text
stringlengths
236
608k
id
stringlengths
47
47
metadata
dict
People who feel comfortable defending their views—defensively confident—may also eventually change those views and corresponding behaviors. National Election Studies surveys showed that defensive confidence predicted defection in the 2006 U.S. House elections, above and beyond the impact of various demographic and political variables. Moreover, defensive confidence was also associated with political knowledge and attention to politics and government affairs, but not attention to the news. Finally, males, more educated citizens, ethnic minorities, and older respondents had higher reported defensive confidence than did females, less educated citizens, European Americans, and younger respondents. Defensive confidence may be a crucial factor for a deeper understanding of political behavior. - Nitsiyihkâson: The Brain Science Behind Cree Teachings Of Early Childhood Attachment - A Therapeutic Approach to Jurisprudence: A Differential Thinking Model of Sanctions and Rewards - A Review and Analysis of Routine Outcome Measures for Forensic Mental Health Services - Patient Focus Group Responses to Peer Mentoring in a High-Security Hospital - What Do Juvenile Probation Officers Think of Using the SAVRY and YLS/CMI for Case Management, and Do They Use the Instruments Properly? Category Specific RSS
<urn:uuid:d8a7c1a9-48b2-4328-bce6-188b4f7ea767>
{ "dump": "CC-MAIN-2014-35", "url": "http://ifp.nyu.edu/2012/journal-article-abstracts/are-confident-partisans-disloyal-the-role-of-defensive-confidence-in-party-defection/", "date": "2014-08-31T08:13:52", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500837094.14/warc/CC-MAIN-20140820021357-00359-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9172150492668152, "token_count": 248, "score": 2.734375, "int_score": 3 }
|Amazon Price||New from||Used from| Now, The Politically Incorrect Guide(tm) to the Constitution shows that there is very little relationship between the Constitution as ratified by the thirteen original states more than two centuries ago and the "constitutional law" imposed upon us since then. Instead of the system of state-level decision makers and elected officials the Constitution was intended to create, judges have given us a highly centralized system in which bureaucrats and appointed--not elected--officials make most of the important policies. In The Politically Incorrect Guide(tm) to the Constitution, Professor Kevin Gutzman, who holds advanced degrees in both law and American history: * explains how the Constitution was understood by the founders who wrote it and the people who ratified it * follows the Supreme Court as it uses the fig leaf of the Constitution to cover its naked usurpation of the rights and powers the Constitution explicitly reserves to the states and to the people * shows how we slid from the Constitution's republican federal government, with its very limited powers, to an unrepublican "judgeocracy" with limitless powers * reveals how huge swaths of American law and society were remade in the wake of Supreme Court rulings * reveals how the Fourteenth Amendment has been twisted to use the Bill of Rights as a check on state power instead of on federal power, as originally intended * exposes the radical inconsistency between "constitutional law" and the rule of law * contends that the judges who receive the most attention in history books are celebrated for acting against the Constitution rather than for it As Professor Gutzman shows, constitutional law is supposed to apply the Constitution's plain meaning to prevent judges, presidents, and congresses from overstepping their authority. If we want to return to the founding fathers' vision of the Republic, if we want the Constitution enforced in the way it was explained to the people at the time of its ratification, then we have to overcome the "received wisdom" about what constitutional law is. The Politically Incorrect Guide(tm) to the Constitution is an important step in that direction. Great read explaining the complicated nature of the US today and how from the very start the people who wished a strongly centralized government erroded the liberties guaranteed by... Read morePublished 23 days ago by Louis S. Menyhert How can we call ourselves patriotic constitutionalists if we're ignorant of what it says and why the Framers adopted it?Published 2 months ago by Roberto E. Benitez Read this book and find out what really makes America different from the rest of the world! How do you know what you stand to lose if you don't understand, or know your rights?? Read morePublished 2 months ago by Michael J. Nellett My son is reading this fos history . It has given him a love for the constitution he never had before. Thank you so much for opening both of our eyes!Published 5 months ago by Daniel Barker This is an extremely interesting book! It is very historical and gives you the back round story of how things happened and why it happened. Read morePublished 7 months ago by Jane A. Penuel This b provides an excellant education on what the Constitution really should be, & isn't under this so-called constitutional scholar.Published 7 months ago by Amazon Customer I found the book extremely hard to read. It is full of facts, and interesting insights into the constitution from the early years of the country through modern interpretation. Read morePublished 8 months ago by Florence, SC It explains many of the issues I was having with the implementation of the Constitution. Those that wanted a fully functional national government and had not gotten their way... Read morePublished 9 months ago by Jim Watson
