lispval-storage-type is more flexible and should be used instead.)|
|resize-areas||&key verbose old old-symbols new global-gc tenure expand sift-old-spaces pack-heap||This function resizes old and newspaces, perhaps coalescing oldspaces, according to the arguments. See the resize-areas page for details.|
||If the gsgc switch :hook-after-gc is true,
then the value of this symbol, if true, will be funcalled immediately
after a scavenge. See the description of
|gc-after-c-hooks||Returns a list of addresses of C functions that will be called after a gc. See gc-after-c-hooks for details.|
|gc-before-c-hooks||Returns a list of addresses of C functions that will be called before a gc. See gc-before-c-hooks for details.|
In a global garbage collection (global gc), objects in oldspace are garbage collected. Doing so frees up space in oldspace for newly tenured objects. Global gc's are time consuming (they take much longer than scavenges) and they are not necessary for Lisp to run.
The effect of never doing a global gc is the Lisp process will slowly grow larger. The rate of growth depends on what you are doing. The costs of growth are that the paging overhead increases and, if the process grows too much, swap space is exhausted, perhaps causing Lisp to stop or fail.
You have complete control over global gc's. The system will keep track of how many bytes have been tenured since the last global gc. You can choose one of these options for global gc:
The function that records how many bytes have been tenured since
the last global gc is the default value of the variable
*gc-after-hook*. If you set
that variable (whose value must be a function or
nil or a function
that does not keep records of bytes tenured, you will not get the
behavior described here. (See the description of
information on defining a function that does what you want and records
bytes tenured correctly.)
has as its value its initial value or a function that records bytes
tenured correctly, global gc behavior is controlled by the global
*tenured-bytes-limit* is used in conjunction
*global-gc-behavior*. The number of bytes
tenured (moved to oldspace) since the last global gc is remembered and
*global-gc-behavior* depends on when
The tenuring macro causes the immediate tenuring (moving to oldspace) of all objects allocated while within the scope of its body. This is normally used when loading files, or performing some other operation where the objects created by forms will not become garbage in the short term. This macro is very useful for preventing newspace expansion.
It is useful if possible to provide some sort of cue while garbage collections are occurring. This allows users to know that a pause is caused by a gc (and not by an infinite loop or some other problem). Typical cues include changing the mouse cursor, printing a message, or displaying something in a buffer as Emacs does when the emacs-lisp interface is running.
Unfortunately, providing such a cue for every scavenge is a difficult problem and if it is done wrong, the consequences to Lisp can be fatal. However, we have provided an interface for the brave. The functions gc-before-c-hooks and gc-after-c-hooks return settable lists of addresses of C functions to be called before and after a gc.
Luckily, scavenges are usually fast and so failing to provide a cue may not be noticeable. Global gc's, however can be slow but it is possible to provide a cue for a global gc even without using C functions. There are two strategies: (1) determine when a global gc is necessary and either schedule it when convenient or warn the user that one is imminent; (2) do not give advance warning but provide a cue when it happens. Looking at these examples, you can probably craft your own method of warning or cue.
Note that in these examples, we replace the value of
*gc-after-hook* with a new
value, destroying the current value (which provides for the default
automated behavior). The default function is named by the (internal)
One way to implement the first strategy is to set a flag when a global gc is needed and then have code that acts on that flag. This code can be run at your choosing -- but be sure that it is run at some point. You might do this:
(defvar *my-gc-count* 0) (defvar *time-for-gc-p* nil) (defun my-gc-after-hook (global-p to-new to-old eff to-be-alloc) (declare (ignore eff to-new to-be-alloc)) (if global-p (progn (setq *my-gc-count* 0) (setq *time-for-gc-p* nil)) (progn (setq *my-gc-count* (+ *my-gc-count* to-old)) (if (> *my-gc-count* excl:*tenured-bytes-limit*) (setq *time-for-gc-p* t)))))
Make sure you compile my-gc-after-hook before
making it the value of
*gc-after-hook*. Now, define a function that
triggers a global gc (calls
(gc t)) when
*time-for-gc-p* is true. This function can be called by a
user of your application, or when your application is about to do
something that the user expects to wait for anyway, or whenever, so
long as it is called at some point.
In the second strategy, we provide some cue to the user that a global gc is occurring. We have not included the code for the cue (you should supply that) and notice we have gone to some pains to avoid a recursive error (where the garbage collector calls itself).
