text
stringlengths 25
13.4k
| quality
float64 1
2.58
| source
stringclasses 3
values |
---|---|---|
|Guilford County students to study genes, immunity aboard Destiny bus next week|
|Friday, January 22, 2010|
Media representatives are invited to experience hands-on science aboard one of the University of North Carolina at Chapel Hill's two traveling science laboratories when it visits two Guilford County high schools next week.
Tuesday (Jan. 26)
Wednesday (Jan. 27)
The Destiny Traveling Science Learning Program is a science education outreach initiative of Morehead Planetarium and Science Center at UNC-Chapel Hill, serving pre-college teachers and students across North Carolina. Destiny develops and delivers a standards-based, hands-on curriculum and teacher professional development with a team of educators and a fleet of vehicles that travel throughout the state.
Destiny and Discovery, two custom-built, 40-foot buses equipped as mobile science laboratories, bring advanced science and technology equipment to students who otherwise might not see high-tech experiments or what a career in science can offer. The mobile science labs are powerful visual images that heighten public awareness of the importance of and funding necessary for quality science education.
To be eligible to request a visit from a Destiny mobile science lab, each participating teacher must attend workshops to learn how to incorporate module activities and experiments into his or her classroom. Destiny offers 15 different science modules, each aligned with the N.C. Standard Course of Study.
The Destiny program was created by UNC-Chapel Hill in 2000. Its principal funders are the State of North Carolina and GlaxoSmithKline, with additional support from Bio-Rad Laboratories and from the North Carolina Biotechnology Center. Since 2006, Destiny has been part of Morehead Planetarium and Science Center.
Destiny Web site: _URL_
| 1.457822 |
HuggingFaceFW/fineweb-edu
|
What You Need to Know About Blood Borne Diseases in the Workplace: Part 1 of 2
When we hear the words hepatitis or HIV we may cringe or even get a little scared. Images of injection drug abusers may come to mind or we may have thoughts of contracting it sexually from an infected person. We would probably even freak out knowing we had to handle infectious blood or came in contact with an infected person.
Individuals living with a blood borne infectious disease face a lot of stigma and discrimination in society based on their perceived health status. Not only do individuals have a challenging time living and managing their disease in their personal lives, but also face obstacles in the workplace.
What are Blood Borne Diseases?
Blood borne diseases are infectious microorganisms in human blood and can cause disease in humans. Hepatitis B virus (HBV), hepatitis C virus (HCV), and human immunodeficiency virus (HIV) are the most common pathogens. Hepatitis B is a viral infection that attacks the liver and can cause both acute and chronic disease. Hepatitis C is a liver disease which can cause acute and chronic hepatitis, which can lead to cirrhosis (liver scarring), liver failure, and liver cancer. HIV targets the immune system and weakens the body's ability to fight off other infections and illnesses.
How are Blood Borne Diseases Transmitted?
HBV, HCV, and HIV can be transmitted through:
- Blood
- Saliva (dental procedures)
- Fetal and joint fluid
- Sexual encounters
- Mucous membranes: eyes, nose, mouth
Hepatitis B virus can survive in a dried state on surfaces at room temperature for over a week, whereas hepatitis C has no reliable data about the survival time in an exposed environment, and HIV becomes inactive when exposed to air
In the workplace, such as laboratory or clinic, transmission is most likely to occur due to accidental puncture from contaminated needles, broken glass, or other sharp objects; contact between broken or damaged skin and infected bodily fluids; or contact between mucous membranes and infected bodily fluids.
For example, if someone infected with HBV cut their finger on a piece of glass, and then you accidentally cut yourself on the same infected piece of glass, there is a possibility that you could contract Hepatitis B.
Unbroken skin is an effective physical barrier against blood borne pathogens. However, infected blood can enter your system through open sores and blisters, cuts, abrasions, acne, and sunburns, but it is extremely rare for HIV to be transmitted by broken skin and wounds. From 1981 and 2006, 57 cases and 140 possible cases of HIV transmission to U.S. healthcare workers were documents. Of the 57 cases, 48 were associated with a puncture or cut injury.
Blood borne diseases are NOT transmitted by:
- Air
- Water
- Coughing, sneezing
- Touching or shaking hands
- Hugging or kissing
- Insects or pets
- Sharing food, drinks, utensil
- Toilet seats
Who is at Occupational Risk?
Blood borne diseases are not an occupational concern unless workers come into contact with blood in the workplace. The most common occupations that are at high risk of exposure are:
- Healthcare workers
- Laboratory workers
- Emergency responders
- Correctional facility officers
- Dental workers
- Tattoo artists
Employers must train employees who are at risk and ensure training covers: symptoms, transmission, and control measures to minimize exposure.
Disclosure in the Workplace
Individuals who have a blood borne disease have the right to privacy with a few exceptions. HBV, HCV, and HIV are not transmitted through typical day-to-day contact, so employees do not have to disclose their status to their employer or union unless your job could put others at risk of coming in contact with your blood. Individuals with blood borne diseases have the right to decide when, how, to what extent and to whom they will disclose their personal information.
However, blood borne diseases are considered a disability, so individuals with a positive status may need to discuss with their human resources department or manager about managing symptoms while at work (modified work schedule, time off for appointments, workspace accommodations), or to claim medical benefits. Employers must maintain the maximum degree of privacy and confidentiality when handling and keeping medical information, in addition to employment records and files. Medical information should be kept separate from employee files. Employees with a positive status still do not need to completely disclose their condition, but generally, state they have a health condition that requires modifications to their daily lifestyle. This information should only be given to the person(s) who needs to know the information.
Employers may request a doctor's note. The note only needs to state that accommodations are needed to maintain health and to fulfill essential job tasks. Employers cannot probe for further details on the underlying medical condition. Further medical documentation may be required depending on the job. Individuals may request to send documents directly to the insurer or provide a sealed envelope to HR. An employer who fails to properly safeguard personal information about an employee may infringe the Code.
Remember, if you have a positive blood borne disease status you have legal rights and obligations. Employers must follow and abide by Canadian law (AODA) when accommodating employees with a disability. Stay tuned for Part 2 of What You Need to Know About Blood Borne Diseases in the Workplace!
Written by Jenna Kressler | Curriculum Developer
Interested in more helpful health and safety content? Free tools and templates? Subscribe to our mailing list.
| 2.535414 |
Zyphra/Zyda-2
|
Research Article
A Whole-Body Model for Glycogen Regulation Reveals a Critical Role for Substrate Cycling in Maintaining Blood Glucose Homeostasis
- Ke Xu,
Affiliations: Department of Biomedical Engineering, University of North Carolina School of Medicine, Chapel Hill, North Carolina, United States of America, Department of Pharmacology, University of North Carolina School of Medicine, Chapel Hill, North Carolina, United States of America
- Kevin T. Morgan,
Affiliation: Old Dogs in Training, Carrboro, North Carolina, United States of America
- Abby Todd Gehris,
Affiliation: Department of Mathematics, Broome Community College, Binghamton, New York, United States of America
- Timothy C. Elston mail, (TCE); (SMG)
- Shawn M. Gomez mail (TCE); (SMG)
Affiliations: Department of Biomedical Engineering, University of North Carolina School of Medicine, Chapel Hill, North Carolina, United States of America, Department of Pharmacology, University of North Carolina School of Medicine, Chapel Hill, North Carolina, United States of America, Department of Computer Science, University of North Carolina at Chapel Hill, Chapel Hill, North Carolina, United States of America
- Published: December 01, 2011
- DOI: 10.1371/journal.pcbi._PHONE_
Timely, and sometimes rapid, metabolic adaptation to changes in food supply is critical for survival as an organism moves from the fasted to the fed state, and vice versa. These transitions necessitate major metabolic changes to maintain energy homeostasis as the source of blood glucose moves away from ingested carbohydrates, through hepatic glycogen stores, towards gluconeogenesis. The integration of hepatic glycogen regulation with extra-hepatic energetics is a key aspect of these adaptive mechanisms. Here we use computational modeling to explore hepatic glycogen regulation under fed and fasting conditions in the context of a whole-body model. The model was validated against previous experimental results concerning glycogen phosphorylase a (active) and glycogen synthase a dynamics. The model qualitatively reproduced physiological changes that occur during transition from the fed to the fasted state. Analysis of the model reveals a critical role for the inhibition of glycogen synthase phosphatase by glycogen phosphorylase a. This negative regulation leads to high levels of glycogen synthase activity during fasting conditions, which in turn increases substrate (futile) cycling, priming the system for a rapid response once an external source of glucose is restored. This work demonstrates that a mechanistic understanding of the design principles used by metabolic control circuits to maintain homeostasis can benefit from the incorporation of mathematical descriptions of these networks into "whole-body" contextual models that mimic in vivo conditions.
Author Summary
Homeostasis of blood glucose concentrations during circadian shifts in survival-related activities, sleep and food availability is crucial for the survival of mammals. This process depends upon glucose intake, short-term storage as glycogen, and gluconeogenesis. The integration of hepatic glycogen anabolic and catabolic dynamics with whole body energetics is critical for survival. In this paper we use computational modeling to investigate the potential survival advantage of substrate (futile) cycling of glycogen and glycogen precursors. Our simulations, combined with published experimental results of other researchers, indicate that as the body enters a state of fasting, the activity of enzymes involved in the synthesis of glycogen increases leading to increased substrate cycling. This increase in substrate cycling allows the system to respond more rapidly once new external sources of glucose become available. The whole-body computational model developed for this work allows the metabolic control circuitry to be studied under simulated in vivo conditions, providing functional insights that are not evident when individual modules of glycogen regulatory circuitry are examined in isolation.
Glucose is the major metabolic fuel of mammals, with its maintenance at appropriate levels within the body being crucial for normal function, while dysregulation is associated with diseases such as diabetes mellitus, galactosemia and glycogen storage diseases [1]. Maintaining glucose levels requires a highly responsive control system capable of balancing a wide range of environmental conditions, perhaps the most basic of which is managing the uptake of nutrients from food at irregular time intervals. Specifically, transitions between fed and fasted states require rapid shifting between the storage of excess glucose, in the form of glycogen, within the liver and muscle and the breakdown of these stores for delivery of glucose to other organs. In healthy individuals, proper functioning of this system ensures that available nutrients are efficiently captured and stored during times of excess, while effectively managed and distributed during times of fasting.
The rate with which the organism responds to these changes can play a critical role in survival. Optimization of energy storage is essential during competition for sparse food supplies, while rapid delivery of these energy supplies during hasty retreat from predators can mean the difference between life and death [2]. A key player in energetics, especially for erythrocyte and brain function, is blood glucose concentration.
The liver is the central organ for regulation of glucose and glycogen and acts as the primary distributor of nutrients through the blood to other tissues. When in a fasted state, the liver breaks down glycogen stores, producing glucose for other tissues. After a meal, the liver switches to a glucose consuming state, capturing nearly 26% of the glucose presented to it by the portal system during the first passage [3]. Nearly 10–15% [4], [5] of liver weight is comprised of glycogen stores when filled.
Glucose regulation within the liver is performed by the glycogen circuit that controls both the storage of glucose as glycogen (glycogenesis) as well as its breakdown into glucose-6-phosphate from hepatic stores (glycogenolysis). Of significance is the fact that glycogenolysis and glycogenesis are not the result of a single reversible reaction, but rather are two separate, highly-regulated pathways. Two key molecular players within these pathways are glycogen synthase (GS) and glycogen phosphorylase (GP). GS drives the synthesis of glycogen, with its activity regulated through multiple mechanisms including allosteric activation, covalent modification, as well as enzymatic translocation [6][8]. GP catalyzes the rate-limiting step in glycogenolysis and it too, is actively regulated through phosphorylation at a single residue on the NH2 terminus as well as through allosteric regulation [6][8]. Both these enzymes exist in activated (GSa and GPa) as well as inactivated (GSb and GPb) states.
As the synthesis of glycogen and its breakdown into glucose occur through separate pathways, there is the potential for substrate cycling to occur, wherein glucose and glycogen are continuously interconverted. In fact, the glycogen circuit exhibits different behaviors depending on the state of liver glycogen levels (Figure 1). In the fed state, glucose is plentiful in the blood and glycogen levels within the liver are relatively high, resulting in the activation of GS and the synthesis of glycogen. When a fasting state is entered, glycogen levels in the liver are high and blood glucose levels are maintained by the breakdown of this glycogen into glucose-6-phosphate by GPa. Finally, when in the fully fasted state, glycogen stores within the liver are essentially depleted. It is here, in the context of glycogen depletion, that cycling is observed between glycogen and glycose-6-phosphate [9], [10].
Figure 1. Liver glycogen levels control circuit architecture.
Glycogen is synthesized by GSa and broken down into glucose-6-phosphate by GPa. Glycogen levels within the liver are shown in the Fed, Fasting and Fasted state as shaded boxes, with full liver glycogen stores being shown as a solid black box in the Fed portion of the circuit. Arrows indicate which branch of the pathway is active. Substrate cycling occurs in the glycogen-depleted (empty box), Fasted state.
It has long been suggested that substrate cycling is a generic mechanism that can potentially improve such properties as sensitivity and system response time, allowing net synthesis when there is a small offset in the substrate concentrations [7], [10][13]. However, demonstrations of cycling and its functional relevance in a physiological context are still relatively rare. In this work, we were particularly interested in investigating the potential role of the cycling - no cycling architecture of the glycogen circuit manifested during the transition from a fed to a fasted state. While the benefit of preventing substrate cycling is apparent since energy is dissipated in the form of heat during this process, it is not clear why it is beneficial for glycogen to cycle under the fasted state, as shown in Figure 1.
Mathematical models, which provide one way to explore such questions, have been applied successfully to many biological fields, but their application has been limited in the case of the nutritional sciences [14]. The number of mathematical models of hepatic energy metabolism, as it relates to hepatic glycogen storage, has been slowly increasing in response to interest in the impact of exercise on energetics in the case of diabetes [14], diet [15] and athletic training [16]. In addition, large-scale reconstructions of metabolism, typically based on flux or constraint-based models, have recently been developed for multiple organ systems including the liver [17][21]. These stochiometry-based approaches can be used to analyze the relevant biological network solely based upon systemic mass-balance and reaction capacity constraints when kinetic information is missing [22], [23]. However, as these approaches are based on steady state assumptions and do not consider specific kinetic properties, they provide
| 1.213916 |
Zyphra/Zyda-2
|
World Library
Flag as Inappropriate
Email this Article
Pedis possessio
Article Id: WHEBN0015749841
Reproduction Date:
Title: Pedis possessio
Author: World Heritage Encyclopedia
Language: English
Subject: Adverse possession
Publisher: World Heritage Encyclopedia
Pedis possessio
Pedis possessio is a legal phrase in common law used to describe walking on a property to establish ownership.
This concept involves the establishment of first possession of land. By walking on a property and defining its bounds, possession is established. Legal dictionaries[1] put forth this definition. Pedis possessio has been described as the actual possession of land within bounds set forth by the need of a mine claimant and operator to improve and work a claim for its mineral value.
Violation of set boundaries are avoided and violence prevented by the establishment of title using the concept of pedis possessio.[2]
See also
| 1.848321 |
Zyphra/Zyda-2
|
While the concept of data science has been around for decades, the notion of a data scientist has become an in-demand career leading to a rise of a new generation of data scientists. Proliferation of sensors, mobile and social trends provide explosive growth of new types of data. Data scientists are creating the tools that can be used to interpret and help translate the streams of information into innovative new products. Social media platforms such as Facebook depend on data science to create innovative, interactive features that encourage users to get interested and stay that way
Here is a visual walk-through of this concept and the role of the data scientist.
| 1.615531 |
HuggingFaceFW/fineweb-edu
|
Red-back is Australias best known spider, and is part
of national folklore. They can live almost anywhere but do especially
well in the man-made, disturbed environments of both country
and city. Red-backs are closely related to the equally infamous
Black Widow Spiders of America.
are prodigious breeders. Each female makes several egg sacs
in a year and produces up to a thousand eggs. In warm conditions
when theres plenty of food Red-back numbers can explode.
are constantly being transported around Australia, and sometimes
overseas, in a variety of freight. Recently, they were found
in the streets of Osaka in Japan, possibly shipped in from Australia
with a cargo of wood chips.
of Red-back spider bites are reported each year, but less than
20 per cent require anti-venom treatment.
female Red-back spiders bite people. Male spiders are only a
tenth the size of females.
Spiders database for more details.
| 1.346917 |
HuggingFaceFW/fineweb-edu
|
) "Sideloading" and music/video sharing are common practices among the digitally savvy, helping users save on data costs (especially when sharing large files) and making technology and media discovery more social. As a result, file-sharing apps (e.g. Xender) are very popular.
Tema: Brug af Wikipedia
Mission: Other than expert respondents, virtually no one seemed aware of Wikipedia's mission or that the larger Wikimedia movement.
At times, this can lead to unrealistic expectations around Wikipedia's features—for example, those that think it is a search engine believe it should have more robust search functionality. False expectations, in turn, lead to poor assessments of Wikipedia's design or performance.
- (Nigeria) Readers go to Wikipedia to understand the meaning or definition of unfamiliar terms. At times, this leads to perceptions of Wikipedia as a dictionary.
- (Nigeria) A common use-case is to settle "bar bets"– arguments with friends that require an immediate answer (e.g. the height of a famous footballer). Students use Wikipedia to complete school assignments. Professionals didn't seem to use it for work.
- (Nigeria) Readers appreciate how Wikipedia is organized and how it is optimized for scannability. Most like the topic overviews and the ability to jump to specific subsections. No observed reader looked at article references.
Finding: Wikipedia's content model can arouse suspicion. Despite this, there was no observed relationship between trust in and reading of Wikipedia.
Trust in Wikipedia is shaken when people find out anyone can edit pages, especially in Nigeria, where the media is captured by political and commercial interests, there is skepticism that contributors could be neutral, and that the content they produce could be unbiased. Interestingly, however, trust in and reading of Wikipedia are not highly correlated. Even when trust is low—e.g., when a person has been specifically told that Wikipedia is not credible—reading continues when people perceive the utility of content to be high.
User personas
Phone survey findings
From Global Reach/Nigeria survey
Methodology and participants
Primary methods applied for this research
Ethnographic: Interviews
User Observations & Technology Demos
Key Informant Interviews
alt =New Readers statistics from the visit to Nigeria.
Staff involved
In Nigeria, three staff were in the field with Reboot participating in research. Abbey Ripstra, Lead Design Research Manager; Jack Rabah, Regional Manager, Strategic Partnerships - Middle East and Africa; and Zachary McCune, Global Audience Communications Manager.
1. "Nigeria Internet Users". Retrieved 2016-08-17.
2. Widespread is defined as reaching 80% of citizens.
6. "The most popular apps on every Nigerian smartphone" (in en-US). 2015-11-06. Retrieved 2016-08-17.
| 1.657602 |
Zyphra/Zyda-2
|
does not play a role. If we want to assign more weight to recent evidence, we can define a heuristic modification of the extended graphical model, in which contributions from spikes to the complete input log-likelihood are linearly interpolated in time, and multiple pieces of evidence simply accumulate. This is exactly what is computed in in Eq. (17), where the shape of the kernel defines how the contribution of an input spike at time evolves over time. Defining as the weight for the evidence of the assignment of to value, it is easy to see (and shown in detail in Methods) that the instantaneous output distribution represents the result of inference over causes, given the time-weighted evidences of all previous input spikes, where the weighting is done by the EPSP-function. Note that this evidence weighting mechanism is not equivalent to the much more complex mechanism for inference in presence of uncertain evidence, which would require more elaborate architectures than our feed-forward WTA-circuit. In our case, past evidence does not become uncertain, but just less important for the inference of the instantaneous hidden cause.
We can analogously generalize the spike-triggered learning rule in Eq. (5) for continuous-valued input activations according to Eq. (17):(18)
The update of every weight is triggered when neuron, i.e. the postsynaptic neuron, fires a spike. The shape of the LTP part of the STDP curve is determined by the shape of the EPSP, defined by the kernel function. The positive part of the update in Eq. (18) is weighted by the value of at the time of firing the postsynaptic spike. Negative updates are performed if is close to zero, which indicates that no presynaptic spikes were observed recently. The complex version of the STDP curve (blue dashed curve in Fig. 1B), which resembles more closely to the experimentally found STDP curves, results from the use of biologically plausible -shaped EPSPs. In this case, the LTP window of the weight update decays with time, following the shape of the -function. This form of synaptic plasticity was used in all our experiments. If EPSPs accumulate due to high input stimulation frequencies, the resulting shape of the STDP curve becomes even more similar to previously observed experimental data, which is investigated in detail in the following section.
The question remains, how this extension of the model and the heuristics for time-dependent weighting of spike contributions affect the previously derived theoretical properties. Although the convergence proof does not hold anymore under such general conditions we can expect (and show in our Experiments) that the network will still show the principal behavior of EM under fairly general assumptions on the input: we have to assume that the instantaneous spike rate of every input group is not dependent on the value of that it currently encodes, which means that the total input spike rate must not depend on the hidden cause. Note that this assumption on every input group is identical to the desired output behavior of the WTA circuit according to the conditions on the inhibition as derived earlier. This opens up the possibility of building networks of recursively or hierarchically connected WTA circuits. Note also that the grouping of inputs into different is only a notational convenience. The neurons in the WTA circuit do not have to know which inputs are from the same group, neither for inference nor for learning, and can thus treat all input neurons equally.
Relationship to experimental data on synaptic plasticity
In biological STDP experiments that induce pairs of preand post-synaptic spikes at different time delays, it has been observed that the shape of the plasticity curve changes as a function of the repetition frequency for those spike pairs [40]. The observed effect is that at very low frequencies no change or only LTD occurs, a "classical" STDP window with timing-dependent LTD and LTP is observed at intermediate frequencies around 20 Hz, and at high frequencies of 40 Hz or above only LTP is observed, independently of which spikes comes first.
Although our theoretical model does not explicitly include a stimulation-frequency dependent term like other STDP models (e.g. [53]), we can study empirically the effect of a modification of the frequency of spike-pairing. We simulate this for a single synapse, at which we force preand post-synaptic spikes with varying time differences, and at fixed stimulation frequencies of either 1 Hz, 20 Hz, or 40 Hz. Modeling EPSPs as -kernels with time constants of 1 ms for the rise and 15 ms for the decay, we obtain the low-pass filtered signals as in Eq. (17), which grow as EPSPs start to overlap at higher stimulation frequencies. At the time of a post-synaptic spike we compute the synaptic update according to the rule in Eq. (18), but keep both the weight and the learning rate fixed (at ) to distinguish timing-dependent from weight-dependent effects.
In Fig. 4A we observe that, as expected, at low stimulation frequencies (1 Hz) the standard shape of the complex STDP rule in Eq. (18) from Fig. 2 is recovered, since there is no influence from previous spikes. The shift towards pure LTD that is observed in biology [40] would require an additional term that depends on postsynaptic firing rates like in [53], and is a topic of future research. However, note that in biology this shift to LTD was observed only in paired recordings, neglecting the cooperative effect of other synapses, and other studies have also reported LTP at low stimulation frequencies [43]. At higher stimulation frequencies (20 Hz in Fig. 4B) the EPSPs from different pre-synaptic spikes start to overlap, which results in larger compared with isolated pre-synaptic spikes. We also see that the LTD part of the STDP window becomes timing-dependent (due to overlapping EPSPs), and thus the shape of the STDP curve becomes similar to standard models of STDP and observed biological data [43], [54]. For even higher stimulation frequencies the STDP window shifts more and more towards LTP (see Fig. 4B and C). This is in good accordance with observations in biology [40]. Also in agreement with biological data, the minimum of the update occurs around, because there the new -kernel EPSP is not yet effective, and the activation due to previous spikes has decayed maximally.
Figure 4. Relationship between the continuous-time SEM model and experimental data on synaptic plasticity.
A–C: The effect of the continuous-time plasticity rule in Eq. (18) at a single synapse for different stimulation frequencies and different time-differences between preand post-synaptic spike pairs. Only time-intervals without overlapping pairs are shown. A: For very low stimulation frequencies (1 Hz) the standard shape of the complex learning rule from Fig. 2 is recovered. B: At a stimulation frequency of 20 Hz the plasticity curve shifts more towards LTP, and depression is no longer time independent, due to overlapping EPSPs. C: At high stimulation frequencies of 40 Hz or above, the STDP curve shifts towards only LTP, and thus becomes similar to a rate-based Hebbian learning rule. D: Cumulative effect of preand post-synaptic burst stimulation (50 Hz bursts of 5 pre-synaptic and 4 post-synaptic spikes) with different onset delays of -120, -60, 10, 20, 30, 80 and 140 ms (time difference between the onsets of the postand pre-synaptic bursts). As in [55], the amount of overlap between bursts determines the magnitude of LTP, rather than the exact temporal order of spikes.
Another effect that is observed in hippocampal synapses when two neurons are stimulated with bursts, is that the magnitude of LTP is determined mostly by the amount of overlap between the preand post-synaptic bursts, rather than the exact timing of spikes [55]. In Fig. 4D we simulated this protocol with our continuous-time SEM rule for different onset time-differences of the bursts, and accumulated the synaptic weight updates in response to 50 Hz bursts of 5 pre-synaptic and 4 post-synaptic spikes. We performed this experiment for the same onset time differences used in Fig. 3 of [55], and found qualitatively similar results. For long time-differences, when EPSPs have mostly decayed, we observed an LTD effect, which was not observed in biology, but can be attributed to differences in synaptic time constants between biology and simulation.
These results suggest that our STDP rule derived from theoretical principles exhibits several of the key properties of synaptic plasticity observed in nature, depending on the encoding of inputs. This is quite remarkable, since these properties are not explicitly part of our learning rule, but rather emerge from a simpler rule with strong theoretical guarantees. Other phenomenological [56], [57] or mechanistic models of STDP [58] also show some of these characteristics, but come without such theoretical properties. The functional consequence of reproducing such key biological characteristics of STDP is that our new learning rule also exhibits most of the key functional properties of STDP, like e.g. strengthening synapses of inputs that are causally involved in firing the postsynaptic neuron, while pruning the connections that do not causally contribute to postsynaptic firing [10], [13]. At low and intermediate firing rates our rule also shifts the onset of postsynaptic firing towards the start of repeated spike patterns [49], [50], [59], while depressing synapses that only become active for a pattern following the one for which the post-synaptic neuron is responsive. If patterns change quickly, then
| 1.893681 |
Zyphra/Zyda-2
|
Web Application to upload, process, verify, modify and create some excel files
Job Description
I'm looking for a web application (java/jsp) developer who has good competence on processing of excel files using Apache POI or similar libraries.
Web application will allow authorized users to upload excel files in predefined format (4 different templates) and then;
* will verify the uploaded files based on a checklist. Checklist will contain simple logic rules such as "if column A has this value, column B cannot be greater than 10" or "column C should be a number" or "sum of values in column D cannot be greater than 1000". In total there will be around 40 controls in the check list.
* will store the data in uploaded excel in a database (mysql or postgresql).
* will verify the uploaded file by comparing it to all previously uploaded data (data store in DB) based on some checklist controls.
* will make some corrections on the excel file based on predefined rules. Number of rules will be around 10.
* will create a result report after the verification of the check list and email it to user.
Web application will also have following functionality:
* Parameter based query and reporting for the stored data in DB. (Query based on available columns). Can export data as excel file in predefined format.
* Basic user management (user/pass) for access control to the web application (including super user for new user creation, password reminders, email based verification, etc.)
* Management of reference data. Some controls will need some reference data to be used for the controls in the checklist. Example of reference data will be daily USD, EUR, etc. currency values for last year. There has to be an interface for management of reference data (addition/deletion/modification of records of reference data). There will be around 10 different types of reference data. Based on the access right, a user will be able to list, query and modify the reference data records.
| 1.192791 |
Zyphra/Zyda-2
|
Benefits of Ductility in TMT Iron Rods
Thermo-Mechanically-Treated (TMT) iron rods are known for their high yield strength and ductility which make them highly preferable and the most common building materials suitable for all kinds of construction. Ductility is as important as strength in TMT iron rods because of its impact in holding structures firm during earthquakes.
What Makes TMT Iron Rod Ductile
The ductility of TMT iron rods means that it can bend up to its maximum tensile strength without being brittle or losing its strength. It is the ability of the iron rod to easily deform and adapt as it is put under stress with tensile load within a construction unit. It is also known as the ability of the iron rod to be elongated. The ductility of TMT iron rod is therefore made possible through its elongation.
Ductility is formed in TMT iron rod as a result of the annealing process, in which the soft inner core cools under atmospheric temperature. This results in the formation of a ferrite-pearlite core that provides the ductility.
Importance of Ductility in TMT Iron Rods
- Aesthetic design
- Ability to withstand earthquake/shock wave
Ductility improves the overall safety of the structure after exceeding the permissible load values. Construction projects are designed with the expected load in mind. In the process of construction, the structure, a bridge for example, can carry extra load if the concrete is reinforced with TMT iron rod because of its ductility.
Ductility gives TMT iron rod easy and higher bendability. This ensures that it can be bent and shaped as one desires without breaking or cracking and can be used for various construction purposes. The bendability also ensures protection from natural disasters such as earthquake.
The ductility of TMT iron rod results in greater pliability which allows for aesthetic designing of a structure. As a result of its easy bendability, which enables it to be shaped according to one's need and structural specifications, TMT iron rod makes aesthetic design possible and easy while still ensuring the safety of the structure.
Any TMT iron rod with perfect ductility gives high level of flexibility to buildings and structures. This helps the building to maintain its structure during earthquake and other natural disasters.
Ductility gives TMT iron rod ability to stop any sudden failure caused by extra load. It also makes the iron rod take in tension force and withstand stronger shock waves. This gives the structure a longer lifespan and enables it to serve its purpose for many years. It also guides against the need for constant renovation and repairs caused by damage and collapse.
[READ FURTHER: Ten Facts you Didn't Know About TMT Iron Rods]
Make the Right Choice
Build with TIGER TMT iron rod, the best and most preferred TMT brand. TIGER TMT iron rod goes through the most advanced and fully-automated quenching process that makes the inner part softer and the outer part harder. This gives it perfect ductility without losing its toughness.
TIGER TMT also has great bending properties and is easily shaped without cracking or breaking. This quality makes TIGER TMT resistant to earthquake and other natural disasters.
By resisting earthquake, TIGER TMT gives buildings and structure durability, longevity and ensures that they are long-lasting.
To learn more about the qualities of TIGER TMT, click here.
| 1.252825 |
openbmb/Ultra-FineWeb
|
Sentences using the word beauties. Journalists, spelling bee organizers, and people who just like words might especially enjoy this webpage. The lines of text below use beauties in a sentence, and provide visitors a sentence for beauties.
- A third looked a sturdy soldier, squareset and hard of feature, for whom beauties of scenery had few awakening charms. (10)
- As they passed into other rooms these objects were taking different positions; but from every window there were beauties to be seen. (4)
- Collins attending them to point out its beauties, and Lady Catherine kindly informing them that it was much better worth looking at in the summer. (4)
- His thoughts and beauties are so spread abroad that one touches them everywhere; one is intimate with him by instinct. (4)
- I am sure you neglect nothing that can add to the beauties of that noble place. (4)
- It shall be admitted that you create the very beauties for a chaste people. (10)
- Its natural beauties, I am sure, are great. (4)
- One of the Beauties of Riversley we lost! (10)
- Young Tom was respectfully studying the aspects of the radiant beauties of the polite work. (10)
- Your father will praise Gippsland whenever my Martin asks him to admire the beauties of our neighbourhood. (10)
Glad you visited this page with a sentence for beauties. Perhaps also see a sentence for betrothed and ways to use bell in a sentence. Now that you've seen how to use beauties in a sentence hope you might explore the rest of this educational reference site Sentencefor.com to see many other example sentences which provide word usage information.
| 1.348671 |
openbmb/Ultra-FineWeb
|
, however, formed the opinion that it was the mummy of Thutmoses I on account of the facial resemblance which it bore to the Pharaoh's Thutmoses II and III" "Egyptian Mummies" by G. Elliot Smith and Warren R. Dawson (1924) p. 91.
This mummy was identified as Thutmoses 1 because he seemed to favor the other mummies. Not a strong basis for identification. Plus that fact that the mummy said to be Thutmoses III was also determined to be far too youngplus the fact that he was just barely five feet tall. Then, there is the mummy of Thutmoses IV, who was extremely emaciated and identified as just barely 30 years old. It doesn't even take careful study to realize that these mummies are "impostors".
THE "EGYPTIAN WATERGATE"
The year is about 1446 BC. The Egyptian pharaoh, his army and all the members of all the priesthoods have left in great haste. They are enraged that their entire slave population has fled, even though less than a week earlier the pharaoh and his ministers had virtually begged them to leave. The Egyptians lavished the great multitude of slaves with objects of gold, silver and precious stones as supposed "payment" for all the work they had done as slaves. EXO 12:35 And the children of lsrael did according to the word of Moses; and they borrowed of thee Egyptians jewels of silver, and jewels of gold, and raiment: 36 And the LORD gave the people favour in the sight of the Egyptians, so that they lent unto them such things as they required. And they spoiled the Egyptians.
The Hebrew words in this text that are translated "borrow" and "lent" are the same word, "shaal". And this word simply means "ask", "demand", "request", "give", etc. Only 6 times in the entire Bible is it translated "borrow" and 2 times as "lend" or "lent''. But 87 times it is translated "ask" and in excess of 60 times is it translated to read other words which mean simply "ask". The verses are telling us that they "asked" for these things, as God had told them to do so they would not be a destitute nation. And the Egyptians were quite happy to comply with whatever they asked. The fear of God was in the Egyptians after the terrible plagues which had befallen them by the Hand of the Israelites' God.
Back home in Egypt, the entire country is trying to recover from the catastrophic destruction the country has suffered as a results of the plagues brought by the God of the slaves, "I AM". Every family is in mourning for the loss of their first born. Nothing of this magnitude has ever been experienced by these people.
The crown-prince, the young boy, Tutankhamen, is being mourned by the entire nation and preparations are being made for his burial. But mostly, all is at a standstill until the pharaoh, the ministers of state, the army and the priesthoods all return with the slaves. Throughout the land, the continuous sound of mourning can be heard from sun up to sun down, and even throughout the night.
The pharaoh, as soon he ascended the throne 8/9 years earlier as emperor, had taken as his "great wife and queen" a lady of foreign blood by the name of Tiy. When he had been co-regent in Memphis, he had been married to a royal daughter, as was tradition. It was this royal lady who had given birth to his firstborn, Tutankhamen. But it was the "common" foreign wife whom he elevated to "great king's wife and queen" as soon as he was "boss"- and this lady was to play a big part in later events of Egyptian history after the Exodus. But now, back to the story at hand.
Soon, word arrives at the palace in Memphis that is too fantastic to be believedthe entire Egyptian army, all of the priesthood and the pharaoh himself have all perished! All drowned in the Red Sea while in pursuit of the slaves! The confusion, grief, fear and agony of the entire country is impossible to imagine. But very quickly, it becomes utmost in the minds of those remaining that knowledge of what has happened must be kept secret.
The previous emperor had secured the position of Egypt as the world power. All nations feared as well as respected Egypt. They all, for the most part, brought their tribute regularly to the palaces, and Egypt had want of absolutely nothing. She had no need to ever go to war for the nations feared her great army. If word of what happened here became known, Egypt could lose her control over her vassal territories and that would mean financial disaster.
There is a miraculously-preserved record of the last official correspondences of the pharaoh who drowned in the Red Sea, as well as correspondences with the later pharaoh, and even Tiy. These are contained in the group of tablets found in ancient Amarna, called the Tel-Amarna Letters. In these were found correspondences to this pharaoh of the Exodus, Amenhotep 3, from the Babylonian king, Kadashman-Enlil and the Mittanni king, Tushratta, which serve to verify other world events of this time.
The greatest contender for world power, after Egypt, at the time of the Exodus was the rapidly emerging Hittite Empire. And the greatest Hittite king, Suppiluliumas, had just taken the throne a few years earlier. The Egyptians were sitting ducks if word leaked out...
Time passed; the Egyptians tried to pick up the pieces and go on with their lives, but it was difficult. The only thing they had in their favor was the fact that they were so isolated from the rest of the world. No one could enter the country without being detected far before they arrived. Careful precautions were taken to see that the true situation was not discerned by others.
There was but one person in Egypt who had the royal right to seat a new pharaohthis was the original great royal wife of Amenhotep 3- the mother of Tutankhamen. But, her situation was not an easy one. Remember, when her husband took the throne as emperor, he took a non-royal wife and she became his favorite.
"My Husband has died and I have no son!"
The true, royal wife of the royal bloodline took the only step she knew to take to secure strong leadership for the country and provide protection and security for Egypt. She wrote a letter to the Hittite king. We can learn about this in an inscription left behind by the Hittite king, Suppiluliumas' son: "...When the people of Misra [Egypt] learned of the destruction of Amqa, they were afraid, for to make matters worse their master, Bibhuria had just died and the widowed queen of Egypt sent an ambassador to my father and wrote to him in these terms: 'My husband is dead and I have no son. People say that you have many sons. If you send the one of your sons he will become my husband for it is repungant to me to take one of my servants to husband.' When my father learned this, he called together the council of the great: 'Since the most ancient times such a thing has never happened before.' He decided to send Hattu-Zittish, the chamberlain, 'Go, bring me information worthy of belief; they may try to deceive me; and as to the possibility that they may have a prince, bring me back information worthy of my belief.' While Hattu-Zittish was absent on the soil of Egypt, my father vanquished the city of Karchemish... The ambassador of Egypt, the lord Hanis, came to him. Because my father had instructed Hattu-Zittish when he went to the country of Egypt as follows: 'Perhaps they have a prince, they may be trying to deceive me and do not really want one of my sons to reign over them.'; the Egyptian queen answered my father in a letter in these words; 'Why do you say' they are trying to deceive me?' If I had a son, should I write to a foreign country in a manner humiliating to me and to my country? You do not believe me and you even say so to me! He who was my husband is dead and I have no son. Should I then perhaps take one of my servants and make of him my husband? I have written no other country, I have written to you..."
There is more, but for the sake of space, we will just tell you what happened. Suppiluliumas finally believed her and sent a son. However, that son never made it to Egypt. No one knows what happened to him exactly, but we do know what happened next.
However, before we leave this most important letter, we must point out that the most convincing evidence of all is the fact that the queen who wrote the Hittite king makes it quite clear that all who remain in Egypt are her "servants"! Is this not a perfect description of the situation that would have resulted after all the royal ministers, priests and army had drowned in the Red Sea? The scholars assign the name of the dead pharaoh "Bibhuria" as being that of "Tutankhamen", for one of his names was "Neb-kheper-ru-re"; however, we believe it should be transliterated
| 1.853504 |
HuggingFaceFW/fineweb-edu
|
Covalently layer-by-layer assembled homogeneous nanolayers with switchable wettability†
Layer-by-layer (LbL) assembly is a practical and versatile approach to build up ultrathin hydrogel networks using mostly polyelectrolytes via alternate adsorption of oppositely charged molecules. It has recently been applied covalently by means of many different types of molecules, particularly those having low molecular weights or linear polymer structures. Using isocyanate (NCO) end-functional star-type polyethers (NCO-sP(EO-stat-PO)) in such covalent assemblies is a great challenge, since they are prone to form a smooth but non-reactive layer that precludes chemisorption of a subsequent layer. To overcome this problem, we developed a protocol where oligomers (e.g., dimers, trimers) act as building blocks for a monolayer instead of single star shaped molecules. Since these are larger and multifunctional but still flexible, smooth layers thicker than a monomolecular film (ca. 10 nm) result with sufficient mobility of the building blocks to bear enough reactive groups for covalent binding of a subsequent layer. As a second component for the chemical LbL layer buildup, a high molecular weight copolymer of vinylformamide/vinylamine (PVFA-co-PVAm) was used. The first layer was obtained by treating aminosilylated surfaces with NCO-s(EO-stat-PO) followed by incubation with PVFA-co-PVAm and chemical cross-linking with the first layer via urea links. The cycle was repeated to achieve the desired layer growth, and the resulting layers were characterized by ellipsometry, contact angle analysis, X-ray photoelectron spectroscopy (XPS), and scanning force microscopy (SFM). The amorphous structures of the polymers were revealed by WAXS analysis, suggesting the lack of the long-range order, which led to structural degree of freedom available to the polymer (i.e., molecular flexibility) on the surface. Thus, multilayers were obtained with homogeneous structure together with low roughness values, and the water contact angles of the layers switched between 37 and 45° depending on the terminal layer. The layers were stable over three months under humid conditions during which no significant changes could be observed in thickness and hydrophilicity.
| 1.756018 |
openbmb/Ultra-FineWeb
|
the explanation. The first part is similar to the previous example, but then we see the first variable declaration. Near comment (2), TOTAL is set to zero. In gawk, variables are not "typed" as they are in many other languages, so you simply write the name of the variable, an equal sign ( = ), and the value it will hold. Note that gawk does not require variable declaraction; you can just start using a variable and gawk will assign a default value to the variable.