<urn:uuid:86224c23-6f64-4d0d-a15a-ffe158346363>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.amazon.com/Politically-Incorrect-Guide-Constitution-Guides/dp/1596985054", "date": "2014-08-31T08:50:49", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500837094.14/warc/CC-MAIN-20140820021357-00359-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9606321454048157, "token_count": 760, "score": 2.671875, "int_score": 3 }
Thank you for helping us expand this topic! Simply begin typing or use the editing tools above to add to this article. Once you are finished and click submit, your modifications will be sent to our editors for review. The topic intra-articular fibrocartilage is discussed in the following articles: Intra-articular fibrocartilages are complete or incomplete plates of fibrocartilage that are attached to the joint capsule (the investing ligament) and that stretch across the joint cavity between a pair of conarticular surfaces. When complete they are called disks; when incomplete they are called menisci. Disks are found in the temporomandibular joint of the lower jaw, the sternoclavicular... Click anywhere inside the article to add text or insert superscripts, subscripts, and special characters. You can also highlight a section and use the tools in this bar to modify existing content: Add links to related Britannica articles! You can double-click any word or highlight a word or phrase in the text below and then select an article from the search box. Or, simply highlight a word or phrase in the article, then enter the article name or term you'd like to link to in the search box below, and select from the list of results. Note: we do not allow links to external resources in editor. Please click the Websites link for this article to add citations for
<urn:uuid:4e3a38dc-57c0-4638-a932-08d49137588f>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.britannica.com/EBchecked/topic/291919/intra-articular-fibrocartilage", "date": "2014-08-31T09:23:54", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500837094.14/warc/CC-MAIN-20140820021357-00359-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.8536220788955688, "token_count": 298, "score": 2.953125, "int_score": 3 }
Scientists Grow New Frog Eyes From Stem Cells November 21, 2008 10:13 AM comment(s) - last by The frog tadpole on the left was implanted with stem cells to give it a new eye, seen on the right. The discovery could one day restore sight in humans. (Source: Michael Zuber) Scientist help disabled frogs live fuller lives -- and hopefully someday humans too Technology promises to cure many ailments in the near future, from to blindness. In the case of blindness, the only question is whether an or an organic stem-cell driven solution will be the first to hit the market and gain mainstream acceptance. Supporters of the stem cell approach got a big boost from new research at the SUNY Upstate Medical University, in Syracuse, NY. Researcher Michael Zuber and his colleagues report that by taking stem cells from frog eggs, they're able to prod the cells to grow into eyes when attached to tadpoles, baby frogs. In order to get the cells to become eyes , the team genetically modified them, inserting transcription factors (proteins that trigger expression of other genes) which are known to regulate eye growth and development. The scientists then implanted the cells into tadpoles missing an eye. The cells properly developed and differentiated into all seven types of retinal cells and appeared to have the proper structure. Additionally the new eye attached properly to the brain. In swimming tests the eye was shown to be working as implanted tadpoles only swam to the white side of the tank (normal behavior), while blind ones would also swim to the black side of the tank. Would the technique work on mammals? The answer is maybe -- frogs naturally have a much easier type regrowing tissues than humans, in fact they can be triggered to regrow legs and many amphibians can regrow lost tails. Triggering proper differentiation in mammals is much more complex. Nonetheless, Professor Zuber hopes that chemicals will be found from the research that can activate transcription factors in humans. Even if a full eye could not be grown, this could help people with retinal disorders