(defvar *my-gc-count* 0) (defvar *prevent-gc-recursion-problem* nil) (defun my-gc-after-hook (global-p to-new to-old eff to-be-alloc) (declare (ignore eff to-new to-be-alloc)) (when (null *prevent-gc-recursion-problem*) (if global-p (setq *my-gc-count* 0) (progn (setq *my-gc-count* (+ *my-gc-count* to-old)) (if (> *my-gc-count* excl:*tenured-bytes-limit*) (excl:without-interrupts (setq *prevent-gc-recursion-problem* t) ;; (<change the cursor, print a warning, whatever>) (gc t) ;; (<reset the cursor if necessary>) (setq *my-gc-count* 0) (setq *prevent-gc-recursion-problem* nil)))))))
;; (<change the cursor, print a warning, whatever>) ;; (<reset the cursor if necessary>)
with whatever code you want, but be careful that there is no possibility of waiting (for user input, e.g.) or going into an infinite loop because you are in a without-interrupts form and waiting is wrong and an infinite loop is fatal in that case.
The following list contains information and advice concerning gsgc. Some of the information has already been provided above, but is given again here for emphasis.
nilunless some other method of stepping the generation is enabled (including specific action by you). If objects are not tenured, newspace will grow, filling up with long-lived objects, and performance will degrade significantly.
:tenure(which will cause all live objects to be tenured) or with the tenuring macro. There is no way to prevent a specific object from ever being tenured except by disabling generation stepping and thus preventing all objects from being tenured.
It is not easy to cause a gsgc error. Such errors are usually catastrophic (often Lisp dies either without warning or with a brief message that some unrecognizable object was discovered). Once the garbage collector becomes confused, it cannot be straightened out.
Such errors can be caused when Lisp code is compiled with the compiler
optimizations set so that normal argument and type checking is
disabled. For example, if a function is compiled with the values of
speed and safety such that the compiler:verify-argument-count-switch
nil, and that function is passed the wrong
number of arguments (usually too few), it can trigger a fatal gsgc
error. Before you report a gsgc error as a bug (and please do report
them), please recompile any code where checking was disabled with
settings of speed and safety which allow checking. See if the error
repeats itself. See Declarations and optimizations in
compiling.htm for more information on compiler
optimization switches and values of speed and safety.
Garbage collector errors may also be caused by foreign code signal handlers. Note that foreign code signal handlers should not call lisp_call_address or lisp_value. See foreign-functions.htm for more information on signals.
See the information on the
Section 5.4 Gsgc switches.
The Allegro CL image will grow as necessary while running. If it needs to grow and it cannot, a storage-condition type error is signaled (storage-condition is a standard Common Lisp condition type). While these errors might arise from insufficient swap space, the typical cause is a conflict in the virtual address space. That is, something else (a program or a library location) has grabbed virtual address space in a range that Lisp needs to grow the heap. (Allegro CL does not allow discontinuous virtual address ranges.)
Whatever the cause, the error is triggered by a request for space which cannot be fulfilled. Here we show the error when a largish array is created (this example is contrived in order to show the error: a request for such an array does not typically cause a problem).
CL-USER(25): (setq my-array (make-array 100000)) Error: An allocation request for 483032 bytes caused a need for 12320768 more bytes of heap. The operating system will not make the space available. [condition type: STORAGE-CONDITION] CL-USER(26):
A global gc may free up enough space within Lisp to continue without growing. Killing processes other than Lisp may free enough space for Lisp to grow. But it may be the case that other allocations of virtual address space conflicts with Lisp usage. Please contact Franz customer support for assistance in determining whether this is the case if the problem persists.
You trigger a global gc by evaluating (see gc):
When the garbage collector gets confused, usually by following what it believes to be a valid pointer, but one that does not point to an actual Lisp object, Lisp fails with a two part message. The first part is a brief description of the specific problem. The second part is a general statement about the gc failures and the fact they cannot be recovered from, along with an opportunity of get a core file (which may be useful for later analysis). Here are some examples of the second part:
The gc's internal control tables may have been corrupted and Lisp execution cannot continue. [or] The internal data structures in the running Lisp image have been corrupted and execution cannot continue. [then] Check all foreign functions and any Lisp code that was compiled with high speed and/or low safety, as these are two common sources of this failure. If you cannot find anything incorrect in your code you should contact technical support for Allegro Common Lisp, and we will try to help determine whether this is a coding error or an internal bug. Would you like to dump core for debugging before exiting(y or n)?