Next the main loop begins, looking at each line in turn. The line after comment (4) checks whether the seventh field matches 'bash' or'sh'. See how the first half of the line looks like the pattern-matching in the previous example. Notice that the two checks are each grouped in parentheses seperated by two pipes, ||. Just like in C and Perl, || means 'or' in gawk. So if a line matches either of the two expressions, the commands between the curly braces ({}) will be executed.
The first statement adds 1 to the total. Next we check whether the line matched 'bash' or'sh' and add 1 to the appropriate tally. Notice that the variable NUM_SH is never declared, it is first used when it is incremented (has 1 added to it). gawk assigns it to zero automatically; if it were being used as a string it would be initialized to an empty string to begin with. So as long as you are satisfied with the auto-initialized values, you can just start using variables without declaration.
After all the right counters are incremented, the user name (field 1) is printed for each qualifying line. Finally, the END section is used to report the totals. The END section is useful for this job because it is executed once, after all lines in the data file have been inspected and processed apropriately.
Note that gawk takes input from Standard In (STDIN) if no data file is specified. So it can be manipulated on the command line using input/output redirection (e.g. >> ), making it a powerful tool for the command line. gawk is especially useful when combined with other tools, in particular sed.
Hopefully, you now have enough information to make use of gawk or even add it to your *nix utility belt. Happy gawk-ing!
| 2.131277 |
Zyphra/Zyda-2
|
The word dementia is a general term that refers to many different diseases. Different types of dementia are caused by different physical changes to the brain. Some dementias are reversible, meaning that they can be treated and cured. Some are irreversible, meaning that there is no cure yet. Several conditions produce symptoms similar to dementia. These can include depression, thyroid disease, infections or drug interactions. Early diagnosis is essential to make sure that people with these conditions get the right treatment. If the symptoms are caused by dementia, an early diagnosis will mean early access to support, information, and available treatment options.
Regardless of the type of dementia, people who have dementia and those who care for them can get information and support from the Alzheimer Society.
| 2.526474 |
openbmb/Ultra-FineWeb
|
The European and Japanese space agencies launched their initial mission to Mercury yesterday (Oct. 19, Oct. 20 GMT), though now, a mission's engineers and admirers have to continue a seven-year wait before the project's science starts in earnest.
The BepiColombo goal has such a prolonged journey time since it's indeed unequivocally formidable to successfully circuit a minute heavenly neighbor. It's so formidable that it took until 1985 before an operative figured out any approach to make a orbital trajectories work out properly.
The problem arises since Mercury is so little and so tighten to a sun. That means it orbits a object impossibly quickly, and a booster anticipating to revisit a innermost universe has to transport pedal-to-the-metal in sequence to locate adult to a quick world. But there's a large catch: The sun's sobriety will lift a booster so strongly toward a star that a qualification like BepiColombo indeed needs to stop via a journey to equivocate removing tugged off course. [BepiColombo in Pictures: A Mercury Mission by Europe and Japan]
In sequence to tackle this twin challenge, BepiColombo's drivers have delicately devised a multiple of solar power, chemical fuel and heavenly flybys, that will work together to drive a booster by this astronomical barrier course. All told, a booster will spend some-more appetite than it would perplexing to strech Pluto, that resides over nearby a corner of a solar system. But those heavenly flybys will move BepiColombo's journey time to a sum of only over 7 years.
The mission's array of flybys — one of Earth in Apr of 2020, dual of Venus in 2020 and 2021, and 6 of Mercury itself between 2021 and 2025 — will any tweak a spacecraft's circuit only a little, nudging it closer and closer to a mission's target. These flybys will also give engineers a possibility to make certain many of a instruments on house BepiColombo are operative as they should be, since some-more than half of them will be incited on.
Then, in Dec of 2025, BepiColombo will trip into circuit around a little planet. Once a examine does so, it will apart into a dual scholarship booster that are now assimilated together for a prolonged ride: Europe's Mercury Planetary Orbiter (MPO) and Japan's Mercury Magnetospheric Orbiter (MMO). Those dual booster will fly in interrelated orbits, with a MPO encircling a universe each 2.3 hours and MMO doing so each 9.3 hours.
If all goes according to scientists' plans, those clever twirls will let a 16 instruments that make adult BepiColombo accumulate copiousness of eyebrow-raising information about tiny, bizarre Mercury and how a whole solar complement came to be.
| 1.125534 |
openbmb/Ultra-FineWeb
|
Skip to main content
Western Kentucky University
Human Resources News
5 Reasons College Students Should Make Time For Exercise
College students, especially online college students, have packed schedules. Classes, employment, and family or social obligations quickly fill up your calendar. It seems cruel to add another obligation to the list, but here's one to consider: exercise. Scientific evidence is piling up that shows regular exercise provides important cognitive benefits that could make your scholarly efforts a little less taxing.
Exercise Stimulates Brain Cell Development
Recent human and animal studies show that regular aerobic exercise has profound effects on the brain. A recent New York Times article, "How Exercise Could Lead To A Better Brain", describes experiments performed on mice at the University of Illinois. Mice who ran regularly on a wheel had more neurons—brain cells—than those who did not.
Also, mice who ran regularly had more complex connections between neurons, meaning they were able to access their brain cells more flexibly. Finally, the mice who ran regularly did better on cognitive tests, such as completing a maze. There's evidence that this direct relationship also exists in humans.
Exercise Improves Memory Retention
The hippocampus is a structure in the brain that controls the formation, retention, and recall of memories. In most adults, the hippocampus starts to shrink slightly starting in the late 20s, leading to memory loss over time. Evidence from a 2011 study, recounted in the New York Times article mentioned above, shows that exercise prevents this shrinkage and may even promote regrowth.
A group of senior citizens were randomly assigned to a stretching program or a walking program for a year. After the year was over, the stretching group's brains were scanned, and their hippocampuses had shrunken according to normal expectations. In the walking group, however, the hippocampus had grown. For college students, the implication is clear: regular exercise could benefit the parts of your brain that help you recall information.
Exercise Increases Focus and Concentration
In 2009, a Canadian school for learning-disabled and ADHD children took part in an experiment that involved having students exercise for 20 minutes on treadmills or exercise bikes before starting their math class. Teachers noted a marked improvement in students' ability to concentrate, participate, and retain informationduring the class after they had exercised. Inappropriate behavior also improved in the group that exercised.
Additional experiments of this type, such as those taking place at Naperville Central High near Chicago, IL, suggest that three 20-minute sessions a week is the minimum dose needed to reap the concentration-enhancing benefits of exercise.
Exercise Boosts Mood
Numerous studies have shown that exercise profoundly improves your mood. A 1999 Duke study into the effects of exercise on depression had some participants work out while others took a well-known anti-depressant medication. By the end of the study, the exercise group showed as much improvement in mood as the medication group did. So college students looking to maintain their positive attitude to succeed can benefit from regular exercise.
Exercise Relieves Stress
Prolonged stress can lead to health problems, such as heart attacks and stomach problems. Exercise, by helping you sleep better and easing anxiety, can relieve the negative effects of stress on your body. Many regular exercisers also find that they can focus constructively on problems during or after a bout of exercise.
So make time for exercise. Choose an activity you love that gets your heart rate up, whether it's hiking, running, or dancing, and put it on your schedule the way you would any other appointment or class for at least three 30-minute sessions a week. You'll soon be reaping the benefits that exercise offers the scholar: a sound mind in a healthy body.
For additional info., click:
Latest Headlines
Parking and Transit During Fall Break
Fall Break October 1st - 4th
Parking Pattern by Lot - Fall 2015
Group Rates for Airport Shuttle
Bowling Green Shuttle
Featured Articles
5 Ways to Drop Your Soda Habit
Real or fake sugar: Does it matter?
List of 'Salty Six' Foods May Surprise You
download Adobe Acrobat Reader.
download excel.
download word.
download powerpoint.
download quicktime.
Last Modified 9/25/14
| 2.449391 |
Zyphra/Zyda-2
|
Félix Labisse: The Blue Cocktail of Bosch, Dali, and Trouille
31 januari 2021
Félix Labisse (_PHONE_) was a French self-taught surrealist painter, theatrical designer, and illustrator. In his works, there are lots of recognizable surrealist features, like adherence to Freudianism, attention to ancient mythology and subconsciousness, usage of visual illusions. Still, among other surrealist pictures, the paintings of Labisse seem to be the most shocking and unsettling.
Félix Labisse portrait
Fig. 1. Félix Labisse (wikiart.org)
"O Captain, My Captain!"
Labisse was born in a French family that moved to Belgium in 1923. The artist studied at the Collège Saint-Jean in Douai, then at the École de Pêche (Fishing School) in Ostend. In 1924, Labisse underwent his military service in Cambrai. At those times, the artist's father founded a sea fishing company in Zeebruges, but unfortunately for the father and fortunately for the art, this business didn't last long. Labisse, who could become a marine merchant, decided to devote himself to fine arts after meeting notorious Flemish painter James Ensor.
felix labisse Medea
Fig. 2. Medea, 1942 (emaze.com). This painting refers to the story of the granddaughter of the sun, whose powers were used by the hero Jason to get the Golden Fleece. The woman was seduced and then abandoned by Jason for the Corinthian princess. Out of revenge, Medea killed the children she had with Jason and also killed the princess sending her a poisoned dress.
felix labisse the golden fleece
Fig. 3. The Golden Fleece, 1941 (emaze.com)
Women Quelled by Terror
Labisse began painting in the early 1920s. His first exhibition praised by Ensor happened in 1928 at the Ostend Gallery of Modern Art. On the paintings of his friend, Flemish infant terrible said the following: "Extraordinary painter, your heartrending accents warp women quelled by terror."
felix labisse the strange leda
Fig. 4. The Strange Leda, 1950 (emaze.com)
felix labisse the window of the Marquis
Fig. 5. The window of the Marquis [de Sade], 1947 (emaze.com)
felix labisse young fig posing leonardo da vinci
Fig. 6. Young fig posing for Leonardo da Vinci, 1946 (emaze.com)
felix labisse ongoing adventure
Fig. 7. Ongoing Adventure, 1944 (emaze.com). The blood-handed woman with a mantis head obviously symbolizes dangerous eroticism lying in our nature. The ominousness of the picture is intensified by guts depicted in the background.
felix labisse the pearls of the crown
Fig. 8. The Pearls of the Crown, 1947 (emaze.com). The red woman with a Shih-Tzu head and the dying tree with slugs of the wood-borer inside in the background.
felix labisse Bonjour Marie
Fig. 9. Bonjour Marie, 1945 (emaze.com). The woman with a head turning into a sculpture.
The Theatrical Decorator
The 1930s were very prolific to Labisse as he manifested himself not only as a painter but also as a founder and editor of the "Tribord" literary and artistic review. In addition to this, he participated in filmmaking with his friend Henri Storck (films "Une Idylle à la plage," "The Death of Venus"). In 1932, Labisse moved to Paris and became acquainted with the most prominent French artist of those times, like Jean-Louis Barrault, Robert Desnos, Antonin Artaud, Roger Vitrac, Germaine Krull, Jaques Prévert, etc. Three years later, he created sets and twenty-five costumes for Barrault's production "Autour d'une mère" ("Around the Mother") based on William Faulkner's "As I Lay Dying" novel.
felix labisse Hermeline
Fig. 10. Hermeline, 1973. The woman with a vulva-shaped shell instead the head (emaze.com)
felix labisse Natural History
Fig. 11. Natural History, 1943 (emaze.com)
felix labisse Discovery of the anthropophagic
Fig. 12. Discovery of the anthropophagic tree, 1941 (emaze.com)
felix labisse the explorer
Fig. 13. The Explorer, 1944 (emaze.com)
felix labisse the baptism from the air
Fig. 14. The baptism from the air, 1942 (emaze.com). The Golden Fleece is being destroyed, which symbolizes the end of the western world in the war.
Before and After the War
While the work for Barrault made Labisse a high-demand decorator, his second exhibition at the Palais des Beaux-Arts in Brussels in 1938 made him a well-known painter. He was mobilized in 1939 and returned to Paris a year later. In that period, Labisse painted a series of cannibalistic trees. He maintains contact with surrealist artists like Robert Desnos and René Magritte. Breton admires his work despite the difference in their political/artistic views (Labisse was a member of the Revolutionary Surrealism group along). After the war, Labisse continued his prolific artistic career. He traveled to Brazil, organized numerous exhibitions, and worked as a stage decorator.
felix labisse Tiresias' Daughter
Fig. 15. Tiresias' Daughter, 1973 (butdoesitfloat.com). Tiresias was a blind prophet of Apollo. He had daughters Manto and Daphnae, who were prophets too. Snakes in the background probably give us a hint that depicted woman is Tiresias himself as according to some legends, he was turned into a woman by goddess Hera after he hit a pair of copulating snakes with his stick.
felix labisse entrance virgins
Fig. 16. Entrance of the wise virgins, 1963 (emaze.com)
felix labisse erotic
Fig. 17. Untitled (butdoesitfloat.com)
felix labisse entrance of the wise virgins
Fig. 18. Cotyo, Perfica, Volupie, 1963 (emaze.com). These three women synonymic to three Greek goddesses of fate, represent three aspects of femininity seen by men: Cotyo (the cook), Perfica (she who completes), and Volupie (the voluptuous aspect of women).
felix labisse surrealist
Fig. 19. Theroigne de Mericourt, 1971 (wikiart.org). This painting represents famous heroine of French revolution Anne-Josèphe Theroigne. A bare-breasted woman with a Phrygian cap is a common allegory of the freedom in the context of French revolution (e. g. "Liberty Leading People" by Delacroix).
felix labisse The Three/ Le 14 juillet
Fig. 20. The Three/ Le 14 juillet a pointe-a-pitre (1968). Three colored females represent the French flag.
Blue Women
The most famous works of Labisse are the depictions of mysterious blue women. The first one appeared in 1952 (fig. 26). The blue-skinned females with Asian or African features are witches, saints, spirits, or famous characters of mythology or history, like Judith. This series is a result of Labisses curiosity about female nature. The "disquieting strangeness" of eroticism (thesurrealists.org) finally found its' visual expression in otherworld creatures walking in dreamy landscapes.
felix labisse Six Selenides
Fig. 21. Six Selenides (moonspirits), 1966 (wikiart.org)
felix labisse Le Grand Thebaide,
Fig. 22. Le Grand Thebaide, 1978 (wkiart.com). The title is a reference to the play of Racine (the story of Oedipus' children he had with his mother Jocasta)
felix labisse La Thebaide,
Fig. 23. La Thebaide, 1978 (wikiart.com)
felix labisse The Reclining Odalisque
Fig. 24. The Reclining Odalisque, 1968 (wikiart.org)
felix labisse Magician of the Carribean
Fig. 25. Magician of the Carribean, 1967 (emaze.com)
felix labisse Sahida de Socorro
Fig. 26. Sahida de Socorro, 1952 (emaze.com)
felix labisse Veneridae
Fig. 27. Veneridae, 1967 (emaze.com). The shell, which is a traditional attribute of Venus, was repeated in "Hermeline" painting (fig. 10)
felix labisse Semiramis
Fig. 28. 1972, Semiramis. The mythological Lydian-Babylonian queen, possessed wonderful hanging gardens which existence, though, wasn't proved by historicists.
felix labisse Lilith
| 1.414069 |
Zyphra/Zyda-2
|
List of C-based programming languages
From Wikipedia, the free encyclopedia
Jump to: navigation, search
This list is in rough chronological order and describes some basics of each language.
Language Year started Created by (at) Comments
C _PHONE_ Dennis Ritchie (Bell Labs) Was an enhancement of Ken Thompson's B language.
Ratfor 1974 Brian Kernighan (Bell Labs) A hybrid of C and Fortran, implemented as a preprocessor for environments without easy access to C compilers.
C shell/tcsh late 1970s Bill Joy (UC Berkeley) Scripting language and standard Unix shell.
C++ 1979 Bjarne Stroustrup (Bell Labs) Named as "C with Classes" and renamed C++ in 1983; it began as a reimplementation of static object orientation in the tradition of Simula 67, and through standardization and wide use has grown to encompass generic programming as well as its original object-oriented roots.
AMPL 1985 Robert Fourer, David Gay and Brian Kernighan (Bell Labs) It is an algebraic modeling language with elements of a scripting language.
Objective-C 1986 Brad Cox and Tom Love It is an object-oriented dynamic language based heavily on Smalltalk. A loosely-defined de facto standard library by the original developers has now largely been displaced by variations on the OpenStep FoundationKit.
Perl 1988 Larry Wall Scripting language used extensively for system administration, text processing, and web server tasks.
Python 1991 Guido van Rossum Scripting language used extensively for system administration, text processing, scientific computing, and web server tasks. The CPython, Stackless Python, and PyPy implementations are based in C.
S-Lang 1991 John E. Davis A library with a powerful interpreter that provides facilities required by interactive applications such as display/screen management, keyboard input, keymaps, etc.[1]
SAC 1994 (Germany) Development spread to several institutions in Germany, Canada, and the UK. Functional language with C syntax.
Alef 1995 Phil Winterbottom (Bell Labs) Created for systems programming on the Plan 9 from Bell Labs operating system; it was published in 1995 but eventually abandoned. It provided substantial language support for concurrent programming.
Limbo 1995 Limbo succeeded Alef and is used in Inferno as Alef was used in Plan9.
PHP 1995 Rasmus Lerdorf Widely used as a server-side HTML scripting language. Perl-like syntax.
ECMAscript 1995 Brendan Eich (Netscape) Created as Mocha and LiveScript, announced in 1995, shipped the next year as JavaScript. Primarily a scripting language used in Web page development as well as numerous application environments such as Adobe Flash and QtScript. Though based on C and Java syntax, it is primarily a functional programming language based on Self.
NQC ~1998 David Baum An embedded systems programming language for the Lego Mindstorms RCX 1.x platform; intended as a drop-in replacement for the LabVIEW-based ROBOLAB IDE. Later replaced with NXC, an enhanced version created for the Mindstorms NXT platform.
C# 1999 Anders Hejlsberg (Microsoft) Created under the name "Cool", it is syntactically very similar to Java, though with a Smalltalk-like unified type system.
Ch 2001 Harry Cheng A C/C++ scripting language with extensions for shell programming and numerical computing.[2][3]
D 2001 Walter Bright (Digital Mars) Based on C++, but with an incompatible syntax having traits from other C-like languages like Java and C#.
Cyclone 2001 Greg Morrisett (AT&T Labs) Intended to be a safe dialect of the C language. It is designed to avoid buffer overflows and other vulnerabilities that are endemic in C programs, without losing the power and convenience of C as a tool for system programming.
LSL 2003 ? Created for the Second Life virtual world by Linden Lab.
Squirrel 2003 Alberto Demichelis A light-weight scripting language
Rust 2006 Graydon Hoare Rust emphasizes a concurrent-actor style.
Vala 2006 Jürg Billeter, Raffaele Sandrini Vala adds objects to C to support GNOME developers.
Go 2007 Rob Pike, Ken Thompson, and Robert Griesemer (Google) Released to public in 2009, it is a concurrent language with fast compilations, Java-like syntax, but no object-oriented features and strong typing.
C0 2010 Rob Arnold (CMU) A safe subset of C with checked pointers and bounds-checked arrays. Created for CMU introductory computer courses.[4]
| 1.700032 |
Zyphra/Zyda-2
|
Yuval Noah Harari
Summary of Homo Deus
Homo Deus: A Brief History of Tomorrow, authored by Yuval Noah Harari, was published in 2015. The book delves deeply into the past, present and future of the world and humans in light of religion, science and technology. It takes both the past and present into account to forecast the future and highlights the risks caused by artificial intelligence and other technological progress that humans may encounter.
26 printed pages
Original publication
Related books
洪一萍shared an impressionlast year
Previously the main sources of wealth were material assets such as gold mines, wheat fields and oil wells. Today the main source of wealth is knowledge. And whereas you can conquer oil fields through war, you cannot acquire knowledge that way.
Fertilise several eggs, and choose the one with the best combination. Once stem-cell research enables us to create an unlimited supply of human embryos on the cheap, you can select your optimal baby from among hundreds of candidates, all carrying your DNA, all perfectly natural, and none requiring any futuristic genetic engineering. Iterate this procedure for a few generations, and you could easily end up with superhumans (or a creepy dystopia).
In contrast, 'anger' isn't an abstract term we have decided to use as a shorthand for billions of electric brain signals. Anger is an extremely concrete experience which people were familiar with long before they knew anything about electricity. When I say, 'I am angry!' I am pointing to a very tangible feeling. If you describe how a chemical reaction in a neuron results in an electric signal, and how billions of similar reactions result in billions of additional signals, it is still worthwhile to ask, 'But how do these billions of events come together to create my concrete feeling of anger?'
if some multinational corporation wants to know whether it lives up to its 'Don't be evil' motto, it need only take a look at its bottom line. If it makes loads of money, it means that millions of people like its products, which implies that it is a force for good.
the experiencing self is often strong enough to sabotage the best-laid plans of the narrating self. I might, for instance, make a New Year's resolution to start a diet and go to the gym every day. Such grand decisions are the monopoly of the narrating self. But the following week when it's gym time, the experiencing self takes over. I don't feel like going to the gym, and instead I order pizza, sit on the sofa and turn on the TV.
intelligence is mandatory but consciousness is optional.
The most important question in twenty-first-century economics may well be what to do with all the superfluous people. What will conscious humans do, once we have highly intelligent non-conscious algorithms that can do almost everything better?
Анна Асаеваshared an impression2 years ago
👍Worth reading
Kim Kryger Andersenhas quotedlast year
Interestingly, the author considered that it is through the Bible that one learns that animals don't mean humans any good i.e. an interpretation of the snake's acts.
Olena Liubynetskahas quotedlast year
The narrative has been shifting over the years. Whatever was the need of time, a deity emerged targeted to that very specific need of the humans. If food was required, then food was what the humans got by trusting the very deity and if new technology was needed, the technology deity delivered it. The truth is people over the past centuries
Laura Garciahas quoted2 years ago
science were allowed to progress without the added influence of these beliefs, these beliefs would become invalid very quickly.
On the bookshelves
Non fiction
- 11
- 2
- 10
- 1
Belen Carvente
- 9
- 1
Andre Francisco
Prioridad Alta
- 44
Lis Elgaard
- 15
| 1.464264 |
Zyphra/Zyda-2
|
Sex and Spirituality
tantra articles
Liisa Maimon
Founder and Senior Teacher
Sex and spirituality really aren't that different. They appear to be paradoxical concepts but according to Tantra this is simply not true. There is an unconscious aspect of ourselves that knows intuitively that there is something beyond what we have been told about sex and our sexual energy. But what is it exactly?
Myth: tantra is sex
Widespread 'neo-Tantra' adaptations, which are often focused only on partial and superficial knowledge about sexual energy, compromise the original teachings a lot.
It is important to understand firstly that tantra is not sex. In fact, sexuality is one small piece of a very vast system of knowledge. Defined most simplistically, Tantra is the study of energy. It is also a whole and complete spiritual system that answers life's greatest mysteries, while at the same time granting the practical tools and techniques to develop our inner world, live a happy and harmonious life, and bring us closer to the secret forces of nature that rule our reality. This is of course if authentic techniques are involved.
This all-encompassing practice has the potential to help us become the masters of our own destiny and unequivocally understand our purpose as human beings. The system would be incomplete if there were no teachings related to our sexuality – due to the mere fact that we emanate from sex and sex is a very big part of our lives. But more so, sex and our sexual energy contain a mystical significance that many are not privy to.
Curious? Read more to uncover the ancient mysteries regarding sex and spirituality.
Our reality is governed by energy
The whole universe is made of energy and if we learn how to harness it properly we can ultimately achieve spiritual awakening.
Tantrics discovered millenia ago that our reality is derived of and created by many different forms and types of energy. In essence, energy rules and governs our universe, and therefore our lives. If you are unconscious to these universal forces then you are by definition a slave to these currents and waves of energy, and a victim of chance and happenstance.
The great master tantrics refused to live their lives in such a way. They knew that these various forms of energy all contain an infinite amount of potential. If you could unlock this potential then you have access to a very powerful force and impetus for spiritual gain and spiritual good.
Therefore, they studied energy extensively and were able to decode the rules and laws that govern it. They became masters of energy and consequently masters of their lives.
So what does all this have to do with sex?
The sexual energy is simply another form of energy – an extremely dynamic, healing and lifegiving form of energy – that rivals that of uranium in a nuclear reactor.
Tantrics recognized this and the sexual energy became another universal force they not only studied but learned to control. Not because they were obsessed with sex, but because they were obsessed with enlightenment. Ultimately, tantrics discovered the sexual energy is backed by an incredible force that can propel a person to unimaginable spiritual heights, when harnessed correctly, and thus the link between sex and spirituality was made.
When a man and woman unite and orgasm is reached, it provides a very brief glimpse into the divine, our true nature and our infinite self. It is a transitory moment of enlightenment.
This is such a crucial moment and yet so fleeting for most that its potential and impact are null. There must be a way to prolong and extend the orgasmic experience so that this frivolous peek into the divine can become an earnest conversation with God. And thus tantric sex was born.
You too can become a true tantric man and woman through clear techniques and guidance and practical knowledge. Then and only then can sex and spirituality truly become one.
Sex meets spirituality
Somananda leading a heart opening tantric ritual at a retreat in Germany, 2018.
Tantric sex is one of the tantric paths towards spiritual illumination. In the ancient times of India, tantric masters and enlightened gurus used sexuality for sincere spiritual purposes. By utilizing the sexual energy in a specific way they were able to generate an elongated orgasmic state and thereby an enlightened state, while riding continuous waves of bliss and ecstasy. They used this energetic force, known as the sexual energy, found in the manifested world to reach unmanifested spiritual dimensions that most only dream about.
Luckily, these sacred practices are not reserved to the spiritual elite only.
Are you ready to learn how to bring spirituality to your sexuality? Join one of our upcoming Spiritual Tantra Sexuality retreats
Liisa Maimon
Founder and Senior Teacher
Recommended course
Asset 1
Spiritual Tantra Sexuality
Learn the divine form of love
Looking for more support on your path?
Looking for more support on your path?
| 1.496642 |
Zyphra/Zyda-2
|
who let one or two forceful people dominate the proceedings?
2. Does the group work entirely from one particular set of teachings or manual and not allow deviation from those principles or allow people to question them?
3. Does the group demand that you observe a number of strict rules, or attempt to interfere in your life outside the group (i.e. telling you to avoid certain people or not to read particular books)?
4. Do they insist that they are the best group to be in and that all others are second-rate?
5. Do they make it difficult for people to leave the group and, if people do leave, are they then demonized, i.e., made into enemies of the group?
6. Do they make all kinds of wild claims about how your life will be made better by being a member?
7. Is there a complex and rigid hierarchy, where high-ranking members have impressive titles and seem to be beyond criticism or censure by others?
8. Do they encourage members to demonstrate loyalty either by donating large amounts of cash to the group's coffers or devoting a good deal of their spare time to unpaid work for the group?
9. Do they continually draw a distinction between themselves and the outside world, regarding themselves as superior initiates and depicting everyone else as ignorant?
10. Do they strongly discourage the voicing of dissident opinions in meetings, and label anyone who does speak out as immature, unbalanced or weak?
If you feel that the group in question displays two or three of the above points, then tread warily. If it seems to display four or more of these characteristics, then unless you think you are going to be happy in such a situation, it may be best to avoid it.
| 1.177463 |
Zyphra/Zyda-2
|
Gem Version Build Status Coverage Status Dependency Status Code Climate
The Geokit gem provides:
- Distance calculations between two points on the earth. Calculate the distance in miles, kilometers, meters, or nautical miles, with all the trigonometry abstracted away by Geokit.
- Geocoding from multiple providers. It supports Google, Yahoo,, and geocoders, and others. It provides a uniform response structure from all of them. It also provides a fail-over mechanism, in case your input fails to geocode in one service.
- Rectangular bounds calculations: is a point within a given rectangular bounds?
- Heading and midpoint calculations
Combine this gem with the geokit-rails to get location-based finders for your Rails app.
- If you need help, use Stack Overflow. (Tag 'geokit' and we'll be alerted)
- If you found a bug, use GitHub issues.
- If you have an idea, use GitHub issues.
- If you'd like to ask a general question, use GitHub issues.
- If you want to contribute, submit a pull request.
gem install geokit
"regular" address geocoders
- Yahoo BOSS - requires an API key.
- - may require authentication if performing more than the free request limit.
- - for Canada; may require authentication as well.
- Geonames - a free geocoder
- Bing
- Yandex
- MapQuest
- Mapbox - requires an access token
- OpenCage - requires an API key
address geocoders that also provide reverse geocoding
- Google - Supports multiple results and bounding box/country code biasing. Also supports Maps API for Business keys; see the configuration section below.
- FCC
- OpenStreetMap
- Mapbox
- OpenCage
IP address geocoders
- IP - geocodes an IP address using's web service.
- -- another IP address geocoder
- RIPE
- MaxMind
HTTPS-supporting geocoders
- Google
- Yahoo
- Bing
- FCC
- MapQuest
- Mapbox
- OpenCage
Options to control the use of HTTPS are described below in the Configuration section.
irb> require 'rubygems'
irb> require 'geokit'
irb> a=Geokit::Geocoders::GoogleGeocoder.geocode '140 Market St, San Francisco, CA'
irb> a.ll
=> 37.79363,-122.396116
irb> b=Geokit::Geocoders::GoogleGeocoder.geocode '789 Geary St, San Francisco, CA'
irb> b.ll
=> 37.786217,-122.41619
irb> a.distance_to(b)
=> 1.21120007413626
irb> a.heading_to(b)
=> 244.959832435678
irb(main):006:0> c=a.midpoint_to(b) # what's halfway from a to b?
irb> c.ll
=> "37.7899239257175,-122.406153503469"
irb(main):008:0> d=c.endpoint(90,10) # what's 10 miles to the east of c?
irb> d.ll
=> "37.7897825005142,-122.223214776155"
FYI, that.ll method means "latitude longitude".
See the RDOC more more... there are also operations on rectangular bounds (e.g., determining if a point is within bounds, find the center, etc).
If you're using this gem by itself, here are the configuration options:
# These defaults are used in Geokit::Mappable.distance_to and in acts_as_mappable
Geokit::default_units = :miles # others :kms, :nms, :meters
Geokit::default_formula = :sphere
# This is the timeout value in seconds to be used for calls to the geocoder web
# services. For no timeout at all, comment out the setting. The timeout unit
# is in seconds.
Geokit::Geocoders::request_timeout = 3
# This setting can be used if web service calls must be routed through a proxy.
# These setting can be nil if not needed, otherwise, a valid URI must be
# filled in at a minimum. If the proxy requires authentication, the username
# and password can be provided as well.
Geokit::Geocoders::proxy = 'https://user:password@host:port'
# This is your yahoo application key for the Yahoo Geocoder.
# See
# and
Geokit::Geocoders::YahooGeocoder.key = 'REPLACE_WITH_YOUR_YAHOO_KEY'
Geokit::Geocoders::YahooGeocoder.secret = 'REPLACE_WITH_YOUR_YAHOO_SECRET'
# This is your Google Maps geocoder keys (all optional).
# See
# and
Geokit::Geocoders::GoogleGeocoder.client_id = ''
Geokit::Geocoders::GoogleGeocoder.cryptographic_key = '' = ''
# You can also use the free API key instead of signed requests
# See
Geokit::Geocoders::GoogleGeocoder.api_key = ''
# You can also set multiple API KEYS for different domains that may be directed to this same application.
# The domain from which the current user is being directed will automatically be updated for Geokit via
# the GeocoderControl class, which gets it's begin filter mixed into the ActionController.
# You define these keys with a Hash as follows:
_TAG_::Geocoders::google = { '' => 'RUBY_ON_RAILS_API_KEY', '' => 'RUBY_DOCS_API_KEY' }
# This is your username and password for
# To use the free service, the value can be set to nil or false. For
# usage tied to an account, the value should be set to username:password.
# See
# and
Geokit::Geocoders::UsGeocoder.key = 'username:password'
# This is your authorization key for
# usage tied to an account, set the value to the key obtained from
# See
# and
Geokit::Geocoders::CaGeocoder.key = 'KEY'
# This is your username key for geonames.
# To use this service either free or premium, you must register a key.
# See
Geokit::Geocoders::GeonamesGeocoder.key = 'KEY'
# Most other geocoders need either no setup or a key
Geokit::Geocoders::BingGeocoder.key = ''
Geokit::Geocoders::MapQuestGeocoder.key = ''
Geokit::Geocoders::YandexGeocoder.key = ''
Geokit::Geocoders::MapboxGeocoder.key = 'ACCESS_TOKEN'
Geokit::Geocoders::OpencageGeocoder.key ='some_api_key'
# Geonames has a free service and a premium service, each using a different URL
# GeonamesGeocoder.premium = true will use (premium)
# GeonamesGeocoder.premium = false will use (free)
Geokit::Geocoders::GeonamesGeocoder.premium = false
# require "external_geocoder.rb"
# Please see the section "writing your own geocoders" for more information.
# Geokit::Geocoders::external_key = 'REPLACE_WITH_YOUR_API_KEY'
# This is the order in which the geocoders are called in a failover scenario
# If you only want to use a single geocoder, put a single symbol in the array.
# Valid symbols are :google, :yahoo, :us, and :ca.
# Be aware that there are Terms of Use restrictions on how you can use the
# various geocoders. Make sure you read up on relevant Terms of Use for each
# geocoder you are going to use.
Geokit::Geocoders::provider_order = [:google,:us]
# The IP provider order. Valid symbols are :ip,:geo_plugin.
# As before, make sure you read up on relevant Terms of Use for each.
# Geokit::Geocoders::ip_provider_order = [:external,:geo_plugin,:ip]
# Disable HTTPS globally. This option can also be set on individual
# geocoder classes.
Geokit::Geocoders::secure = false
# Control verification of the server certificate for geocoders using HTTPS
Geokit::Geocoders::ssl_verify_mode = OpenSSL::SSL::VERIFY_(PEER/NONE)
# Setting this to VERIFY_NONE may be needed on systems that don't have
# a complete or up to date root certificate store. Only applies to
# the Net::HTTP adapter.
Google Geocoder Tricks
The Google Geocoder sports a number of useful tricks that elevate it a little bit above the rest of the currently supported geocoders. For starters, it returns a suggested_bounds property for all your
| 1.099303 |
Zyphra/Zyda-2
|
|Skip Navigation Links|
|Exit Print View|
|man pages section 3: Networking Library Functions Oracle Solaris 11 Information Library|
- get network entry
cc [ flag... ] file... -lsocket -lnsl [ library... ] _TAG_ struct netent *getnetbyname(const char *name);
struct netent *getnetbyname_r(const char *name, struct netent *result, char *buffer, int buflen);
struct netent *getnetbyaddr(long net, int type);
struct netent *getnetbyaddr_r(long net, int type, struct netent *result, char *buffer, int buflen);
struct netent *getnetent(void);
struct netent *getnetent_r(struct netent *result, char *buffer, int buflen);
int setnetent(int stayopen);
These functions are used to obtain entries for networks. An entry may come from any of the sources for networks specified in the /etc/nsswitch.conf file. See nsswitch.conf(4).
getnetbyname() searches for a network entry with the network name specified by the character string parameter name.
getnetbyaddr() searches for a network entry with the network address specified by net. The parameter type specifies the family of the address. This should be one of the address families defined in . See the NOTES section below for more information.
Network numbers and local address parts are returned as machine format integer values, that is, in host byte order. See also inet(3SOCKET).
The netent.n_net member in the netent structure pointed to by the return value of the above functions is calculated by inet_network(). The inet_network() function returns a value in host byte order that is aligned based upon the input string. For example:
Commonly, the alignment of the returned value is used as a crude approximate of pre-CIDR (Classless Inter-Domain Routing) subnet mask. For example:
in_addr_t addr, mask; addr = inet_network(net_name); mask= ~(in_addr_t)0; if ((addr & IN_CLASSA_NET) == 0) addr <<= 8, mask <<= 8; if ((addr & IN_CLASSA_NET) == 0) addr <<= 8, mask <<= 8; if ((addr & IN_CLASSA_NET) == 0) addr <<= 8, mask <<= 8;
This usage is deprecated by the CIDR requirements. See Fuller, V., Li, T., Yu, J., and Varadhan, K. RFC 1519, Classless Inter-Domain Routing (CIDR): an Address Assignment and Aggregation Strategy. Network Working Group. September 1993.
The functions setnetent(), getnetent(), and endnetent() are used to enumerate network entries from the database.
setnetent() sets (or resets) the enumeration to the beginning of the set of network entries. This function should be called before the first call to getnetent(). Calls to getnetbyname() and getnetbyaddr() leave the enumeration position in an indeterminate state. If the stayopen flag is non-zero, the system may keep allocated resources such as open file descriptors until a subsequent call to endnetent().
Successive calls to getnetent() return either successive entries or NULL, indicating the end of the enumeration.
endnetent() may be called to indicate that the caller expects to do no further network entry retrieval operations; the system may then deallocate resources it was using. It is still allowed, but possibly less efficient, for the process to call more network entry retrieval functions after calling endnetent().
The functions getnetbyname(), getnetbyaddr(), and getnetent() use static storage that is reused in each call, making these routines unsafe for use in multi-threaded applications.
The functions getnetbyname_r(), getnetbyaddr_r(), and getnetent_r() provide reentrant interfaces for these operations.
Each reentrant interface performs the same operation as its non-reentrant counterpart, named by removing the ''_r'' suffix. The reentrant interfaces, however, use buffers supplied by the caller to store returned results, and are safe for use in both single-threaded and multi-threaded applications.
Each reentrant interface takes the same parameters as its non-reentrant counterpart, as well as the following additional parameters. The parameter result must be a pointer to a struct netent structure allocated by the caller. On successful completion, the function returns the network entry in this structure. The parameter buffer must be a pointer to a buffer supplied by the caller. This buffer is used as storage space for the network entry data. All of the pointers within the returned struct netent result point to data stored within this buffer. See RETURN VALUES. The buffer must be large enough to hold all of the data associated with the network entry. The parameter buflen should give the size in bytes of the buffer indicated by buffer.
For enumeration in multi-threaded applications, the position within the enumeration is a process-wide property shared by all threads. setnetent() may be used in a multi-threaded application but resets the enumeration position for all threads. If multiple threads interleave calls to getnetent_r(), the threads will enumerate disjointed subsets of the network database.
Like their non-reentrant counterparts, getnetbyname_r() and getnetbyaddr_r() leave the enumeration position in an indeterminate state.
Network entries are represented by the struct netent structure defined in .
The functions getnetbyname(), getnetbyname_r, getnetbyaddr, and getnetbyaddr_r() each return a pointer to a struct netent if they successfully locate the requested entry; otherwise they return NULL.
The functions getnetent() and getnetent_r() each return a pointer to a struct netent if they successfully enumerate an entry; otherwise they return NULL, indicating the end of the enumeration.
The functions getnetbyname(), getnetbyaddr(), and getnetent() use static storage, so returned data must be copied before a subsequent call to any of these functions if the data is to be saved.
When the pointer returned by the reentrant functions getnetbyname_r(), getnetbyaddr_r(), and getnetent_r() is non-NULL, it is always equal to the result pointer that was supplied by the caller.
The functions setnetent() and endnetent() return 0 on success.
The reentrant functions getnetbyname_r(), getnetbyaddr_r and getnetent_r() will return NULL and set errno to ERANGE if the length of the buffer supplied by caller is not large enough to store the result. See Intro(2) for the proper usage and interpretation of errno in multi-threaded applications.
network name database
configuration file for the name service switch
See attributes(5) for descriptions of the following attributes:
Fuller, V., Li, T., Yu, J., and Varadhan, K. RFC 1519, Classless Inter-Domain Routing (CIDR): an Address Assignment and Aggregation Strategy. Network Working Group. September 1993.