regenerate ocular tissue. In a separate, but perhaps equally intriguing study performed by Sujeong Jang of Chonnam National University, in South Korea, and his colleagues, the researchers were able to restore the hearing of deaf guinea pigs by implanting them with human neural stem cells obtained from human bone marrow. This article is over a month old, voting and posting comments is disabled RE: It never ends! 11/23/2008 5:37:54 PM This TOTALLY proves the superiority of the PS3 over the 360. RE: It never ends! 11/24/2008 5:55:18 AM I toadally disagree... "Young lady, in this house we obey the laws of thermodynamics!" -- Homer Simpson Single Neuron Un-Paralyzes Monkeys in Test October 17, 2008, 11:14 AM Stretchable Electronics Yield First Electronic Eyeball August 7, 2008, 4:42 PM Researchers Make Leap in Stem Cell Research; Cells Can Now be Produced From Any Tissue July 2, 2008, 10:03 AM Nail Polish May Soon be Able to Detect Date Rape Drugs August 26, 2014, 7:57 AM SpaceX Falcon 9-R Rocket Suffers Malfunction, Self-Destructs During Test Flight August 23, 2014, 9:36 AM Texas Chosen as Site for SpaceX's First Commercial Launchpad August 5, 2014, 1:44 PM South Carolina Prison Finds Crashed Drone Carrying Drugs, Phones August 1, 2014, 2:49 PM NASA's Mars 2020 Rover Gains Seven New Instruments for Exploration August 1, 2014, 1:30 PM NASA Opportunity Rover Breaks Record for Most Miles Traveled on Another Planet July 29, 2014, 1:38 PM Most Popular Articles Microsoft's Surface 2 Tablet Family Gets a $100 Price Cut August 25, 2014, 1:16 AM Owner of "Decepticon" Maserati Ordered to Appear in Court This Thursday August 25, 2014, 7:55 AM LG Posts Teaser Video of Its “Round Face” G Watch R Smartwatch, Set for IFA Lauch August 24, 2014, 2:49 PM Windows 9: "Upgrade Now" Button Coming for Enterprise Updates, ARM Preview in H1 2015 August 26, 2014, 8:00 PM Second ZMapp-Treated Patient Dies of Ebola, Supplies Run Out August 25, 2014, 7:03 PM Latest Blog Posts Space Terrorism is a Looming Threat For the United States Apr 23, 2014, 7:47 PM Facebook Aims to Provide Internet to "Every Person in the World" with Drones, Satellites Apr 1, 2014, 10:20 AM Retail Mobile Sites Experience Outages in Light of Simplexity's Bankruptcy Mar 14, 2014, 8:48 AM Tesla vs. BMW: Who Has the Safer EV? Feb 1, 2014, 2:56 PM Justice Leaks Details of Next HTC One Two Flagship Phone Dec 5, 2013, 4:04 PM More Blog Posts Copyright 2014 DailyTech LLC. - Terms, Conditions & Privacy Information
<urn:uuid:e1654eee-3b4e-4766-9a93-74a9816c5f11>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.dailytech.com/article.aspx?newsid=13501&commentid=370915&threshhold=1&red=832", "date": "2014-08-31T09:37:38", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500837094.14/warc/CC-MAIN-20140820021357-00359-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.8658162355422974, "token_count": 1121, "score": 3.515625, "int_score": 4 }
The U.S. Helps Reconstruct the Ottoman Empire Each of these United States military interventions occurred in an area that had been part of the Ottoman Empire, and where a secular regime was replaced by an Islamist one. So far, the German policy of keeping hidden its leadership role in its attempt to reconstitute the Ottoman Empire has succeeded. Since the mid-1990s the United States has intervened militarily in several internal armed conflicts in Europe and the Middle East: bombing Serbs and Serbia in support of Izetbegovic's Moslem Regime in Bosnia in 1995, bombing Serbs and Serbia in support of KLA Moslems of Kosovo in 1999, bombing Libya's Gaddafi regime in support of rebels in 2010. Each intervention was justified to Americans as motivated by humanitarian concerns: to protect Bosnian Moslems from genocidal Serbs, to protect Kosovo Moslems from genocidal Serbs, and to protect Libyans from their murderous dictator Muammar Gaddafi. Other reasons for these interventions were also offered: to gain for the United States a strategic foothold in the Balkans, to defeat communism in Yugoslavia, to demonstrate to the world's Moslems that the United States is not anti-Moslem, to redefine the role of NATO in the post-Cold War era, among others. Each of these United States military interventions occurred in an area that had been part of the Ottoman Empire. In each, a secular regime was ultimately replaced by an Islamist one favoring sharia law and the creation of a world-wide Caliphate. The countries that experienced the "Arab Spring" of the 2010s without the help of American military intervention, Tunisia and Egypt, had also been part of the Ottoman Empire, and also ended up with Islamist regimes. In the United States most discussions of the military conflicts of the 1990s in the Balkans and the "Arab Spring" of the 2010s do not mention that the areas involved had been part of the Ottoman Empire; these included Turkey, the Moslem-populated areas around the Mediterranean, Iraq, the coastal regions of the Arabian Peninsula and parts of the Balkans. In