Here are some examples of the first part:
system error (gsgc): Unknown object type at (0xc50ec9a) system error (gsgc): Object already pointing to target newspace half: 0x42c43400 system error (gsgc): Scavenger invoked itself recursively.
As the text says in the second part, there is no recovery.
The causes of such errors can be one or more of the following:
Diagnosing and fixing the problem can be difficult. Here are some initial steps to take where possible:
(gc :print), see gc.)
If you cannot quickly determine the cause of the problem and a solution for it, contact Franz Inc. technical support at [email protected]. Be sure to include the output of a call to print-system-state, and provide any information about foreign code, optimizations, etc. that you can. We may ask you for a core file (which, as said above, can be optionally generated when there is a failure).
A Lisp object becomes garbage when nothing points to or references it. The way the garbage collector works is it finds and identifies live objects (and, typically, moves them somewhere). Whatever is left is garbage. Finalizations and weak vectors allow pointers to objects which will not, however, keep them alive. If one of these pointers exists, the garbage collector will see the item and (depending on the circumstances), either keep it alive (by moving it) or abandon it.
It is useful to distinguish two actions of the garbage collector. When the only pointers to an object are weak pointers or finalizations, the garbage collector follows those pointers and `identifies the object as garbage'. If it decides not to keep the object alive, it `scavenges the object away'. Note that any Lisp object can be scavenged away - that just means that the memory it used is freed and (eventually) overwritten with new objects. Only objects pointed to by a weak vector or a finalization can be identified as garbage, however. Live objects are not garbage and objects with nothing pointing to them are not even seen by the garbage collector.
The function lispval-storage-type applied to an object returns a keyword providing information about the storage type of the object. Weak vectors and finalizations are identified by this function which can be used to test whether an object is a weak vector.
Weak arrays are created with the standard Common Lisp function make-array (using the non-standard weak keyword argument) or (if a vector is desired) with the function weak-vector. When you create a weak array by specifying a true value for the weak keyword argument to make-array, you cannot also:
:displaced-tokeyword argument (weak arrays cannot be displaced into other arrays).
:new(the non-standard allocation keyword argument allows specifying where the arrays will be created, with choices including foreign space, non-gc'ed Lisp space, or the Lisp heap, called for by
:new, which is also the default).
When make-array successfully accepts a true value for the weak keyword argument, the object that is weak is always the underlying simple-vector; if the resultant array is non-simple or is multidimensional, then the array itself is not marked as weak, but objects in the array will still be dropped by the gc when not otherwise referenced, because the simple-array that is the data portion of the array is itself weak.
See the discussion of extensions to make-array (in implementation.htm) for further details on the Allegro CL implementation of make-array and the weak keyword argument.
As we said in the brief description above, the most important feature
about weak arrays is that being pointed to by a weak array does not
prevent an object from being identified as garbage and scavenged
away. When an object is scavenged away, the entry in a weak array that
points to the object will be replaced with
Weak arrays allow you to keep track of objects and to discover when
they have become garbage and disposed of. An application of weak
arrays might be determining when some resource external to Lisp can be
flushed. Suppose that all references to a file external to Lisp are
made through a specific pathname. It may be that once all live
references to that pathname are gone (i.e. the pathname has become
garbage) the file itself is no longer needed and it can be removed
from the filesystem. If you have a weak array which points to the
pathname, when the reference is replaced by
nil by the garbage collector, you can tell the system
to kill the file.
It is important to remember that objects which have been tenured will not be identified as garbage unless a global gc is performed. If you use weak arrays, you should either arrange that global gc's are done regularly or that you do an explicit global gc before checking the status of an element of the weak array.
We provide a simple example of weak vectors (weak arrays differ from weak vectors only in having more dimensions) and finalizations in Section 10.3 Example of weak vectors and finalizations.
Weak hashtables are also supported. See implementation.htm for information on an extension to make-hash-table that creates weak hashtables.
The function lispval-storage-type applied to an object returns a keyword providing information about the storage type of the object. Weak vectors and finalizations are identified by this function which can be used to test whether an object is a weak vector.
A finalization associates an object with a function and optionally
queue. If the object
is identified as garbage by the garbage collector, either the function
is called with the object as its single argument before the object is
scavenged away (if there is no associated queue) or a list consisting
of the function and the object is placed on the queue. In the latter
case, no further action is taken by the system. The program must apply
the function call-finalizer at its convenience.