The reentrant interfaces getnetbyname_r(), getnetbyaddr_r(), and getnetent_r() are included in this release on an uncommitted basis only, and are subject to change or removal in future minor releases.
The current implementation of these functions only return or accept network numbers for the Internet address family (type AF_INET). The functions described in inet(3SOCKET) may be helpful in constructing and manipulating addresses and network numbers in this form.
When compiling multi-threaded applications, see Intro(3), Notes On Multithread Applications, for information about the use of the _REENTRANT flag.
Use of the enumeration interfaces getnetent() and getnetent_r() is discouraged; enumeration may not be supported for all database sources. The semantics of enumeration are discussed further in nsswitch.conf(4).
| 1.689459 |
HuggingFaceFW/fineweb-edu
|
Mind fitness: improving operational effectiveness and building warrior resilience.Today's complex, fluid, and unpredictable operational environment both demands more from the military in terms of mission requirements and exposes troops to more stressors and potential trauma than ever before. On the one hand, situational awareness Situation awareness or situational awareness (SA) is the mental representation and understanding of objects, events, people, system states, interactions, environmental conditions, and other situation-specific factors affecting human performance in, mental agility, and adaptability are characteristics that the military wants to cultivate to succeed in such complex environments. In part, this complexity comes from the number and nature of the different missions the military must concurrently fill. The military needs to be able to mix offensive, defensive, and stability operations conducted along multiple lines of operations Lines that define the directional orientation of the force in time and space in relation to the enemy. They connect the force with its base of operations and its objectives., without the benefit of a clearly demarcated "frontline." Many Soldiers liken lik·en
tr.v. lik·ened, lik·en·ing, lik·ens
To see, mention, or show as similar; compare.
[Middle English liknen, from like, similar; see like2 this complexity and unpredictability to "the faucet," that is, needing to adjust to situations that could change from cold to hot instantaneously. Moreover, Servicemembers must navigate morally ambiguous situations with balance and nonreactivity, while drawing on stores of cultural awareness to "win hearts and minds." Finally, these missions require that decisionmaking be pushed down to the most junior levels, as the doctrine of "distributed operations Distributed Operations (DO) is a new warfighting concept being adopted by the United States Marine Corps and is being developed by their Warfighting Laboratory as a response to the changing environment of the Global War on Terror. " makes clear. Such challenges require a tremendous amount of attentional capacity, self-awareness, and situational awareness.
On the other hand, because of the stressors and challenges of this operating environment In computing, an operating environment is the environment in which users run programs, whether in a command line interface, such as in MS-DOS or the Unix shell, or in a graphical user interface, such as in the Macintosh operating system., the U.S. military is showing signs of strain. In 2007, the Army experienced its highest desertion rate since 1980, an 80 percent increase since the United States United States, officially United States of America, republic (2005 est. pop. 295,734,000), 3,539,227 sq mi (9,166,598 sq km), North America. The United States is the world's third largest country in population and the fourth largest country in area. invaded Iraq in 2003. The warning signs of future retention problems are increasingly apparent: suicide, post-traumatic stress disorder (PTSD PTSD posttraumatic stress disorder.
posttraumatic stress disorder
Post-traumatic stress disorder (PTSD) ), substance abuse, divorce, domestic violence, and murder within the force are on the rise. Recent attention has focused on the growing number of suicides, with the Marine Corps experiencing more suicides in 2008 than since the war began and the Army logging its highest monthly total in January 2009 since it began counting in 1980. Not surprisingly, PTSD rates are highest among Iraq and Afghanistan veterans who saw extensive combat (28 percent). However, military health care officials are seeing a spectrum of psychological issues, even among those without much combat experience. Various surveys provide a range of estimates, with up to half of returning National Guard and Reservists, 38 percent of Soldiers, and 31 percent of Marines reporting mental health problems. (1)
It is no wonder. Troops manning checkpoints or on patrol have to make split-second decisions on when to use lethal force, and veterans say fear often clouded their judgment. As Army Sergeant Dustin Flatt put it, "The second you left the gate of your base, you were always worried. You were constantly watchful for IEDs [improvised explosive devices].... If you've been in firefights earlier that day or week, you're even more stressed and insecure to a point where you are almost trigger-happy." (2) The perpetual uncertainty is mentally exhausting and physically debilitating de·bil·i·tat·ing
Causing a loss of strength or energy.
Weakening, or reducing the strength of.
Mentioned in: Stress Reduction, and often its effects linger even after returning home.
What can be done to enhance the military's capacities to operate in such complex environments while simultaneously protecting against the stressors inherent in them? This article proposes a new training program for both improving operational effectiveness and building resilience to the stressors of deployment: Mindfulness-based Mind Fitness Training (MMFT MMFT Monthly Mecha Fighting Tournament
MMFT Method of Moments plus Fourier transform, pronounced M-Fit). This program includes techniques and exercises that previous research in civilians has demonstrated to be effective at enhancing the capacities central to mind fitness, such as mental agility, emotion regulation, attention, and situational awareness. Importantly, these exercises appear to achieve improvements in mind fitness by changing brain structure and function so that brain processes are more efficient. Our pilot research, conducted in pre-deployment Marine Reservists, suggests that MMFT is similarly successful at bolstering mind fitness and building resilience against stressors in a military cohort. Drawing on the well-documented theory of neuroplasticity, which asserts that experience changes the brain, this article argues that mind fitness training could complement the military's existing stress inoculation inoculation, in medicine, introduction of a preparation into the tissues or fluids of the body for the purpose of preventing or curing certain diseases. The preparation is usually a weakened culture of the agent causing the disease, as in vaccination against training by developing skills to promote resilience against stress and trauma so that warriors can execute their missions more effectively.
Stress Can Degrade Performance
A variety of research indicates that harmful conditions such as chronic stress, neglect, and abuse can produce harmful changes in the brain. (3) Stress is produced by real or imagined events that are perceived to threaten an individual's physical and mental well-being. Today, stress is commonly understood to mean external events or circumstances, and as a result, we tend to think of stress as something external to us. However, stress is actually a perceived, internal response. The right amount of stress will allow a decisionmaker to function at peak performance. However, excessive stress has biological and psychological consequences that reduce the capacity to process new information and learn. Stress may also bias decisionmaking more toward reactive, unconscious emotional choices.
Recent empirical research about decisionmaking in stressful military environments demonstrates that trauma and stress lead to deficits in cognitive functioning. One large study of Army troops found that Soldiers who served in Iraq were highly likely to show lapses in memory and an ability to focus, a deficit that often persisted more than 2 months after they arrived home. (4) In the study, 654 Soldiers who deployed to Iraq between April 2003 and May 2005 did significantly worse in tasks that measured spatial memory, verbal ability, and the ability to focus than 307 Soldiers who had not deployed. In contrast, the Soldiers who had deployed outperformed those who had not in terms of quick reaction time (for example, how long it takes to spot a computer icon and react). In effect, the deployed Soldiers' brains built the capacity for quick reaction, a function more necessary for survival in Iraq, while experiencing degradation in other mental capacities.
In another study, Soldiers who screened positive for mental health problems after returning home were up to three times more likely to report having engaged in unethical behavior while deployed. (5) Such behavior, including unnecessarily damaging private property or insulting or physically harming noncombatants, is obviously counterproductive to winning the confidence of the local population. This finding suggests a strong link between the negative effects of stress, which degrades Soldiers' capacity to manage their own emotions and thereby control impulsive, reactive behavior, and a decrease in their ability to perform their mission effectively.
Other studies of military environments have found substantial degradation in cognitive performance when subjects experience sleep deprivation sleep deprivation Sleep disorders A prolonged period without the usual amount of sleep. See Driver fatigue, Poor sleeping hygiene, Sleep disorders, Sleep-onset insomnia. and other environmental stressors. One recent study of sleep deprivation among Navy SEALs and Army Rangers during a field training exercise demonstrated that the lack of sleep affected troops so badly that after a week they performed worse on cognitive tests than if they were sedated or legally drunk. In this study, the SEALs and Rangers showed severe degradation in reaction time, vigilance, visual pattern recognition, short-term memory, learning, and grammatical reasoning skills. (6)
Another group of studies examined more than 530 Soldiers, Sailors, and pilots during military survival training, including time in mock prisoner of war camps, to prepare them to withstand the mental and physical stresses of capture. In these studies, exposure to acute stressors resulted in symptoms of dissociation (alterations of one's perception of body, environment, and the passage of time), problem-solving deficits (as measured by objectively assessed military performance), and significant inaccuracies in working memory and spatial memory (as measured by eyewitness identification tests).7 These findings corroborated with other studies that found multistressor environments lead to substantial degradation of executive control capacity and cognitive skills, and such degradation has been linked to battlefield errors, such as friendly fire incidents and collateral damage collateral damage Surgery A popular term for any undesired but unavoidable co-morbidity associated with a therapy–eg, chemotherapy-induced CD to the BM and GI tract as a side effect of
| 1.788809 |
HuggingFaceFW/fineweb-edu
|
The topic magnitude is discussed in the following articles:
analytic geometry
- TITLE: mathematics
SECTION: Analytic geometry
...significant conceptually, he set aside Viète's principle of homogeneity, showing by means of a simple construction how to represent multiplication and division of lines by lines; thus, all magnitudes (lines, areas, and volumes) could be represented independently of their dimension in the same way.
- TITLE: mechanics (physics)
SECTION: Vectors
A vector is a quantity that has both magnitude and direction. It is typically represented symbolically by an arrow in the proper direction, whose length is proportional to the magnitude of the vector. Although a vector has magnitude and direction, it does not have position. A vector is not altered if it is displaced parallel to itself as long as its length is not changed.
- TITLE: principles of physical science
SECTION: Fields
...q2. The combination r/r3 is a vector in the direction of r, the line joining q1 to q2, with magnitude 1/r2 as required by the inverse square law. When r is rendered in lightface, it means simply the magnitude of the vector r, without direction. The...
| 2.555783 |
Zyphra/Zyda-2
|
In the fall issue of Vital Signs, Marlies Sproll, Ph.D., the CSO of MorphoSys, discusses a new antibody in the pipeline for the treatment of Alzheimer's. Developed by Roche with the support of MorphoSys' HuCAL technology, this new antibody gantenerumab is currently in Phase 1 clinical trials:
"Alzheimer's disease (AD) affects 5.3 million people and is the seventh leading cause of death and the most common type of dementia in the United States. Alzheimer's is an incurable, progressive disease, and the treatments currently available only serve to alleviate its symptoms. Thus, AD represents the largest unmet need in neurology. Early diagnosis and therapeutic strategies that could delay the onset and progression of this debilitating disease would be considered a success…Pathological hallmarks of AD are the deposits of extracellular amyloid-beta (Aβ) plaques, intraneuronal tangles—composed of hyperphosphorylated tau—,and cerebral neuronal loss. Therefore, strategies to develop drug candidates with potential disease-modifying effects tend to focus on inhibiting Aβ production and aggregation or they aim to increase the Aβ clearance from the brain."
"Preclinical tests have demonstrated the high specificity and affinity of this MorphoSys/Roche HuCAL antibody, gantenerumab, and its ability to dissolve accumulated Aβ plaques in vitro."
Recent reported outbreaks of MRSA (high-school athletes in Iowa, a child in Washington and inhabitants of a Maine lobstering island) show that community-acquired antibiotic-resistant infections remain a significant issue for the American public.
According to Reuters, data released by the CDC last week suggest that, "Americans are more than six times as likely as Britons to contract the superbug in the community, although rates of hospital-acquired infections are about the same." Estimates from 2005 suggest that MRSA caused 95,000 serious infections in the U.S. and caused 18,500 deaths.
Not only are efforts to curb infection in hospitals and in the community limited in their success, but the few drugs used to treat MRSA (e.g. vancomycin) are not always effective against different strains. Most antibiotics approved to treat MRSA are injectable (with the exception of oral Zyvox) meaning that serious community-acquired MRSA infections must be treated in the hospital. There are, however, new promising candidates in the pipeline.
One example is Cempra's promising drug candidate for treating drug resistant infections, Taksta (sodium fusidate – has completed Phase 2 trials). Taksta has a history of safety and efficacy outside the U.S., but holds promise for treating MRSA in the American population due to its low risk for resistance. Because Americans have not been in contact with this particular anti-infective, local strains of MRSA and other gram-positive infections have not yet developed resistance against it.
Of course, 'superbugs,' as highly drug-resistant infections are called, are constantly evolving to challenge the drugs developed to eradicate them. As such, the anti-infective pipeline must remain strong and determined to innovate to treat the newest strains of infectious disease.
Today, an estimated 170 million people worldwide are chronically infected with the hepatitis C virus (HCV). Chronic HCV infection, the leading cause of liver transplantation, can result in fibrosis and cirrhosis of the liver, liver cancer as well as liver failure. Troublingly, the current standard of care, which includes a combination of injectable and oral antiviral treatments, leads to severe side-effects and only cures about 50 percent of patients treated for the most common strain of HCV. The other half of patients, which is comprised of patients who either cannot tolerate sustained therapy, untreated patients and those patients for whom the treatment does not work, form a lucrative target in today's drug development landscape.
HCV's standard of care is a combination of injected interferon-a (INF-a), on of the body's natural immune responders, and ribavirin, an oral generic antiviral. Now, drug developers are approaching the problem of HCV from a couple of different angles.
The most advanced drugs in development (currently in Phase 3 trials) include Vertex's telaprevir and Schering/Merck's boceprevir. These oral antivirals aim to complement INF-a treatment and improve outcomes for today's treated population. A recent survey of 100 physicians who treat ~20,000 HCV patients (carried out by Morgan Stanley) suggested that telaprevir is the favorite of the two. While there is hope that oral agents may ultimately replace injectables, studies have not yet supported this hypothesis.
Some companies with drugs in the earlier stages of development are hoping to replace the injectable form of INF-a with a more tolerable injectable that would similarly encourage the body to attack the virus. One example is Idera Pharmaceuticals whose intectable IMO-2125 (Phase 1) is a synthetic agonist of a receptor that activates one of the body's innate immune responses, a process that includes the release of constitutive INF-a and other cytokines. Early positive results suggest that keeping the immune response and INF-a localized 'in-house' may improve tolerability for patients who cannot sustain the current standard of care. Instead of complementing today's difficult regimen of INF-a injections, IMO-2125 may be a better drug to work with oral antiviral agents.
The April, 2010, approval of Dendreon's Provenge for the treatment of prostate cancer was said to mark "the beginning of an era in which patients' own immune systems become part of the standard therapeutic arsenal against cancer." Provenge is a personalized immunotherapy designed to fight cancer by the creation of a bespoke vaccine that trains a patient's body to fight the disease. Physician's agree that the one size fits all approach to cancer treatment is no longer working, however the promise of personalized immunotherapy is not without its challenges.
The revelation of the cost and labor involved in the production of Provenge has recently caused controversy. Skilled lab technicians prepare the vaccine by hand using the patient's own cells, and the dose must be administered within hours of preparation, otherwise it becomes inactive. As a result of the labor-intense process, the cost of a single treatment of Provenge is $93,000.
Because of the complicated nature of the preparation and the limited production volume possible, Provenge is one of the first drugs to be rationed in the last 15 years. At the University of Texas M.D. Anderson Cancer Center, only two patients (selected by lottery) out of a possible 150 can be dosed per month.
Of course, Provenge is the first approved drug of its kind. Scientists and physicians certainly see the potential for experimental cancer vaccines and believe that further innovation can lead to more automated and more affordable manufacturing.
An example of the new technology available for manufacturing personalized immunotherapy is called Arcelis. Developed by Argos Therapeutics, Arcelis is a more automated system that can produce five years worth of doses in only one run and enables the resulting vaccines to be frozen for years, not hours or days. The limited supervision required also decreases the cost of labor and subsequently the cost of treatment. The most advanced drug manufactured with Arcelis has completed Phase 2 trials in renal cell carcinoma.
Arcelis has the potential to make personalized immunotherapy like Provenge more accessible to patients, more attractive to insurers and promises makes the development of this type of therapy more realistic for a wide variety of diseases beyond cancer.
An interesting perspective from David J. Weatherall, one of this year's Lasker Prize winners, in The New York Times:
Q. IN YOUR ACCEPTANCE SPEECH FOR THE LASKER PRIZE, YOU COMPLAINED THAT MANY OF THE INTERNATIONAL HEALTH ORGANIZATIONS IGNORE GENETIC DISEASES. WHY IS THAT?
A. They don't think enough people are impacted, so they are more interested in solving communicable diseases. Well, they are making progress with those, but they recognize that once you do that the frequency of the genetic diseases increases. As you start to control infections, you lower childhood mortality and many children with genetic diseases who might have died in their first years are living long enough to present for treatment. They have to deal with that.
What happens when PepsiCo decides to use a group-blogging site that is home to some of the best-known science bloggers to host their promotional blog "Food Frontiers"?
They get get kicked off, according to the Fall 2010 issue of ScienceWriters.
The group-blogging site was ScienceBlogs, and the reason for PepsiCo's dismissal was protest and discontent.
Initially, certain bloggers on the site were concerned with issues such as the risk for advertising bleeding into editorial content or a blog written exclusively by a commercial sponsor. Many did not appreciate the blurring of the line between journalism and self-promotion.
Some were not as concerned, and merely viewed the site as a hosting platform. As such, the integrity of "ScienceBlogs" would not necessarily implicate the integrity of those blogs hosted on the site.
Ultimately, some high-profile bloggers left the site, may of whom, the article notes, were journalists. Journalists are the group for whom the line between advertorial and editorial is most significant and most defined.
According to the author, "Readers of today's pubs expect that editorial content can be distinguished from ads with ease."
Branding PepsiCo's blog "advertorial" by the ScienceBlogs staff was not sufficient for the disgruntled bloggers because it does not effectively convey to the general public that this was more likely an advertisement.
Rather, the eventual discontinuation of "Food Frontier's" hosting on the site was
| 1.600416 |
HuggingFaceFW/fineweb-edu
|
āna, and is characterized by equanimity (upekṣā). The Bṛhatphala worlds form the upper limit to the destruction of the universe by wind at the end of a mahākalpa (see Temporal cosmology below), that is, they are spared such destruction.
- Asaññasatta (Sanskrit: Asaṃjñasattva) (Vibhajyavāda tradition only) – "Unconscious beings", devas who have attained a high dhyāna (similar to that of the Formless Realm), and, wishing to avoid the perils of perception, have achieved a state of non-perception in which they endure for a time. After a while, however, perception arises again and they fall into a lower state.
- Bṛhatphala or Vehapphala (Tib: 'bras bu che) – Devas "having great fruit". Their lifespan is 500 mahākalpas. (Vibhajyavāda tradition). Some Anāgāmins are reborn here. The height of this world is 5,242,880 yojanas above the Earth.(approximately the distance of Venus from Earth)
- Puṇyaprasava (Sarvāstivāda tradition only; Tib: bsod nams skyes) – The world of the devas who are the "offspring of merit". The height of this world is 2,621,440 yojanas above the Earth.
- Anabhraka (Sarvāstivāda tradition only; Tib: sprin med) – The world of the "cloudless" devas. The height of this world is 1,310,720 yojanas above the Earth.
The mental state of the devas of the Śubhakṛtsna worlds (Jpn: 三禅三天) corresponds to the third dhyāna, and is characterized by a quiet joy (sukha). These devas have bodies that radiate a steady light. The Śubhakṛtsna worlds form the upper limit to the destruction of the universe by water at the end of a mahākalpa (see Temporal cosmology below), that is, the flood of water does not rise high enough to reach them.
- Śubhakṛtsna or Subhakiṇṇa / Subhakiṇha (Tib: dge rgyas) – The world of devas of "total beauty". Their lifespan is 64 mahākalpas (some sources: 4 mahākalpas) according to the Vibhajyavāda tradition. 64 mahākalpas is the interval between destructions of the universe by wind, including the Śubhakṛtsna worlds. The height of this world is 655,360 yojanas above the Earth.
- Apramāṇaśubha or Appamāṇasubha (Tib: tshad med dge) – The world of devas of "limitless beauty". Their lifespan is 32 mahākalpas (Vibhajyavāda tradition). They possess "faith, virtue, learning, munificence and wisdom". The height of this world is 327,680 yojanas above the Earth.
- Parīttaśubha or Parittasubha (Tib: dge chung) – The world of devas of "limited beauty". Their lifespan is 16 mahākalpas. The height of this world is 163,840 yojanas above the Earth.
The mental state of the devas of the Ābhāsvara worlds (Jpn: 二禅三天) corresponds to the second dhyāna, and is characterized by delight (prīti) as well as joy (sukha); the Ābhāsvara devas are said to shout aloud in their joy, crying aho sukham! ("Oh joy!"). These devas have bodies that emit flashing rays of light like lightning. They are said to have similar bodies (to each other) but diverse perceptions.
The Ābhāsvara worlds form the upper limit to the destruction of the universe by fire at the end of a mahākalpa (see Temporal cosmology below), that is, the column of fire does not rise high enough to reach them. After the destruction of the world, at the beginning of the vivartakalpa, the worlds are first populated by beings reborn from the Ābhāsvara worlds.
- Ābhāsvara or Ābhassara (Tib: 'od gsal) – The world of devas "possessing splendor". The lifespan of the Ābhāsvara devas is 8 mahākalpas (others: 2 mahākalpas). Eight mahākalpas is the interval between destructions of the universe by water, which includes the Ābhāsvara worlds. The height of this world is 81,920 yojanas above the Earth.
- Apramāṇābha or Appamāṇābha (Tib: tshad med 'od) – The world of devas of "limitless light", a concept on which they meditate. Their lifespan is 4 mahākalpas. The height of this world is 40,960 yojanas above the Earth.
- Parīttābha or Parittābha (Tib: 'od chung) – The world of devas of "limited light". Their lifespan is 2 mahākalpas. The height of this world is 20,480 yojanas above the Earth.
The mental state of the devas of the Brahmā worlds (Jpn: 初禅三天) corresponds to the first dhyāna, and is characterized by observation (vitarka) and reflection (vicāra) as well as delight (prīti) and joy (sukha). The Brahmā worlds, together with the other lower worlds of the universe, are destroyed by fire at the end of a mahākalpa (see Temporal cosmology below).
- Mahābrahmā (Tib: tshangs pa chen po; Jpn: 大梵天 Daibonten) – the world of "Great Brahmā", believed by many to be the creator of the world, and having as his titles "Brahmā, Great Brahmā, the Conqueror, the Unconquered, the All-Seeing, All-Powerful, the Lord, the Maker and Creator, the Ruler, Appointer and Orderer, Father of All That Have Been and Shall Be." According to the Brahmajāla Sutta (DN.1), a Mahābrahmā is a being from the Ābhāsvara worlds who falls into a lower world through exhaustion of his merits and is reborn alone in the Brahma-world; forgetting his former existence, he imagines himself to have come into existence without cause. Note that even such a high-ranking deity has no intrinsic knowledge of the worlds above his own. Mahābrahmā is 1 1⁄2 yojanas tall. His lifespan variously said to be 1 kalpa (Vibhajyavāda tradition) or 1 1⁄2 kalpas long (Sarvāstivāda tradition), although it would seem that it could be no longer than 3⁄4 of a mahākalpa, i.e., all of the mahākalpa except for the Saṃvartasthāyikalpa, because that is the total length of time between the rebuilding of the lower world and its destruction. It is unclear what period of time "kalpa" refers to in this case. The height of this world is 10,240 yojanas above the Earth.
- Brahmapurohita (Tib: tshangs 'khor) – the "Ministers of Brahmā" are beings, also originally from the Ābhāsvara worlds, that are born as companions to Mahābrahmā after he has spent some time alone. Since they arise subsequent to his thought of a desire for companions, he believes himself to be their creator, and they likewise believe him to be their creator and lord. They are 1 yojana in height and their lifespan is variously said to be 1⁄2 of a kalpa (Vibhajyavāda tradition) or a whole kalpa (Sarvāstivāda tradition). If they are later reborn in a lower world, and come to recall some part of their last existence, they teach the doctrine of Brahmā as creator as a revealed truth. The height of this world is 5,120 yojanas above the Earth.
- Brahmapāriṣadya or Brahmapārisajja (Tib: tshangs ris) – the "Councilors of Brahmā" or the devas "belonging to the assembly of Brahmā". They are also called Brahmakāyika, but this name can be used for any of the inhabitants of the Brahma-worlds. They are half a yojana in height and their lifespan is variously said to be 1⁄3 of a kalpa (Vibh
| 1.743942 |
openbmb/Ultra-FineWeb
|
One of the large constellations of the northern hemisphere. It is thought to
represent a winged horse. The Four of the stars alpha Peg, beta
Peg, gamma Peg and alpha And form an easy to view square.
Originally the fourth star was called delta Peg, but nowadays this
star is assigned to the neighbouring constellation
Stars and other objects
The brightness of the red giant star beta,Peg, called Scheat
(the shoulder), varies irregularly between 2nd and 3rd magnitude.
The double epsilon Peg, called Enif, is a wide pair, very unequal in brightness. The first component is a K2 super giant of 2.39 mag. The second component of 9th mag becomes visible in binoculars or small scopes.
1 Peg is also an object for small scopes. The pair consists of a 4.13 mag F5 subgiant with an 9th mag companion.
The 6th mag globular cluster M15 is one of the densest of this type. It is notable for its collapsed core as well as for its high amount of known variable stars and pulsars. To view it binoculars and small scopes are sufficient. The cluster appears as a misty patch. To resolve individual stars larger telescopes are required (with an aperture of 150 mm at least). Detailed information can be found in the Messier database.
Two meteor showers are associated with this constellation: The Alpha Pegasids were discovered 1959. The duration seems to be from 29th of October to 12th of November.
The Upsilon Pegasids are active from 25th of July to 19th of August with the maximum occurring on August, 8th.
| 2.268735 |
HuggingFaceFW/fineweb-edu
|
- January 24 - King Charles II of England disbands Parliament
- August 7 - The brigantine Le Griffon, which was commissioned by René Robert Cavelier, Sieur de La Salle, is towed to the southern end of the Niagara River, to become the first ship to sail the upper Great Lakes.
- Battle of Bothwell Bridge
- Habeas Corpus Act passed in England.
- European explorers discover Niagara Falls.
- Thomas Hobbes
- Anne Conway
| 1.373263 |
HuggingFaceFW/fineweb-edu
|
When we exercise, our heart rates increase, and when we sleep, they drop. But sometimes, when we're working during the day and minding our business, our heart skips a beat. During any 24-hour period, in fact, one-fifth of adults may experience this phenomenon and not know it. When extra beats happen in quick succession, the heart can enter a chaotic state, leading to a condition known as arrhythmia, which is treated with daily medication or, in more severe cases, electrical pulses that return the heart to normalcy.
Teresa Chay is a biophysicist who suffers from arrhythmia. She developed the condition as a child after rheumatic fever damaged two heart valves. Surgery seven years ago replaced the valves, but she still takes daily medication and occasionally needs to rush to the hospital for electrical pulse treatment.
Since her surgery, Chay has studied arrhythmia. Using supercomputers at the Pittsburgh Supercomputing Center, she has developed a mathematical model that explains why arrhythmia begins and why it stops when electric shocks are applied. Her goal, like other researchers in this field, is providing a foundation for developing better drugs to control arrhythmia. Currently, the drugs are not always effective, and in some cases, for reasons not well understood, rather than controlling arrhythmia they can trigger it and kill you.
Researcher: Teresa Chay, University of Pittsburgh.
Hardware: CRAY C90
Software: User developed code
Keywords: arrhythmia, heart, heart rate, electrical pulse treatment, anti-arrhythmic drugs, ion channels, sudden cardiac death, atrial fibrillation, erratic beating, chaotic state, nonlinear dynamics, chaos theory, bifurcation analysis, coexistence theory, reentrant arrhythmia, self beating, quiescent state, sinus node.
Related Material on the Web:
More information about Dr. Chay and her research, from the Community of Science Web Server.
Projects in Scientific Computing, PSC's annual research report.
References, Acknowledgements & Credits
| 1.984115 |
HuggingFaceFW/fineweb-edu
|
Our 'Have Your Say' resource aligns with levels 3 and 4 of the New Zealand Curriculum. We've also created a 'Votes for Women' resource which aligns with level 4 of the New Zealand Curriculum.
You can also download slideshows and editable PDFs that you can use to help teach these resources.
Have Your Say – New Zealand Curriculum levels 3 and 4
This resource aims to encourage your students to have their say on decisions that affect their lives.
We based this resource on civics education, which helps students engage with and take part in the democratic process.
Use this resource to promote your students' critical thinking and increase their knowledge of citizens' rights and responsibilities to contribute to and take part in decision-making.
Votes for Women – New Zealand Curriculum level 4
Use this resource to connect the suffragists' achievement to how voters engage with and take part in democracy today.
| 1.881035 |
openbmb/Ultra-FineWeb
|
Streetwork: Homeless Youth Facts
Who are homeless youth?
According to a 2002 federal study, approximately 1.7 million young people call the streets home every year.
Children under 18 years of age accounted for 39% of the homeless population. Of that number, 42% were younger than age 5.
Approximately 40% of homeless youth identify as L(esbian) G(ay) B(isexual) or T(ransgendered) – compared to 10% of the general youth population in the United States.
What can cause a young person to be homeless?
Young people are at far greater risk of becoming homeless if their parents engage in substance abuse or have mental health problems, if there is child abuse or neglect in the home, if the family has been homeless previously, or if they identify themselves as lesbian, gay, bisexual, or transgendered.
A U.S. Department of Health and Human Services study found that 46% of homeless youth escaped a home where they suffered physical abuse, while 17% left because of sexual abuse.
Children who have been in foster care have a greater risk of becoming homeless at an earlier age than other youth, and are more likely to remain homeless for a longer period of time.
What happens to young people who try to survive on the streets?
Young people who are too old for foster care and too young to apply for social services face devastating shortand long-term consequences from being forced to survive on the streets.
- Nearly 43% of homeless young men and 39% of homeless young women say they were assaulted with a weapon while living on the streets.
- Homeless youth suffer significant mental health problems that include depression, anxiety disorders, post-traumatic stress disorder, substance abuse, and suicidal thoughts.
- Young people living on the streets are highly likely to be engaged in substance abuse (approximately 75%), as a means to self-medicate to deal with traumatic experiences and abuse they face while trying to survive.
- Children living on the streets are more likely to engage in "survival sex" – trading sex to gain food, clothing, drugs, money, or just for a safe place to sleep at night.
- According to a San Francisco government study, 17% of homeless youth are HIV-positive.
- Homeless youth who identify as lesbian, gay, bisexual, or transgendered are more likely commit suicide than other youth.
- Every year, approximately 5,000 homeless young people will die because of assault, illness, or suicide while on the street.
How does Safe Horizon help young people affected by violence and abuse?
Nearly 20,000 homeless people 24 years old and younger live in New York City, most of whom have fled to the streets because of violence and abuse. Safe Horizon's Streetwork program offers homeless and street-involved youth a refuge – a hot meal, a hot shower, and a lifeline.
- Streetwork makes contact with more than 19,000 youth each year through our two drop-in centers, two residential programs, and street outreach services.
- Streetwork distributes over 45,000 meals to young people every year.
- Streetwork offers free legal, medical, and psychiatric services; individual and group counseling; practical and educational assistance; advocacy; HIV prevention; and many other services that homeless youth urgently need, all in a safe, non-judgmental setting.
What can I do to help young people in crisis?
Safe Horizon's Streetwork program helps give homeless young people the refuge they need from the streets – and critical resources they need to find safety and hope. You can make a difference for young people in crisis through any of the following ways:
Donate today and help provide young people with the tools they need to find brighter, safer futures.
Find out more about Streetwork and how we help homeless and street-involved youth.
More information about homeless youth
National Child Traumatic Stress Network
National Coalition for the Homeless
National Resource Center for Foster Care and Permanency Planning, Hunter College - School of Social Work, City University of New York
| 2.184701 |
HuggingFaceFW/fineweb-edu
|
Create an Account - Increase your productivity, customize your experience, and engage in information you care about.
Show All Answers
Criminal CasesA criminal case results when a person is accused of committing a crime. You, as a juror, must decide whether the person charged is guilty or not guilty. The accused person is presumed innocent, and the State, represented by the District or County Attorney, must prove guilt "beyond a reasonable doubt."
Civil CasesA civil case results from a disagreement or dispute between two or more parties. In a civil case, you, as a juror, must answer questions of disputed facts based upon the testimony and evidence admitted by the judge. The answers to these questions are called the verdict.
| 1.741673 |
openbmb/Ultra-FineWeb
|
Analysis of conventional core include description of bedding, lithology, sedimentary structures, fossils, and
any other macro-features of the rock. Data used to understand depositional environment, reservoir geometry,
and reservoir quality. Can also be used to calibrate wireline logs. Results are provided in a final report
and core log panel generated by WellCad. The WellCad panel can include well logs, grain size profile,
depositional environment interpretation, and selected petrographic data.
Example Cuttings Panel
Description of macrofractures in an oriented, conventional core. Determines orientation, aperture width, and
total number of fractures. Data is plotted on WellCad panel.
Snap Shot of Fracture Analysis Panel
A robust net-to-gross determined based on a specialized, highly detailed conventional core description. Used in
highly laminated rock, such as distal turbidities or channel levee deposits. Data is plotted on WellCad panel.
Lam Count Analysis
| 1.871206 |
openbmb/Ultra-FineWeb
|
The Settlers (Die Siedler, Serf City: Life is Feudal)
Дата выхода 1 декабря 1993
Платформа Amiga
Издатель Blue Byte
Разработчик Blue Byte
Жанр Стратегия, Симулятор жизни, Менеджер
Игроков 1
Кооператив Нет
Описание The Settlers
The Settlers (also known as Serf City: Life is Feudal, original German title Die Siedler) is a slow-paced strategy video game by Blue Byte Software, released in 1993 for Commodore Amiga and in 1994 for the PC. The player is tasked with building a medieval settlement populated by an army of workers, each of whom perform their own individual task. The player competes against computer controlled opponents or another human player for supremacy of the land and resources.
The Settlers на других платформах
| 1.102916 |
Zyphra/Zyda-2
|
The Association for Spina Bifida and Hydrocephalus, South Africa
|Suburb:||Durban, Kwazulu Natal|
|Physical Address:||98 Marine Drive, Bluff, Durban, Kwazulu Natal, South Africa|
|Postal Address:||98 Marine Drive, Bluff, Durban, 4052, South Africa|
|Phone:||+27 (0)31 _PHONE_|
|Contact Person:||Noreen Vissers|
Spina Bifida is a neural tube defect which occurs when the neural tube does not close properly along its length so part of the meninges or spinal cord protrudes through the spinal column, often resulting in physical disability. The severity of the problems caused by spina bifida depends on the size of the lesion, its location along the spine and the extent of the damage caused to the spinal cord. It can result in lack of bladder or bowel control, paralysis of the legs and abnormal spinal curvature.
Hydrocephalus occurs in about 80% of children with spina bifida. It is due to an abnormality that prevents free circulation and drainage of the cerebrospinal fluid (fluid that circulates in the brain and spinal cord). As a result, the fluid accumulates and causes the head to enlarge excessively. If not treated this may cause brain damage and may lead to mental disability.
Other neural tube defects include anencephaly and encephalocoele. The incidence of neural tube defects varies according to region, social class and population group. The incidence in South Africa is believed to be around 1 in 500 to 800 births making these conditions an important field of research. Inheritance is multifactorial which means that genes from both parents interact with some factors in the environment to cause a defect. Research in many countries has shown that periconceptual folic acid intake can greatly reduce a woman's risk of having a baby with a neural tube defect.
| 1.81885 |
HuggingFaceFW/fineweb-edu
|
The Tough Task of Teaching Sex Ed
A new study finds 19 million reported cases of sexually transmitted diseases in the U.S., half of them among people between the ages of 15 and 24. Susan Milstein, a professor who specializes in sexual health education, knows how difficult it is to persuade young people to change their behavior.
Once upon a time, teaching kids about sex ed was a fairly simple affair as this video from 1957 points out.
(Soundbite of video, "As Boys Grow")
Mr. JOE MIKSAK (Actor): (As Coach Douglas) Growing up is a time of change. Everything seems to happen at once.
Unidentified Man: (As character) Uh-uh. The coach said it's glands.
Unidentified Woman: (As character) Well, you get those from your parents.
Mr. MIKSAK: Hey, what is this? You're all taking the whole afternoon off?
Unidentified Man: (As character) Hey, coach. Didn't you say it was glands that made guys different?
Mr. MIKSAK: Yeah. That's right.
Unidentified Woman: (As character) Well, today in biology class, Mr. David said we're all different because of our parents.
Mr. MIKSAK: That's right. I meant the way your body develops to puberty.
Unidentified Woman: (As character) Puberty? What's that?
Mr. MIKSAK: Well, that'll take a little explaining. Maybe later, huh?
STEWART: Well, later isn't a good idea anymore considering some nasty stats from the CDC. The CDC says last year, there were 19 million reported cases of sexually transmitted diseases - STDs. And half of those reported cases happened to folks between the ages of 15 and 24. And for the first time ever, the numbered cases of Chlamydia topped a million, the most ever.
Faced with a tough task of trying to teach sex ed these days is Sarah Milstein. She's a professor at Montgomery College specializing in sexual health education. Hi, Sarah.
Professor SUSAN MILSTEIN (Sexual Health Education, Montgomery College): It's Susan, but good morning.
Oh, my goodness.
STEWART: Oh, I'm sorry. Susan.
Prof. MILSTEIN: That's okay.
STEWART: Well, Susan, when you first heard about this survey, were you atall surprised?
STEWART: Why not?
Prof. MILSTEIN: Which is scary. I don't - the numbers have been really high for that population for a while. Obviously, the Chlamydia rates getting as high as they are is a little spooky, but this is nothing new. These kids have been having unprotected sex or they're not protecting themselves against STDs, and it's been happening for a while.
Prof. MILSTEIN: If I could answer that…
(Soundbite of laughter)
STEWART: Or anecdotally - from the information you can kind of pull out them in class or you hear in the halls.
Prof. MILSTEIN: I've asked my students what kind of contraception they used the last time they had sex, if they had sex. And 42 percent have either nothing or withdrawal.
Prof. MILSTEIN: So that can kind of tell you that right there. And the ones who are being careful, they're more worried about pregnancy. So they're using more the hormonal methods which are great for pregnancy but not for STDs.
STEWART: Now, the kids that come into your classroom, how does the amount of information they have about their sexual health compare with their sexual activity?
Prof. MILSTEIN: Oh. Not enough sexual - they have not enough information when they're coming in. They're getting caught, unfortunately, in some really bad education in the schools. And I'm not going to bash the abstinence thing, but they're not being taught what they need, and they're coming in very unprepared.
STEWART: What's the name of the class you teach?
Prof. MILSTEIN: I teach class called Health Issues and Human Sexuality.
STEWART: And I understand you taught a class on STDs yesterday?
Prof. MILSTEIN: Actually, yeah. Perfect timing.
STEWART: How'd it go?
Prof. MILSTEIN: A little shocking for them. I think some of the pictures were quite disturbing. And I'm hoping they left feeling like they could get one of these. But it - that kind of feeling lasts for about 20 minutes.
STEWART: Is that what works…
STEWART: …really disgusting pictures.
Prof. MILSTEIN: It works for a very short period of time. And that's what we know. But at this point, anything to get their attention.
BURBANK: This is something I was wondering: Are you getting to them too late? If they're already in college, I mean, have they formed their sort of ideas about this?
Prof. MILSTEIN: Absolutely. I mean, I just think I have the significant portion of my population who is not sexually active and for them, it's good timing. But I think that college is way too late. They need the information earlier.
STEWART: We are talking to Susan Milstein. She's a professor at Montgomery College, and she specializes in sex health education.
I'm curious - if we can kind of stay out of the political side of this discussion - how did - how does abstinence-only education affect what you do by the time they get to college?
Prof. MILSTEIN: I think if you do abstinence-only education right, I think it's great. If you give them all the information that they need buut tell them this is the best method, that's great. I think the way it translates into everyday schools is abstinence is your only option. And we're not going to give you everything else that you need. If we gave the kids all the information they need and we could promote abstinence but let them get the information, I think it would be better for them in the long run.