the areas that experienced the Arab Spring Turkey's role in every instance has been to support the rebels and quickly recognize them as the legitimate government of the country in upheaval. Turkish leaders do make the connection between the conflicts in the Bosnia, the "Arab Spring" and the Ottoman Empire. Harold Rhode, an American expert on Turkey, has reported: [President of Turkey] Erdogan's recent electoral victory speech puts his true intentions regarding Turkey's foreign policy goals in perspective. He said that this victory is as important in Ankara as it is in the capital of Bosnia-Herzegovina, Sarajevo, under Ottoman times, an important Ottoman city; that his party's victory was as important in a large Turkish city Izmir, on the Western Anatolian coast, as it is in Damascus, and as important in Istanbul as it is in Jerusalem…. In saying that this victory is as important in all of these former Ottoman cities, Erdogan apparently sees himself as trying to reclaim Turkey's full Ottoman past. The occurrence that since 1990 each European and Middle Eastern country that experienced American military intervention in an internal military conflict or an "Arab Spring" has ended up with a government dominated by Islamists of the Moslem Brotherhood or al-Qaeda variety fits nicely with the idea that these events represent a return to Ottoman rule. Besides being a political empire ruling a territory and its population, the Ottoman Empire claimed to be a Caliphate with spiritual suzerainty over all Moslems – those within its borders and those beyond. Though it might seem strange at first, the idea of advancing the renewal of the Ottoman Empire on two tracks – breaking down the post-Ottoman political structure and promoting a Caliphate which Islamists say they long for – is really quite reasonable. Just as the Balkan conflicts of the 1990s and the "Arab Spring" of the 2010s considered in historical perspective suggests that Turkey might be attempting to recreate its former empire, consideration of the Turkish Empire in historical perspective suggests the possible partnership of Germany with Turkey in the project given that, from its creation in 1870, Germany viewed Turkey with its empire as a most valuable client and ally. In the view of the leaders of Germany, Turkey was controllable through a combination of economic intercourse, gifts of educational opportunities, provision of technical expertise and administrative aid, as well as bribes to Turkish officials. Germany saw influence over Turkey as a means of influencing Moslems worldwide for its own interests. Thus as the German scholar Wolfgang Schwanitz has shown, during World War I Germany employed the Turkish Caliphate to promote jihad – riot and rebellion – in areas where Moslem populations were ruled by its enemies Russia, France, Britain and Serbia. Yet in the 50-odd articles collected in an exploration of the awareness on the part of Americans of a possible Turkish connection with the "Arab Spring," I found not a single mention of "Germany." Only from a link in one of those articles – to an article on the International Criminal Court (ICC) which, with its indictment of Muammar Gaddafi and issue of a warrant for his arrest, provided the "legal" basis legitimizing NATO's bombing of Libya -- which gave the rebels their victory and ended the Gaddafi regime – did I find mention of Germany. From that article, "A Lawless Global Court" by John Rosenthal (Policy Review Feb. 1. 2004 No.123), one learns that the ICC is a project initiated, promoted and, to a considerable extent, funded by Germany. Given this, the idea that the ICC serves Germany's purposes is common sense. Through the ICC connection, Germany's promotion of the "Arab Spring" is clear. Yet it is never or almost never mentioned. This silence calls for explanation. Later, I did come across an explicit reference to Germany's role in it -- specifically in the war against the Assad regime in Syria -- in John Rosenthal's article "German Intelligence: al-Qaeda all over Syria" in the online Asia Times -- which reports that the German government supports the rebels and their political arm, the Syrian National Council (SNC), against Assad; that the German government classified [made secret] "by reason of national interest" the contents of several BND (German foreign intelligence) reports that the May 25, 2012 massacre of civilians in the Syrian town of Houla, for which Assad has been blamed, was in fact perpetrated by rebel forces; and that "the German foreign office is working with representatives of the Syrian opposition to develop 'concrete plans' for a 'political transition' in Syria after the fall of Assad." So far the German policy of keeping hidden its leadership role in the attempt to reconstitute the Ottoman Empire seems to have succeeded. Each U. S. military action in Europe and the Middle East since 1990, however, with the exception of Iraq, has followed an overt pattern: First there is an armed