Multiple finalizations can be scheduled for the same object; all are run or placed on queues if and when the gc identifies the object as garbage. The order of the running of multiple finalizations is unspecified.
The timing is important here. While the garbage collector is running, nothing else can be done in Lisp. In particular, functions (except those internal to the garbage collector itself) cannot be called. Therefore, the process of running a finalization and the eventual reclamation of the finalized object occurs over two invocations of the garbage collector. During the first gc, the object is identified as garbage. The garbage collector sees the finalization and so, instead of immediately scavenging the object away, it keeps it alive and makes a note to call the finalization function or enqueue the list of the function and the object as soon as it finishes the current scavenge (or global gc). The finalization is removed from the object after the function is run so that during a subsequent garbage collection, the object is either garbage or, if a weak vector points to it, again identified as garbage and (since it no longer has a finalization) scavenged away. See the example in Section 10.3 Example of weak vectors and finalizations.
A finalization is not a type of Lisp object. Finalizations are implemented as vectors (but that may change in a later release). You should not write any code which depends on the fact that finalizations are implemented as vectors.
You schedule a finalization with the function schedule-finalization. The function unschedule-finalization removes the finalization from the object. Finalizations are only run once, either immediately after the garbage collection which identified the object as garbage or by the program. The object is not scavenged away during the garbage collection in which it is identified as garbage (since it must be around to be the argument to the finalization function).
On Windows, load the file after the transcript example. Typing the example into the Debug window in the Integrated Development Environment on Windows does not work as described, because tools in the IDE cause pointers to the objects to be preserved, and, as a result, the example does not work as described. On Unix, you can type the example directly to a prompt.
;; This example can be typed to a prompt on a UNIX platform. ;; We define a weak vector and a function to be called by finalizations. CL-USER(10): (setq wv (weak-vector 1)) #(nil) CL-USER(11): (defun foo (x) (format t "I am garbage!~%")) foo ;; We create an object and put it in the weak vector: CL-USER(12): (setq a (cons 1 2)) (1 . 2) CL-USER(13): (setf (aref wv 0) a) (1 . 2) ;; We schedule a finalization. CL-USER(14): (schedule-finalization a 'foo) #((1 . 2) foo nil) ;; We remove the reference to the cons by setting the value of A to NIL. CL-USER(15): (setq a nil) nil ;; We evaluate unrelated things to ensure that the object ;; is not the value of *, **, or ***. CL-USER(16): 1 1 CL-USER(17): 2 2 CL-USER(18): 3 3 ;; We trigger a scavenge. The finalization function is called. ;; Note: an automatic gc might occur while you are entering the ;; forms shown. If it does, you might see the message printed by ;; our finalization sooner. CL-USER(19): (gc) I am garbage! ;; At this point, the weak vector still points to the object: CL-USER(20): wv #((1 . 2)) ;; The next gc causes the value in the weak vector to ;; be changed. CL-USER(21): (gc) CL-USER(22): wv #(nil)
On Windows, put this in a file finalization.cl:
(in-package :cg-user) (setq wv (weak-vector 1)) (defun foo (x) (format t "I am garbage!~%")) (setq a (cons 1 2)) (setf (aref wv 0) a) (schedule-finalization a 'foo) (setq a nil)
and do this in the Debug Window (the transcript shows the I am
garbage! message occurring after
evaluated at cl-user(11) but if a gc was triggered by the
loading of finalization.cl, you may see instead
the I am garbage! message sooner):
cl-user(10): :ld finalization.cl Loading finalization.cl cl-user(11): wv #((1 . 2)) cl-user(12): (gc) I am garbage! cl-user(13): 1 1 cl-user(14): 2 2 cl-user(15): 3 3 cl-user(16): (gc) cl-user(17): wv #(nil)
The data in a static array is placed in an area that is not garbage collected. This means that the data is never moved and, therefore, pointers to it can be safely stored in foreign code. (Generally, Lisp objects are moved about by the garbage collector so a pointer passed to foreign code is only guaranteed to be valid during the call. See foreign-functions.htm for more information on this point.) Only certain element types are permitted (listed below). General arrays (whose elements can be any Lisp object) cannot be created as static arrays.