STEWART: I'm curious what some of the assumptions are that you have to correct students about STDs and about sexual health.
Prof. MILSTEIN: Well, about STDs, it's never them. It's always going to be somebody else.
Prof. MILSTEIN: But that's true with teenagers all over the country on any topic and then closely tie it to pregnancy. They're still talking about the fact that you can't get pregnant if it's your first time, or if you stand up.
Prof. MILSTEIN: Yes, which is not true. Let me make sure I say that
BURBANK: Yeah. I have a really good friend who had a kid at 17 and could tell you that that is not true.
Prof. MILSTEIN: Yeah.
BURBANK: That is totally not true.
STEWART: On a very serious tip, STDs are really dangerous and they can really affect your entire life. I mean, I have a friend who, unfortunately, got an STD. It's not me. And she can't have children now because she has scarred fallopian tubes. What are some of the more serious aspects of STDs that you think kids need to know about?
Prof. MILSTEIN: I think you've nailed one of the big ones is that for a lot of the girls specifically, when they're being exposed to Chlamydia and gonorrhea and it's not being treated because, unfortunately, a lot them don't get symptoms, they're winding up with infertility problems later on. And then obviously, with HIV, we're looking at the possibility of death later on when they convert into AIDS. So…
STEWART: That's interesting. We were talking about this in our meeting yesterday that when we were in high school and college, they just scared the bejeezers out of you about HIV and AIDS. And you wouldn't even think about approaching anyone without - for almost being in a body condom it felt like for a while. Has that changed?
Prof. MILSTEIN: Actually, a student asked me yesterday in class if we need to talk about this because there was a cure for HIV, which, again, not true.
BURBANK: That's what I'm wondering about. You know you're happy for Magic Johnson that he's healthy.
Prof. MILSTEIN: Right.
BURBANK: But on the other hand, it's like, you see something like that and people think of it as a kind of a manageable disease now, right?
Prof. MILSTEIN: Right. And if you can catch it and you - they can put you on good drugs - that sounds so bad.
STEWART: We know what you mean though.
Prof. MILSTEIN: If they can put you on a good drug cocktail, you can live a productive life with HIV. It's not the death sentence that it used to be. But they do, they get this message that Magic Johnson is so healthy so it's obviously not a big deal. But it is. Magic Johnson has a lot of money for treatment, which most of these kids don't.
STEWART: Yeah. What are you going to teach today?
Prof. MILSTEIN: Today, I am finishing up actually STIs and HIV.
STEWART: Well, I wish you a lot of luck today.
Prof. MILSTEIN: Thank you.
STEWART: Susan Milstein, professor at Montgomery College, specializing in sexual education. Thanks for
| 1.159681 |
Zyphra/Zyda-2
|
Implementation of the NBSAP
In 2010, Venezuela adopted a new National Strategy for the Conservation of Biological Diversity (2010-2020). The new Strategy was formulated with the participation of a wide variety of sectors within society (academic, Government employees, enthusiasts and community-based organizations), in several workshops that took place over a period of 18 months. Overall, over 1600 people participated nationwide, promoting debate and enriching the analytical process through offering different points of view. During the workshops, the problems associated with the loss of biological diversity were identified and their causes and consequences analyzed. The causes identified were then grouped into one of three categories: proximate, intermediate and structural. The next stage consisted of collectively constructing strategies for the conservation of biological diversity. Using the analysis of the problems and the current status of biodiversity as starting points, seven strategic lines were formulated in terms of the technical elements required to confront the loss of biological diversity, and seven crosscutting themes identified as the political and social elements necessary to guarantee biological conservation together with social commitment. This collective construction ensured that participants were involved in the entire process of preparing the Strategy, generating awareness of the urgency of the issues while contributing to the transformation of the country's situation via the transformation of individuals and vice versa. The National Strategy for the Conservation of Biological Diversity contains the fundamental guidelines that will govern actions taken during the 2010-2020 period. It is composed of seven strategic lines, with a general objective and several specific objectives, which contain general actions that constitute the basis on which the Action Plans are built. Venezuela's first NBSAP was adopted in 2001.
| 2.083772 |
HuggingFaceFW/fineweb-edu
|
COVID-19 Disinfection: Importance of Experience
Headshot of Angie Martin, VP, CHMM, PE
Authored by Vice President
Angie Martin, PE, CHMM
As the need for disinfection services arose following the outbreak of COVID-19, companies jumped at the opportunity to meet demand. However, not every entity offering these services has the experience, knowledge, equipment, and qualifications to properly handle a disinfection – and their lack of experience can not only hinder business continuity, but significantly increase risk for the companies that hire them.
A major concern with viruses is preventing the spread, which can occur via person-to-person or person-to-object contact. If surfaces, equipment, and fabrics are exposed, the virus can be spread through touch, specifically touching the face, mouth, and nose after touching an impacted surface. To prevent the spread, precautions are recommended to disinfect these exposed materials, and the personnel who are disinfecting must be properly protected as well, both from the virus, and from the chemicals used to kill it. A recent article in The Environmental Business Journal (EBJ) discussed how companies without previous hazmat experience often arrive "without the appropriate and necessary specialized personal protective equipment (PPE), certifications, and experience, [and are] being tasked with cleanups they're not trained or qualified to handle." Ensuring team members are wearing proper PPE and follow protocols that are designed to safely kill the virus while minimizing exposure is critical.
Heritage has been protecting human health and the environment for 50 years – we have responded to chemical spills, chemical fires, plane crashes, oil spills, including one of the largest oil spills in the US in the Gulf of Mexico, and various other types of hazardous materials incidents. We have conducted hazardous materials remediation and decontaminations of industrial buildings, equipment, and containers. Handling a threat like the coronavirus requires a similar degree of experience, equipment, and training, and we are experts in handling hazardous materials and emergency situations in a safe and compliant manner.
Heritage practices different levels of PPE depending on the situation. The higher-level PPE is used when there is a confirmed or presumed case, for emergency response disinfections. The reduced level of PPE used for pre-contracted routine/preventative disinfection.
From the disinfectants used, to the operating procedures we follow; all our disinfection protocols have been developed based on EPA and CDC guidelines. The PPE our emergency response teams utilize when responding to a known or presumed cases of coronavirus (coated, chemical-resistant hooded suits with taped or bonded seams, nitrile gloves, chemical booties, and full-face respirators) offers some of the highest levels of chemical protection. The PPE our routine services teams use includes disposable suits, nitrile gloves, and N95 or upgraded respiratory protection. We exclusively use chemicals from the EPA's List N, which are products that have met the EPA's criteria for use against SARS-CoV-2, the virus that causes COVID-19.
Entities who are conducting disinfection without wearing proper PPE can cross contaminate from one work site to another. Employees who are wearing the proper PPE which are disinfected and disposed prior to moving on to another site eliminate the possibility of cross contamination.
For the emergency response disinfections, preventing the spread of the virus is controlled by creating zones for each stage of the operation. First, we establish a safety perimeter and buffer zone, preventing any unauthorized personnel from entering. A single point of entry is established whenever possible to further enhance security.
Before the decontamination begins, we review floor plans and any special requirements with each customer to ensure every corner, crack and crevice are disinfected.
Depending on the surface, we utilize three methods of disinfection:
1. Hand wiping high touch areas, like desks, keyboards, phones, door handles, microwaves, vending machines, timeclocks and machinery controls.
2. Spraying high traffic areas, such as locker rooms, break rooms, and cafeterias.
3. Hydrostatic fogging in open spaces such as hallways, auditoriums, and production floors.
Outside the designated area, a decontamination zone is set up where exiting team members practice standard decontamination and doffing methods. Disinfected PPE is placed into a container, which is sealed and disinfected, before being sent offsite for safe and compliant destruction.
When it comes to protecting the health and safety of your workplace and employees, it is important to work with companies you can trust, that have the experience to safely and thoroughly handle your situation. Heritage is ready to respond.
Learn more about our Emergency Response and Hazardous Waste Services
| 1.484853 |
Zyphra/Zyda-2
|
Skip to Content
UW Health SMPH
American Family Children's Hospital
Request information
Islet Cell Transplant: Nancy's Story
Nancy (pictured, with husband Bob) underwent an islet cell transplant at UW Hospital and Clinics.
Nancy, islet transplant recipient, with husband Bob
Nancy, more than most people, truly grasps the simple beauty of a walk on a warm autumn day with her husband Bob and dog Buddy.
A life-long diabetic, Nancy's days were filled with frequent blood tests. She was dependent on insulin to try to maintain appropriate blood-sugar levels. Like many diabetics, Nancy's kidneys wore out, and she received a transplant with a kidney donated by her husband. But Nancy was not a typical diabetic.
She also suffered from hyperglycemic episodes that cause her blood-sugar levels to crash without warning. These crashes cause blackouts and can be similar to seizures.
In an effort to end these episodes, and her dependence on insulin, Nancy received islet cell transplants. Islet cells are sugar-sensing cells, found in the pancreas, that release insulin. In the islet cell transplant process, islet cells are extracted from a donated pancreas, processed and introduced into a vein near the recipient's liver.
Following two successful islet cell transplants, enough islet cells reproduced in Nancy's body to stabilize her blood-sugar levels. Now Nancy's life no longer includes constant blood-sugar level testing and unexpected blackouts and seizures. She can enjoy simple everyday things like a walk down a beautiful path on a sunny day, and greets each day with gratitude for the organ donors who made her new lease on life possible.
| 1.382086 |
Zyphra/Zyda-2
|
Skip to main content
What We Do
What We Know
CHILDREN AND ADULTS living with DS-ASD are an under-served and often misunderstood population.
PARENTS often know in their hearts that something is amiss. They may feel alone and overwhelmed as they observe other children with Down syndrome growing and developing according to expectations while their child exhibits behaviors more typically associated with autism. EDUCATORS may become overwhelmed without the tools and resources they need to ensure the success of their students with DS-ASD. HEALTHCARE PROVIDERS may be reluctant to suggest a second diagnosis or may even be unaware that the two conditions can co-occur. Often, the diagnosis is delayed, and children miss out on educational strategies, such as early intervention and supplemental therapies, that make a difference in the child's and family's life. Our compassionate and experienced board of parent volunteers stand ready to provide you with support, resources, and the education you need.
| 2.094975 |
Zyphra/Zyda-2
|
The UK retailer
That means they calculated everything that goes into the carbon footprint such as the components, manufacturing, transportation, even the amount of energy consumers will use to wash and dry the underwear.
One interesting discovery from calculating the carbon footprint of lingerie was the discovery of how much impact lace and embroidery have on the footprint's size. So, lingerie that is simpler is also "greener." And, using manufacturing techniques that use renewable energy and reduce waste, they were able to reduce the carbon footprint by approximately 33% compared to traditional lingerie manufacturing.
Follow HerRoom on Twitter for daily tips.
| 1.855973 |
HuggingFaceFW/fineweb-edu
|
to one antibiotic may become resistant to another, called cross-resistance. Bacteria often have complete cross-resistance to structurally related antibiotics. Resistance may be acquired by the transfer of genetic material from one organism to another. It also appears to occur outside the body, probably in sewage and contaminated surface water.
There is a case where a mutated enterococcal bacterium (VRE) has emerged. It is resistant to all pharmaceutical antibiotics! Normally, enterococci reside quite happily inside the gut and female genital tract, where they cause no problems. In diseased people (often in hospitals), enterococci can become opportunistic and cause heart valve or urinary tract infections. This bug actually thrives around antibiotics. The real potential for damage, however, is in the ability of bugs to so easily transmit genetic information to other bugs. Vancomycin resistance, for instance, may spread from enterococci to other bacteria, such as golden staph. And that would be disastrous.
At present, the bugs have survived in this war (a war they never wanted) extremely well; they are mutating in ways we never thought were possible, and at rates which have alarmed the scientists. The overuse of antibiotics, both medically and in meat and dairy production, has led to bugs mutating to the point where they can even threaten the existence of healthy people. This can lead to a situation that humanity has never seen before. Until now, if people died from infections, it was generally because of poor health in the patient, poor choice of treatment, or both. But now the situation is changing. If it continues, and if we keep trying to destroy the bugs by chemical warfare rather than letting our bodies keep them in balance, we may see many fatalities before the bug war is over. This possibility of a superbug arising has even been discussed by the World Health Organization.
An Estimate
The adverse effects of antibiotics call for a re-evaluation of their present widespread and often indiscriminate use for humans and animals. Unless the allopathic medicine decides to look at the infectious diseases differently they will never try to attend to the causes or develop alternatives. They may even set the stage for a large-scale epidemic of antibiotic-resistant diseases.
It is important to understand that the only truly effective antibiotic is to develop a healthy and strong immune system; and until we begin to direct our therapeutic efforts toward strengthening the body and not to killing the germ, infectious disease will continue to remain a threat to humanity.
What You Can Do to Protect Your Health
- Avoid using antibiotic treatment unless you have a life-threatening situation. It will be better to overcome an infection by holistic means (see our other articles). It will develop your immunity and make you stronger and less dependent on treatment with drugs.
- Avoid consuming meats and dairy products (since they contain antibiotics) unless you know they are got from a genuine organic source.
- If you have taken antibiotics, then flush your gut with probiotics immediately thereafter. The bacteria from Curd or Yogurt are not enough. Then further, every six months take a course of probiotics as a precaution. Buy only refrigerated probiotics and that too from a reliable source.
| 2.293462 |
Zyphra/Zyda-2
|
November 27, 2020
Dear Drama Observers,
This week, I thought I'd re-up something I wrote 2.5 years ago entitled "We Should Argue More."
With a title like "We Should Argue More," it may sound like I plan to bizarrely extol the merits of knock-down-drag-outs, fighting like cats and dogs, or conversational cage matches. Let me explain.
Webster defines an argument as:
- A coherent series of reasons, statements, or facts intended to support or establish a point of view
- A form of rhetorical expression intended to convince or persuade
My point is to say that, by Webster's definition, our public discourse these days—at least what we observe on social media and cable talk shows—is seldom characterized by the making of arguments. Rather, it's characterized by the slinging of zingers. The list is long, but I'd like to highlight just a few notable distinctions between Zinger-Slingers and Argument-Makers.
Provocation vs. Persuasion
Zinger-Slingers seem to have no interest in persuading their ideological opponents but take great delight in provoking them. How often have you heard the asinine statement, "I must be succeeding if I'm making the right people mad."
The word, schadenfreude, has made its way into our public lexicon, which means: pleasure derived from the misfortune of others. "Their tears are delicious," is a way of expressing this ecstatic schadenfreude.
Well, if anger incitement or pain infliction is your conflict objective, you get an A. But if persuasion is the goal, F is your grade. Insulted opponents seldom—if ever—change their minds, but they almost always stiffen their resolve.
Arguments-Makers, on the other hand, seek, in the words of Webster, to persuade through presenting a coherent series of reasons, statements, or facts. Opinion alteration is the conversational objective. The Argument-Maker is driven by the notion: "When this conversation ends, I want that person thinking more about what I said than how I said it."
Arguments are designed to persuade the people in front of you. Zingers are designed to make the people behind you cheer.
Beliefs vs. Convictions
Beliefs stem from knowing what you believe. Convictions stem from knowing what you believe AND why you believe it.
Zinger-Slingers can usually recite the bullet points of the tribal creed and are well-versed on those things they're against.
Argument-Makers can also tell you what they're against but, more importantly, they can elaborate upon what they're for. They understand the philosophical underpinnings animating their belief system.
To use a biblical example, the ideas of Zinger-Slingers are planted in rocky soil, leaving them poorly rooted and easily plucked.
On the flip-side, Argument-Makers are planted in rich soil, leaving them firmly rooted and less susceptible to those who might try to pull out the old ideas and plant new ones their place.
Lazy vs. Diligent
It takes work to build an argument. The thought-bubble beside an Argument-Maker might read this way: "I didn't come to this conclusion lightly. I've had to struggle a bit to formulate my thoughts, figure out how to express them, and then transfer them to you."
That takes effort.
But Zinger-Slingers bypass the effort by taking rhetorical short cuts. Or to put it another way, they cheat in the war of ideas.
If I'm a Zinger-Slinger, I'll frequently make use of the ad hominem attack. That is, if I can discredit you as a person, I'm no longer obligated to wrestle with your ideas. I'm off the hook because, after all, why would I give someone like you the time of day?
Or, I might use a straw-man argument in which I construct your position from easily refutable pieces, tear it down, and get cheered as the victor. And I've "won" without exerting the effort to consider or refute your actual position.
Simply put, the Zinger-Slinger is lazy.
Means vs. Ends
The Argument-Maker is principled. That is, he or she cares not only about the end goal of persuading an ideological opponent but also cares about the means used to accomplish that persuasion.
But for the Zinger-Slinger, the ends justifies the means. The thought-bubble beside a Zinger-Slinger might read this way: "If I must lie to promote truth, I'll do it." Or "If the other side is doing it, we must do it, too."
For the Zinger-Slinger, winning is the highest value. "When winning is all that matters," wrote Daniel Krauthammer, "questions of morality are superfluous."
Tribal vs. Civil
Finally, Zinger-Slingers build walls while Argument-Makers build bridges.
The Zinger-Slinger's chief motivation is to plant his tribal flag atop the cultural hill. Like the famous picture of soldiers raising the American flag over Iwo Jima, the Zinger-Slinger envisions a similar Us-versus-Them conquest. And once the "other" is conquered, the war is over, the thinking goes.
But the Argument-Maker understands that all victories are fleeting and yearns not for a once-and-for-all victory but for a civil society where ideas can be respected and debated on an ongoing basis.
The Argument-Maker has confidence in the enduring strength of ideas. He or she realizes that you can win moments but lose minds.
Like lighter fluid squirted onto a match, zingers produce exciting flare-ups. But arguments produce charcoal fires that keep producing warmth long after the lighter fluid has burned off.
All of this to say, we should argue more.
Till next week.
2 replies
1. Anonymous
Anonymous says:
I agree that arguing is better, long as you are arguing with a reasonable person, because as you have always said, you can't reason with an unreasonable person.
Comments are closed.
| 1.355824 |
Zyphra/Zyda-2
|
Definition - What does Seta mean?
Seta is a term that describes the morphology of plants. It is typically used in regards to moss. Mosses are also known as sporophytes. It stem or stalk that supports the stalk that supports the capsule.
MaximumYield explains Seta
When it matures, the seat will usually rapidly elongate, and it brings the capsule to the suitable height for dispersing spores. The seat will have vascular tissue, and it enables the sporophyte capsule to get nutrients from the parent.
Another definition for the term seta is a nerve-like extension to a leaf. It can also mean a bristle or a stiff hair.
| 2.546853 |
openbmb/Ultra-FineWeb
|
logically partitioned across many servers so that they can compute on different nodes of the cluster. RDDs are fault tolerant i.e. self-recovered / recomputed in the case of failure. The dataset could data load externally by the users which can be in the form of JSON file, CSV file, text file or database via JDBC with no specific data structure.
RDD is Lazily Evaluated i.e. it is memorized or called when required or needed, which saves lots of time. RDD is a read-only, partitioned collection of data. RDDs can creates through deterministic operations or on stable storage or from other RDDs. It can also generates by parallelizing an existing collection in your application or referring a dataset in an external storage system. It is cacheable. As it operates on data over multiple jobs in computations such as logistic regression, k-means clustering, PageRank algorithms, which makes it reuse or share data among multiple jobs.
To learn more about the RDD follow: RDD Tutorial
3. Apache Spark Interview Questions For Beginners
8) What are the features of RDD, that makes RDD an important abstraction of Spark?
Ans. RDD (Resilient Distributed Dataset) is a basic abstraction in Apache Spark. Spark RDD is an immutable, partitioned collection of elements on the cluster which can operates in parallel.
Each RDD is characterized by five main properties :
Below operations are lineage operations.
- List or Set of partitions.
- List of dependencies on other (parent) RDD
- A function to compute each partition
Below operations are used for optimization during execution.
- Optional preferred location [i.e. block location of an HDFS file] [it's about data locality]
- Optional partitioned info [i.e. Hash-Partition for Key/Value pair –> When data shuffled how data will travel]
Examples :
# HadoopRDD: HadoopRDD provides core functionality for reading data stored in Hadoop (HDFSHBase, Amazon S3..) using the older MapReduce API (org.apache.hadoop.mapred)
Properties of HadoopRDD :
1. List or Set of partitions: One per HDFS block.
2. List of dependencies on parent RDD: None.
3. A function to compute each partition: read respective HDFS block
4. Optional Preferred location: HDFS block location
5. Optional partitioned info: None
_TAG_ : Properties of FilteredRDD:
1. List or Set of partitions: No. of partitions same as parent RDD\
2. List of dependencies on parent RDD: 'one-to-one' as the parent (same as parent)
3. A function to compute each partition: compute parent and then filter it
4. Optional Preferred location: None (Ask Parent)
5. Optional partitioned info: None
Find features of RDD in RDD Features in Spark
9) List out the ways of creating RDD in Apache Spark.
Ans. There are three ways to create RDD
(1) By Parallelizing collections in the driver program
(2) By loading an external dataset
(3) Creating RDD from already existing RDDs.
Create RDD By Parallelizing collections :
Parallelized collections are created by calling parallelize() method on an existing collection in driver program.
val rdd1 = Array(1,2,3,4,5)
val rdd2 = sc.parallelize(rdd1)
val myList = sc.parallelize(List(1 to 1000), 5) where 5 is the number of partitions
[If we do not specify then default partition is 1
Create by loading an external Dataset
In Spark, the distributed dataset can form from any data source supported by Hadoop, including the local file system, HDFS, Cassandra, HBase etc. In this, the data is loaded from the external dataset. To create text file RDD, we can use SparkContext's textFile method. It takes URL of the file and read it as a collection of line. URL can be a local path on the machine or a hdfs://, s3n://, etc. Use SparkSession.read to access an instance of DataFrameReader. DataFrameReader supports many file formats-
i) csv (String path)
import org.apache.spark.sql.SparkSession
object DataFormat {
val spark = SparkSession.builder.appName("AvgAnsTime").master("local").getOrCreate()
val dataRDD = spark.read.csv("path/of/csv/file").rdd
ii) json (String path)
val dataRDD = spark.read.json("path/of/json/file").rdd
iii) textFile (String path)
val dataRDD = spark.read.textFile("path/of/text/file").rdd
Creating RDD from existing RDD:
Transformation mutates one RDD into another RDD, thus transformation is the way to create an RDD from already existing RDD.
val words=spark.sparkContext.parallelize(Seq("the", "quick", "brown", "fox", "jumps", "over", "the", "lazy",
val wordPair = words.map(w => (w.charAt(0), w))
For a detailed description on creating RDD read How to create RDD in Apache Spark
10) Explain Transformation in RDD. How is lazy evaluation helpful in reducing the complexity of the System?
Ans. Transformations are lazy evaluated operations on RDD that create one or many new RDDs, e.g. map, filter, reduceByKey, join, cogroup, randomSplit. Transformations are functions which take an RDD as the input and produces one or many RDDs as output. They don't change the input RDD as RDDs are immutable and hence cannot change or modify but always produces new RDD by applying the computations operations on them. By applying transformations you incrementally build an RDD lineage with all the ancestor RDDs of the final RDD(s).
Transformations are lazy, i.e. are not executed immediately. Transformations can execute only when actions are called. After executing a transformation, the result RDD(s) will always be different from their ancestors RDD and can be smaller (e.g. filter, distinct, sample), bigger (e.g. flatMap, union, cartesian) or the same size (e.g. map) or it can vary in size.
RDD allows you to create dependencies b/w RDDs. Dependencies are the steps for producing results in a program. Each RDD in lineage chain, string of dependencies has a function for operating its data and has a pointer dependency to its ancestor RDD. Spark will divide RDD dependencies into stages and tasks and then send those to workers for execution.
Follow this link to read more
11) What are the types of Transformation in Spark RDD Operations?
Ans. There are two kinds of transformations:
Narrow transformations:
Narrow transformations are the result of map, filter and in which data to transform id from a single partition only, i.e. it is self-sustained.
Wide Transformations
reside in many partitions of the parent RDD.
Wide transformations are also called shuffle transformations as they may or may not depend on a shuffle. All of the tuples with the same key must end up in the same partition, processed by the same task. To satisfy these operations, Spark must execute RDD shuffle, which transfers data across the cluster and results in a new stage with a new set of partitions.
12) What is the reason behind Transformation being a lazy operation in Apache Spark RDD? How is it useful?
Ans. Whenever a transformation operation is performed in Apache Spark, it is lazily evaluated. It won't execute until an action is performed. Apache Spark just adds an entry of the transformation operation to the DAG (Directed Acyclic Graph) of computation, which is a directed finite graph with no cycles. In this DAG, all the operations are classified into different stages, with no shuffling of data in a single stage.
By this way, Spark can optimize the execution by looking at the DAG at its entirety, and return the appropriate result to the driver program.
For example, consider a 1TB of a log file in HDFS containing errors, warnings, and other information. Below are the operations being performed in the driver program:
1. Create an RDD of this log file
2. It perform a flatmap() operation on this RDD to split the data in the log file based on tab delimiter.
3. Perform a filter() operation to extract data containing only error messages
4. Perform first() operation to fetch only the first error message.
If all the transformations in the above driver program are eagerly evaluated, then the whole log file will load into memory, all of the data within the file will split base on the tab, now either it needs to write the output of FlatMap somewhere or keep it in the memory. Spark needs to wait until the next operation is performed with the resource blocked for the upcoming operation. Apart from this for each and every operation spark need to scan all the records, like for FlatMap process all the records then again process them in filter operation.
On the other hand, if all the transformations are lazily evaluated, Spark will look at the DAG on the whole and prepare the execution plan for the application, now this plan will optimize the operation will combine/merge into stages then the execution will start. The optimized plan created by Spark improves job's efficiency and overall throughput.
By this lazy evaluation in Spark, the number of switches between driver program and cluster is also reduced thereby saving time and resources in memory, and also there is an increase in the speed of computation.
13)
| 2.010227 |
Zyphra/Zyda-2
|
There are two basic techniques for how to write a book — or for that matter, any piece. They just become more defined in a book because of the length.
The first is: begin at the top left hand corner of page one and finish at the bottom right hand corner of the last page, and in between follow your nose. We'll call this the 'free-form' method.
The second is: plan everything out. Design the structure of the book with chapter and sub-chapter headings, right to the lowest level. Then fill it up. This one we'll call the 'structured' method.
Most writers to some extent use a combination of both approaches; and they are in any case suited to different types of writing. For example a psychological drama that explores characters' reaction to their environment, really has to be free-form, to allow the characters to live and to actually respond in a convincing manner. I used this technique in The Warm Pink Jelly Express Train, a novel in which a straight man meets a transsexual and falls in love with her.
| 1.612807 |
openbmb/Ultra-FineWeb
|
"World on the Edge is brilliant. Author Lester Brown is one of humanity's greatest voices for the environment. In this volume, he presents the reader with a clear prescription for restoring sanity to our relationship with the biosphere. Highest recommendation." —Geoffrey Holland, The Hydrogen Age
In 1543, Polish astronomer Nicolaus Copernicus published "On the Revolutions of the Celestial Spheres," in which he challenged the view that the sun revolved around the earth, arguing instead that the earth revolved around the sun. With his new model of the solar system, he began a wide-ranging debate among scientists, theologians, and others. His alternative to the earlier Ptolemaic model, which had the earth at the center of the universe, led to a revolution in thinking, to a new worldview.
Today we need a similar shift in our worldview, in how we think about the relationship between the earth and the economy. The issue now is not which celestial sphere revolves around the other but whether the environment is part of the economy or the economy is part of the environment. Economists see the environment as a subset of the economy. Ecologists, on the other hand, see the economy as a subset of the environment.
Like Ptolemy's view of the solar system, the economists' view is confusing efforts to understand our modern world. It has created an economy that is out of sync with the ecosystem on which it depends.
Economic theory and economic indicators do not explain how the economy is disrupting and destroying the earth's natural systems. Economic theory does not explain why Arctic sea ice is melting. It does not explain why grasslands are turning into desert in northwestern China, why coral reefs are dying in the South Pacific, or why the Newfoundland cod fishery collapsed. Nor does it explain why we are in the early stages of the greatest extinction of plants and animals since the dinosaurs disappeared 65 million years ago. Yet economics is essential to measuring the cost to society of these excesses.
Evidence that the economy is in conflict with the earth's natural systems can be seen in the daily news reports of collapsing fisheries, shrinking forests, eroding soils, deteriorating rangelands, expanding deserts, rising atmospheric carbon dioxide levels, falling water tables, rising temperatures, more destructive storms, melting glaciers, rising sea level, dying coral reefs, and disappearing species. These trends, which mark an increasingly stressed relationship between the economy and the earth's ecosystem, are taking a growing economic toll. At some point, this could overwhelm the worldwide forces of progress, leading to economic decline.
These increasingly visible trends indicate that if the operation of the subsystem, the economy, is not compatible with the behavior of the larger system—the earth's ecosystem—both will eventually suffer. Recent events in the economic and financial systems cause one to wonder if we're beginning to see the effects of an economy outgrowing its natural base. The larger the economy becomes relative to the ecosystem, and the more it presses against the earth's natural limits, the more destructive this incompatibility will be. The challenge for our generation is to reverse these trends before environmental deterioration leads to long-term economic decline, as it did for so many earlier civilizations.
An environmentally sustainable economy—an eco-economy—requires that the principles of ecology establish the framework for the formulation of economic policy and that economists and ecologists work together to fashion the new economy. Ecologists understand that all economic activity, indeed all life, depends on the earth's ecosystem—the complex of individual species living together, interacting with each other and their physical habitat. These millions of species exist in an intricate balance, woven together by food chains, nutrient cycles, the hydrological cycle, and the climate system. Economists know how to translate goals into policy. Economists and ecologists working together can design and build an eco-economy, one that can sustain progress.
Just as recognition that the earth was not the center of the solar system set the stage for advances in astronomy, physics, and related sciences, so will recognition that the economy is not the center of our world create the conditions to sustain economic progress and improve the human condition. After Copernicus outlined his revolutionary theory, there were two very different worldviews. Those who retained the Ptolemaic view of the world saw one world, and those who accepted the Copernican view saw a quite different one. The same is true today of the disparate worldviews of economists and ecologists.
These differences between ecology and economics are fundamental. For example, ecologists worry about limits, while economists tend not to recognize any such constraints. Ecologists, taking their cue from nature, think in terms of cycles, while economists are more likely to think linearly, or curvilinearly. Economists have a great faith in the market, while ecologists often fail to appreciate the market adequately.
The gap between economists and ecologists in their perception of the world as the 21st century began could not have been wider. Economists looked at the unprecedented growth of the global economy and of international trade and investment and forecast a promising future with more of the same. They noted with justifiable pride the sevenfold expansion of the economy since 1950, which raised output from $6 trillion of goods and services to $43 trillion in 2000 and boosted living standards to levels not dreamed of before. Ecologists looked at this same growth and realized that it was the product of burning vast quantities of artificially cheap fossil fuels, a process that destabilizes the climate. They looked ahead to see more intense heat waves, more destructive storms, melting ice caps, and rising sea levels that would shrink the land area even as population continued to grow. While economists saw booming economic indicators, ecologists saw an economy that is altering the climate with unthinkable consequences.
Economists rely on the market to guide their decisionmaking. They respect the market because it can allocate resources with an efficiency that a central planner can never match (as the Soviets learned at great expense). Ecologists view the market with less reverence because they see a market that is not telling the truth. For example, when buying a gallon of gasoline, customers in effect pay to get the oil out of the ground, refine it into gasoline, and deliver it to the local service station. But they do not pay the health care costs of treating respiratory illness from air pollution or the costs of climate disruption.
We have created an economy that is in conflict with its support systems, one that is fast depleting the earth's natural capital, moving the global economy onto an environmental path that will inevitably lead to economic decline. This economy cannot sustain economic progress; it cannot take us where we want to go. Just as Copernicus had to formulate a new astronomical worldview after several decades of celestial observations and mathematical calculations, we too must formulate a new economic worldview based on several decades of environmental observations and analyses. A stable relationship between the economy and the earth's ecosystem is essential if economic progress is to be sustained.
Although the idea that economics must be integrated into ecology may seem radical to many, evidence is mounting that it is the only approach that reflects reality. When observations no longer support theory, it is time to change the theory—what science historian Thomas Kuhn calls a paradigm shift. If the economy is a subset of the earth's ecosystem, the only formulation of economic policy that will succeed is one that respects the principles of ecology.
The good news is that economists are becoming more ecologically aware, recognizing the inherent dependence of the economy on the earth's ecosystem. For example, some 2,500 economists—including eight Nobel laureates—have endorsed the introduction of a carbon tax to stabilize climate. More and more economists are looking for ways to get the market to tell the ecological truth.
The existing industrial economic model cannot sustain economic progress. In our shortsighted efforts to sustain the global economy, as currently structured, we are depleting the earth's natural capital. We spend a lot of time worrying about our economic deficits, but it is the ecological deficits that threaten our long-term economic future. Economic deficits are what we borrow from each other; ecological deficits are what we take from future generations.
Adapted from Chapter 1, "The Economy and the Earth," in Lester R. Brown, Eco-Economy: Building an Economy for the Earth (New York: W.W. Norton & Company, 2001), available for free downloading and purchase at _URL_
| 2.377916 |
HuggingFaceFW/fineweb-edu
|
Calendar Calculator App
The Biorhythm
Biorhythm Theory deals with the premise that our everyday lives and futures are impacted in big component by the rhythmic cycles that represent our physical, emotional, and intellectual wellness and direction. According to biorhythm theory a physical cycle is 23 days long, a psychological one is 28 days long, and an intellectual one is 33 days long.
This concept was initially created by Wilhelm Fliess in the late 19th century. In the United States in the 1970s it grew in popularity. Today, biorhythm theory is once again undergoing a renaissance as increasingly more followers are observing its personal benefits and also discovering success in their lives.
What Is A Biorhythm
The reason why human beings assume, feel and act is due to the fact that we are made of life pressure power that becomes part of our bodies prior to we are birthed. This vital force energy occupies paths in our bodies as well as discovers hubs or centres referred to as chakras.
There are hundreds of chairs in the body, not just the 7 commonly highlighted in books and in website. Each of these chakras has its own frequency that communicates with deep space and also the earth.
The energy strength of the chakras differs depending upon the motion of the planets and different exterior stimulations. The variant in the chakra energy is referred to as your biorhythm.
Biorhythm Calculator
, if you go with your life not aware of your biorhythms the chances are you will not totally recognize your moods or why points happen the means they do.. It's likely your mind will create a psychological story for the feeling or event that exists outside of truth impact. A biorhythm calculator can help.
An excellent biorhythm calculator will take a note of your birthday and today's date. It will certainly after that develop a map of your energy centers utilizing data associating to your physical, emotional, and mental characteristics. Your biorhythm contour will certainly reveal you today condition of your life pressure energy, permitting your to make far better options.
Biorhythm Compatibility
When it pertains to like you've heard all the sayings. You've read about heart friends, concerning individuals that were 'indicated' to be together, after that you've likewise found out about people who are just inappropriate. What does it really imply? The solution hinges on your vital force energy and also your biorhythms.
Working with one more person can be differed. Since you aren't suitable today does not indicate you won't be more suitable following week, simply. This leaves a lot to opportunity, specifically if you take place a date. Your date could be excellent to bit your biorhythms out of placement. Why not give it time and make use of a calculator.
Biorhythm Chart
Calendar Calculator App
Biorhythms are a complicated issue that requires a high degree of ability and also understanding to get. That's why you require a biorhythm calculator and also a biorhythm graph. These tools are specifically created to draw up your present biorhythm frequencies to provide you the information you require to make even more effective life selections.
When you consult your biorhythm chart you will certainly see 3 lines, one is for the physical energy, one is for the psychological power, and also one is for your intellectual energy. When the lines pass the zero point or criss-cross you ought to pay attention, these lines go up and down in waves– it's a sin wave–.
How To Read A Biorhythm Chart
, if you want your biorhythm calculator and chart to function in your support you need to understand just how to utilize them.. There's no point in buying an item you can not check out, that's why we give you all the details needed to understand the significance of your biorhythm data.
The initial point to do is discover a reliable biorhythm calculator and input your information. This is normally a set of dates. After the calculator has actually offered you your data it's time to read the chart and also translate the outcomes. The chart uses a line chart layout with coloured lines to indicate each regularity. Review where these lines converge.
What Is My Biorhythm
As we have described over your biorhythm is the regularity of your vital force power located around the point of energy in your body. These points of energy are typically called chakras. These chakras are effective and dominant pressures in your life. They are not only in charge of your health however also for your quality of life and also future course.
You can review the biorhythmic data that emerges from these energy centers utilizing one of our biorhythmic calculators as well as charts. The information you acquire from these assessments can assist you make life choices that are more harmonic with truth nature of reality and the means things truly are.
Calendar Calculator App
Calendar Calculator App Calendar Calculator App
Calendar Calculator App
error: Content is protected!!
| 1.552325 |
Zyphra/Zyda-2
|
Researchers at the George Institute for Global Health investigated a modified dosage of recombinant tissue plasminogen activator (rtPA) - the standard care for acute ischaemic stroke for several years. Findings of the study showed when the level of the drug was reduced, most of the clot busting or dissolving benefits of the higher dose were maintained. However, there was significantly less bleeding inside the brain. This helped improve survival rates, researchers claimed.
Experts said the study has the potential to change the way the most common form of stroke is treated globally.
As over 1.2 million Indians suffer strokes every year, making it the leading cause of death and disability in rural India, the study's implications can be evaluated by Indian health professionals. The trial, conducted during a study on over 3,000 patients in 100 hospitals worldwide, showed the rate of serious bleeding in the brain, known as intracerebral haemorrhage, came down significantly by two-thirds on reducing the dose of rtPA from a standard 0.9mg/kg body weight to a lower dose of 0.6mg/kg.
After 90 days into the trial, 8.5% of patients died after receiving low dose rtPA, compared to 10.3% who received the standard dose, according to the results of the study. The drug rtPA is used to dissolve clots that block a blood vessel in a patient's brain within the first few hours after the onset of stroke symptoms.
However, the survival benefits from the modified dosage of the drug rtPA was offset by a slight rise in the number of people suffering residual disability, the study showed.
| 1.818572 |
openbmb/Ultra-FineWeb
|
Posted by Niki on Saturday, September 18, 2010 at 11:02pm.
Assignment: Creating an At-Risk Program
Resources: Ch. 8 of Multicultural Education and Appendix E.
Imagine that you have been asked to serve on the advisory board for a new, alternative school program in your school district. The advisory board must specify the factors that will be considered in determining which students qualify for the program and they must create a plan that can be presented to the school board for approval and potential implementation at the beginning of the school year two years from now.
Create a plan for identifying potential students for the new at-risk program by completing the following points:
o Consider the following question in your plan: Because you do not have the resources to serve an entire at-risk population, how will you focus your resources to create the greatest impact for your community?
o Use at least three sources, other than the text, to support your plan.
o Cite your sources according to APA guidelines.
o Construct either a 1,050- to 1,400-word paper or a 15- to 20-slide Microsoft® PowerPoint® presentation with presenter's notes, addressing each of the following questions in your plan:
§ What part of the at-risk population will the program serve?
§ How will students be identified for the program?
§ How will the program address the needs of the students?
§ What additional social resources are available in the community that can be utilized for greater success?
§ What are the potential positive impacts for the district, students, and community?
§ What are the necessary steps for implementing the program?
Refer to Appendix E for directions and tips on building a Microsoft® PowerPoint® presentation. If you choose to do the presentation, your title slide and reference slides do not count toward the final slide count, and it is recommended that you do two to three slides per topic.
Use APA guidelines to format your paper, if you select to write a paper.
Post your assignment as an attachment.
Microsoft® PowerPoint® Basics
For the assignment, Debunking Gender Misconceptions, you are required to use Microsoft® PowerPoint®. This appendix is meant to give you the very basics for using the PowerPoint® program
Open Microsoft® PowerPoint®.
Start a new presentation: Click on Blank Presentation, then OK.
Choosing a slide layout: Click on Format, then Slide Layout. A good one to start with is one with a header and bullet points.