The primary purpose of static arrays is for use with foreign code. They may also be useful with pure Lisp code but only if the array is needed for the whole Lisp run and the array never has to be significantly changed. The problem is the array is not garbage collected and there is no way (within Lisp) to free up the space.
Static arrays are returned by make-array with the (Allegro CL-specific) allocation keyword argument specified. The data is stored in an area which is not garbage collected but the header (if any) is stored in standard Lisp space. The following element types are supported in static arrays.
bit (signed-byte 8) (unsigned-byte 4) (unsigned-byte 8) (signed-byte 16) (unsigned-byte 16) (signed-byte 32) (unsigned-byte 32) character single-float double-float (complex single-float) (complex double-float)
See implementation.htm for information on this extension to make-array. See lispval-other-to-address for information on freeing static arrays.
Copyright (c) 1998-2012, Franz Inc. Oakland, CA., USA. All rights reserved.
Documentation for Allegro CL version 9.0. This page was not revised from the 8.2 page.
|Allegro CL version 9.0|
Unrevised from 8.2 to 9.0. | <urn:uuid:b14c698d-79cb-429f-9908-bccc75d9404c> | CC-MAIN-2013-20 | http://www.franz.com/support/documentation/current/doc/gc.htm | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705195219/warc/CC-MAIN-20130516115315-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.873932 | 16,820 | 2.765625 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
Teen is on front lines of autism clinical trialShe lives in a world no one else can enter, unable to speak or interact with others. But 16-year-old Rebecca Singer may be playing an important role in science.
By: Barbara Williams , The Record (Hackensack N.J.)
HACKENSACK, N.J. — She lives in a world no one else can enter, unable to speak or interact with others. But 16-year-old Rebecca Singer may be playing an important role in science.
Rebecca has become the first patient in a clinical trial testing a drug that researchers hope could pull her out of her reality and eventually lead to a groundbreaking autism treatment.
In the study led by the Mount Sinai School of Medicine and assisted by a research team from Rutgers University, the Tenafly, N.J., girl is taking a growth factor hormone that was shown to reverse in mice some of the deficits associated with autism.
Researchers aren’t expecting a cure but are hopeful for a "disease modifying" outcome, said Dr. Alex Kolevzon, one of the physicians working on the study and the pediatrics clinical director at the Seaver Autism Center at Mount Sinai.
"We know that humans don’t always respond the way mice do, but there’s the potential for significant benefit," Kolevzon said.
Such words are remarkable to parents of children with autism. "I’m trying not to get my hopes up that this could be the miracle we’ve been waiting for," Rebecca’s father, Jon Singer said. "But there is the possibility that it could be and even if this hormone only helps in a small way, it’s a start."
Autism rates are rising at a startling pace. One in 88 children nationwide now has the disorder. New Jersey’s rates are even higher — one in every 49 children, including one in every 29 boys — according to a report released in March by the Centers for Disease and Control and Prevention.
Rebecca and two other children in the 7-month blind study are being injected twice a day for three months with growth factor IGF-1 or a placebo, separated by a four-week resting period. The insulin-like hormone is typically used for children not growing appropriately for their age.
In a trial last year, IGF-1 was shown to reverse nerve cell communication damage in mice. People with autism seem to have the same type of deficits.
All the trial participants have a mutated or missing gene on chromosome 22, which causes Phelan-McDermid Syndrome, a rare genetic disease that causes severe disabilities and, often, autism. Chromosome 22 is involved in processes crucial for learning and memory; the loss of it can impede neuron communication.
People with Phelan, estimated at fewer than 700 worldwide, typically have profound intellectual disabilities, chewing and swallowing problems, no formal language, and autism.
"Rebecca seems to understand certain things and can use a fork and drink from a cup, something we didn’t think would ever happen," Singer said. "She turns the pages of a book when we’re reading to her but we’re not sure how much of it she understands."
Though Rebecca doesn’t speak, her family understands her rudimentary method of communicating, like when she stops what she is doing to sit on a kitchen chair — meaning she’s hungry. When she wants to go to her favorite place — anywhere outdoors — she stands in front of the door. Her father, her mother, Michey, and 12-year-old brother, Sam, can interpret the sounds she makes to know whether she’s agitated or happy. And anyone can see her face-wide grin when she’s in a pool or riding her bike.
"She’s a real trouper — she’s been poked and prodded so much and she doesn’t really cry or give us a hard time," her mother said. "I’m cautiously hopeful this trial will be groundbreaking and even if it doesn’t help Rebecca, it will help someone else down the road."
Now that Rebecca is in the study, her loved ones are watching carefully for any improvements — better eye contact or more fluid movements — though no one knows whether she’s taking IGF-1 or the placebo.
"Sometimes I think she’s doing better with her fine motor skills but I have to remind myself how powerful suggestion can be," her father said. "Her teachers will tell us they believe she’s making longer eye contact, but we have to keep all this in perspective. Even though everyone is trying to be objective, sometimes you see what you want to see."
(EDITORS: STORY CAN END HERE)
While others look for hopeful signs, Michey Singer has her eyes trained on the conditions that indicate her daughter may be suffering from the growth factor’s side effects — low blood sugar, light-headedness or a more pronounced limp.
"I test her blood sugar three times a day and watch if she’s limping," Michey Singer said. "Even without the trial, there’s constant worry with Rebecca — she can’t tell me when something is wrong so I’m always listening and watching to see if something seems off."
Two years ago. scientists discovered how to create autism-like conditions in mice, altering the chromosome to disrupt nerve cell communication. Less than a year later, researchers gave the affected rodents IGF-1.
By Day Six of the two-week treatment, they had reversed the damage.
"IGF-1 promotes synaptic growth in nerve cells," Kolevzon said. "You can’t compare the time frame between mice and humans but if IGF-1 is successful, this may shed a broader light on autism."
(EDITORS: STORY CAN END HERE)
A psychology research team at Rutgers University may be among the first to see any improvements in Rebecca and others in the study. Elizabeth Torres, an assistant professor who leads the group, said they are creating three Avatar-like images for each patient — before the study begins, half-way through the trial, and after it is over.
Comparing the images may allow researchers to discern slight changes in movement that may not be visible in the patient, researchers said.
"We’re collecting motion patterns — 240 points of movement for each second," Torres said. "These movements are like fingerprints, unique to each person, and we can track their performance gains."
Emerging research points to genetic mutations as a likely cause of autism spectrum disorder. Specifically, different genetic mutations may cause the common symptoms associated with the disorder, such as problems with social interaction, language and behavior. The Mount Sinai work could trigger other studies on various gene mutations, experts say.
In addition to having autism, people with Phelan also have a wide range of symptoms including intellectual disabilities, sleep disorders and seizures. Infants may have very low muscle tone, poor motor control and problems with eating and swallowing.
Jon Singer works tirelessly for autism causes. He raises funds for research; helped launch the Reed Academy in Oakland, N.J., a school dedicated solely to students with autism, and publishes books for parents of special-needs children.
He fought hard to get Rebecca into the clinical trial. At first, it seemed her body was finished growing, making the potential side-effects too dangerous, but Singer found several doctors to review the tests and confirm she was still a good candidate.
"We’ve wanted to get her into this study for a year-and-a-half," he said. "We have no idea what the outcome will be — if there are improvements, will they be reversed when the injections stop? But I’m very excited about it."
Distributed by McClatchy Tribune. | <urn:uuid:c34f7d56-a8ca-4e9d-a6f8-75be7a724f4e> | CC-MAIN-2013-20 | http://www.grandforksherald.com/event/article/id/240158/publisher_ID/40/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705195219/warc/CC-MAIN-20130516115315-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.958839 | 1,640 | 2.65625 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
Operation Downfall was the name given to the planned invasion of Japan. Operation Downfall itself was divided into two parts - Operation Olympic and Operation Coronet. By mid-1945, it was apparent that the collapse of Japan was near and the Allies had to plan for the invasion of the Japanese mainland - something that they knew would be very costly in terms of lives lost.
American military commanders were given the task of planning for the invasion - Douglas MacArthur, Chester Nimitz, Ernest King, William Leahy, Hap Arnold and George Marshall. Inter-service rivalry did occur as both army and navy wanted one of 'their men' to be supreme commander of planning. Eventually the navy accepted that MacArthur was to have total control if the invasion was to take place. The planning proceeded without taking the atomic bomb into consideration as so few knew about its existence.
The Americans faced one very serious problem. They knew for sure that the Japanese would defend their territory with zeal and that American casualties would be high - probably too high for the American public to accept. The fanaticism that had been shown by the kamikazes, would almost certainly be encountered in Japan and the Americans had to plan for this.