Type in text for the slide (Suggestion: Put the title of your paper in the top box and then your name and class information in the lower box. Next slide: Overview of paper topics-introduction. Next slide: First topic).
To add presenter's notes: Click on the Notes Page. Click on View, then Notes Page. To get back to the slide, click on View, then Normal.
To add a slide: Click on Insert, then New slide.
To add background color: Click on Format, then Background, and then More colors (for the full palette).
To insert a slide in the middle of your other slides: Go to the left side of the screen, where it gives you an overview of your slides, and click on the place where you want the new slide to go. Click on Insert, then New Slide.
To change the order of your slides: Go to the presentation overview on the left side of the screen, click on the slide you want to move, and then drag and drop it where you want it to go.
Save your presentation just as you would save a Microsoft® Word document by clicking on File, then Save,
Note: If you get stuck, use the Help feature to figure things out. Click on Help, then Microsoft® PowerPoint® help and type in a keyword.
- Aed 204 - Ms. Sue, Saturday, September 18, 2010 at 11:04pm
How would you like us to HELP you with this assignment?
- Aed 204 - Elysia M, Tuesday, September 21, 2010 at 3:53pm
Check out my Student of Fortune Account, studentoffortune. com/# ElysiaM
Any help that you need with your class will be there.
Answer this Question
SCI 275 - I need help on my assignment that is due by 12midnight. It is now 8:...
human resources - Resources: Appendix A; Online library, Ch. 1 (p. 19) in...
At-Risk children - Create a plan for identifying potential students for the new...
education - Steps required for a multicultural education to be effective....
Diversity in the Classroom - Imagine that you have been asked to serve on the...
SCI275 - creating and outline of the risk of using malathion according to the...
AED 204 - My assignment says to write no more than 150 words about the...
AED20 - : Characteristics of At-Risk Students Resources: The Online...
Diversity in the Classroom - Create an At-Risk Program. What would be At-Risk...
Appendix f AED 204 - how is this done it it about religions of all kinds and the...
For Further Reading
| 1.775045 |
HuggingFaceFW/fineweb-edu
|
Achaeans. 2 They had only recently been ejected from their city by Cleomenes, and as the saying is, utterly uprooted, and consequently they were in absolute want of many things and were ill provided with everything. 3 It is true that they retained their high spirit; but in every respect the shortage of their supplies both in public and private was a source of weakness to them. 4 In consequence disputes, jealousies, and mutual hatred were rife among them, as usually happens both in public and private life when men have not sufficient means to give effect to their projects. 5 The first matter of dispute was the fortification of the city, some saying that it ought to be reduced to a size which would enable them to complete the wall if they undertook to build one and to defend it in time of danger. It was just its size, they said, and the sparseness of the inhabitants which had proved fatal to the town. 6 The same party proposed that landowners should contribute the third part of their estates, for making up the number of additional citizens required. 7 Their opponents neither approved of reducing the size of the city nor were disposed to contribute the third part of their property. 8 The most serious controversy of all, however, was in regard to the laws framed for them by Prytanis, an eminent member of the Peripatetic school, whom Antigonus had sent to them to draw up a code. 9 Such being the matters in dispute, Aratus exerted himself by every means in his power to reconcile the rival factions, 10 and the terms on which they finally composed their difference were engraved p227 on a stone and set up beside the altar of Hestia in the Homarium.
94 1 After this settlement he left Megalopolis and went to take part in the Achaean Assembly, leaving the mercenaries under the command of Lycus of Pharae, who was then sub-strategus of the League. 2 The Eleans, who were dissatisfied with Pyrrhias, now procured from the Aetolians the services of Euripidas, 3 and he, waiting for the time when the Achaean Assembly met, took sixty horse and two thousand foot, and leaving Elis passed through the territory of Pharae and overran Achaea as far as that of Aegium. 4 Having collected a considerable amount of booty, he was retreating towards Leontium, 5 when Lycus, learning of the inroad, hastened to the rescue and encountering the enemy at once charged them and killed about four hundred, taking about two thousand prisoners, 6 among whom were the following men of rank: Physsias, Antanor, Clearchus, Androlochus, Euanorides, Aristogeiton, Nicasippus, and Aspasius. He also captured all their arms and baggage. 7 Just about the same time the Achaean naval commander made a landing at Molycria and came back with nearly a hundred captured slaves. 8 Starting again he sailed to Chalceia, and on the enemy coming to the assistance of that town he captured two warships with their crews and afterwards took with its crew an Aetolian galley near Rhium. 9 So that all this booty coming in from land and sea at the same time, with considerable benefit both to the exchequer and the commissariat, the soldiers felt confident that they would receive their p229 pay and the cities that they would not be unduly burdened by war contributions.
95 1 Simultaneously with these events Scerdilaïdas, considering himself wronged by the king, as the sum due to him by the terms of their agreement had not been paid in full, sent out fifteen galleys with the design of securing payment by trickery. 2 They sailed to Leucas where they were received as friends by everyone, owing to their previous co-operation in the war. 3 The only damage, however, that they managed to do here, was that when the Corinthians Agathinus and Cassander who were in command of Taurion's squadron anchored with four sail in the same harbour, regarding them as friends, they made a treacherous attack upon them, and capturing them together with the ships, sent them to Scerdilaïdas. 4 After this they left Leucas, and sailing to Malea began to plunder and capture merchantmen.
5 It was now nearly harvest time, and as Taurion had neglected the task of protecting the cities I mentioned, Aratus with his picked Achaean force remained to cover harvesting operations in Argolis, 6 and in consequence Euripidas with his Aetolians crossed the frontier with the view of pillaging the territory of Tritaea. 7 Lycus and Demodocus, the commander of the Aetolians from Elis, collected the levies of Dyme, Patrae, and Pharae and with these troops and the mercenaries invaded Elis. 8 Reaching the place called Phyxium, they sent out p231 their light-armed infantry and their cavalry to overrun the country, placing their heavy-armed troops in ambush near this place. 9 When the Eleans with their whole force arrived to defend the country from pillage and followed up the retreating marauders, Lycus issued from his ambuscade and fell upon the foremost of them. 10 The Eleans did not await the charge, but turned and ran at once on the appearance of the enemy, who killed about two hundred of them and captured eighty, bringing in all the booty they had collected in safety. 11 At about the same time the Achaean naval commander made repeated descents on the coast of Calydon and Naupactus, ravaging the country and twice routing the force sent to protect it. 12 He also captured Cleonicus of Naupactus, who since he was proxenus of the Achaeans, was not sold as a slave on the spot and was shortly afterwards set at liberty without ransom.
96 1 At the same period Agetas, the Aetolian strategus, with the whole Aetolian citizen force plundered Acarnania and overran the whole of Epirus, pillaging the country with impunity. 2 After this performance he returned and dismissed the Aetolians to their several cities. 3 The Acarnanians now made a counter-attack on the territory of Stratus and being overtaken by panic, effected a retreat, which if not honourable was at least unaccompanied by loss, as the garrison of Stratus were afraid of pursuing them since they suspected their retreat was a ruse to lead them into an ambush.
4 The following instance of treachery countered by treachery also took place at Phanoteus. Alexander, who had been appointed to the command in Phocis p233 by Philip, made a plan for outwitting the Aetolians by the agency of a certain Jason whom he had placed in charge of Phanoteus. 5 This Jason sent a message to Agetas the Aetolian strategus offering to betray the citadel of that town to him, and entered into an agreement to do so confirmed by oath. 6 On the appointed day Agetas with his Aetolians came to Phanoteus under cover of night, and concealing the rest of his force at a certain distance sent on a picked body of a hundred to the citadel. 7 Jason had Alexander ready in the city with some troops, and receiving these Aetolian soldiers he introduced them all into the citadel as he had sworn. 8 Alexander now burst in at once with his men, and the hundred picked Aetolians were captured. Agetas, when day broke, perceived what had happened and withdrew his forces, having thus been the victim of a trick not dissimilar to many he had played on others.
97 1 At about the same time Philip occupied Bylazora, the largest town in Paeonia and very favourably situated as regards the pass from Dardania to Macedonia. So that by his conquest he very nearly freed himself from the fear of the Dardai, 2 it being no longer easy for them to invade Macedonia, now that Philip commanded the passes by holding this city. 3 After securing the place, he dispatched Chrysogonus with all speed to collect the levies of upper Macedonia 4 and he himself with those of Boeotia and Amphaxites arrived at Edessa. p235 Here he was joined by the Macedonians under Chrysogonus, and setting forth with his whole army reached Larisa on the sixth day. 5 Pushing on vigorously all night without stopping, he arrived before Melitea at daybreak, and setting up his scaling-ladders, attempted to storm the town. 6 He terrified the Meliteans so much by the suddenness and unexpectedness of the attack that he could easily have taken the town; but the attempt was foiled by the ladders being far too short for the purpose. 98 1 This is the sort of thing for which commanders deserve the severest censure. 2 Who could indeed help blaming those who come up to a town with the expectation of taking it on the spur of the moment
| 1.224813 |
Zyphra/Zyda-2
|
Scientists study the illusive snow leopard in Northern Afghanistan (The New York Times)
- Snow leopards have the advantage of living in "one of the most remote and isolated mountain landscapes in the world," away from the human threats other large cats face.
- Increasingly, snow leopards have been eating livestock, and these encounters with humans might threaten this already endangered species as tensions arise.
- Scientists estimate there are between 4,500 and 7,500 snow leopards in the wild, but Dr. Schaller said, "those figures are just wild guesses."
Q&A with Will Potter about his new book: Green Is the New Red: An Insider's Account of a Social Movement under Siege (Grist)
- Will Potter discusses how corporations and lobbyists are attacking the environmental movement with accusations of terrorism, much like red scare.
- "As the scale of the ecological crisis we are facing becomes more apparent, and as the backlash against social movements that are challenging our self-destructive culture intensifies, it is difficult to not feel dark, to feel helpless."
Puma commits to eliminating all hazardous waste releases into Chinese waterways as part of Greenpeace's detox challenge (Greenpeace)
- Puma, the third largest sportswear producer in the world, just committed to stop releasing toxic chemical in Chinese rivers by 2020, "beating" both Nike and Adidas in the detox challenge.
The National Petroleum Reserve, bustling with biodiversity of arctic life, is soon to be tapped (Yale Environment 360)
- "This wetland is home to the most spectacular gathering of migratory birds from all over the world, numbering in the millions."
- The 23 million acre reserve will have is its fate decided in a year, and scientists are hurrying to study "special spots," which the US will protect within the reserve.
And lastly a video to inspire, relish and even lament conservation efforts (TreeHugger)
If the above embedded video does not display, here to view it.
| 1.317242 |
HuggingFaceFW/fineweb-edu
|
Short Summaries of Articles about Mathematics
in the Popular Press
"Quantum Logic with Light, Glass, and Mirrors," by Andrew Shields. Science, 13 September 2002.
"Although only a handful of quantum algorithms have been discovered so far,they include important mathematical problems, such as finding the prime factorsof large numbers, the Achilles heel of classical cryptography." From there theauthor predicts that because unlike every other known method quantumcryptography can guarantee the secrecy of encryption keys, it "may soon secureoptical links between different sites of banks or large corporations across ametropolitan area. Thus the first applications for quantum logic are verylikely to be such photonic systems."
--- Annette Emerson
| 2.102466 |
HuggingFaceFW/fineweb-edu
|
"We live in an atmosphere of shame. We are ashamed of everything that is real about us; ashamed of ourselves, of our relatives, of our incomes, of our accents, of our opinions, of our experience, just as we are ashamed of our naked skins." -George Bernard Shaw
All that is real about ourselves is nothing to be ashamed about; quite to the contrary, it's something to be eminently thankful for. This very existence is all we have, and while it's minuscule compared to the entire Universe, it required the entire Universe to bring us to the point where it's possible for us to exist.
What do I mean by that?
(The turkey that many of us will be eating tomorrow is perhaps our 160,000,000th cousin, some 50,000,000 times removed.)
But those same atoms that now make us up — that millions of years ago made up our ancestors — have been around on our planet since its birth, some 4.5 billion years ago.
And where did those atoms come from?
Practically all of the atoms we find on Earth: Nitrogen, Oxygen, Carbon, Iron, Silicon, Sulphur, Nickel, Magnesium and Calcium — over 99% of the atoms on our planet — were once inside of a star that went through its entire life cycle, burned up all of its nuclear fuel, and died in a spectacular supernova explosion.
That burned-up fuel from prior generations of stars that lived and died created practically all the heavy elements — every single atom heavier than element #4, Beryllium — that exists in the Universe today. Only after multiple generations of stars, living and dying, their fused atoms recycled into star-forming regions rich in unburned hydrogen and helium, could a star system like ours, complete with rocky planets and the ingredients for life, be formed.
In order for those stars to exist, burn, recycle their elements, and eventually form successive generations containing planets, heavy elements, and life, it required a Universe full of massive galaxies, loaded with the light elements capable of forming stars in the first place.
The galaxies themselves, great cosmic spirals, ellipticals, and irregular behemonths, collections of billions or even trillions of suns' worth of matter, are the gifts of a matter-filled Universe operating under the laws of gravity. Given the history of the Universe, some small fluctuations away from a perfectly uniform density, and general relativity, gravitation ensures that you'll get a Universe filled with hundreds of billions of galaxies, each containing, on average, hundreds of billions of stars.
And what's amazing is that — if you're willing to start with expanding spacetime and the laws of physics — a Universe that looks a whole lot like ours, complete with clusters, galaxies, stars, planets, heavy elements, and, most probably, life, is inevitable. And it's inevitable all over the Universe.
So don't be ashamed of what you are; be thankful for all that you are!
Tomorrow (Thursday) marks American Thanksgiving, an annual harvest festival and feast where we celebrate a variety of things, particularly the good things that have come to us in life. While I myself have a great number of personal things to be thankful for, including six wonderful years with my partner, Jamie, and nearly five years of sharing this Universe with you here at Starts With A Bang, the story of where we come from is universal to us all, and it's something we can all be thankful for together.
Happy Thanksgiving to each and every one of you out there — whether you celebrate it or not — and may your lives be filled with a wonderful bounty of things to be thankful for, today and all the days of the year!
| 2.093613 |
HuggingFaceFW/fineweb-edu
|
- What is Information Theory?
- Prehistory: Proto-writing
- Ptolemaic: Rosetta Stone
- Ancient History: The Alphabet
- Source Encoding
- Visual Telegraphs (case study)
- Decision Tree Exploration
- Electrostatic Telegraphs (case study)
- The Battery & Electromagnetism
- Morse Code & The Information Age
- Morse code Exploration
- Symbol Rate
- Symbol Rate Exploration
- Introduction to Channel Capacity
- Message Space Exploration
- What's Next?
What is Information Theory? A broad introduction to this field of study
What is Information Theory?
⇐ Use this menu to view and help create subtitles for this video in many different languages. You'll probably want to hide YouTube's captions if using these subtitles.
| 1.663089 |
HuggingFaceFW/fineweb-edu
|
Protecting the Ozone layer: Safeguarding the Environment
We know that the earth's ozone layer protects all of us from the harmful radiations from the sun. But have we ever thought of ozone as toxic? The reports state that the ozone on the ground layer poses health hazards while ozone on stratosphere protects us from harmful UV rays. Recently, the depletion of the ozone layer has become a rising issue that needs to be taken seriously. But also the excess of ozone produced in the lower strata also poses a huge threat to life on earth. The capitalistic and materialist mentality of people had turned blind toward the urgent call for environment protection. One such result of the unchecked human exploitation is the depletion of necessary ozone in the stratosphere, the upper layer of atmosphere and production of excessive ozone on the troposphere, the lower layer of atmosphere.
Effects of Ozone layer depletion
The sun emits electromagnetic radiations at various wavelength. That indicates that the intensities of various energies differ from each other. And atmosphere act as a shield that protects the earth from dangerous radiations.
Ozone is found in two parts of the atmosphere. It is found in the stratosphere that can be called good oxygen. This ozone absorbs the UV radiations and thus prevents dangerous UV rays from hitting the earth's surface. The depletion of the stratospheric ozone is a serious issue as this results in harmful UV radiation reaching the earth's surface.
This can cause health problems varying from eye disease; development of cataract to skin cancer and immune system damage.
UV radiation affects the growth of plantsIt can cause a change in the plant's form, distribution of nutrients within the plants, the development phases and secondary metabolisms. These changes can result in plant diseases and their biochemical cycles.
The core of the aquatic food web is phytoplankton. There has been reported a direct decrease in phytoplankton production as the UV radiation increases.
The UV radiation damages the development stages of fishes and other marine animals and can destroy the balance of the whole of the aquatic food chain.
It can affect the biochemical cycles of terrestrial and marine lives, both of which acts as a sink of greenhouse gases. This can contribute to the concentration of these gases in the atmosphere.
Human activities have a huge role in the reduction of the ozone layer. The decrease in ozone is related to the increasing levels of chlorine and bromine in the stratosphere. They are produced mainly during the manufacturing and release of CFC's and other halocarbons. These gases are released during the use of refrigerators, air conditioners, a propellant for aerosol cans etc. Controlled use of such products and buying produces that do not use CFC's can to an extent reduces the depletion of the ozone layer.
Effects of production of excessive ozone on the troposphere
The other layer of ozone is found in the troposphere. This ozone is considered as bad and is not good for human health and it consists of particles of smog. This ozone is man-made. It is the product of air pollution from various industries and automobiles. The emission from the power plants and other sources release nitrogen oxide and other volatile organic compounds. Nitrogen gases and these compounds combine with an oxygen molecule to form ozone at high-temperature conditions.
Thus we are lucky that we are shaded from the harmful ultraviolet radiation by earth's own sunscreen-the ozone layer. But at the same time, it is helpful when it is miles away from us.
Do you care about the environment? Wish to make a change? Have an idea to resolve issues? ELP is your chance.
We are excited to launch our first edition of the Ecochirp Launchpad program 2020 (ELP2020). ELP is the game-changer for all the budding enviropreneurs. It is a 12 weeks launchpad program for youth-led environmental solutions. This virtual launchpad program with weekly learning modules that includes webinars, mentoring sessions, and weekly tasks that will support you to launch your idea into a validated business plan.
Apply at: _URL_
About The Author: Radhika R is a student of Christ University Bangalore. She is pursuing her Masters in English with Cultural Studies. She completed her UG in English Literature from Kerala. Her areas of interest are mythology and arts
| 2.567009 |
openbmb/Ultra-FineWeb
|
Izhak Golan, Ran El-Yaniv
We consider the problem of anomaly detection in images, and present a new detection technique. Given a sample of images, all known to belong to a ''normal'' class (e.g., dogs), we show how to train a deep neural model that can detect out-of-distribution images (i.e., non-dog objects). The main idea behind our scheme is to train a multi-class model to discriminate between dozens of geometric transformations applied on all the given images. The auxiliary expertise learned by the model generates feature detectors that effectively identify, at test time, anomalous images based on the softmax activation statistics of the model when applied on transformed images. We present extensive experiments using the proposed detector, which indicate that our algorithm improves state-of-the-art methods by a wide margin.
| 1.232702 |
openbmb/Ultra-FineWeb
|
out of the highest academic sources as well. Which is why, in the end, I distrust the "argument from authority". Yes, a well-trained historical linguist is much more likely to produce a good, sound, trustworthy contribution; but if you stop checking because of that, you're likely to end up very, very disappointed. So: checking is vital. It's the peer-review system that makes science science, not the fact that there are people who worked for decades in it and manipulate complicated theories (alchemy and astrology have that, too). So, I suggest: the most important thing here is how you decide which ideas to include and which ideas to exclude. Who proposes the ideas should certainly be an important criterion, but not the only one.
Test case: both Ivan Stambuk and CodeCat seem to agree that Proto-Balto-Slavic is the modern consensus. I see dissent in recent published sources -- the "Baltic Languages" article in the Elsevier Encyclopedia of Languages and Linguistics (2006), written by an American (S. Young), disagrees, tagging Proto-Balto-Slavic as "still controversial". So, what do we do?
(a) We don't take a position, we just compile the sources. So, if a source has a Proto-Baltic reconstructed word, we can enter it into the Appendix as such; if another source has another (or even the same!) word listed as Proto-Balto-Slavic, we enter it as a separate word into the Appendix; in both cases the source is mentioned at the end;
(b) We discuss and agree that one of these positions -- say, Proto-Balto-Slavic is the scientific consensus -- and keep it, eliminating the other position; Proto-Baltic words are not allowed in the Appendix (if there are any, they are deleted), nor in etymologies of speicific words.
(b-1) We keep strictly to the sources: only those Proto-Balto-Slavic words that were reconstructed in some (trustworthy) source are allowed here;
(b-2) We adapt Proto-Baltic sources: at least some Proto-Baltic reconstructions are clearly also acceptable Proto-Balto-Slavic reconstructions, so we can relabel them accordingly and add them to Wiktionary.
I claim that (b-2) clearly involves original research (or at least original ideas), and probably also (b-1) and all of (b) at some level. Which option is more in agreement with the spirit of Wiktionary? In passing: if you agree that Wiktionarians can decide what the "best theories" are, then (it seems to me) you are implicitly disagreeing with the idea (that I think Ivan Stambuk espouses) that "Wiktionarians can't be trusted to do OR or decide on such matters". --Pereru (talk) 12:51, 21 September 2013 (UTC)
The controversy seems to be mostly political in nature, mainly within the Baltic states themselves who don't want to associate themselves with their former Russian conquerors. I experienced that first hand myself when an anonymous editor on Wikipedia repeatedly tried to remove all references to Balto-Slavic from the w:Baltic languages article, claiming that it was "false propaganda". It seems that there is consensus for Balto-Slavic outside the Baltic states but there is consensus against it within them, so when the two ideas meet there is controversy.
The question of Proto-Baltic is somewhat separate from that, though. It's about whether Balto-Slavic (or Indo-European) split into Baltic and Slavic, or whether Balto-Slavic split into Slavic, East Baltic and West Baltic. In the latter case, there is no Proto-Baltic language, only Proto-Balto-Slavic, so those that discard Balto-Slavic as a whole follow the "Baltic node" hypothesis. Those that did subscribe to Balto-Slavic also tended to believe in "Baltic is a node" and that was the mainstream idea. It's only recently, with linguists getting a deeper understanding of the sound changes of Balto-Slavic, that many people are questioning whether Baltic really is a node. They find that when they reconstruct Proto-Baltic with a modern understanding, what they get doesn't differ substantially when they add Slavic into the mix. In other words: if you reconstruct Proto-Baltic, then in the majority of cases you can make Proto-Slavic descend from it too. Which means that you really reconstructed Proto-Balto-Slavic. —CodeCat 13:30, 21 September 2013 (UTC)
I haven't read this but, usually on Wikipedia original research means something you can't back up with reliable sources. It's a pejorative term that we wouldn't apply to someone who's put time and effort in to sourcing a word that isn't in any published dictionary. Mglovesfun (talk) 21:10, 21 September 2013 (UTC)
- I oppose original research in etymologies. I object to Wiktionary editors inventing etymological hypotheses not backed by reliable sources and entering them into Wiktionary. On this, I seem to generally agree with Ivan Štambuk. As far as definitions, I support the current practice of editors providing original phrasing of definitions based on the attestation evidence of words as found in use, regardless of whether this practice is considered original reaseach. Given the practice relies on primary sources, it seems to be original research as defined by Wikipedia at W:Wikipedia:No original research, especially W:Wikipedia:No_original_research#Primary.2C_secondary_and_tertiary_sources: "All interpretive claims, analyses, or synthetic claims about primary sources must be referenced to a secondary source, rather than to an original analysis of the primary-source material by Wikipedia editors." Our definitions are at least in part a result of original analysis of the evidence found in primary sources rather than being verified by referencing to a secondary source. See also Wiktionary:Wiktionary is a secondary source. --Dan Polansky (talk) 08:59, 22 September 2013 (UTC)
- The problem with etymology is that some of them are so obvious people don't even bother publishing. If you're an author of a Portuguese etymological dictionary, there is little point in wasting space to say that casa, meaning house, descends from Old Portuguese casa, meaning the same thing. If we want to be completionists (and we do), some degree of original research is necessary.
The opposers of this practice are committing a false dichotomy, implying that either no OR whatsoever be allowed, or any nonsense someone comes up with be allowed. This is not the case; naturally, OR shouldn't be accepted when it comes to controversial or uncertain etymologies/reconstructions/whatnot. — Ungoliant (Falai) 13:14, 24 September 2013 (UTC)
- Anything involving protolanguages is controversial and uncertain. There is not a single protolanguage that has unique reconstruction, accepted by all historical linguistis. Had you actually followed the discussion you'd see that this OR proposal primarily refers to protolanguages.--Ivan Štambuk (talk) 15:28, 24 September 2013 (UTC)
Nonsense. The discussion encompasses all sorts of OR. Etymology, reconstruction, pronunciation and definitions have been mentioned so far. There is little controversy and uncertainty when it comes to the reconstruction of Vulgar Latin etyma, for example. — Ungoliant (Falai) 15:45, 24 September 2013 (UTC)
Correct me if I am wrong, but etyma is a word that is actually used. We are talking about reconstructions in etymologies. Those are highly speculative (contrary to pronunciations or definitions) and need to be sourced. Dakdada (talk) 16:04, 24 September 2013 (UTC)
I know, that's why I'm using it. As I said, not every reconstruction is highly speculative. Vulgar Latin *oclus, for example, is not speculative, it's a simple matter of knowing the slightest thing about sound change and Romance languages. — Ungoliant (Falai) 16:17, 24 September 2013 (UTC)
Vulgar Latin is really not a typical example of a protolanguage. Definitions and pronunciations are irrelevant. Let's stick to real protolanguages and not various intermediate forms between attested ancestor and daughter languages. --Ivan Štambuk (talk) 16:30, 24 September 2013 (UTC)
A complete ban on OR would also prevent OR in atypical protolanguages. As I said before, there is a false dichotomy. It's not a choice between no OR at all and total OR anarchy. Different protolanguages, even different reconstructions in the same protolanguage, should be treated differently. Vulgar Latin is a protolanguage (and it is a real protolanguage) that doesn't really need references for many entries, while Proto-Indo-European is one that does. — Ungoliant (Falai) 16:41, 24 September 2013 (UTC)
There is no false dichotomy. You keep repeating that the arguments applied to dismissing OR in protolanguages are being applied to dismiss OR in general, even if applicable to to obviously plausible and conclusive etymologies. This is not the case. This issues that I listed with OR etymologies p
| 1.505459 |
Zyphra/Zyda-2
|
What is Thermocouple Compensation Wire?
What is Thermocouple Wire?
Wire that is used in a thermocouple from the point of sensing to the point of cold junction compensation (cjc end) where the signal is measured. A thermocouple is a sensor for measuring temperature, which consists of two dissimilar metals that are joined together at the sensing end.
Different thermocouple types (e.g. J, K, T, E, etc) use different mixtures of metals in the wire. At the cjc end, the millivolt value provided by the thermocouple represents the difference in temperature of the sensing end as compared to the cjc end (also called the reference end).
What is the difference between Thermocouple grade and Extension grade wire?
Thermocouple grade wire is wire that is used to make the sensing point (or probe part) of the thermocouple. Extension grade wire is only used to extend a thermocouple signal from a probe back to the instrument reading the signal. The extension grade wire typically will have a lower ambient temperature limit in which the wire may be used.
Namely, it may pass a signal representing a higher temperature as received from the probe, but the wire physically may not be exposed to higher temperatures. Thermocouple wire may be used as extension wire, but extension grade wire may not be used in the sensing point (or probe part) of the thermocouple. Part numbers for extension wire typically begin with an "EX" prefix.
| 2.370292 |
Zyphra/Zyda-2
|
From the Publisher
"Captivating…In Lost to the West Lars Brownworth shows a novelist's eye for character, bringing to life some of the most fascinating — and yet little known figures of the Byzantine era. But it is as a researcher into the obscurities of palace intrigue, treachery, and battlefield carnage that Lars really shines. With dry humor and a palette of vivid images, he recounts the dizzying game of musical chairs that placed one usurper after another on the Byzantine throne, only to be pitched off in a gaudily macabre way. In the end, one is left agog by the irony that the upshot of this centuries-long scrum was the preservation of nearly all that the Greeks have bequeathed to us."
—Steven Pressfield, author of Gates of Fire
"Rome never fell it simply moved five hundred miles East to Byzantium. For over a thousand years the Byzantines commanded one of the most visceral and vivid empires the world has ever known. And yet their achievements are consistently underplayed; written out of history. Lars Brownworth is a rare talent. His contagious passion brings murderous empresses, conniving eunuchs, lost Greek texts and Byzantine treasures of fairy-tale proportions blinking back into the light. Confidently striding through time and across the mountains and plains of the Eastern Mediterranean, Brownworth puts this theocratic superstate slap-bang in the center of mankind's global story; back where it should be. The Byzantines made our world what it is today. Lars Brownworth matches their verve and brio in his seductive and gripping account."
—Bettany Hughes, PBS host and author of Helen of Troy
"This is history as it used to be, history as story-telling. In this fascinating account of the Byzantine empire, Lars Brownworth covers a thousand years of blood-letting, outrageous luxury, bitter religious disputes and vaulting ambition without giving the slightest impression of being rushed or crowded. The page turns unaided."
—Anthony Everitt, bestselling author of Augustus, Cicero and The First Emperor
"A hugely entertaining and often moving portrait of a civilization to which the modern West owes an immense but neglected debt. Read it, and you will never use the word 'Byzantine' as a term of abuse again."
—Thomas Holland, author of Millennium, Persian Fire and Rubicon
"Lost to the West is the sort of history I wish I'd been offered in school — a fast-paced adventure story that covers over a thousand years of political intrigue, brilliant leaders, incompetent squabblers, mayhem, butchery and religious divides, and vividly pictures a bygone era that is still a vital part of our heritage."
—Mark Pendergrast, author of Uncommon Grounds
"The Byzantines are back! Correcting centuries of neglect, Lars Brownworth guides us through a forgotten world and, with clarity and wit, brings it to vibrant life. Filled with a dazzling cast of ruthless Emperors, conniving generals and half-crazed scholars, Lost to the West is both entertaining and enlightening a great piece of popular history."
—Tony Perrottet, author of Pagan Holiday and The Naked Olympics
The once common idea that the lights went out on classical and Western civilization when Rome fell in 476 C.E. has long since been debunked, but Brownsworth weighs in to illustrate that the Roman Empire's center of power simply shifted to Constantinople. In a narrative by turns spellbinding and prosaic, Brownsworth marches us through centuries of history, beginning long before the fall of Rome, and introduces the successive rulers of Byzantium, from Christian emperors to Muslim sultans, detailing a culture he describes as both familiar and exotic. He follows religious, political and cultural change up through the Islamic conquest of 1453. Christian refugees fled Byzantium into Europe, taking with them their longstanding love of ancient culture and introducing Western Europe to Plato, Demosthenes, Xenophon, Aeschylus and Homer, fanning the flames of the renaissance of Hellenistic culture that had already begun in various parts of Europe. Although Brownsworth admirably illustrates the ways that the Byzantine Empire lives on even today, Judith Herrin's Byzantium: The Surprising Life of a Medieval Empire offers a more compelling and thorough history of this empire. Maps. (Sept.)
"Lost" and "forgotten" are surely strange words for an empire that is well noted for its preservation of ancient cultures. This is that kind of thumping, old-fashioned popular history that could have been written a hundred years ago. Brownworth, a former high school history teacher, traces the Byzantine Empire from its founding by Constantine in 328 C.E. to its conquest by the Ottoman Turks in 1453. He is fond of semilegendary stories of treacherous dynasts and valiant generals (from Belisarius to last emperor Constantine XI) and doesn't like more modern perspectives, such as exploring sources and economics and everyday culture—although there is some discussion of religious conflicts. Most significantly, he largely ignores the magnificent Byzantine artistic tradition. VERDICT Adrian Goldsworthy's recent How Rome Fell is a much more successful work in this genre that treats the early years of Byzantium. This book will provide an undemanding general reader new to the subject with a first glimpse of the Byzantine Empire.—Stewart Desmond, New York
A history lecturer illuminates the fractious, little-studied period between the fall of the Roman Empire in the West and rise of the Ottomans in the 15th century. With the breakup of the Roman Empire by Diocletian in the third-century CE into West and East, largely along linguistic lines, two distinct identities were forged over the succeeding centuries and grew increasingly estranged from and antagonistic to each other: Latin vs. Greek and Catholic vs. Orthodox. Brownworth examines the long-maligned Eastern half of the Empire, which saw its capital of Nova Roma chosen by Constantine the Great in 328 CE become the glorious, inimitable city of Constantinople. The author reminds us that the denizens of the East always referred to themselves as Roman, and the term Byzantium was later applied by Enlightenment scholars. Brownworth traces the highlights over the next 1,000 years of violent upheaval and murderous dynastic succession: e.g., early doomed attempts by Julian to repaganize the empire; fighting back the assaults by the barbarians and the sacking of Rome; the golden age under Justinian, who established Roman Law and reconquered numerous lost lands; and meeting the Islamic challenge from the seventh-century onward with holy wars and crusades until the ultimate devastation of Constantinople by the Turks in 1453. While the East held many of the ancient secular texts safe from the so-called Dark Ages that stymied the West, the author concentrates mostly on military, rather than cultural, events. Brownworth delivers just enough of the big picture for interested readers to pursue specific events in greater detail. An energetic look at a still-misunderstood period in late antiquity. Agent:Tina Bennett/Janklow & Nesbit
Read an Excerpt
The long-suffering people of the third-century Roman Empire had the distinct misfortune to live in interesting times. For three centuries before Constantine's birth, Roman architects, engineers, and soldiers had crisscrossed the known world, bringing order and stability to the barbaric, diverse lands beyond the frontiers of Italy. In the wake of the mighty Pax Romana came more than fifty-thousand miles of arrow-straight, graded roads and towering aqueducts, impervious alike to the mountains and valleys that they spanned. These highways were the great secret of empire, providing access to markets, ease of travel, and an imperial mail system that could cover more than five hundred miles in a single day. Graceful cities sprang up along the major routes, complete with amphitheaters, public baths, and even indoor plumbinga visible testament to the triumph of civilization. But by the third century, time had ravaged the empire's glory, and revolts had stained its streets with blood. Those impressive Roman roads that had so effectively exported the empire now became its greatest weakness as rebel armies and barbarian hordes came rushing in. No onenot even the ephemeral emperorswas safe in those uncertain times. In the first eight decades of the century, twenty-nine men sat on the imperial throne, but only one escaped murder or capture to die a natural death.
Apathy and enervation seemed to be everywhere, sapping the strength of once solid Roman foundations. The military, too busy playing kingmaker to maintain itself, fell victim like everything else to the sickness of the age. In 259, the proud Emperor Valerian led his soldiers against the Persians, and suffered one of the greatest humiliations in Roman history. Captured by the enemy, he was forced to endure the indignity of being used as a footstool by the gleeful Persian king. When the broken emperor at last expired, the Persians had him flayed, dyeing the skin a deep red color and stuffing it with hay. Hanging the gruesome trophy on a wall, they displayed it to visiting Roman ambassadors as a constant reminder of just how hollow the myth of the invincible legions had become.
Such public humiliation was galling, but Roman writers had been lamenting the decay of the national character for years. As early as the second century bc, Polybius blamed the politicians whose pandering had reduced the Republic to mob rule, Sallust railed against the viciousness of political parties, and Livythe
| 1.295824 |
openbmb/Ultra-FineWeb
|
For centuries, lead was used in many products. The Greeks and Romans used lead in making pottery. Some historians have attributed the decline of the Roman Empire in part to lead poisoning. Lead was even used in medicines in early Greece and other ancient cultures. More recently, lead was used in old folk remedies such as "greta" and "azarcon," which was used to treat upset stomachs.
Lead use increased dramatically beginning with the industrial revolution. It has been used in the manufacture of common products such as paintgasolinebatteriessolder in electrical conduits and potable water and sewer pipes, glasscrystal glassware and decanters, and painted toys and furniture.
By the late 20th Century, the presence of lead in the environment was so pervasive that humans in most regions of the world were exposed to lead every day. Since humans can take lead into their bodies by both breathing it and by ingesting it, most people are exposed daily to lead through the air we breathe and the food and water we consume. According to the U.S. Department of Housing and Urban Development (HUD), about 35% of surveyed homes (37.1 million) have lead-based paint. Of those 37.1 million homes, 93% were built before 1978 (2011 American Healthy Homes Survey). The Centers for Disease Control and Prevention (CDC) estimates that there are over half a million children under the age of 5 who have elevated levels of lead in their bloodstreams.
Lead is found in the dirt around houses, especially property near major roads due to lead particles from auto emissions drifting onto the property. The lead is then tracked into the house. Industrial and manufacturing facilities such as radiator repair shops, brass or bronze foundries, battery manufacturers, steel mills, and bridge construction areas are examples of environments with a high potential for lead exposure.
Because of the serious effects of lead on human health, all states have created tough lead laws based on federal legislation mandated by Congress. Lead in gasoline was banned in 1996 and from paint in 1978. The Housing and Community Development Act of 1992, Title X, which is also known as the Residential Lead-Based Paint Hazard Reduction Act, has as its goal controlling the exposure to lead-based paints. Federal funds are available to assist the states in developing programs for testing and remediation. The Act represents the first time that the federal government has become involved with residential real estate transfers through its mandatory disclosure requirements.
More lead information will be in the next installment of Bend Oregon real estate listings.
| 2.258737 |
Zyphra/Zyda-2
|
The role of religion in modern political life »« The Canadian drug problem
Hopeful signs in the Islamic world
The so-called 'Arab spring' posed a bit of a dilemma for people around the world who value both nominal democracy (the right of people to elect their own governments) and as well as true democracy (where fundamental human rights and the rights of minorities and marginalized groups are also protected).
On the one hand, the overthrow of dictators and other authoritarian regimes in Egypt, Yemen, Tunisia, and Libya, and possibly other countries in the future is surely something to be welcomed and supported, since those countries did not have even nominal democracy.
On the other hand, the democratic forces in those countries are often fragmented and disorganized, coming together momentarily for the purpose of removing the old regime but often unable to channel that unity into a potent unified political force. The most organized forces seem to be those that are aligned with religious groups, often fundamentalist ones that are intolerant of the rights of those outside their in-group.
This is not that surprising. Authoritarian governments are able to repress democratic voices with impunity and prevent such movements from getting organized but cannot do so that easily with religious groups, and so it was under the auspices of clerics and mosques that opponents had the greatest freedom to speak and organize. Hence once the dictators fell, it was these groups that were able to quickly prepare for elections, and thus were more likely to come to power.
It looked like we had to simply grit our teeth and hope that the new governments would not be as bad as we feared and that a second democratization wave would occur that would put truly democratic governments in power. The problem was that that second wave could be a long time coming and in the interim women, religious and ethnic minorities, and other marginalized groups could well suffer repression that might be even worse than what they experienced under the former authoritarian regimes. Regimes that are only interested in preserving their power have a vested interested in maintaining the peace and seek to clamp down on conflicts among groups. Religious governments can and often do exercise power in more sectarian ways because the belief that god wants you to do certain things and is behind you can produce the most extreme behaviors. The destruction by Islamic groups in several countries of important historical landmarks, simply because those were associated with other sects of Islam or other religions, is a sign of this intolerance.
Elections in Egypt produced a government dominated by the Muslim Brotherhood. Yemen is in some turmoil with no proper transition to a democratic government, with the remnants of the old regime still exercising considerable influence. Libya too is going through a period of turmoil and instability. In Tunisia, things are a little better. A moderately Islamic party won a plurality in parliamentary elections but has said that it will not impose sharia-based law and a human rights activist was elected president. The recent murder of a leftist opposition leader who was a critic of the Islamic party is a troubling development.
Islamic countries in general seem to be dominated by governments that seek to base at least part of their legitimacy on giving primacy to that religion. But Juan Cole in a post titled Muslim Opposition to the Muslim Religious Right Grows, from Egypt to Bangladesh sees signs that the second wave of reform may already be occurring. This is not taking the form of a full-blown secularism (which is too much to hope for) but a rejection of the more extreme forms of religious domination.