There was plenty of evidence to indicate that any invasion of the Japanese mainland would be very bloody for all concerned. The complexity of such an attack also led to both sides of the US military developing different ideas as to what the best plan should be. The navy believed that a blockade supported by an air campaign would suffice. They wanted to use air bases in China and Korea to launch bombing raids against key cities in Japan. The army believed that such a campaign would take too long and that the morale of the American public might suffer as a result. They supported the use of an invasion that would go to the heart of Japan – Tokyo. The army got its way.
It quickly became apparent that any invasion of Japan would present huge difficulties. There were very few beaches that could be used as a landing place and the Japanese knew this. Both sides knew that only the beaches in Kyushu and the beaches at Kanto, near Tokyo, could support a huge amphibious landing. The Japanese took the appropriate measures in both areas.
The Americans had planned to land in Kyushu first and use it as a base for planes to attack other targets in Japan. These planes would then be used to give support to the landings at Kanto. As there were so few places to land a massive force of amphibious troops, the Japanese guessed as early as 1944 where such landings would take place.
The actual invasion of Kyushu was known to be fraught with dangers. Therefore, there were those in the American military who advocated the use of chemical weapons on the Japanese defenders. The use of poisonous gas had been outlawed by the Geneva Convention, but neither America nor Japan had signed this. As Japan had used poisonous gas in their attack on China, there were some in the US military who felt it was perfectly justified to use it on the Japanese. The Japanese did fear a gas attack and records do show that senior military figures in Japan wanted to ensure that if there was a gas attack, that the response of the Japanese would be such that it would not make any attack worse. American Intelligence had known for a while that Japan was in no fit state to respond to a gas attack with a gas attack.
The main concern for the Americans was the potential for huge casualty rates. Nearly every senior officer involved in the planning did his own research regarding American casualties – this was based on the experience America had fighting the Japanese since Pearl Harbour.
The Joint Chiefs of Staff estimated that Olympic alone would cost 456,000 men, including 109,000 killed. Including Coronet, it was estimated that America would experience 1.2 million casualties, with 267,000 deaths.
Staff working for Chester Nimitz, calculated that the first 30 days of Olympic alone would cost 49,000 men. MacArthur’s staff concluded that America would suffer 125,000 casualties after 120 days, a figure that was later reduced to 105,000 casualties after his staff subtracted the men who when wounded could return to battle.
General Marshall, in conference with President Truman, estimated 31,000 in 30 days after landing in Kyushu. Admiral Leahy estimated that the invasion would cost 268,000 casualties. Personnel at the Navy Department estimated that the total losses to America would be between 1.7 and 4 million with 400,000 to 800,000 deaths. The same department estimated that there would be up to 10 million Japanese casualties. The ‘Los Angeles Times’ estimated that America would suffer up to 1 million casualties.
Regardless of which figures were used, it was an accepted fact that America would lose a very large number of men. This was one of the reasons why President Truman authorised the use of the atomic bomb in an effort to get Japan to surrender. On August 6th, ‘Little Boy’ was dropped on Hiroshima and on August 9th, ‘Fat Man’ was dropped on Nagasaki. On September 2nd, Japan surrendered and America and her allies were spared the task of invading Japan with the projected massive casualties this would entail. | <urn:uuid:4b70444d-39cf-4ad0-806b-2d5ee3b66eca> | CC-MAIN-2013-20 | http://www.historylearningsite.co.uk/operation_downfall.htm | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705195219/warc/CC-MAIN-20130516115315-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.987766 | 1,058 | 3.515625 | 4 | HuggingFaceFW/fineweb-edu/sample-100BT |
Peter PanLiterary Hero
Best known as:
Fanciful boy hero of Peter Pan
Peter Pan is the mischievous hero of J.M. Barrie's 1904 play Peter Pan. Peter is "the boy who never grew up," a fantastical figure who visits the bedroom of the Darling children (Wendy, John and Michael) and flies them away to Neverland. There the children meet Peter's loyal troupe of lost boys, and have adventures and battles with the nefarious Captain Hook. The character of Peter went through several versions, from a 1902 book The Little White Bird to Barrie's hugely successful 1904 play. Barrie published the story as prose in 1911, under the title of Peter and Wendy. In 1953, Walt Disney made a hit animated movie out of a cleaned up version the story, and a 1954 Broadway musical version of the play earned a Tony award for Mary Martin, who played Peter. In films Peter has been played by Jeremy Sumpter (Peter Pan, 2003) and Robin Williams (Hook, 1991) among many others. Peter Pan is also the star of a series of adventure stories for children by Dave Barry and Ridley Pearson, starting with Peter and the Starcatcher (2004).