The headlines this week were full of stories from the Muslim world about Muslims attacking the Muslim religious Right, whether the Muslim Brotherhood in Egypt or the Jama'at-i Islami in Bangladesh. The rise of the religious Right in politics is producing a backlash throughout the region. Part of the backlash comes from secularists of Muslim heritage. But a significant part of it comes from believing Muslims, who oppose the sectarian and authoritarian approach of the religious Right parties, or who are uncomfortable with some of their stances toward longstanding Muslim religious practices, such as spiritual visits to the shrines of Muslim saints (a practice condemned by Wahhabism, Salafism, Talibanism, and other religious-right currents).
Secularism, forms of ethnic nationalism, tribalism, and the religious Left and Center all serve as countervailing forces to the religious Right parties in the Muslim world, the politics of which is becoming more polarized along these lines. But the resulting struggles look familiar if compared to those in the most religious of the industrialized democracies, the United States.
I hope he's right. The question is whether all these diverse non-Islamist groups will be able to coalesce around values of democracy and human rights or whether they will succumb to the temptation to splinter by each trying to gain advantage over the other.
1. says
Well, things sure as Hell aren't "looking up" in that part of the Muslim world controlled by a non-Muslim country that pretends to be the freest and most progressive in the area. Thanks for reminding us how wunnerful that occupation is working.
2. MNb says
If you want to understand what's going on in Arab countries etc. you have to identify to some extent with the people there, which is not the same as agreeing with them or justifying everything they do. Muslims look at Al-Jazeera. So they know what's happening in Gaza and how Hamas stifles everything there. Many of them don't want that in their own countries, so it's only logical that muslim-fundies meet opposition.
There is hardly anything we in the free west can do. What's more: we shouldn't try. Kipling's white man's burden is seriously outdated.
3. slc1 says
Re Raging Bee @ #2
Ah, it's all Israel's fault. Aside from the fact that Israel isn't occupying the Gaza Strip, having withdrawn its troops and settlements in 2005, apparently Mr. Bee thinks that if the Government of Israel just stopped blockading the Gaza Strip and allowed the importation of WMDs there, the Hamas government would become liberal and allow women to participate in marathons and other athletic activities. In a pigs eye. Mr. Bee is a fine one to be criticizing Don Williams.
4. Brian M says
No, slc. You are strawmanning things (again) in the interests of propaganidzing for your favorite apartheid state. (Wanna look at fundamentalisms…check out the fun fun fun growth of Hasidim in Israel!).
Maybe if people weren't starving, over time they might be less drawn to fundamentalists?
Keep in mind that Mossad helped create the Islamic reactionaries as a counterweight to the PLO.
5. Mano Singham says
But Ophelia did not say anything about people starving. She was talking about the exclusion of women from the marathon.
6. slc1 says
Agreed, I should have made it clear that I was referring to the exclusion of women from the marathon. I should also have made it clear that the starving comment was made in response to Brian M.
7. slc1 says
Re Brian M @ #5
Mr. Brian M should be aware that the religious parties in Israel ain't going to be part of the next government. The refusal of the Bennent and Lapid parties to serve with them is, IMHO, a healthy outcome of the election, along with Bibi's party losing 10 seats. One could only wish that the folks in Gaza could get the same opportunity to oust their nutcases in Hamas. Or that the folks in Egypt could get a secular government instead of the Muslim Brotherhood. Or that the folks in Iran could get rid of the mad Mullahs who currently run that country.
Leave a Reply
| 1.449663 |
Zyphra/Zyda-2
|
Definitions, Specifications, and Other Guidance
Postconsumer fiber means:
- Paper, paperboard, and fibrous wastes from retail stores, office buildings, homes, and so forth, after they have passed through their end-usage as a consumer item, including: used corrugated boxes; old newspapers; old magazines; mixed waste paper; tabulating cards; and used cordage; and
- All paper, paperboard, and fibrous wastes that enter and are collected from municipal solid waste.
- Postconsumer fiber does not include fiber derived from printers' over-runs, converters' scrap, and over-issue publications.
Recovered fiber means:
Postconsumer fiber such as:
Manufacturing wastes such as:
- Paper, paperboard, and fibrous materials from retail stores, office buildings, homes, and so forth, after they have passed through their end-usage as a consumer item, including: used corrugated boxes; old newspapers; old magazines; mixed waste paper; tabulating cards; and used cordage; and
- All paper, paperboard, and fibrous materials that enter and are collected from municipal solid waste, and
Manufacturing wastes such as:
- Dry paper and paperboard waste generated after completion of the papermaking process (that is, those manufacturing operations up to and including the cutting and trimming of the paper machine reel into smaller rolls or rough sheets) including: envelope cuttings, bindery trimmings, and other paper and paperboard waste resulting from printing, cutting, forming, and other converting operations; bag, box, and carton manufacturing wastes; and butt rolls, mill wrappers, and rejected unused stock; and
- Repulped finished paper and paperboard from obsolete inventories of paper and paperboard manufacturers, merchants, wholesalers, dealers, printers, converters, or others.
Mill broke means any paper waste generated in a paper mill prior to completion of the papermaking process. It is usually returned directly to the pulping process. Mill broke is excluded from the definition of "recovered fiber." Also see "measurement" section below.
EPA recommends that procuring agencies review specifications provisions pertaining to performance and aesthetics and revise provisions that can impede use of postconsumer and recovered fiber, unless such provisions are related to reasonable performance standards. Agencies should determine whether performance provisions are unnecessarily stringent for a particular end use. Agencies also should revise aesthetics provisions-such as brightness, dirt count, or shade matching-if appropriate, consistent with the agencies' performance requirements, in order to allow for a higher use of postconsumer and recovered fiber.
EPA recommends that procuring agencies document determinations that paper products containing postconsumer and recovered fiber will not meet the agencies' reasonable performance standards. Any determination should be based on technical performance information related to a specific item, not a grade of paper or type of product.
EPA recommends that procuring agencies watch for changes in the use of postconsumer and recovered fiber in paper and paper products. When a paper or a paper product containing postconsumer and recovered fiber is produced in types and grades not previously available, at a competitive price, procuring agencies should either revise specifications to allow the use of such type or grade, or develop new specifications for such type or grade, consistent with the agencies' performance requirements.
EPA recommends that procuring agencies express their minimum content standards as a percentage of the fiber weight of the paper or paper product. EPA further recommends that procuring agencies specify that mill broke cannot be counted toward postconsumer or recovered fiber content, except that procuring agencies should permit mills to count mill broke generated in a papermaking process using postconsumer and/or recovered fiber as feedstock toward "postconsumer fiber" or "recovered fiber" content, to the extent that the feedstock contained these materials. In other words, if a mill uses less than 100% postconsumer or recovered fiber, only a proportional amount of broke can be counted towards postconsumer or recovered fiber content.
EPA recommends that procuring agencies consider the effect of a procurement of a paper product containing recovered and postconsumer fiber on their paper collection programs by assessing the impact of their decision on their overall contribution to the solid waste stream.
| 2.057359 |
HuggingFaceFW/fineweb-edu
|
the oil, they suspected they wouldn't be able to stop it from surging into the river just a couple of miles away. Flooding from four days of heavy rain made the oil-soaked water almost impossible to contain.
The cleanup teams had two advantages as they planned their strategy. The break had occurred just minutes from Enbridge's maintenance facility in Marshall, so some cleanup equipment was immediately available. Marshall is also close to Interstates 94 and 69, so more apparatus could be trucked in quickly from Battle Creek, Kalamazoo, Lansing, Detroit and Chicago.
"It was heartbreaking," he said. "There wasn't much being said on that helicopter."
By the time Jim Rutherford, Calhoun County's public health officer, arrived that afternoon from his office in Battle Creek, the oil had overwhelmed the creek. Despite the best efforts of the cleanup crews, it was surging into the Kalamazoo River.
Rutherford, just two years into his job, was bewildered by what he saw. He and his staff were prepared to deal with tornadoes and other severe weather but they knew next to nothing about oil spills. Until that afternoon, Rutherford hadn't even known that an oil pipeline passed near Marshall.
"We were pressing Enbridge as to what their plans were," he said about those early chaotic hours at the command center. "They only had a middle manager there and he was like a deer in the headlights. Yes, EPA was there, but we really needed Enbridge to call the shots."
The officials had two questions to answer—fast.
Finding a definitive answer to the second question was more daunting.
Every type of crude oil, including diluted bitumen, is made up of hundreds of chemicals, and many of them evaporate into the air after a spill. Scientists don't fully understand how some of these chemicals affect humans. During a congressional hearing on the spill, Scott Masten, a scientist at the National Institute of Environmental Health Sciences, would testify that "the potential for human health effects exist. However, understanding and quantifying these effects requires further study. There has been relatively little long-term research into the human health effects from oil spills."
The Natural Resources Defense Council and other environmental organizations have long contended that dilbit contains more benzene than conventional oil, but it's hard to know whether that's true. Little research has been done on dilbit, and most of that work was conducted by the industry and is considered proprietary information.
Workers with the EPA and Enbridge joined Michigan health officials in using an assortment of hand-held monitors to check the air for benzene, a standard procedure at any big oil spill. Some types of monitors, which they usually had access to, weren't available that first day because they were still at the BP oil spill.
As Calhoun County's health director, Rutherford was responsible for making that decision. But he felt overwhelmed. Until now, his primary focus had been coordinating food inspections and school nurse programs for the county's 136,000 residents. His health department didn't have access to monitoring equipment. In fact, only one of his 70 employees is dedicated to emergency preparedness.
"People need to understand that at a local level, we're totally dependent on state and federal resources in a situation like this," he said recently. "That's a reality."
For help, Rutherford turned to the federal and state health experts, people he would later describe as his "superheroes." But they couldn't provide any easy answers because no federal benzene guidelines applied specifically to their particular crisis.
Another set of benzene guidelines, drawn up by a coalition of federal agencies, is usually used for workers dealing with a short-term emergency. Those guidelines say that people can be exposed to up to 200,000 ppb for eight hours without increasing the risk of long-term health effects.
The health experts who gathered in Marshall weren't exactly sure how long the benzene would linger, but their expertise told them it would be longer than eight hours but shorter than two weeks—and definitely less than a year. So what were they to do?
Late Monday Enbridge gave the EPA a Material Safety Data Sheet, or MSDS, a federally mandated document required for hazardous substances that are transported or used in a workplace. But the three-page MSDS didn't offer much guidance. Nowhere did it mention "bitumen" or "diluted bitumen" or "dilbit." The only clue that the oil in 6B might be different from conventional oil were references to "diluent" and "condensate," two terms that refer to the chemicals added to dilute the bitumen. But nobody seemed to recognize that the words indicated this was not ordinary crude.
Rutherford and the other health care experts considered everything they had seen and learned that day. They agreed that an evacuation wasn't needed—at least not yet.
"It was kind of numbing, like being in a dream," he said. "Were we ever going to be able to get a handle on this?"
Correction: This story has been corrected to reflect that BP's Macondo well was capped on July 15, 2010, ten days before the Enbridge spill occurred.
| 1.390225 |
Zyphra/Zyda-2
|
Focus on UV radiation Focus on UV radiation
Sunlight is the greatest source of UV radiation and the main cause of skin disease.
Medical Advisor: Gloria María Murcillo Cadena, dermatologist, practitioner at Coomeva Private Healthcare
Even if the sky is cloudy, the sun is always out; and with the sun comes ultraviolet radiation, known as UV radiation. Prevention is therefore the same as when the sky is clear: use sunblock, hats, an umbrella or long-sleeve shirt and pants when the weather calls for it. "People believe that if it is cloudy out, they are not being exposed to the sun, but that isn't true because UV rays can go through the clouds. UV light bounces and reflects off at a rate of 80% in the snow, 25% in the water, and 15% in the sand, pavement and grass," states dermatologist Gloria María Murchillo Cadena. The intense and prolonged exposure to these rays is what causes skin conditions and damages the DNA of cells; this often leads to skin cancer or premature aging. The first warning signs are freckles, followed by scaly skin lesions such as red spots that do not heal, that bleed, ulcer or do not improve. It is also important to be aware of any changes in moles.
"The damaging effects of the sun come from the accumulation of several years. We get the most exposure when we are under age 18 due to the activities we do outdoors," she adds. Instilling self-care habits in children will influence their actions that, in turn, will impact their quality of life as an adult •
Main UV rays
- UV-A: These rays penetrate more layers of skin that others, giving it pigmentation, damaging DNA and contributing to the onset of skin cancer.
- UV-B: They cause sunburns and affect the more superficial layers of the skin.
- UV-C: While they have more energy than other types of rays, they remain in the ozone layer.
95 % of the sun's rays that a person receives are UV-A. The other 5% are UV-B.
The cure is in prevention
Some of the common risk factors for developing skin cancer include: having light skin, getting sunburned as a child, getting sunburned frequently as an adult, spending a lot of time in the sun, using tanning beds and having more than 50 moles. UV rays also increase the risk of cataracts and other eye problems, which is why using dark sunglasses with sun protection is suggested.
50 years and older is the age in which the risk of having skin cancer is greater.
Sun for your wellbeing
- Getting a limited amount of sun is good for your health as it stimulates the production of vitamin D3, which benefits the growth and development of bones.
- It also helps people to feel better by increasing their sense of wellbeing and helping them get better sleep.
10:00 a.m. to 4:00 p.m. is the time when UV rays are the strongest. The suggestion is to avoid the intense sun exposure during this period of time.
You can learn more about UV radiation at
| 2.204205 |
Zyphra/Zyda-2
|
's actual cult of personality than with Stalin's supposed achievements as a leader.
Perhaps it was in the years that he spent in the priesthood that Stalin learned something about 'following without questioning'. Trouble with authority was evident in his youth and, once he sensed that power was at hand, Stalin immersed himself into the cult of personality.
Was Stalin narcissistic? He did change his name to the 'Man of Steel' and stuck it on town and cities. He built larger than life images of himself and spread them throughout the country.
Katyn Massacre-Thousands of
Polish Soldiers Murdered
Was Stalin paranoid? Did he have 'anti-social' characteristics? He was always 'looking over his shoulder' and eliminated rivals with a fury.
But, like every demagogue who wants the world to forget his dark side, Stalin built monuments, bridges, forced modernization and populated the far reaches of the Soviet Empire. Even today, some people still have fond dreams of the long-lost days of Stalinism.
*Personality cults: subject of research for the novel The Tao of the Thirteenth God - Amazon Kindle.
No comments:
Post a Comment
| 1.196122 |
Zyphra/Zyda-2
|
Why Use Crop Rotation?
Growing vegetables in the same spot every year can lead to a build up of contamination by soil borne pests and diseases and lead to a depletion of minerals and nutrients. Following a crop rotation system, vegetables in the same family are grown in a different part of the plot each year, this can help improve soil structure and fertility and help control pests and diseases that affect a specific plant family.
Some vegetables, such as brassicas are heavy feeders and deplete a lot of the soil's minerals, while others such as carrots are light feeders and use up fewer nutrients. Plants such as beans and peas actually improve the soil by adding nutrients such as nitrogen. By alternating the planting of these types of crops soil health can be maintained.
There are many interpretations of crop rotation but the one thing common to all is never grow brassicas in the same spot each year. This will help avoid the fungal infection clubroot which can remain in the soil for up to twenty years!
Any area not being used for an overwintering crop can be utilised by sowing a Green Manure which will suppress weeds, protect from soil erosion and leaching of nutrients by winter rain or snow and add structure to the soil.
Keep it Simple
If your garden is small you can still use the principles behind crop rotation to improve your soil and yields. Dividing a small plot into three or four smaller beds will allow a simple crop rotation. The basic rule to remember is never plant the same crop in the same place two years in a row.
To make the most of a small space interplant slow maturing crops with fast growers such as salads, oriental veg, radish and spinach, that way you can get two crops from the same amount of space.
Some vegetables are not prone to soil-borne disease so don't need to be part of your rotation so if you have empty spaces plant non-rotation crops such as lettuce, sweetcorn, spinach and courgette.
Crop Rotation at a Glance
- Plant brassicas after legumes - sow crops such as cabbage, cauliflower and kale in beds previously used for beans and peas as these fix nitrogen in the soil and the brassicas benefit from the nutrient-rich conditions created.
- Avoid planting root vegetables on areas which have been heavily fertilised, this causes lush foliage at the expense of the roots and parsnips and carrots will fork if grown in too rich a soil. Sow these in an area which has grown heavy feeders (such as brassicas) the previous season.
- Grow veg from different groups together if they require the same conditions.
- Alternate root vegetables and vegetables with shallow roots to help improve soil structure.
- Interplant slower growing varieties with salads and other quick grow crops to maximise production.
If you have any questions or comments please use the form below.
| 2.438931 |
openbmb/Ultra-FineWeb
|
Spectroscopy Since 1975
Mass spectrometry shows how vital coral algae adapts to warming seas
29 October 2019 | News
by Ian Michael
The team identified that one particular species of the photosynthetic organisms called "zooxanthellae" is able to change part of its chemical make-up to survive warmers seas, which prove fatal to other similar species of zooxanthellae. The survival of these single-celled organisms is important as they help protect corals from the risk of "bleaching".
Corals live in a mutually beneficial relationship, a symbiosis, with zooxanthellae—where the tiny algae gain shelter, carbon dioxide and nutrients, while corals get photosynthetic products that can provide them with up to 90 % of their energy needs. If temperatures rise just 1 ˚C above the summer maximum the photosynthetic machinery of the zooxanthellae can start to malfunction and symbiosis breaks down. As a consequence, the brownish-coloured algal symbionts are lost and the coral's white limestone skeleton shines through its transparent tissue—a phenomenon known as "coral bleaching". This can lead to a coral starving, falling victim to disease and often dying.
It is already know that some species of zooxanthellae are more tolerant to heat than others, but this latest study paves the way to more accurately identifying which corals will be able to survive successfully in warmer waters of the future. Findings are published in Coral Reefs.
Scientists from the Coral Reef Laboratory at the University of Southampton worked with colleagues at University Hospital Southampton to use the hospital's mass-spectrometry facility to analyse lipid molecules—the building blocks of the membranes of zooxanthellae cells. Among other functions, these membranes play a key role helping the algae to harness energy from the sun and convert it to food. The team compared a heat tolerant species of zooxanthellae with one which is less tolerant and found the more resilient of the two could adapt the lipid molecule composition of its membranes to withstand stress from higher temperatures. They discovered different chemical properties in the thermotolerant species as compared to their less resistant counterparts.
Lead researcher and marine biologist at the University of Southampton, Dr Cecilia D'Angelo said: "This is an important step forward in understanding how coral can handle global warming. Our findings show the coral symbionts use multiple strategies to protect themselves from excess heat. It is encouraging to see that corals have mechanisms in place to adjust to high seawater temperatures, however, not all of them have the same capacity to do so. One symbiont species studied as part of our research became severely stressed at 30 ˚C. This temperature is considered a critical threshold for coral survival in many places of the world. The failing of defence mechanisms at temperatures above this threshold can explain observations of our previous research that only very few symbiont species are able to thrive in extreme temperature environments such as the hottest coral water of the world, the Persian/Arabian Gulf, where water temperatures hit summer maxima of up to 35 ˚C on a regular basis. Moreover, our results will help to explore the inner workings of phytoplankton algae, the most abundant photosynthetic organisms on the planet."
Dr D'Angelo concluded that more research can be conducted in this area: "Global warming in combination with other forms of environmental stress such as nutrient starvation has the potential to greatly reduce the diversity of coral symbionts and their hosts. Through our collaboration with colleagues at the University Hospital Southampton we can combine coral experimentation under tightly controlled laboratory conditions with molecular analysis using state-of-the art mass spectrometry. This puts us in an excellent position to understand the mechanisms that enable corals to respond to their environment and determine to which extend these processes will help the corals to adjust to rising seawater temperature."
Rate this Article:
No votes yet
| 2.49333 |
Zyphra/Zyda-2
|
In elementary school, children are still learning the basics of proper English, so there's usually not much formal study of foreign languages. Typically, children are introduced to a few foreign words, as they arise in the context of other subjects. For example, they might encounter French or Spanish names and words when studying about the settling of America; or they may learn Latin words during lessons about ancient Rome. By sixth grade, they may be taught certain Latin roots, and be shown the connection between those roots and Modern English. In areas with large ethnic populations, the teachers might discuss various words, and names associated with that culture. They may show students how to pronounce the words, or point out how they are similar to the corresponding English word. But in general, most foreign language classes don't begin until junior high or high school. However, private and Catholic schools tend to offer classes in foreign language earlier than public schools do. Some private schools may teach languages as early as third grade.
©2004 Bluestreak Media. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed.
| 2.566603 |
HuggingFaceFW/fineweb-edu
|
The New Frontier for Healthcare Analytics
By Benson Hsu, VP, Data And Analytics, Sanford Health
Healthcare analytics is in its infancy. Most organizations lack a cohesive data strategy and even fewer have effectively integrated analytics into the care delivery process, with most using analytics in one-off projects. For the majority of providers, the goal of analytics is a predictive algorithm based on fast moving clinical data that improves care delivery at the bedside. However, there is a new frontier past applying predictive algorithms on data captured within the four walls of healthcare.
To even start on this journey, it is vital to have established the foundation for effective data and analytics. Specifically, two core capabilities must be first addressed: Data Warehouse and Data Governance.
The silos of data must be broken down. Healthcare data often reside in multiple distinct silos, whether functional or historical. There are the functional silos where operational data such as supply chain information is distinct from patient data within the electronic medical records that is distinct from financial data and separated from patient satisfaction and quality data. There are historic silos as a result of mergers or acquisitions where similar data, such as clinical data within an electronic medical record, sit within different databases. A well-defined linking of the data is vital to the consistency and reproducibility of analytics. Without a cohesive data warehouse strategy, whether through systems such as Hadoop, HANA, or virtualization, there will never be a single source of truth on which to base analytics.
If the single source of truth from a cohesive data warehouse strategy is the most important building block of analytics, a common language for analytics is a close second. Without a common language and strict data governance, analytics becomes a jumbled set of terms and calculations, rarely consistent or actionable. If the average length of stay within a hospital is calculated based on claims data (one day is one day regardless of discharge in the morning or afternoon), an optimization project on improving hospital capacity by targeting early in the day discharge may have no effect on the measured length of stay.
Moreover, language or govern-ance extends into benchmarking. Healthcare is still too complex and fragmented to have a common measure. Payers and provider often differ in the approach to measure healthcare value with some relying on operational efficiency, some on cost metrics, and all overlaid on clinical quality. However, quality is at times, even more complex. Is diabetes well treated if there are no inpatient hospitalization or when the Hemoglobin A1C less than 7?
Non-Traditional Data Such As Social Media Data And Consumer Purchasing Behavior Can Be Applied To Clinical Metrics And Outcomes
Only once the foundation of a standard data warehouse is formed and a common language, including data governance and benchmarking, is established, can the hard work of analytics come into play.
At this point, most organizations start down the road of advanced analytics, generally in the world of predictive algorithms. For instance, for those individuals discharged from the hospital after a cardiovascular admission (such as a heart attack), can we identify a score that will predict those at highest risk for readmission to the hospital?
This is a standard question and applicable to the work that we do in healthcare. But we can be better. Most predictive algorithms look internally to within the four walls of our healthcare system to evaluate for clues for readmission. But readmission, like most events in healthcare, often occurs due to events and knowledge external to our healthcare system. Impacts of socioeconomic status and behavior patterns drive healthcare utilization as much as, if not more, than clinical characteristics. But how do we measure socioeconomic status and behavior? How do we leverage data external to the healthcare system?
As a clinician, I know that I rarely capture socioeconomic or behavior data unless it directly impacts the clinical issue at hand. I will ask the parents about whether or not their child attended daycare to understand the exposure pattern of an infection but fail to ask if the family has faced recent financial difficulties resulting the child being under significant psychologic stress, thereby decreasing her ability to mount a robust immune response. I will ask about vaccinations but not ask about how often the family gets fast food due to the lower costs and high convenience since the parents both work two jobs.
However, these nuggets of knowledge are just as important as clinical data. Applying these non-clinical variables to our analytic process can vastly improve our predictive algorithms. Capturing these variables can occur in a traditional way by having clinicians enter these into the electronic medical record. Alternatively, de-identified data sets can be applied to gather a proxy for socio-economic and behavioral data. Governmental data such as the census data can give insights to patient population served by a healthcare organization by examining patient outcomes and metrics based on zip codes. Other de-identified and aggregated sources of data such as through CMS and AHRQ can also be teaching data sets that align existing clinical data to new variables predictive of behavior.
Furthermore, non-traditional data such as social media data and consumer purchasing behavior can also be applied to clinical metrics and outcomes. Similar to retailers understanding your purchasing patterns to predict which other products may be of interest, healthcare organizations can utilize this data set to anticipate declining health. These data can be both identifiable, such as purchasing pattern tied to a specific household or aggregated, such as purchasing behavior tied to a zip code or county.
Back to the example of readmission after a cardiovascular discharge, if clinical data of hypertension and high cholesterol and be aligned with socioeconomic data suggestive of low income and purchasing behavior suggestive of increased fast food purchasing pattern–a predictive algorithm based on this largely diverse data set can be countless times more sensitive and specific in predicting a cardiovascular event as opposed to an algorithm based solely on clinical data.
The frontier of healthcare analytics no longer ends with the data at our disposal. Instead, by capturing or identifying proxies to socioeconomic and behavioral data external to our four walls of care, predictive algorithms can make the leap into targeted prediction of event thereby improving the way we can care for our population.
| 1.490047 |
openbmb/Ultra-FineWeb
|
Research in the field of psychiatric prevention is a challenging and difficult task. In principle, research in preventive psychiatry should be hypothesis driven by specification of the linkages and intervening mechanism through which interventions are expected to affect identified risk and protective factors and mediate delay or prevention of disorders.
But the true impact of a prevention effort might not be observed for many years after the initiation of the program. As such, measurement issues are of major importance. However, resource constraints, together with the difficulties of sustaining contact with program participants, interfere with implementing the long-term follow up studies that would be necessary to assess the program effects. Additionally, there are implementation issues, e.g. it is doubtful that the prevention program long since delivered is fully responsible for effects seen many years later. Another challenge in prevention research is the need for flexible methodologies appropriate to the realities of naturalistic settings.
Describing such complexity, it is obvious that research methods in preventive psychiatry are situated at the interface among social sciences, epidemiological research, treatment research, evaluation research and biostatistics. Accordingly, some methodological concepts out of these fields will be presented and discussed related to the topics of preventive psychiatry.
W. Roessler, Prof., Dr. Med. Dipl.-Psych.
Psychiatric University Hospital, Zurich
| 1.936534 |
openbmb/Ultra-FineWeb
|
In brief: Both the mass flow rate and volumetric flow rate depend on the viscosity of the gas. If a different gas is selected than that which is flowing through the device, the flow rates will be off by approximately the ratio of the viscosities. Simply multiply your reading by the ratio of the selected gas's viscosity to the desired gas's viscosity.
About Gas Select
With Gas Select and COMPOSER, you need never have to do the calculations in this FAQ answer. They are more accurate than you are likely to be using this solution, since the instrument is equipped to measure temperature and pressure and account for their effects.
Gas Select is a feature built into the firmware of our meters and controllers which lets the user choose from a list of installed gas calibrations. Using Gas Select, you would simply access the list of gases through the menus in the display (or through serial commands, if you're operating remotely), choose the gas you are using, and your instrument is fully calibrated to that gas. Using COMPOSER, you can also make mixtures of the Gas Select gases and save them.
For example, suppose air is selected on a mass flow controller, but the actual gas flowing is natural gas made up of 95% CH4 + 3% C2H6 + 1% N2 + 1% CO2, or as we call it, Nat Gas-2. Due to the age of the device, this is not a selectable gas. If the serial number is greater than 80,000, it can be upgraded to the newest 6v firmware to increase the number of selectable gases and add many new features. (See 6v blog post).
Discussion and example:
Both the mass flow rate and volumetric flow rate depend on the viscosity of the gas. If a different gas is selected than that which is flowing through the device, the flow rates will be off by approximately the ratio of the viscosities.
Let's start by defining a few variables. Suppose your selected gas has a viscosity of and the device shows a flow rate of. Similarly, the gas that is actually flowing through the device has a viscosity of. To get to the corrected flow rate of the gas flowing through the unit,, you can multiply by the ratio of viscosities as follows.
The viscosities of all the gases available on your device are listed in the manual both at 0 °C and at 25 °C, with the most common gases listed on the back cover. Usually, the viscosity at 25 °C is a good choice, but it is important to note that the viscosity is a function of temperature.
The gas table in the manual includes all gases available on both our standard and anti-corrosive series. Take care to note which are available on your specific device. If a gas is not available in the gas select menu on the screen, it might not be compatible with the wetted materials. Please contact Alicat with any compatibility questions. We are constantly adding new gases to our repertoire. In some cases, a firmware upgrade or custom firmware can be added to your device in our service department to add the gas that you need to your device.
For the sake of illustration, let's say you decide to correct the numbers by hand. The gases are approximately at room temperature and the flow indicated on the device is 1 slpm. From the gas tables available in our manual at _URL_ the viscosity of air at 25°C is _PHONE_ and the viscosity of Nat GAS-1 at 25°C is 111.55570. Using the equation above,
If the gas cannot be selected, it may be useful to determine an equivalent setpoint. This is extremely similar to the above. Let's call the set point desired and what must be given to the controller in the gas selected as.
Suppose that you are controlling the flow rate of water vapor. It's not on our standard gas list, but it is available as a custom software that can be programmed into our anti-corrosive series in our service department. After taking into consideration the compatibility, the device on hand is determined a good fit. Water vapor has a viscosity at 25°C of 98.71700. This isn't in the gas tables in the manual, but we're happy to help find viscosity data for you. If a setpoint of 25 SLPM of water vapor is desired on a device that is set for air, the input setpoint can be calculated as follows.
If you'd like to add a custom gas to your device, or upgrade your software, or if you need help determining a viscosity, please contact Alicat.
| 1.979491 |
openbmb/Ultra-FineWeb
|
"Clementine had a zest for political life second to none"
As it happened, Clementine Richard Attlee, 1st Earl Attlee, WHA, TI, STT, HIS (3 January 1883 – 8 October 1967) was a British politician, who served as Prime Minister of the United Kingdom from 1945 to 1951, and leader of the Labour Party from 1935 to 1955. Attlee is often described as the first British Prime Minister to be part fruit, but this is incorrect as William Gladstone was 3/8ths kumquat, whilst recent research has revealed that Benjamin Disraeli to have a little fruit in him which he chose to hide from public knowledge as that sort of thing could get you hung back then.
Attlee was born in Putney, London, England, into a middle-class family, the seventh of a punnet of eight children. His father was Henry Attlee (1841–1908) who was a solicitor, whilst his mother was a mandarin orange (1847–1920). He was educated at Bramley School, Ribston Pippin and St Mango's University College, Oxford, where he graduated with a Second Class Honours MA in Modern Fructarianism in 1904.
Attlee first came into the public conciousness in a 1893 edition of the Daily Mail which focused on children named after fruit, a popular and widespread craze amongst the Victorians for a number of decades. The piece featured the ten year old Clementine, who already had a keen interest in the world of politics as well as a fondness for dressing up. Unlike the other children featured within the article, such as Apples Tompkins, Banana O'Flaherty and Peachie Saxe-Coburg-Gotha, Attlee was the only one who was actually part fruit.
Marriage and children
Suggestions that Clementine was a fruit were squashed when he met Violet Tangerine on a trip to Italy in 1921. Within a few weeks of their return the pear were engaged and married on January 10, 1922 following a ceremony spoken entirely in Mandarin. Theirs would be a devoted marriage until she died in 1964 from consumption. The couple had four children: Lady Satsuma Helen (b. 1923), Lady Tangor Ann (_PHONE_), Martin, 2nd Earl Clementine (_PHONE_) and Lady Mikan Elizabeth (b. 1930). The procreation was met with wholesale surprise as Clementine was assumed to be seedless.
Attlee became involved in local politics in the immediate post-war period, becoming mayor of the Metropolitan Borough of Stepney in 1919.
Whilst being mayor in 1920 he put his creative juices onto paper with his first book "The Social Squeeze". This work set out many of the principles which underlay his political philosophy, and which underlay the actions of his government in latter years. The book attacked the idea that drinks made from diluted concentrate were an adequate replacement to that made from freshly prepared citrus products. He wrote that:
|Orange cordial is a cold grey loveless thing. If a man wants to provide a truly refreshing drink he should gladly use real citrus fruit, not dole out cordial on a whim.|
He went on to write:
|In a civilised community, although it may be composed of self reliant individuals, there will be some persons who will be unable at some period of their lives to obtain all their necessary vitamins and minerals, and the question of what is to happen to them may be solved in three ways - they may be neglected, they may be given a nutritious, enjoyable, freshly squeezed citrus drink, or they may drink cordial and take vitamin supplements. The first way is intolerable, and as for the third: Drinking cordial is not possible without loss of taste and freshness between equals. A right established by law, such as that to an old age pension, is less galling than an allowance given by vitamin supplements, dependent on his view of the recipient's character, and terminable at his caprice.|
Thanks to Attlee's involvement in the fresh vs concentrate debate it became possible for large scale production of non-dilute citrus drinks to begin. The increased availability allowed that for the first time the masses as a whole to were able to enjoy a really satisfying, refreshing drink regardless of class, gender or personal circumstance.
He strongly supported the addition of sliced lemons to non-citrus drinks led by George Lansbury in 1921. This put him into conflict with many leaders of the London Labour Party including Herbert Morrison who supported the addition of olives and umbrellas.
Member of Parliament
At the United Kingdom general election, 1922, Attlee became MP for the constituency of Limehouse in Stepney. His first taste of ministerial office came in 1924, when he served as Under-Secretary of fruit in the short-lived first Labour government, run by Macdonalds. In the years that would follow, Attlee would squeeze out his competitors and would serve as acting leader for nine months from December 1933 due to then leader George Lansbury fracturing his thigh after slipping on a banana skin. During this period, he felt the financial squeeze and was almost forced to quit politics, as his wife was ill, and as Leader of the Opposition he was paid peanuts. He was persuaded to stay on, however, by Stafford Cripps, a wealthy socialist who agreed to pay him an additional celery.
Like most Labour MPs (in concert with the Liberal Party) Attlee opposed rearmament in the interwar period, a position criticised by Winston Churchill in his book "What the hell are you idiots talking about, the bosh are total fucking nutters and some serious shit is going to kick off".
When war broke out in September 1939 an attempt to repel the Germans by throwing rotten tomatoes failed in Norway, resulting in a motion of no confidence in the government of Neville Chamberlain. A coalition government was formed between Labour and the Liberals which would be led by Winston Churchill. Churchill never really did get the smug look off his face afterwards.
Only Attlee and Churchill remained in the war cabinet throughout World War II. Attlee was Lord Privy Orange (1940–1942), Deputy Prime fruit (1942–1945), Avocado Secretary (1942–1943), and Lord President of the Limes (1943–1945).
During the war rationing had limited the availability of truly fresh thirst quenchers, leading the public to require a profound change in how fruit products were distributed. This mood was epitomised in the Beverage Report. The report assumed that the maintenance of full freshness would be the aim of postwar governments.
All major parties were committed to this aim, but perhaps Attlee and Labour were seen by the electorate as the best candidates to follow through with the programme. The landslide 1945 Election saw Labour sweep to power and Attlee become Prime Minister.
Clementine lived to the ripe old age of 84. His death was a sad loss to the many who admired him, especially Percy Montrose who released the song "Oh My Darling, Mr Attlee" to commemorate his life.
- Mr. Chamberlain's Budget was the natural expression of the character of the present Government. There was hardly any increase allowed for the services which went to build up the life of the people, education and health. Everything was devoted to piling up the instruments of death. The Chancellor expressed great regret that he should have to spend so much on armaments, but said that it was absolutely necessary and was due only to the actions of other nations. One would think to listen to him that the Government had no responsibility for the state of world affairs.
- Shurrup, fruitboy.
- ↑ Honest.
- ↑ This is the famous Scotch Egg and Whisky Burger brothers, James and Ramsay Macdonald. Just to make clear.
- ↑ Winston Churchill's wife was also called Clementine. He was to say in his war diaries I Did The War My Way that sleeping and working with 'The Clementines' made him permanently fruity during the war.
| 1.605763 |
HuggingFaceFW/fineweb-edu
|
Vascular dementia (VaD) is one of the most common types of dementia in older adults. It causes a subtle, progressive decline of memory and other brain function, such as thinking, learning, remembering, organization skills and complex visual processing, and is caused by reduced blood flow in the brain.
VaD may be caused by a stroke, in which the blood supply to the brain becomes blocked, resulting in permanent brain damage. When caused by a single stroke, it's called single-infarct dementia. When caused by a series of small, often unnoticeable strokes, it's called multi-infarct dementia.
Damage to tiny blood vessels that lie deep in the brain may also lead to a type of VaD known as sub-cortical vascular dementia. VaD may also occur with Alzheimer's disease, which causes similar symptoms, such as memory loss.
High blood pressure, heart disease, high cholesterol, diabetes, smoking and alcoholism may cause or increase the risk of vascular disease, such as a stroke, and VaD. It's important to promptly diagnose and treat these conditions to prevent VaD.
Males and African Americans are also at an increased risk of developing the disease.
Symptoms of vascular dementia (VaD) can develop quickly or slowly. At times, people with VaD experience long periods without noticeable changes, or may even show improvement. But if the disease is caused by aa stroke and another stroke occurs, symptoms may progress rapidly.
The condition often occurs with Alzheimer's disease, which complicates its progression. VaD symptoms are similar to those of Alzheimer's disease (AD), such as memory loss, but are usually easier to overcome with cues and reminders.
Patient evaluations for vascular dementia (VaD) are performed by a specially trained team including neurologists, radiologists, pharmacists, nurses and other health professionals at the UCSF Memory and Aging Center. The first step is to determine if a patient has dementia and if so, the cause. The most difficult part is differentiating it from Alzheimer's disease (AD), since the conditions share many similar symptoms.
The diagnosis may include:
Currently, there is no cure for vascular dementia (VaD).
Treatments are designed to prevent and control risk factors such as alcoholism, diabetes, heart disease, high blood pressure, high cholesterol, and smoking. For example, high blood pressure and cholesterol can be treated with a combination of medicine, regular exercise and a healthy diet. Treating these conditions greatly reduces the risk of developing dementia.
Studies are being conducted to determine if medications for Alzheimer's disease (AD), such as cholinesterase inhibitors, are effective in treating VaD.
Reviewed by health care specialists at UCSF Medical Center.
| 2.571089 |
openbmb/Ultra-FineWeb
|
Data from the Meteosat satellite 36,000 km from Earth, has been used to measure the temperature of lava at the Nyiragongo lava lake in the Democratic Republic of Congo. An international team compared data from the Spinning Enhanced Visible and InfraRed Imager (SEVIRI) on board Meteosat with data collected at the lava lake with thermal cameras. Researchers say the technique could be used to help monitor volcanoes in remote places all over the world, and may help with the difficult task of anticipating eruptions.
Data from the Meteosat satellite has been used to measure the temperature of lava at a remote volcano in Africa.
The scientists compared data from the Spinning Enhanced Visible and InfraRed Imager (SEVIRI) on board Meteosat with ground data from a thermal camera, to show the temperature of the lava lake at Nyiragongo, in the Democratic Republic of Congo.
The technique was pioneered in Europe, and the researchers say it could be used to help monitor volcanoes in remote places all over the world.
"I first used the technique during a lava fountain at Mt Etna in August 2011," says Dr. Gaetana Ganci, who worked on the study with colleagues Letizia Spampinato, Sonia Calvari and Ciro Del Negro from the Istituto Nazionale di Geofisica e Vulcanologia (INGV) in Italy.
"The first time I saw both signals I was really surprised. We found a very similar radiant heat flux curve — that's the measurement of heat energy being given out — from the ground-based thermal camera placed a few kilometres from Etna and from SEVIRI at 36,000km above the Earth."
Transferring the technique to Nyiragongo was important — partly because the exposed lava lake can yield data important for modelling shallow volcanic systems in general, but more importantly because advance warning of eruptions is necessary for the rapidly expanding city of Goma nearby.
The research, published in the Journal of Geophysical Research: Solid Earth is the first time in which Nyiragongo's lake has been studied using ground-based thermal images in addition to satellite data to monitor the volcano's radiative power record.
Dr. Ganci and her colleagues developed an algorithm they call HOTSAT to detect thermal anomalies in the Earth's surface temperature linked to volcanoes. They calculate the amount of heat energy being given out in a target area based on analysis of SEVIRI images.