Peter Pan is assisted by a tiny fairie named Tinkerbell, who carries a lighted wand; she has become one of the signature figures of the Walt Disney empire... Late singer Michael Jackson called his extravagant California ranch "Neverland"... In Barrie's story, Peter tells Wendy he lives "Second to the right, then straight on till morning." In some productions this has been changed to "Second star to the right, then straight on till morning"... Peter is usually played onstage by women, a tradition started with the original 1904 production; gymnast Cathy Rigby and actress Sandy Duncan played the role often later in the 20th century... In 1929, Barrie donated the rights to Peter Pan to London's Great Ormond Street Hospital for Children.
Copyright © 1998-2013 by Who2?, LLC. All rights reserved.
More on Peter Pan from Infoplease:
Information Please® Database, © 2007 Pearson Education, Inc. All rights reserved. | <urn:uuid:a425dd00-2dda-4f6a-a262-ac0cfe23a97e> | CC-MAIN-2013-20 | http://www.infoplease.com/biography/var/peterpan.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705195219/warc/CC-MAIN-20130516115315-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.943301 | 444 | 2.65625 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |
Forest governance and climate policies
Fred Stolle of the World Resources Institute looks at the need for REDD to address forest governance issues as well as creating market incentives.
Policy-makers are recognizing the essential role that the world’s remaining forests play in maintaining the global climate system. The political momentum generated by the Bali Action Plan under the UN Framework Convention on Climate Change (UNFCCC) will create a unique opportunity to put in place a framework of incentives that could curb deforestation, slow forest degradation, and improve the way forests are managed. To succeed, these incentives must strike at the main drivers of rampant deforestation and must also recognize the dependency of local communities on forest ecosystems for their livelihoods.
In the coming months, climate change negotiators have agreed to explore a mechanism for providing compensation for “Reducing Emissions from Deforestation and Forest Degradation in Developing Countries” (REDD). Under most REDD proposals, compensation would be financed by the sale of these emission reductions as ‘carbon offsets’ to be used by regulated countries or companies to remain within their emissions limits.
However, will the promise of money for carbon alone create the conditions necessary to counteract the drivers of deforestation?
If a REDD mechanism is to succeed, competing pressures on forests will need to be managed fairly and effectively. REDD needs to strike at the heart of the drivers, which are not always directly linked to markets, but are as often factors of problems such as illegal logging, bad planning, lack of law enforcement, the absence of tenure rights, the lack of accountability, the lack of coordination and capacity of institutions that manage forest resources and the loss of revenues and other governance factors.
It seems thus apparent that REDD will need to do more than create market incentives. To make REDD effective, efficient and capable of achieving lasting impacts, these governance issues need to be addressed. However, to make these difficult governance improvements countries will need assistance, while these improvements cannot be directly translated into reduced emissions and thus cannot be paid for by carbon credits. There is thus a need for a payment mechanism phase either in parallel or prior to a market mechanism, for REDD to be successful.
Although this phase could not be measured by tons of carbon removed, it is clear that such a phase needs to be measured (and reported and verified), not to fall into the same trap of general development assistance (ODA) over the last decades that has had a low percentage of success. The concept of this governance phase is getting more attention lately and one option of such a phase has been described recently in the Norwegian government -Meridian Institute Options Assessment Report (2009), as the ‘Implementation of policies and measures phase’.
To make this governance phase measurable and successful, governance indicators (qualitative and/or quantitative) need to be developed and agreed upon to be able to identify areas of improvement and hold governments accountable (both governments that supply funds and governments that receive funds). These indicators should cover a wide range of governance topics such as institutions, management, tenure, planning, etc.
Addressing climate change and especially deforestation worldwide will depend on the right incentives and the governance capacity to effectively use these incentives. To improve governance and ensure progress and accountability of governance, we need to develop measurable and agreed upon governance indicators. | <urn:uuid:1f534088-d817-4fe5-b528-87d4f831722f> | CC-MAIN-2013-20 | http://www.iucn.org/news_homepage/news_by_date/2009_news/october_2009/?3960/Forest-governance-and-climate-policies | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705195219/warc/CC-MAIN-20130516115315-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.954889 | 672 | 2.71875 | 3 | HuggingFaceFW/fineweb-edu/sample-100BT |