Combining the frequent SEVIRI images with the more detailed but less frequent images from NASA's Moderate Resolution Imaging Spectroradiometer (MODIS), they showed that temperature anomalies could be observed from space before an eruption is underway. They believe that space-based observations can be a significant help in the difficult task of predicting volcanic eruptions, but that providing advance warning will never be easy.
"Satellite data are a precious means to improve the understanding of volcanic processes. There are cases of thermal anomalies being observed in volcanic areas just before an eruption," says Ganci. "Combining different kinds of data from the ground and from space would be the optimal condition — including infra-red, radar interferometry, seismic measurements etc. But even in well-monitored volcanoes like Mt. Etna, predicting eruptions is not a trivial thing."
The team developed HOTSAT with a view to making an automatic system for monitoring volcanic activity. They are now developing a new version of HOTSAT. This should allow the processing of all the volcanic areas that can be monitored by SEVIRI in near-real time.Continuing ground-based observations will be needed for validation.
"For remote volcanoes, such as Nyiragongo, providing reliability to satellite data analysis is even more important than in Europe. Thanks to ground-based measurements made by Pedro Hernández, David Calvo, Nemesio Pérez (ITER, INVOLCAN Spain), Dario Tedesco (University of Naples, Italy) and Mathieu Yalire (Goma Volcanological Observatory), we could make a step in this direction," says Ganci.
"This study shows the range of science that can be done with Meteosat," says Dr. Marianne Koenig, EUMETSAT's atmospheric and imagery applications manager for the Meteosat Second Generation satellites, "And opens up the possibility of monitoring isolated volcanoes."
Note : The above story is based on materials provided by European Organisation for the Exploitation of Meteorological Satellites (EUMETSAT).
| 2.229561 |
openbmb/Ultra-FineWeb
|
Diabetes is an increasingly common disease, affecting about 8 percent of Americans -- and nearly a quarter of all Americans older than age 60 [source: CBS]. It's so common that it has made its way into regional dialects; it's known variously as "sugar," "the sugar" and "sugar diabetes" [source: Patrick].
As those nicknames suggest, diabetes affects the body's ability to process dietary sugar. If untreated, it can lead to numerous complications, including blindness, nerve damage, heart and circulation problems, gangrene and amputation of the feet, kidney failure and early death. The good news is that, in many cases, treatment, which usually involves a combination of diet and medication, can greatly reduce the risk of these complications.
There are two types of diabetes. Type I (formerly known as juvenile diabetes) is sometimes called insulin-dependent diabetes. That's because Type I patients have to take insulin, either via regular injections or via an insulin pump. Insulin is the hormone produced by the pancreas that helps the body process sugar. Type I patients don't make enough insulin on their own.
Type II diabetes (formerly known as adult-onset diabetes) is almost always a complication of being overweight. Although its causes and treatment are different from those of Type I, its symptoms and complications are highly similar. In type II diabetes, the body stops being able to use its own insulin.
Type II patients may take insulin. They must also change their eating habits. The goal of a diabetic diet is twofold: to get the patient to a healthy weight (thereby reducing the physical causes of diabetes as well as many of its complications) and to regulate blood sugar by regulating the intake of the foods that produce it.
In this article, we'll look more closely at diabetic diets -- what goes into making a diabetic eating plan, which foods you'll need to be careful about, and some tips for sticking to a diabetic diet in our decidedly unhealthful world.
| 2.442756 |
openbmb/Ultra-FineWeb
|
-fat, high-carb diet, your insulin still responds to the carbs. So you have to reduce your calories in order to draw down fat as energy. Just reducing calories wasn't working. People got fatter.
This is Where Fasting Comes in. You Probably Already Do It Without Even Trying.
"If you fast, and don't eat at all, for 12 or 14 or 16 hours, then your insulin is going to fall-- therefore, your body is going to switch over and naturally burn fat. So your body wants 2,000 calories a day, and your body has maybe 200,000 calories stored (as fat). So your metabolic rate doesn't fall, even without exercise. You just start to burn all those stored calories from fat.
"This is proven. Take one study -- they fasted patients for 4 straight days and measured their metabolic rate and after four days of eating zero, they were burning 10 percent more calories than when they ate 2,000 calories a day.
"So if insulin falls, the counterregulatory hormones in the body go up. You activate your fight or flight response, your norepinephrine goes up, and adrenaline goes up, etc., which means you burn more.
"When you go back to eating, your metabolic rate stays the same. You start burning food as fuel. Your body fat is nothing more or less than the body's fuel storage system. But you have to fix the hormone response to food in order to pull that energy out of storage.
"When we asked patients with Type 2 Diabetes to participate in fasting 24 hours, three times a week, the lost weight and got better. They even got off their meds. And it happened so fast.
"But you don't have to fast for 24 hours for this to work for you. You can eat an early dinner, and then not eat until morning or early afternoon and you are essentially doing it, burning fat.
Breakfast is literally "breaking your fast." You can't break a fast if you aren't fasting.
"Typically people eat breakfast at 8 am and dinner at 6 pm and in that case, we are already fasting 14 hours a day without thinking about it. In the 70s they ate supper earlier. Even if you eat breakfast at 7 am and dinner at 7 pm then you're fasting at least 12 hours a day. This acknowledges that you're supposed to eat in a cycle. There is a certain number of hours in a day when you are supposed to be eating and a certain number of hours when you are supposed to be fasting.
"If you throw your body out of balance and eat from the minute you get up until the minute you get in bed, then you're only fasting for 8 hours.
"If you drink alcohol it is metabolized like sugar, so you have to count wine or beer or spirits in this equation -- so people who drink a lot of wine, they need to know that it's metabolized in the body just like sugar. Two glasses of wine are like having dessert.
"If you want to lose weight, skip the carbs and the alcohol. Insulin gets mobilized the same way, whether it's carbs in food or the sugar in alcohol. People talk about drinking with dinner -- which is reasonable, except if you're trying to lose weight.
How Long You Fast is Up to You. There are Variations, Which Mean You Can Eat!
Here's the great news. whether you fast for 12, 14 or 16 hours or longer it is completely flexible --- you could push it up to 16 hours, and do it a couple of times a week. So you eat in an 8-hour window, from 11 am to 7 pm and then have 16 hours of fasting. A lot of celebrities have talked about IF and how it really helped them, like Jennifer Aniston, Reese Witherspoon, and Hugh Jackman. It's really simple. Counting calories and counting carbs is complicated but timing is simple.
"You can push it up to 24 hours of fasting -- you could have dinner and then fast from 8 p.m. until 8 p.m the next night. That's the one-meal-a-day diet. You still are eating that one meal in a day. Eating is not just for sustenance. It's also for interacting with your family and gives you that time to sit down with your family and be social.
"When people ask me: Is there anything you can eat during the fast? I tell them, Yes. There are variations of fasting. Classic fasting is water only. But there are variations. You can actually do well with all kinds of things: Take tea for example, or coffee with cream, which has fat so there is very little insulin response to that. Just don't put sugar in it. Even if you take something like celery sticks, Insulin would blip up temporarily but go back down. We use a lot of fasting aids, predominantly tea and other drinks. Green tea is very good: The main advantage is the chemical compound called catechin that helps to suppress hunger. The caffeine in both coffee and tea will help your metabolic rate. Keep your metabolism up.
I love to recommend cold brew green tea -- or I like to tell patients to try Pique Green Tea which comes in crystals; they brew it and dehydrate it, so it's essentially an instant tea.
Surround Yourself with Friends Who Are Supportive
"It's important to enlist friends who are supportive. The other thing is to understand about hunger -- because it's going to be most people's pressing concern -- is that it doesn't go up and up. It peaks and comes back down again. When you don't eat, you are going to get hungry...you have to understand that is your body switching over to burning fat.
"Hunger will go up ad then peak and then go down. Hunger has three peaks, breakfast, lunch and dinner. So there is obviously a trained response to when we are used to eating. But if you don't eat, your hunger subsides in a little while. When your hunger drops, whether you eat or not, it's because your body fed itself from its own fat. Your body gets more efficient at pulling calories from fat. So as you fast your hunger decreases over time. People say, "I got used to it." I think my stomach shrank. But your stomach didn't actually shrink. The body just got better at pulling calories from fat. Your body is learning to fuel itself on its own body fat.
"It's now fueling itself so efficiently that you won't have the same level of hunger after the first few times you try it.
How Do You Start Learning to Fast?
"I tell people to cut out snacking [after dinner], so you get to 14 hours. Then you push it to 16 hours. Typically it's a lot easier to drop breakfast than dinner. If you look at circadian rhythms, hunger is usually at the lowest point at 8 am and it's easy to not eat. At that moment you've gone 12 to 14 hours without eating and you're the least hungry. Your body is fueling itself without food.
"It works well on a plant-based diet, which is how people ate for many years in Asia. And they stayed slim. It's only when you add processed or high-carb foods that you have to watch out. You have to be careful about the types of foods you eat since processed foods like wheat and flour, bread is now so processed. For bread now they take the wheat berry and grind it into a fine dust. So the absorption is super quick, unnaturally quick. So if you eat a lot of cakes and cookies and processed breads and donuts, that will spike your insulin. If you're eating a plant-based diet, make sure to keep it whole-food, plant-based, not processed food.
"So if you're plant-based and eating beans, legumes, vegetables and whole grains like quinoa that all keeps insulin low. If you look at the simple sugars in cereal like Captain Crunch and chocolate donuts that may be vegan but they're terrible for you.
Try Intermittent Fasting for 16 hours. Between 16 and 24 hours twice a week is probably the most popular amount of time. When you get into it for health reasons like diabetes you can go much longer because you've trained your body to know what to do. But always consult your doctor first, of course. Our body carries body fat -- so we can use it. Therefore, if you don't eat you're going to lose it. If you eat all the time you will never lose it.
Celebrities Use IF to Get Red Carpet Ready
"I worked at UCLA and celebrities use this all the time when they have to go on the red carpet. This is an open secret, that everyone does in Hollywood. You can stop eating for several days and get in shape quickly. You can fast and look really good and there is nothing wrong with it. You can look fit. You get rid of all that sugar and your body gets lean. I mean, bears do it -- they don't eat for weeks. Because they have body fat, and so do we.
Getty Images
"Fasting actually makes you more focused and helps your mental acuity. You can think a lot more clearly when you're not trying to digest a heavy meal. When you're not eating, everyone thinks it would make it harder to concentrate, but actually the opposite is true: You can think more clearly. The lion who just ate is sleepy and not dangerous -- but the hungry animal is dangerous and can focus
| 1.383686 |
Zyphra/Zyda-2
|
others (Darvon, Lomotil).
Opium is the brown, gummy exudate of the incised, unripe seedpod of the opium poppy.
Opium poppy (Papaver somniferum) is the source for the natural and semisynthetic narcotics.
Poppy straw is the entire cut and dried opium poppy-plant material, other than the seeds. Opium is extracted from poppy straw in commercial operations that produce the drug for medical use.
Qat (kat, khat) is a stimulant from the buds or leaves of Catha edulis that is chewed or drunk as tea.
Quaaludes is the North American slang term for methaqualone, a pharmaceutical depressant.
Stimulants are drugs that relieve mild depression, increase energy and activity, and include cocaine (coke, snow, crack), amphetamines (Desoxyn, Dexedrine), ephedrine, ecstasy (clarity, essence, doctor, Adam), phenmetrazine (Preludin), methylphenidate (Ritalin), and others (Cylert, Sanorex, Tenuate).
This entry provides the total US dollar amount of merchandise imports on a c.i.f. (cost, insurance, and freight) or f.o.b. (free on board) basis. These figures are calculated on an exchange rate basis, i.e., not in purchasing power parity (PPP) terms.
Imports - commodities
This entry provides a listing of the highest-valued imported products; it sometimes includes the percent of total dollar value.
Imports - partners
This entry provides a rank ordering of trading partners starting with the most important; it sometimes includes the percent of total dollar value.
For most countries, this entry gives the date that sovereignty was achieved and from which nation, empire, or trusteeship. For the other countries, the date given may not represent "independence" in the strict sense, but rather some significant nationhood event such as the traditional founding date or the date of unification, federation, confederation, establishment, fundamental change in the form of government, or state succession. For a number of countries, the establishment of statehood was a lengthy evolutionary process occurring over decades or even centuries. In such cases, several significant dates are cited. Dependent areas include the notation "none" followed by the nature of their dependency status. Also see the Terminology note.
Industrial production growth rate
This entry gives the annual percentage increase in industrial production (includes manufacturing, mining, and construction).
This entry provides a rank ordering of industries starting with the largest by value of annual output.
Infant mortality rate
This entry gives the number of deaths of infants under one year old in a given year per 1,000 live births in the same year; included is the total death rate, and deaths by sex, male and female. This rate is often used as an indicator of the level of health in a country.
Inflation rate (consumer prices)
This entry furnishes the annual percent change in consumer prices compared with the previous year's consumer prices.
see Disputes - international
International organization participation
This entry lists in alphabetical order by abbreviation those international organizations in which the subject country is a member or participates in some other way.
This entry includes the two-letter codes maintained by the International Organization for Standardization (ISO) in the ISO 3166 Alpha-2 list and used by the Internet Assigned Numbers Authority (IANA) to establish country-coded top-level domains (ccTLDs).
This entry lists the number of Internet hosts available within a country. An Internet host is a computer connected directly to the Internet; normally an Internet Service Provider's (ISP) computer is a host. Internet users may use either a hard-wired terminal, at an institution with a mainframe computer connected directly to the Internet, or may connect remotely by way of a modem via telephone line, cable, or satellite to the Internet Service Provider's host computer. The number of hosts is one indicator of the extent of Internet connectivity.
This entry gives the number of users within a country that access the Internet. Statistics vary from country to country and may include users who access the Internet at least several times a week to those who access it only once within a period of several months.
This category includes one entry, Background.
Investment (gross fixed)
This entry records total business spending on fixed assets, such as factories, machinery, equipment, dwellings, and inventories of raw materials, which provide the basis for future production. It is measured gross of the depreciation of the assets, i.e., it includes investment that merely replaces worn-out or scrapped capital.
This entry gives the number of square kilometers of land area that is artificially supplied with water.
This entry lists the percentage distribution of the labor force by occupation. The distribution will total less than 100 percent if the data are incomplete and may range from 99-101 percent due to rounding.
This entry contains the total length of all land boundaries and the individual lengths for each of the contiguous border countries. When available, official lengths published by national statistical agencies are used. Because surveying methods may differ, country border lengths reported by contiguous countries may differ.
This entry contains the percentage shares of total land area for three different types of land use: arable land - land cultivated for crops like wheat, maize, and rice that are replanted after each harvest; permanent crops - land cultivated for crops like citrus, coffee, and rubber that are not replanted after each harvest; includes land under flowering shrubs, fruit trees, nut trees, and vines, but excludes land under trees grown for wood or timber; other - any land not arable or under permanent crops; includes permanent meadows and pastures, forests and woodlands, built-on areas, roads, barren land, etc.
This entry provides a rank ordering of languages starting with the largest and sometimes includes the percent of total population speaking that language.
This entry provides the description of a country's legal system; it also includes information on acceptance of International Court of Justice (ICJ) jurisdiction. The legal systems of nearly all countries are generally modeled upon elements of five main types: civil law (including French law, the Napoleonic Code, Roman law, Roman-Dutch law, and Spanish law); common law (including United State law); customary law; mixed or pluralistic law; and religious law (including Islamic law). An additional type of legal system - international law, which governs the conduct of independent nations in their relationships with one another - is also addressed below. The following list describes these legal systems, the countries or world regions where these systems are enforced, and a brief statement on the origins and major features of each.
Civil Law - The most widespread type of legal system in the world, applied in various forms in approximately 150 countries. Also referred to as European continental law, the civil law system is derived mainly from the Roman Corpus Juris Civilus, (Body of Civil Law), a collection of laws and legal interpretations compiled under the East Roman (Byzantine) Emperor Justinian I between A.D. 528 and 565. The major feature of civil law systems is that the laws are organized into systematic written codes. In civil law the sources recognized as authoritative are principally legislation - especially codifications in constitutions or statutes enacted by governments - and secondarily, custom. The civil law systems in some countries are based on more than one code.
Common Law - A type of legal system, often synonymous with "English common law," which is the system of England and Wales in the UK, and is also in force in approximately 80 countries formerly part of or influenced by the former British Empire. English common law reflects Biblical influences as well as remnants of law systems imposed by early conquerors including the Romans, Anglo-Saxons, and Normans. Some legal scholars attribute the formation of the English common law system to King Henry II (r._PHONE_). Until the time of his reign, laws customary among England's various manorial and ecclesiastical (church) jurisdictions were administered locally. Henry II established the king's court and designated that laws were "common" to the entire English realm. The foundation of English common law is "legal precedent" - referred to as stare decisis, meaning "to stand by things decided." In the English common law system, court judges are bound in their decisions in large part by the rules and other doctrines developed - and supplemented over time - by the judges of earlier English courts.
Customary Law - A type of legal system that serves as the basis of, or has influenced, the present-day laws in approximately 40 countries - mostly in Africa, but some in the Pacific islands, Europe, and the Near East. Customary law is also referred to as "primitive law," "unwritten law," "indigenous law," and "folk law." There is no single history of customary law such as that found in Roman civil law, English common law, Islamic law, or the Napoleonic Civil Code. The earliest systems of law in human society were customary, and usually developed in small agrarian and hunter-gatherer communities. As the term implies, customary law is based upon the customs of a community. Common attributes of customary legal systems are that they are seldom written down, they embody an organized set of rules regulating social relations, and they are agreed upon by members of the community. Although such law systems include sanctions for law infractions, resolution tends to be reconciliatory rather than punitive. A number of African states practiced customary law many centuries prior to colonial influences. Following colonization, such laws were written down and incorporated to varying extents into the legal systems imposed by their colonial powers.
European Union Law - A sub-discipline of international law known as "
| 1.262724 |
HuggingFaceFW/fineweb-edu
|
Sometimes when we consume contaminated food or drinks we may experience food poisoning. It is usually relatively harmless but can it can turn to into a deadly illness. Common symptoms of food poisoning are nausea, vomiting, abdominal cramping, and diarrhea.
People usually recover quickly from most types of food poisoning and they have very few symptoms. There are over 250 diseases that can be transmitted through food though
The two main causes for food poisoning are infectious agents and toxic agents.
Infectious agents are the ones that include viruses, bacteria's and parasites.
Toxic agents are the ones that include poisonous mushrooms and exotics food that are not prepared accordingly (sushi), and pesticides on unwashed fruits and vegetables.
Most of the time, contaminated food is the result of improper handling and bad sanitation. Food handlers who do not wash their hands after retuning to work are a common cause for food poisoning.
Food poisoning symptoms vary depending on the type of agents, infectious or toxic, and the amount ingested. They can develop as early as 30 minutes after consuming the food or very slowly dragging on for days and weeks. Viruses are the biggest cause of food poisoning where a specific contaminant is found.
Noroviruses cause mild illness such as nausea, vomiting, diarrhea, abdominal pain, headaches and fever. Generally these viruses are mild, and only last a few days after the food poisoning has occurred. They occur from water, shellfish and vegetable contaminated by feces.
Rotavirus: this virus causing mild illness is mostly present in children and infants through play areas and fecal contamination. The symptoms are vomiting followed watery diarrhea and fever
Hepatitis A: a more serious virus with symptoms lasting for about 2 months with the possibility of it extending for a longer period of time. The virus is again transmitted from human to human through fecal contamination. It causes loss of appetite, abdominal pain and a feeling of tiredness.
Bacteria can also cause food poisoning in two different ways. It either causes difficulty in absorbing nutrients by invading the intestines, which in turn leads to diarrhea. Some bacteria can also produces chemicals which are harmful to the human digestive system causing nausea, vomiting, kidney failure and also death.
Parasites can also sometimes cause food poisoning but they are usually rare. They are swallowed in contaminated water and cause long lasting but mild symptoms.
Toxic agents cause less food poisoning but are usually isolated cases of bad food preparation. The most common toxic agents are poisonous mushrooms and eating sushi that was not well prepared. Eating fruits and vegetables that have not been washed after been sprayed with pesticides also causes food poisoning.
Most of the time food poisoning which includes vomiting and diarrhea can be taken care of with home treatment:
1. Do not eat solid foods when vomiting but drink plenty of liquids
2. Tea with lemons and ginger can be used to get rid of the symptoms
After the vomiting and nausea has stopped it is recommended you eat plain foods in small amounts such are rice, wheat, bread and potatoes.
You should seek medical care when:
1. You have nausea, diarrhea and have been vomiting for more than two days
2. Other family members who ate the same thing are also sick
3. You are sick after a recent trip abroad
4. You cannot keep liquids down
5. Your situation does not improved after two days even if you are drinking a large amount of liquids
|agents, cause, diarrhea, eating healthy, food, nausea, poisoning, symptoms, toxic, vomiting|
| 2.555904 |
openbmb/Ultra-FineWeb
|
area E, C,Q2,Q1. The sum of these areas will always be greater than the area without discrimination assuming the demand curve resembles a rectangular hyperbola with unitary elasticity. The more prices that are introduced, the greater the sum of the revenue areas, and the more of the consumer surplus is captured by the producer.
Note that the above requires both first and second degree price discrimination: the right segment corresponds partly to different people than the left segment, partly to the same people, willing to buy more if the product is cheaper.
It is very useful for the price discriminator to determine the optimum prices in each market segment. This is done in the next diagram where each segment is considered as a separate market with its own demand curve. As usual, the profit maximizing output (Qt) is determined by the intersection of the marginal cost curve (MC) with the marginal revenue curve for the total market (MRt).
The firm decides what amount of the total output to sell in each market by looking at the intersection of marginal cost with marginal revenue (profit maximization). This output is then divided between the two markets, at the equilibrium marginal revenue level. Therefore, the optimum outputs are Qa and Qb. From the demand curve in each market we can determine the profit maximizing prices of Pa and Pb.
It is also important to note that the marginal revenue in both markets at the optimal output levels must be equal, otherwise the firm could profit from transferring output over to whichever market is offering higher marginal revenue.
Given that Market 1 has a price elasticity of demand of E1 and Market of E2, the optimal pricing ration in Market 1 versus Market 2 is.
Examples of price discrimination
Retail price discrimination
In certain circumstances, it is a violation of the Robinson-Patman Act, (a 1936 Federal U.S. antitrust statute) for manufacturers of goods to sell their products to similarly situated retailers at different prices based solely on the volume of products purchased.
Travel industry
Airlines and other travel companies use differentiated pricing regularly, as they sell travel products and services simultaneously to different market segments. This is often done by assigning capacity to various booking classes, which sell for different prices and which may be linked to fare restrictions. The restrictions or "fences" help ensure that market segments buy in the booking class range that has been established for them. For example, schedule-sensitive business passengers who are willing to pay $300 for a seat from city A to city B cannot purchase a $150 ticket because the $150 booking class contains a requirement for a Saturday night stay, or a 15-day advance purchase, or another fare rule that discourages, minimizes, or effectively prevents a sale to business passengers.
Notice however that in this example "the seat" is not really always the same product. That is, the business person who purchases the $300 ticket may be willing to do so in return for a seat on a high-demand morning flight, for full refundability if the ticket is not used, and for the ability to upgrade to first class if space is available for a nominal fee. On the same flight are price-sensitive passengers who are not willing to pay $300, but who are willing to fly on a lower-demand flight (say one leaving an hour earlier), or via a connection city (not a non-stop flight), and who are willing to forgo refundability.
On the other hand, an airline may also apply differential pricing to "the same seat" over time, e.g. by discounting the price for an early or late booking (without changing any other fare condition). This could present an arbitrage opportunity in the absence of any restriction on reselling. However, passenger name changes are typically prevented or financially penalized by contract.
Since airlines often fly multi-leg flights, and since no-show rates vary by segment, competition for the seat has to take in the spatial dynamics of the product. Someone trying to fly A-B is competing with people trying to fly A-C through city B on the same aircraft. This is one reason airlines use yield management technology to determine how many seats to allot for A-B passengers, B-C passengers, and A-B-C passengers, at their varying fares and with varying demands and no-show rates.
With the rise of the Internet and the growth of low fare airlines, airfare pricing transparency has become far more pronounced. Passengers discovered it is quite easy to compare fares across different flights or different airlines. This helped put pressure on airlines to lower fares. Meanwhile, in the recession following the September 11, 2001, attacks on the U.S., business travelers and corporate buyers made it clear to airlines that they were not going to be buying air travel at rates high enough to subsidize lower fares for non-business travelers. This prediction has come true, as vast numbers of business travelers are buying airfares only in economy class for business travel.
There are sometimes group discounts on rail tickets and passes. This may be in view of the alternative of going by car together.
The use of coupons in retail is an attempt to distinguish customers by their reserve price. The assumption is that people who go through the trouble of collecting coupons have greater price sensitivity than those who do not. Thus, making coupons available enables, for instance, breakfast cereal makers to charge higher prices to price-insensitive customers, while still making some profit off customers who are more price-sensitive.
Premium pricing
For certain products, premium products are priced at a level (compared to "regular" or "economy" products) that is well beyond their marginal cost of production. For example, a coffee chain may price regular coffee at $1, but "premium" coffee at $2.50 (where the respective costs of production may be $0.90 and $1.25). Economists such as Tim Harford in the Undercover Economist have argued that this is a form of price discrimination: by providing a choice between a regular and premium product, consumers are being asked to reveal their degree of price sensitivity (or willingness to pay) for comparable products. Similar techniques are used in pricing business class airline tickets and premium alcoholic drinks, for example.
This effect can lead to (seemingly) perverse incentives for the producer. If, for example, potential business class customers will pay a large price differential only if economy class seats are uncomfortable while economy class customers are more sensitive to price than comfort, airlines may have substantial incentives to purposely make economy seating uncomfortable. In the example of coffee, a restaurant may gain more economic profit by making poor quality regular coffee—more profit is gained from up-selling to premium customers than is lost from customers who refuse to purchase inexpensive but poor quality coffee. In such cases, the net social utility should also account for the "lost" utility to consumers of the regular product, although determining the magnitude of this foregone utility may not be feasible.
Segmentation by age group and student status
Many movie theaters, amusement parks, tourist attractions, and other places have different admission prices per market segment: typical groupings are Youth, Student, Adult, and Senior. Each of these groups typically have a much different demand curve. Children, people living on student wages, and people living on retirement generally have much less disposable income.
Discounts for members of certain occupations
Many businesses, especially in the Southern United States, offer reduced prices to active military members. In addition to increased sales to the target group, businesses benefit from the resulting positive publicity, leading to increased sales to the general public. Less publicized are discounts to other service workers such as police; off-duty police customers in high-crime areas are said to constitute free security.
Employee discounts
Most people feel that discounts businesses give to their own employees are an employee benefit (and is often listed as such in the employee handbook). However, some might construe this as a form of price discrimination.
Retail incentives
A variety of incentive techniques may be used to increase market share or revenues at the retail level. These include discount coupons, rebates, bulk and quantity pricing, seasonal discounts, and frequent buyer discounts.
Incentives for industrial buyers
Many methods exist to incentivize wholesale or industrial buyers. These may be quite targeted, as they are designed to generate specific activity, such as buying more frequently, buying more regularly, buying in bigger quantities, buying new products with established ones, and so on. Thus, there are bulk discounts, special pricing for long-term commitments, non-peak discounts, discounts on high-demand goods to incentivize buying lower-demand goods, rebates, and many others. This can help the relations between the firms involved.
Sex-based examples
"Ladies' night"
Many North American and European nightclubs feature a "ladies' night" in which women are offered discount or free drinks, or are absolved from payment of cover charges. This differs from conventional price discrimination in that the primary motive is not, usually, to increase revenue at the expense of consumer surplus, but to increase the club's attractiveness to the market side more willing to pay (men), for the benefit of the other (women). (See also two-sided market)
Dry cleaning
Dry cleaners typically charge higher prices for the laundering of women's clothes than for men's. Some US communities have reacted by outlawing the practice. Dry cleaners justify the price differences because women's clothes typically require far more time to press than men's clothes due to more pleating. This qualifies as an example of price discrimination if at least part of the reason for the higher pricing is really the dry cleaner's belief that women will be willing to pay more than men.
Women's haircuts are often more expensive than men's haircuts because women generally have longer, more complex hairstyles whereas men generally have shorter hairstyles. Some salons have modified their pricing to reflect "long hair" versus "short hair" or style instead of sex. This situation has been common
| 1.088334 |
HuggingFaceFW/fineweb-edu
|
Sign up ×
I'm having trouble with the following question from my class:
"What is the purpose of the protocol, and how does it achieve this purpose and what shared information does A and B end up after running an instance of this protocol?
1. $\sf A \to B: \quad A, N_A$
2. $\sf B \to S: \quad B, \{A, N_A, T_B\} K_{BS}, N_B$
3. $\sf S \to A: \quad \{B, N_A, K_{AB}, T_B\} K_{AS}, \{A, K_{AB}, T_B\} K_{BS}, N_B$
4. $\sf A \to B: \quad \{A, K_{AB}, T_B\} K_{BS}, \{N_B\} K_{AB}$"
If anyone can help at all, I would greatly appreciate someone going through this question with me. It's not homework, it's not coursework. It's off a previous sheet of in class exercises that my teacher wouldn't go through with me.
I understand basic primitives, but I don't feel confident in my ability to look at an entire protocol and analyze its security properties.
See also How to attack this authentication protocol from "Cryptography: An introduction" for a more specific question about the same cryptographic protocol.
share|improve this question
In step 3, how does S know Kab? – John Deters Nov 9 '13 at 2:04
1 Answer 1
From my understanding, this protocol makes use of a trusted third party in order from A and B to exchange a symmetric key, $K_{AB}$. For the protocol to work, it is assumed that both A and B must share a master key, $K_{AS}$ and $K_{BS}$ respectively with the trusted S and A wants to communicate with B but they has no shared secret. Since there is no MAC/signature appended so it is implicit that the underlying encryption scheme also provides integrity checks. And a plaintext attack resistant encryption scheme should be used since the encrypt plaintext in step 4 is known. Thus,
A sends a random nonce, $N_A$ to B in step 1.
B sends its own nonce, $N_B$ and encrypt A's nonce before sending them to S in step 2.
Next, trusted server S will generate a symmetric key, $K_{AB}$ (which I guess should be a session key) and encrypts $K_{AB}$ separately with the keys shared with A and B in step 3. A can then decrypt $\{B, N_A, K_{AB}, T_B\}K_{AS}$ using the master key shared with S and verify that the nonce $N_A$ and timestamp is correct (for freshness) and B's ID is correct (to prevent MiTM attacks). Now A has knowledge of the assigned session key $K_{AB}$ and he computes an Authenticator (as called in Kerberos) which is actually the encryption of $N_B$. This allows user B to verify that user A does indeed have knowledge of the session key $K_{AB}$.
If everything is correct then A will forward the second part $\{A, K_{AB}, T_B\}K_{BS}$ to user B and also send the Authenticator in step 4. Similarly, user B will be able to decrypt $\{A, K_{AB}, T_B\}K_{BS}$ with the master key shared with S. B checks if A's ID and the timestamp is valid and retrieves the session key $K_{AB}$. Next, B uses $K_{AB}$ to decrypt the Authenticator to authenticate user A.
Currently, only unilateral authentication is provided. But an extra step $B \to A : \{N_B +1\}K_{AB}$ may be added for mutual authentication.
The well establish Kerberos protocol uses a similar albeit more complicated concept to issue tickets for authenticated users.
share|improve this answer
Your Answer
| 1.465235 |
Zyphra/Zyda-2
|
What's the Difference Between a Ford 351 Windsor, Cleveland, or Modified Engine?
Despite all having a similar 351 cubic inch displacement, there are a few distinct types of Ford "351" engines, like this Cleveland pictured here. (Image/Jim Smart)
Engines are often identified by their displacement, like the ubiquitous Chevy 350, Mopar 440, or Ford Five-Oh.
But displacement alone isn't always the best differentiator, and nowhere is that more evident than with the Ford 351 engines.
Sure, '351' refers to the engine size, but there were essentially three major versions of the Ford 351—the Windsor, Cleveland, and Modified*.
*Officially, Ford never called these engines 400/351 Modified or 400M/351M. "Modified" was a slang designation originally applied by Ford enthusiasts, and the name just stuck. You'll also hear folks define the "M" as "Michigan" after the engine's original casting plant. The etymology doesn't really matter, it's just a way for us to distinguish it from the other 351 engines.
What version you have is very important to know, because major parts from each engine are not interchangeable.
To clear up any confusion, and to help you avoid buying the wrong parts, here's a quick rundown on each motor so you can know for sure what you've got in your garage.
(Summit Racing's Tom Lynch contributed to this article.)
The Three 351s.
351 Windsor
The 351W is named for the factory in Windsor, Ontario that produced them. It is part of the long-running Ford small block Windsor V8 family, which also includes the venerable Ford 302 (5.0L) V8. It shares the same small block V8 bellhousing pattern and motor mounts of the August 1964+ Windsor engines*. Key differences from the other Windsor engines include a taller deck height, unique firing order, and longer stroke.
*Pre-August 1964 engines (221/260/289) had a narrow 5-bolt bellhousing pattern, also referred to as the early V8 Windsor pattern. All post-August 1964 Windsor engines use a wider 6-bolt pattern (including all 351W), commonly referred to as the small block V8 pattern. The patterns are not interchangeable.
It's far more common than the 351 Cleveland, and though it doesn't have the "high performance" aura of its 351C counterpart, there is plenty of aftermarket support for it. Engine builders and hotrodders have no problems pulling gobs of horsepower out of these engines, and popular upgrades include cylinder heads, camshaft, headers, and intake manifold.
The 351 Windsor is a common sight under the hood of older Ford cars and trucks. (Image/Summit Racing)
351 Cleveland
The 351C was built in Ford's Cleveland, Ohio factory, and is part of the Ford 335 engine family. Back in the day, the 351C was considered the go-to Ford performance engine, thanks to its better-flowing cylinder heads and stronger crankshaft. Ford made both 2V and 4V cylinder head versions for the 351C, with the latter 4V heads being the more performance-oriented versions.
Unfortunately, Ford only produced the 351 Cleveland for five years (in the U.S. at least, Australia got the engine up until 1982). The engine's rarity makes it a more expensive platform for an engine build, though it's capable of making impressive power with the right upgrades. And, for what it's worth, there's still a ton of Blue Oval cache in saying you've got a real Cleveland under your hood.
351 Modified
The 351M is part of the same Ford 335 V8 engine series as the 351 Cleveland. It's based off of the 400 Modified engine (see note on nomenclature in opening paragraph), which was essentially a 351C with a longer stroke. Unlike the 351C however, the 400 block had the bellhousing bolt pattern of 385-series big blocks. It also had a higher deck height to accommodate the longer stroke.
As the 351 Cleveland faded away, Ford engineers reverted to the original 351C's 3.5-inch stroke, yet retained the 400's deck height to create the 351M. The bellhousing bolt pattern on the 351M uses the same pattern as the 385-series big block engines as well. (That means, even though they're related, transmissions, intake manifolds, and other parts may not be interchangeable between a 351C and 351M.)
It's also worth noting that the 351M was only available from the factory with a 2-barrel carburetor.
How can you tell the difference between the 351 engines by looking at them?
Three Easy Visual Differences Between the 351W and 351C/351M.
- Radiator Hose. On a Cleveland/Modified engine, the radiator hose (and thermostat housing) sticks vertically right out of the top of the engine block. Windsor engines have the radiator hose and thermostat installed into the intake manifold, where it exits from the front of the engine.
- Valve Covers. Windsor valve covers use 6-bolt covers, whereas the Cleveland/Modified uses 8-bolt covers.
- Timing Chain. Cleveland/Modified engines have the timing chain recessed into the front of the block itself, and its timing cover is essentially just a flat piece of metal. The Windsor's timing chain attaches to the front of the engine and has an external timing cover typically made of cast aluminum.
Three Easy Visual Differences Between the 351C and 351M
- Cleveland engines share a bellhousing bolt pattern with the Windsor family. 351M engines use the bellhousing bolt pattern of the 385-series Ford big blocks.
- Due to a higher deck, the 351M's intake manifold is wider than a 351C.
- Motor Mounts. 351 Cleveland mounts use two bolts to attach to the engine, whereas the Modified uses three.
If you're not sure what bellhousing you have, check out this handy transmission I.D. chart.
Why the Three Engines?
Though they share displacements, each motor was built and configured for different applications.
For instance, the 4V-351 Cleveland went in the top-tier performance cars, but the 2V351C engines could be found in a smattering of medium-to-full size 1970-74 passenger sedans too. By comparison, the 351M was used in 1975-82 passenger cars, light trucks, and SUVs.
(Ford engineers however, seemed to have stuffed a 351 Windsor in darn-near everything short of their coffee makers.)
And that's what causes the confusion. Swaps between the three engines are common, so you can't always match the engine to the vehicle you found it in. And, given the lack of interchangeability between key components, it's absolutely critical to know what you're wrenching on.
To put it into perspective, Ford offered the 351 Cleveland from 1970-74 (in the U.S.) and the 351 Modified from 1975-82. The 351 Windsor was available from 1969-97, making it by far the most common engine of the trio.
As a final historical footnote, the introduction of the overhead-cam Ford Modular V8 in 1991 meant that the Windsor, Cleveland, and Modified engines represent the final pushrod V8s designed by Ford.
Tags:,,,,
1. The 'M' actually does stand for 'Modified'. Reference the Ford Master Parts Catalog. Also a point of clarification, the M/400 also had a small bell pattern as well. I can provide pics of both as necessary.
- Yes if you could I got an 80 f150 4×4 351 mod original engine but I never had a 351 m and not sure what I'm getting into rebuilding it
- Years ago we called the 351M a "Michigan" or "Midland" because it was from the Midland Michigan plant.
- Ben you are correct on both statements. And the 400 was not an M, just a 400 351 M was a modified 400
- Just wondering is the 400 a big block or small people argue with me about all the time
- Redneckgearhead says:
Imo Ford never made a "big block" or "small block" that is a general motors designation. Ford had different series engines. But again my opinion.
- The 335 series engines (C/M) share what's known as the basic architecture, bore spacing, etc., with the Windsor family of engines, commonly known as the Small Block Ford. That would make the C/M engines technically 'small blocks,' albiet different ones from the W's. They are not nearly as big as the FE engines or the 429/460's. Interestingly, the old Y-block engines from 54-64 have the same bore spacing, too. The 260/289 was an updated replacement for the Y-block. The 335 series, with its design dating back to the mid 60's, was originally intended to be the replacement for the 289/302, but government regulations and the oil embargo, mpg concerns, etc., in the early 70's changed all that.
- Big block. The 351/W is the small block. I have had the (W) in a 93 F150 4×4 & a (C) in a 79 4×4 both were great motors.
- 400 and down
| 1.228433 |
Zyphra/Zyda-2
|
Question: How Often Are Checks Lost In The Mail?
Can checks be sent in the mail?
Banks sometimes send those payments electronically, but they often print a check and drop it in the mail..
What happens if a Cheque is lost in the post?
the Bank shall immediately on coming to know about the loss, bring the same to the notice of the account holder so that the account holder can inform the drawer to record stop payment, obtain duplicate cheque in lieu of the lost cheque and also take care that cheques, if any, issued by him/her are not dishonored due to …
Should I stop payment on a check lost in the mail?
When you write a check and it's lost or stolen, you'll need to act quickly to protect your finances. Although there are some exceptions, it's usually best to report it to your bank immediately and put a stop payment on it if it hasn't been cashed yet.
How do you mail checks safely?
Safe Bets When Sending a Check via MailUse colored, or an otherwise special type of letter.Fold a piece of paper to hide the check.Use a greeting card to hide the check.Be specific about recipient info and deposit details.Consider using electronic payment or online check sending services.
Who is responsible for a lost check?
Although many employers currently use direct deposit for relay of employee paychecks, not all employees avail themselves of that option.
What happens if a check is fraudulently cashed?
Can someone steal your money with a check?
Is sending Cheque by post safe?
Truick argues that it is no longer safe to send cheques through the post under any circumstances. He said: "It is very easy to buy false identity documents such as driving licences over the internet and use them to open an account with a stolen cheque.
How long does it take for a check to be sent in the mail?
Checks are shipped via USPS First Class mail and typically take 3 to 5 business days (Monday-Friday) to arrive after your inspection is complete and it has been accepted.
How do I track a mailed check?
What happens if a check gets lost in the mail?
Take the check to the issuing bank to cash it with the payee, if possible. The bank should be able to verify its authenticity upon presentation of the check.
Can a check be tracked?
Talk to your bank about it. As for tracking checks, in general, they can be tracked using their audit trail from deposit through posting against the account. Or backward from your bank to the bank and account where they were deposited. Your bank can do this.
Can someone cash my lost check?
What to do when a check is lost?
How do you find out if a check has been cashed?
The most efficient way to find out if a check has cleared is to use your financial institution's online banking service. Most credit unions and banks offer real-time histories, and you'll be able to see if the check you wrote has cleared.
| 1.244591 |
Zyphra/Zyda-2
|
Weaknesses in the RC4 encryption protocol have been found, allowing an attacker to deduce the plaintext. If the same message is encrypted many millions of times, statistical methods can be used to extract valuable information, such as cookies. Due to the time this amount of requests takes, this is not a practical attack against most users.
Opera Software has released Opera 12.15, where safeguards against such attacks have been added. On vulnerable connections, Opera will add some random data, making statistical methods less effective. If a domain makes an unrealistically high number of requests in less than 24 hours, it will be treated as an attack, and Opera will block that domain for the remainder of the 24 hours.
See this blog post for further information.
| 1.321414 |
openbmb/Ultra-FineWeb
|
Physical computing just got a lot easier
Putting microcontrollers in everything and tying appliances into the internet has become the DIYers' bread and butter. There's a ton of benefits from an Internet-enabled coffee maker, but actually building these projects takes a little bit of knowledge. Enter [Dave] and [John] with Twine – a little Internet enabled box that connects physical reality to the digital world.
The hardware inside a Twine is a small board that combines WiFi, an accelerometer and temperature sensor. The Twine is programmed 'in the cloud' with a simple if/then condition. A Twine will send you a text, email or tweet when the condition is met. For example, you could put a Twine on a door and program the accelerometer to text you when someone comes knocking.
Twine isn't an entirely closed system; there's a plug for additional sensors (moisture detection, for example), and the data from sensors can be pushed out to a server. You can pick up a twine for $100 from the Kickstarter; it's a little rich for our blood, but we're sure it'll be a useful device.
9 thoughts on "Physical computing just got a lot easier
1. Needs more IO. Then it could make a web controlled coffee machine quite easily. They say it has a breakout board, but doesn't say if it's inputs only or can do output as well.
And yes, I'd prefer a slightly bigger box (with more IO) and a smaller price tag.
2. It's great for doing a specific set of tasks. Giving you an alert if your basement is flooding is a good example of the kind of thing it's good at.
However, its high cost, lack of openness, and dependence on their cloud platform make it less than ideal for your average DIY hacker. Also, you can't send commands back to the Twine. It can send a text or HTTP request when sensor data changes, but that's it. Powering the WIFI from two AAA batteries means that it can't stay awake for any length of time. If you leave it on to respond to requests, the batteries will run out in a couple of hours.
1. I think the fact that it's "not ideal for your average DIY hacker" is sort of the point… It's meant to be accessible to non-DIY-hacker type people. Obviously there are "better" and certainly less expensive ways to do this yourself if you have the know-how, but this looks like a really fun way for someone with zero experience to get their feet wet. Might be a fun gift for a kid to automate their toys or room even.
Leave a Reply
You are commenting using your account. Log Out / Change )
Twitter picture
Facebook photo
Google+ photo
Connecting to %s
| 1.068407 |
Zyphra/Zyda-2
|
Primary Health Care in Turkey: A Passing Fashion?
xmlui.mirage2.itemSummaryView.MetaDataShow full item record
The Alma-Ata Declaration has long been regarded as a watershed in the health policy arena. The global goal of the World Health Organization, 'Health for All by the Year 2000' through primary health care, has attracted many countries both in the developed and the developing world and commitments to this end have been made at every level. However, albeit this consensus on the paper, a common and explicit definition of the concept has not been reached yet. This paper aims at discussing various definitions of primary health care that emerged after the Declaration and also presenting a case study from Turkey, a country that advocates primary health care in her recent health policy reform attempts. After setting the conceptual framework for discussion the Turkish case is presented by using research carried out among Turkish policy-makers at different levels of the State apparatus. It has been concluded that application of primary health care principles as defined in the broad definition of the concept requires major changes or rather shake-ups in Turkey. These areas are outlined briefly at the end of the paper.
| 1.757893 |
openbmb/Ultra-FineWeb
|
Sweet and nutritious, whole fruits are full of the vitamins and fiber important to a child's digestive well-being and overall health.
How much fruit does your child need per day?
0 to 6 months: None
6 to 8 months: Start with 1 tbsp per meal, work up to 4-5 tbsp per day (Choose strained fruits or stage 1 fruit)
8 to 10 months: 4 tbsp or more (Offer cooked fruit pieces, none bigger than your child's thumbnail. Shoot for the consistency of a baked apple)
10 to 12 months: 8 to 12 tbsp (Split each day's fruit allotment into one to two types of fruit)
12 to 24 months: 2-4 servings (One serving equals 1/4 cup canned fruit, 1/2 cup fresh fruit, 4 oz of 100% fruit juice)
| 1.571635 |
HuggingFaceFW/fineweb-edu
|
Mihaela Elena Gheorghe, Simona Pronckute, Katie Angus, Özge Türk, Alena Romaniuka, Ilze Rence and Neus la Petita
students of the University of Vienna Sommerhochschule (SHS)
The British general Sir Charles Napier, when confronted by a delegation of Hindus who argued that the prohibition of Suttee was an attack on their culture, supposedly answered, "You say that it is your custom to burn widows. Very well.We also have a custom: when men burn a woman alive, we hang them. You may follow your custom. And then we will follow ours." Centuries later, it is increasingly clear that we still have issues regarding the proper balance between maintaining local and national customs, and imposing a European cultural or social viewpoint.
Two important questions that we must consider are - Is it right to instil our cultural values elsewhere? And, if so, how much tradition (either local or national) should we keep as a nation before it becomes unwanted 'baggage,' which limits our capacity to fully integrate with others? We shall argue that culture is not only the most important medium to link Europeans together (whether they come from an EU Member State or not), but how it can serve as a uniting tool for people across the globe.
For this, we discussed and debated the sensitive issue of immigration. Does the EU possess a certain power of attraction for other states outside of the EU? Is the EU attractive as a whole, or do certain Member States seem to be regarded as preferable immigration destinations?
Latvia's representative declared confidently that few would see Latvia as an immigration paradise. On the other hand, we asked ourselves why Turkish immigrants choose Germany as their main destination (this exodus from Turkey is occurring on an unprecedented scale). You see, when the proper political or social context arises, people from various countries will generally seize the opportunity of living in a more evolved state and will ultimately decide to stay. It was the case of many Turkish people who were supposed to work in Germany for ten years or so (when Germany needed more workers), but after the years passed, the migrants did not want to go back.
On the other hand, things are changing at a rapid pace. After the economic crisis, the EU no longer seems that attractive. Turkish people even ask why they should be part of the EU, when their economy is performing much better.
Another sentiment, yet this time from the Germans, reveals how immigration rates do not always generate nor encourage multiculturalism as one would assume. German Chancellor Angela Merkel stated "There has been a tendency to say, let's adopt the multicultural concept and live happily side by side...but this concept has failed, and failed utterly."
Thus, in theory, tolerance, respect for cultural relativism or the desire to connect with other cultures should be and are basic principles of the EU, but these values are often not practiced.
For that, we looked specifically at the immigration policy of the UK. The UK was and still remains attractive for many immigrants who attempt to gain entry in dangerous and often illegal ways. Some try to swim across the English Channel in order to get there, while others hide in cargo ships. The number of illegal immigrants entering the UK is quite high and there are different problems that have to be tackled. First of all, Chinese and Polish immigrants are perceived in a very negative light (by the older people, but also increasingly by the young generation).
There are even more important issues to be addressed – housing problems, illiteracy, the reduced number of job opportunities (even unskilled labour), segregation due to language or religion and as a result, discrimination. Yes, some people may trick the system (using marriage as a means of obtaining citizenship or lying about their age when seeking asylum in order to access funding put in place for those deemed more in need) but at the end of the day, an authentic adaptation process is hardly achieved.
We all remember the famous 'hijab' issue – Islamic students or teachers not being allowed to wear their traditional scarves in French schools. Did this controversial measure limit a basic right of religious self-expression, or does it represent a fair system that tries to provide a neutral, secular approach to all pupils? It is impossible to find only one answer removed from subjective opinion. Moreover, how are we to truly believe in nice, idealistic words such as tolerance and the respect for human rights when we are not able to overcome basic stereotypes such as "the Ukranian prostitute", the "Romanian gypsy"‚ the "Polish maid" and so on?
One question that we can definitely ask ourselves is this: Europe, where are you heading towards? Well, maybe it's up to younger generations to fill in the gaps and make the transition from a rhetorical, supposedly politically correct intercultural discourse to an authentic one.
In order to tackle this matter, we have also discussed the theme of the Erasmus programme, which ultimately has attempted to create the perfect, future European (with now the extended version, Erasmus for all). Umberto Eco argued that Erasmus should be used as a means of "sexual revolution" (a Spanish girl marrying a German boy and giving birth to a real European child), or it should even be used as a means of cultural exchange between a French taxi driver and a Lithuanian one, for example. Well, the perfect European is most definitely a utopia. It is not very plausible at this very moment, especially when we take into account the nationalist movements that are taking place in different parts of Europe, nor is it realistic.
Still, cultural understanding might be a quintessential element of building a unified Europe. Europe 2020, the EU's growing strategy for the coming decade, also focuses on improving education levels (especially for immigrants) and social bonding. Learning European languages, but also going beyond the linguistics of another culture, travelling and having an open mind are really important factors that can cement our European identity. Because, as Eco argued, we must remember that it is culture, not war, that cements our European identity. And we can add our assertion that it should be culture, not war that can cement our identity as citizens not just of Europe, but of this world.
| 1.305569 |
openbmb/Ultra-FineWeb
|
Carbon dioxide may have acted as Earth's 'thermostat' since earliest timesBy Steve Koppes
A greenhouse gas that has become the bane of modern society may have saved Earth from completely freezing over early in the planet's history, according to the first detailed laboratory analysis of the world's oldest sedimentary rocks.
Scientists have for years theorized that high concentrations of greenhouse gases could have helped Earth avoid global freezing in its youth by allowing the atmosphere to retain more heat than it lost. A team of scientists at Chicago and the University of Colorado has now analyzed ancient rocks from the eastern shore of Hudson Bay in northern Quebec, Canada, and found the first preliminary field evidence supporting this theory.
"Our study shows the greenhouse gas that could have sustained surface temperatures above freezing 3.75 billion years ago may have been carbon dioxide," said Nicolas Dauphas, Assistant Professor in Geophysical Sciences and the College. Dauphas and his co-authors Nicole Cates and Stephen Mojzsis of the University of Colorado, and Vincent Busigny, now of the Institut de Physique du Globe in Paris, will present their data in the Thursday, Feb. 15 issue of the journal Earth and Planetary Science Letters.
The study, led by Dauphas, helps explain how the Earth may have avoided becoming frozen solid early in its history, when astrophysicists believe the sun was 25 percent fainter than today. Previous studies have shown that liquid water existed at the Earth's surface, even though the weak sun should have been unable to warm the Earth above freezing conditions. But high concentrations of carbon dioxide or methane could have warmed the planet.
Discovered in 2001 by a team of Canadian scientists, the Quebec rocks are among the oldest-known in Earth's 4.5-billion-year history. Slow-acting geologic processes destroy and recycle the Earth's crust on vast time scales, leaving only scraps of land containing remains of the planet's oldest rocks.
The only other outcropping of rocks that are about as old occur in western Greenland. Scientists have studied those rocks exhaustively for more than three decades. But the limited extent of the rocks of this antiquity may have provided only a biased view of the early Earth, Dauphas said.
Mojzsis and Cates revisited the Canadian site to pursue new, but as yet unrealized, opportunities for analysis and comparison. "It is a grand landscape of water, wind and rock carved by glaciers and only lightly touched by the people who live there," Mojzsis said. But the region would have looked much different 3.8 billion years ago.
"At that time, it would have appeared to be a totally alien world to us, with a dense atmosphere of carbon dioxide and methane that would have imparted a reddish cast to the sky, and deep, dark greenish-blue oceans of iron-rich water washing onto beaches of small continents scattered across the globe," Mojzsis said.
The Chicago-Colorado scientists focused their analysis on rocks they suspected contained chemical sediments that precipitate like salt from seawater. First they dissolved the rock, separating iron oxides and iron carbonates from other constituents. Then they used a mass spectrometer to measure the isotopic composition of the iron. All iron atoms have 26 protons at their core, but they can be accompanied by a varying number of more numerous neutrons.
"Iron has several isotopes, and the ratio of these isotopes changes from one rock to another," Dauphas explained. "Sediments that formed by precipitation from seawater have a very distinct signature of iron isotopes." After analyzing the iron composition of the rocks, Dauphas noted, "We found that indeed they had the typical signature of something that formed by precipitation in a marine setting."
The iron probably was released with other metals in hydrothermal vents, called black smokers, which are found along mid-ocean ridges where molten lava emerges on the sea floor to create new oceanic crust. In today's oxygen-rich oceans, the iron rapidly precipitates and concentrates near these vents. But in the oxygen-starved oceans of 3.8 billion years ago, oceanic currents could transport the iron long distances, before becoming partially oxidized and deposited in sea-floor sediments. Some of these sediments survive today as banded iron formations.
Previous research on the rocks from Greenland already had revealed the existence of ocean water at that early stage in Earth's history, known as the Eoarchean Period. But the Canadian rocks showed something else: the first hints that Eoarchean oceans also contained iron carbonates. Iron carbonates can only form in an atmosphere that contains far higher levels of carbon dioxide than are found in Earth's atmosphere today, Dauphas said. This carbon dioxide would have played an important role as a planetary thermostat in the support of life on Earth.
"If it gets cold, ice caps form, chemical weathering decreases, carbon dioxide accumulates in the atmosphere, which increases the greenhouse effect and surface temperatures. If it gets hot, the rate of chemical weathering increases, the rate of burial of sedimentary carbonates increases, and the amount of carbon dioxide in the atmosphere and surface temperatures decrease," Dauphas said.
Other factors are involved in this simplified scheme. "Still, it is possible that such a thermostat was at work as early as 3.75 billion years ago," he said.
| 2.514426 |
HuggingFaceFW/fineweb-edu
|
Här ska det bytas till en sökruta
Driving Simulator
Cybercom developed a driving simulator that puts a stroke patient in a life-like driving situation.
Assessing if a stroke patient still can drive safely can be a complex, costly and imprecise process. Aspects such as ability to focus, peripheral vision, reaction times and eye-hand coordination all needs to be evaluated and condensed into a final ruling. The doctor performs examinations and uses an array of different tools to measure various abilities, but in the end it is down to the doctors personal judgement.
Making an incorrect judgement can have grave consequences, from serious injuries or even deaths on one end and a severe limitation for the patients professional and daily life on the other.
Our solution was to develop a driving simulator that puts the patient in a life-like driving situation while providing certain stimulus and measuring the patient's ability to react timely and accurately without compromising their driving. The simulator calculates and provides several test results that can be directly compared to other patients.
Clinical Trials have been conducted and a total of 120 stroke patients participated in the tests and another 120 non-stroke patients have been used as a control group. Preliminary findings indicate a strong correlation between Cybersim and the current leading tool with the possibility that Cybersim can provide additional, relevant data since it measures more aspects of the driving.
The clinical trials of Cybersim also provided some valuable feedback on how to improve the product. Innovation Zone therefore started work on a second version, based on an improved framework and a revised specification, early 2017.
The second version has modifications and improvements that makes it more suitable for wider deployment in the medical sector and is currently being evaluated in Linköping.
Watch the clip from TV4 news (Swedish):
_URL_ link, opens in new window
Irfan Khalid
Head of Innovation Cybercom Group
Make sure all fields are filled with valid information
Thank you, your message has been sent
| 1.079239 |
Zyphra/Zyda-2
|
|Harvard University Library website|
(INSERT MISSING POST, a.k.a. - The Naturalization Act of 1790)
This Act is short and sweet (if only it were so today). Residency in the US for 2 years (and don't be naughty) and you and your children are considered citizens. Now I was always taught that a wife's citizenship was also tied to the husband, but I see no mention of this in the Act. Could it be that naturalization wasn't always this way for women? Could it be that women were considered even less significant than children to not even warrant being mentioned? Is it automatically an assumption that wives are included due to the era of the legislation? If anyone knows, please share.
"Congress of the United States:
AT THE SECOND SESSION,
Begun and held at the City of New-York, on Monday the Fourth of January, one thousand seven hundred and ninety.
An ACT to establish an uniform Rule of Naturalization.
BE it enacted by the SENATE and HOUSE of REPRESENTATIVES of the United States of America, in Congress assembled, That any alien, being a free white person, who shall have resided within the limits and under the jurisdiction of the United States for the term of two years, may be admitted to become a citizen thereof, on application to any Common Law Court of Record, in any one of the States wherein he shall have resided for the term of one year at least, and making proof to the satisfaction of such Court, that he is a person of good character, and taking the oath or affirmation prescribed by law, to support the Constitution of the United States, which oath or affirmation such Court shall administer, and the Clerk of such Court shall record such application, and the proceedings thereon; and thereupon such person shall be considered as a citizen of the United States. And the children of such person so naturalized, dwelling within the United States, being under the age of twenty-one years at the time of such naturalization, shall also be considered as citizens of the United States. And the children of citizens of the United States that may be born beyond sea, or out of the limits of the United States, shall be considered as natural born citizens: Provided, That the right of citizenship shall not descend to persons whose fathers have never been resident in the United States: Provided also, That no person heretofore proscribed by any State, shall be admitted a citizen as aforesaid, except by an act of the Legislature of the State in which such person was proscribed.
FREDERICK AUGUSTUS MUHLENBERG,
Speaker of the House of Representatives.
JOHN ADAMS, Vice-President of the United States,
and President of the Senate
APPROVED, March 26th, 1790.
GEORGE WASHINGTON, President of the United States."
| 1.237636 |
HuggingFaceFW/fineweb-edu
|
NBS Pseudo Tech is an eco-friendly biological fungicide containing Pseudomonas fluorescens. It is effective against a wide variety of seed and soil-borne plant pathogenic fungi. It protects the seeds and roots from fungal and bacterial infections. It can also help prevent frost damage to crops. Applications during the early stages of plant growth help and protect the plant in its initial critical stages of development.
NBS PseudoTech also acts as a plant growth promoter, stimulates seed germination, and promotes early flowering and fruiting. This is a natural input that can be an invaluable tool in the development of a chemical-free approach.
A combination of NBS PseudoTech and NBS MicroShield not only effectively control a wide spectrum of disease but also helps in plant growth. Constant use of NBS Bio-Products will reduce the usage of harmful chemicals to control diseases and protects good soil organisms and beneficial microbes from depleting.
| 1.845053 |
openbmb/Ultra-FineWeb
|
Remove (Removal Guide) - Simple Removal Guide Removal Guide
What is
My FirstTab – a fake search engine that might hijack your browser search engine
My FirstTab is a potentially unwanted program (PUP) that pretends to be a legitimate search engine. At first glance, it barely differs from legitimate search sites like Google, Yahoo or Bing. However, it's a browser hijacker that spreads in download/installation setups and infect browsers without users' consent.
Type Browser hijacker
Danger level Medium. Alters browser's settings and might expose to dangerous content
Symptoms Browser homepage, default search engine, and new tab URL address set to hxxps://; redirects to questionable sites; an increased amount of ads
Distribution Software bundling
To uninstallMyFirstTab, install ReimageIntego and run a full system scan
My FirstTab virus is promoted as a search engine that can generate improved results. However, it is created for benefitting developers' financial needs. The program is used for generating advertising-based revenue. Unfortunately, this activity causes many problems for the computer users. virus spreads bundled with various free programs. This tricky technique allows tricking user's into installing this search tool. Typically, the hijack is unnoticed. However, its changes cannot be unnoticed:
- It replaces default homepage and search engine with
- It gathers data relating to internet search history and tendencies. Later this information can be used to develop
- certain ad chain that appears on to your browser unexpectedly.
- Other third-party applications, extensions and plug-ins being might be installed.
MyFirstTab is designed to remain on the system as long as possible. It might employ additional add-ons, browser helper objects or modify browser shortcuts to achieve this goal. Therefore, a user has no opportunity to change settings and is forced to visit each time they open a new tab or attempt to search via the URL bar.
Also, a major issue is data tracking that browser hijacker[1] and other unwanted programs have access to. As soon as PUP gets on the computer via browser extensions and plug-ins, it can collect browsing history, IP addresses mostly viewed websites and search queries. This information is useful when delivering specific advertisements and suggesting questionable products.
After the hijack, users might have to deal with unpleasant redirect problems. The hijacker might redirect to possibly harmful sites and display malware-laden or misleading ads. This dubious activity can lead to high-risk computer infections.
To stop unwanted redirects and get back access to the hijacked web browser, users have to find and uninstall all components related to the browser hijacker. It is possible to remove manually, but we recommend dedicating this task for malware anti-malware software.
We recommend ReimageIntego for automatic removal. However, you can use any other professional tool. The most important to tip is to update security software before running a full system scan. virus is a highly suspicious search engine that spreads and operates as a browser hijacker.
Reasons why your browser might be affected
Developers promote these sites as legitimate search engines that it can improve your search experience and offers better results. However, users rarely decide to install them voluntarily. These programs typically get into the computers unnoticed.
This browser hijacker spreads bundled with various free programs. Creators know that people tend to skip some steps of freeware installation, so it is an opportunity to slip some malware within various sections of these procedures. Security specialists from[2] note that it's a very common mistake made by computer users.
So when you are jumping through your program installation and do not choose Advanced or Custom options, you are at risk of getting unwanted programs unknowingly. You can also get something like that via extensions in your browser which comes from insecure websites and pop-up ads that you can mistakenly click on.
Delete from the browser
To remove My FirstTab, you need to try and remove suspicious extensions, add-ons, and other plug-ins[3] from your browser's settings manually. If that is still not changing the situation with your browsers search function, there are a few anti-malware programs below that we can recommend to you.
Automatic removal ensures that all hijacker-related components are deleted from the browser and computer. However, we also recommend resetting affected web browsers to make sure that all tracking cookies are wiped out as well.
do it now!
Reimage Happiness
Intego Happiness
Compatible with Microsoft Windows Compatible with macOS
What to do if failed?
Alternative Software
Alternative Software
Getting rid of Follow these steps
Uninstall from Windows
Follow these steps to get rid of all hijacker-related components from the machine:
Instructions for Windows 10/8 machines:
4. Right-click on the application and select Uninstall.
5. If User Account Control shows up, click Yes.
3. Pick the unwanted application by clicking on it once.
4. At the top, click Uninstall/Change.
5. In the confirmation prompt, pick Yes.
6. Click OK once the removal process is finished.
Delete from macOS
Remove items from Applications folder:
1. From the menu bar, select Go > Applications.
1. Select Go > Go to Folder.
Remove from Microsoft Edge
Delete unwanted extensions from MS Edge:
Clear cookies and other browser data:
Restore new tab and homepage settings:
1. Click the menu icon and choose Settings.
2. Then find On startup section.
3. Click Disable if you found any suspicious domain.
Reset MS Edge if the above steps did not work:
3. Select Details tab.
Instructions for Chromium-based Edge
Delete extensions from MS Edge (Chromium):
1. Open Edge and click select Settings > Extensions.
Clear cache and site data:
1. Click on Menu and go to Settings.
2. Select Privacy and services.
4. Under Time range, pick All time.
5. Select Clear now. Clear browser data from Chroum Edge
Reset Chromium-based MS Edge:
1. Click on Menu and select Settings.
2. On the left side, pick Reset settings.
3. Select Restore settings to their default values.
4. Confirm with Reset. Reset Chromium Edge
Remove from Mozilla Firefox (FF)
Uninstall My FirstTab and other questionable Firefox extensions:
Remove dangerous extensions:
2. Select Add-ons.
Reset the homepage:
2. Choose Options.
Clear cookies and site data:
1. Click Menu and pick Options.
2. Go to Privacy & Security section.
3. Scroll down to locate Cookies and Site Data.
4. Click on Clear Data…
Reset Mozilla Firefox
1. Open Mozilla Firefox browser and click the Menu.
Remove from Google Chrome
Get rid of MyFirstTab or other unknown exetnsions and reset Google Chrome:
Delete malicious extensions from Google Chrome:
Clear cache and web data from Chrome:
1. Click on Menu and pick Settings.
2. Under Privacy and security, select Clear browsing data.
Change your homepage:
1. Click menu and choose Settings.
Reset Google Chrome:
1. Click on Menu and select Settings.
2. In the Settings, scroll down and click Advanced.
3. Scroll down and locate Reset and clean up section.
4. Now click Restore settings to their original defaults.
5. Confirm with Reset settings. Reset Chrome 2
Delete from Safari
Remove unwanted extensions from Safari:
1. Click Safari > Preferences…
2. In the new window, pick Extensions.
Clear cookies and other website data from Safari:
1. Click Safari > Clear History…
1. Click Safari > Preferences…
2. Go to Advanced tab.
3. Tick the Show Develop menu in menu bar.
How to prevent from getting stealing programs
Protect your privacy – employ a VPN
No backups? No problem. Use a data recovery tool
About the author
Olivia Morelli
Olivia Morelli - Ransomware analyst
Contact Olivia Morelli
About the company Esolutions
| 1.098684 |
Zyphra/Zyda-2
|
Cyber Bullying Leaflet Launch
Sue Ball Consultant for BRAG and Parents from Nechells Parents Forum launched a leaflet of advice for parents and carers about how to prevent and tackle cyber-bullying. Cyber-bullies use the internet, mobile phones or any other form of digital technology to threaten, tease or abuse someone.
This useful resource, produced by Birmingham City Council's Young People and Families Directorate, in association with Nechells Parents Forum and the POD, helps parents understand how to be cyber-safe, how to spot the signs if their child is a victim of or an instigator of cyber-bullying and what steps to take to stop it. The leaflet provides useful, practical advice with local and national contacts for further support and guidance.
The launch took place at Nechells Zone Olympics at the Alexander Stadium on June 15th Noran Flynn, Director of the POD, and organiser of the Olympics Event said "Nechells parents are keen to support their children at our Olympics, and promote the values of respect, excellence and friendship. They are also very concerned about the rise in cyber-bullying and have worked hard, with Birmingham's Bullying Reduction Action Group (BRAG) to produce this leaflet to help parents across Birmingham deal with cyber-bullying and keep their children safe"
How to tackle cyber-bullying:
New technologies are amazing. Mobile phones, smart phones, the internet and social networking slites like facebook allow us to keep in touch with our friends and family more easily and to have access to a wide range of information on the world-wide web. They can help children with their learning, prepare them for life in a technological world and improve their communication skills.
But as well as the positives, we all know that there are some negatives and that cyber-bullying is on the increase. Because many children and parents are worried about cyber-bullying Nechells Parents Forum have worked with Birmingham City Council's Bullying Reduction Action Group (BRAG) to produce an advice leaflet for parents called How to Tackle Cyber-bullying.
This leaflet helps parents understand what cyber-bullying is, how to spot the signs if their child is a victim of or an instigator of cyber-bullying and what steps to take to stop it. It also gives useful, practical advice with local and national contacts for further support and guidance.
Sue Ball said "The Olympic values of respect, excellence and friendship are important to us all. Thank you to the POD and all the members of Nechells Parents Forum, who helped to create this leaflet. It gives great advice to parents and carers across Birmingham about how they can best help their children to lead happy and bully-free lives, build respectful friendships and stay safe from cyber-bullying."
For more information about Anti-bullying work in Birmingham
Events This Month
Latest Blog Posts
Tue, 14th May 13 at 4:00pm
Some pupils from year 5 in our Nechells EAZ schools: Cromwell, Nechells, St Clement's, St Joseph's and St Vincent's all went to Aston University today for a day of fun, experiments, experiences and inspiration for their future careers. The young people learnt all about team work, had a tour of the campus and then became mini scientists extracting DNA from kiwi fruits. The Nechells Schools and their pupils would all like to say a big thank you to Bal and her team of student volunteers at Aston University for the opportunity they give every year to some our most Gifted and Talents pupils, they really enjoy this fantastic experience, we hope that our pupils will all continue to study hard and in time become the graduates of the future.
| 1.83363 |
HuggingFaceFW/fineweb-edu
|
The main vision of our play school is to help each child reach his full potential in a safe and comfortable learning environment.
We believe that each child is unique, and we do our best to nurture the intrinsic gifts that each one brings and shares with us. We aim to inspire a lifelong love of learning by providing a thoughtful, nurturing environment for children that fosters creativity, independence and social confidence in a dynamic, joyful setting that is respectful of each child's needs and individuality.
Teachers have a very influential role in being the first link in a long chain of instructions for success in a child's progress through school, our teachers have a responsibility to provide for your child an environment that will stimulate and enrich him or her and help lay a foundation for future academics.
We work as supporters of children's learning.How wesupport children's learning:
| 2.253244 |
openbmb/Ultra-FineWeb
|
It's our mission to provide a comprehensive infection prevention and control program for all CCHC entities. We focus on surveillance, prevention, and control of healthcare associated infections, in CCHC patients, visitors, licensed independent practitioners, employees, volunteers and students.
The program includes collaboration with the local board of health and the MADPH in the prevention of transmission of infectious disease in the community and regional disaster planning and preparedness.
The best ways you can help prevent infections:
Wash Your Hands
Keeping hands clean is one of the best ways to prevent the spread of infection and illness. Hand washing is easy to do and it's one of the most effective ways to prevent the spread of many types of infection and illness in all settings—from your home and workplace to child care facilities and hospitals. Clean hands can stop germs from spreading from one person to another and throughout an entire community.
How to Wash Your Hands [PDF]
Cover Your Cough
Stop the spread of germs that can make you and others sick. Influenza (flu) and other serious respiratory illnesses like whooping cough, and severe acute respiratory syndrome (SARS) are spread by cough, sneezing, or unclean hands.To help stop the spread of germs, cover your mouth and nose with a tissue when you cough or sneeze. Put your used tissue in the waste basket. If you don't have a tissue, cough or sneeze into your upper sleeve or elbow, not your hands.
Cough Etiquette from the CDC [PDF]
Stay Up to Date on Vaccinations
In our mobile society, over a million people each day people travel to and from other countries, where many vaccine-preventable diseases remain relatively common. Without vaccines, epidemics of many preventablediseases could return, resulting in increased - and unnecessary - illness, disability, and death among children and adults. Stay up to date on vaccinations. See the Centers for Disease Control website for scheduled and more information.
Basic and Common Questions about Vaccinations
No More Excuses: You Need a Flu Vaccine [PDF]
Seasonal Flu Vaccine Information [PDF]
Where To Get The Flu Vaccine
WCVB Interview with Dr. Rudman about Childhood Immunizations
| 2.07718 |
HuggingFaceFW/fineweb-edu
|
August 10, 2010 > Free vision curriculum guides available
Free vision curriculum guides available
Submitted By Natalie Wolfrom
In today's economy, educational tools are expensive for both students and educators. School textbook prices have risen alarmingly in recent years; depending on the subject, a single elementary textbook can range in price from $30 to $100.
For 30 years, the Foundation of the American Academy of Ophthalmology's Museum of Vision has provided educational materials for physicians, teachers, and parents interested in teaching children about the eye, vision, and ophthalmology. The museum has created an entire curriculum to teach children about the fascinating and spectacular science of vision. The museum's materials are suitable for ages 10-14, but can be adapted for other age groups.
The free teacher workbooks created by the museum focus on the human eye, the differences between human and animal vision, perspective, and how the brain processes images like optical illusions and 3D. The guides are filled with discussion points and fun interactive activities. Each guide can be downloaded at _URL_ and is free of charge:
Eye Openers: Exploring Optical Illusions is designed to help educators teach basic concepts of vision including binocular vision, persistence of vision, and eye-brain connection. It includes activities for youngsters and provides appropriate handouts.
Animal Eyes(r) describes the basic concepts of vision and explores the amazing eyes of the animal kingdom. The booklet teaches about the human visual system, how human eyes differ from animal eyes, seeing in the dark, and color vision.
Art and Vision: Seeing in 3D(r) describes the concepts of vision and special visual techniques that help to create the illusion of depth. It includes sections on size scaling, overlapping, atmospheric perspective, and linear perspective.
"I am very appreciative of the [educational] materials. I know that they would be very helpful for me in teaching my students about the eye and its wonders," said Scott A. Blanchard, teacher at the Biscotti Educational Center, in Macomb, Michigan.
Those interested in getting the curriculum guides can download the free PDF version online by visiting _URL_ Once there, click on the link "Read More" found under any of the three booklets. A new page will open with the appropriate booklet information. Scroll to the bottom of the page to find a free downloadable version of the booklet.
The Museum of Vision is an educational program of The Foundation of the American Academy of Ophthalmology. It is the only institution in the United States whose sole purpose is to preserve the history of ophthalmology and celebrate its unique contributions to science and health. For more information on the Museum of Vision, visit _URL_.
| 2.392542 |
HuggingFaceFW/fineweb-edu
|
Planting and Early Care of Fruit Trees
Prepared by James R. Schupp, Extension tree fruit specialist, University of Maine Cooperative Extension
Fruit trees can be an attractive and useful addition to the home landscape. This fact sheet will help you to establish new fruit trees that will provide you with beauty and fruit for years to come.
When to Plant
Fruit trees may be planted in early spring, as soon as the frost in the ground has thawed. If the soil is very waterlogged, it is best to wait until it drains. Wait until the soil no longer comes up in sticky clumps that stick to the shovel.
The climate of New England is too cold for fall planting of fruit trees. Fall-planted trees will not have any advantage in growth over trees planted the following spring. Fall-planted trees may also be damaged in the winter months by rodents, deer or severe low temperatures.
Bare-root nursery stock is usually less expensive and will establish and grow well, if planted in April or early May. If you must hold the trees a short time before planting, store them in a cool, shady place where they will be out of the sun and wind. Pack the roots in moist sawdust or sphagnum moss to prevent them from drying out. Potted or ball-and-burlap trees are preferable for planting dates in late May or early June.
Digging the Hole
Select a site with direct sunlight. Allow enough room between the planting site and buildings, trees, power lines or other obstructions for the tree to fill its space when full grown.
Tree size varies with different species and the rootstock that the tree is on. The nursery where you bought the tree can advise you as to how much space the tree will need when full grown.
Fruit trees are tolerant of a fairly wide range of soil types, but the soil should be well-drained, with a minimum of 18 inches of soil above any ledge or hardpan.
Start by cutting through the sod in a circle that is about a foot wider than the diameter of the root ball. Roll the sod out of the hole and discard it or use it to cover a place where you want grass. Then dig a hole wide enough to allow the root system to fit without roots wrapping around the edge of the hole in a circle. Dig the hole deep enough to allow the tree to be planted with the graft union two to three inches above ground. This planting depth is critical for trees on dwarf or semi-dwarf rootstocks. If the tree is planted too deep and the graft union is below the soil line, the scion variety will form roots and the tree will become a standard-sized tree.
Filling the Hole
What should you put in the planting hole? Only roots, clean soil and water! Never put any fertilizer in the planting hole. If the soil is poor, you can mix in peat moss or thoroughly conditioned compost before filling the hole. A ratio of up to 50/50 peat to soil may be beneficial.
Trim off any broken or damaged roots before planting. Place the tree in the hole, and after making sure that the depth is correct, fill the hole with clean topsoil. It is helpful at this stage to have someone hold the tree straight while the hole is being filled. Pack the soil in the hole by gently stamping it with your feet. After the hole is filled, water the tree with two to five gallons of water, poured slowly enough so that the water doesn't run off.
Care and Pruning
All newly planted fruit trees will benefit from being staked. This will result in a straighter tree with more growth. Staking is especially important for trees planted on a wind-blown site and for dwarf fruit trees. Consider a strong permanent stake for dwarf fruit trees.
After the tree has started to grow (in about two weeks) you can apply a nitrogen fertilizer. Apply one ounce of actual nitrogen in a 12-inch circle around the base of the tree, and make sure the tree is well-watered after fertilizing. All nitrogen fertilizer should be applied before mid-June. Late application of nitrogen can lead to late-season growth, and the tree may not harden off in time to withstand winter.
Watering the new tree is important to help get it started, especially in the first few weeks after planting. A good rule is to apply five gallons of water around the base of the tree every week of the growing season in which there is less than an inch of rainfall.
Apples and pears are usually trained as central leader or cone-shaped trees. If the tree is an unbranched "whip," prune the stem to a height of 30 to 36 inches above the soil line. This will stimulate the buds just below the cut to grow. The top bud will grow vertically and form the leader, or trunk of the tree. The next one or two buds can be rubbed off with the fingers to prevent them from competing with the leader.
The buds that grow out below the top two or three should be retained to form the scaffold branches. Remove branches that grow out below a height of 18 inches from the ground. Bend the branches that remain to an angle of 45 to 65 degrees from vertical using clothespins, toothpicks or small weights. This keeps these branches from growing so strongly that they compete with the leader, and it stimulates flower production.
Stone fruit trees (peaches, plums) are usually trained as open-center (vase-shaped) trees. Two or three side branches are selected, and the remainder of the tree is cut off just above the top branch. Contact your county Extension office for other bulletins on training and pruning fruit trees.
Weeds compete with young trees for water and nutrients. A weed-free zone should be established at the base of the tree that extends out to form a circle with a diameter of two to three feet. Mulch, herbicide or cultivation may be used to prevent weeds.
Managing disease and insects usually doesn't become a big challenge until the trees begin to fruit. Newly planted trees need to be protected against attack by leaf-feeding insects, such as gypsy moths and Japanese beetles. Inspect the trees on a regular basis to see if there is fresh damage, and contact your University of Maine Cooperative Extension county office for help in identifying and controlling any pests you find.
Apple trees can become infected with a fungus disease, scab, that damages both leaves and fruit. Control of scab is very important when the trees come into bearing. However, in severe cases, young, non-bearing trees can become defoliated by scab. This can stunt the trees and delay fruiting.
Protect the tree trunk against girdling by rodents. Spiral mouse guards, made of white plastic, are a popular and inexpensive option. The white color helps prevent winter injury to the trunk. However, this type of mouse guard should be removed during the summer and re-fitted in the fall to prevent it from becoming a safe haven for trunk-boring insects, such as the round-headed apple borer. An alternative solution is to paint the trunk with white interior latex paint and wrap the trunk with an 18-inch tall piece of galvanized hardware cloth. This type of mouse guard doesn't need to be removed in summer.
Deer can cause major damage to young fruit trees by feeding on the developing shoots and leaves in summer, and by browsing the fruit buds in winter. While repellents, such as small bars of hand soap, or small cloth bags of human hair, can deter hungry deer, sturdy fencing is the only long-term solution to possible deer damage.
Information in this publication is provided purely for educational purposes. No responsibility is assumed for any problems associated with the use of products or services mentioned. No endorsement of products or companies is intended, nor is criticism of unnamed products or companies implied.
Published and distributed in furtherance of Cooperative Extension work, Acts of Congress of May 8 and June 30, 1914, by the University of Maine and the U.S. Department of Agriculture cooperating. Cooperative Extension and other agencies of the USDA provide equal opportunities in programs and employment.
Call _PHONE_ or TDD _PHONE_ (in Maine), or _PHONE_, for information on publications and program offerings from University of Maine Cooperative Extension, or visit extension.umaine.edu.
The University of Maine does not discriminate on the grounds of race, color, religion, sex, sexual orientation, including transgender status and gender expression, national origin, citizenship status, age, disability, genetic information or veteran's status in employment, education, and all other programs and activities. The following person has been designated to handle inquiries regarding non-discrimination policies: Director, Office of Equal Opportunity, 101 North Stevens Hall, _PHONE_.
Image Description: Print Friendly
Image Description: apples ripening on the tree; photo by Edwin Remsberg, USDA
Image Description: illustration showing the proper depth for planting
| 2.059085 |
HuggingFaceFW/fineweb-edu
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.