conflict within the country where the intervention will take place. American news media heavily report this conflict. The "good guys" in the story are the rebels. The "bad guys," to be attacked by American military force, are brutally anti-democratic, and committers of war crimes, crimes against humanity, and genocide. Prestigious public figures, NGOs, judicial and quasi-judicial bodies and international organizations call for supporting the rebels and attacking the regime. Next, the American president orders American logistical support and arms supplies for the rebels. Finally the American president orders military attack under the auspices of NATO in support of the rebels. The attack usually consists of aerial bombing, today's equivalent of the nineteenth and twentieth centuries' gunboat which could attack coastal cities of militarily weak countries without fear of retaliation. The ultimate outcome of each American intervention is the replacement of a secular government with an Islamist regime in an area that had been part of the Ottoman Empire. Why the government of the United States would actively promote German aims -- the destruction of Yugoslavia (both World Wars I and II saw Germany invade Serbia) and the re-creation of the Ottoman Empire -- is a question that needs to be answered. Robert E. Kaplan is an historian, doctorate from Cornell University, specializing in modern Europe. Reader comments on this item |A fine article but with a few caveats [309 words]||Geoffrey Britain||Jun 26, 2013 20:23| |Kosovo War didn't have anything to do with 'Moslem protection' [56 words]||Alba||Jun 11, 2013 10:57| |↔ @ "Kosovo War didn't have anything to do with 'Moslem protection'" [75 words]||Rod Svarozic||Jun 21, 2013 07:53| |German-Turkish friendship seems eternal! [18 words]||James||Jun 9, 2013 22:00| |"Germanization" of Europe and pre-WWI status reestablishment [244 words]||Jacob Marris||Jun 9, 2013 21:07| |This is a wonderful piece of anti-Germanism [45 words]||Daniel Frick||Jun 6, 2013 14:42| |Makes sense [20 words]||Diana||Jun 2, 2013 20:26| |Future Ottoman Empire [329 words]||Vivienne||Jun 2, 2013 08:11| |What's the reason behind the plot? [129 words]||J. Chen||Jun 1, 2013 20:11| |Grasping [80 words]||Herbie Quasar||Jun 1, 2013 16:40| |Turks in Europe [28 words]||Rick||Jun 1, 2013 13:48| |Sounds like a conspiracy theory [233 words]||Merowig||May 31, 2013 09:32| |Wishful thinking [47 words]||Bart Benschop||May 31, 2013 06:00| |Reconstruct Armenia? [39 words]||David Davidian||May 30, 2013 16:31| |American involvevent in Libya [120 words]||Jan Jires||May 30, 2013 08:37| |Thought-provoking [49 words]||Vince Scopa||May 30, 2013 07:27| |The EU, Turks in Germany, and Erdogan [160 words]||Judith Rood||May 30, 2013 02:22| |Why aren't we taught these things? [57 words]||April Martin||May 30, 2013 00:52| |Rodney Atkinson had all this pegged back in 2000 with "Fascist Europe Rising" [75 words]||A Nobody||May 30, 2013 00:45| |Why, indeed. [68 words]||Sadie||May 30, 2013 00:08| |Not just a revival of the Ottoman Empire, but an empire even older? [273 words]||Bankster Slayer||May 29, 2013 21:32| |Rework the title and you have your answer [117 words]||Marcel||May 29, 2013 20:40| |↔ Thank you [25 words]||lmr||May 31, 2013 14:17| |Digging Deeper [78 words]||Fubara David-West||May 29, 2013 18:34| |Thoughtful and well done, Dr. Kaplan! [66 words]||Phillip Slepian||May 29, 2013 13:01| |BND and Syria [7 words]||Jukka Ari Ilari Moisio||May 29, 2013 12:12| |Reconstruction of the Ottoman Empire [33 words]||Jana||May 29, 2013 05:50| |↔ Turkey and Erdogan [108 words]||Willy Vannoort||May 30, 2013 07:13| |↔ This was foretold a long time ago. [11 words]||Hard Case||May 30, 2013 15:55| Comment on this item by Burak Bekdil In Turkey however, the protests were not peaceful. They included smashing a sculpture than was neither Jewish nor Israeli. It was the usual "We-Muslims-can-kill each other-but-Jews-cannot" hysteria. If Turkish crowds were protesting against Israel in a political dispute, why Koranic slogans? Why were they protesting in Arabic rather than their native language? Do Turks chant German slogans to protest nuclear energy? by Burak Bekdil So in the EU-candidate Turkey, a pianist should be punished for his re-tweets, but a pop-singer should be congratulated for her first-class racist hate-speech. This is contagious. No reporter present at Mr. Ihsanoglu's campaign launch speech thought about asking him if his commitment to the "Palestinian cause" included any affirmation of the Hamas Charter, in particular a section that says, "…The stones and trees will say, 'O Muslims, there is a Jew behind me, come and kill him.'" Turkey is also the country where a few years earlier, a group of school teachers (yes, school teachers!) gathered in a demonstration to commemorate Hitler. by Debalina Ghoshal Despite Chapter VII of the UN Charter and UNSC Resolutions, it seems that North Korea will continue developing its missiles -- and eventually weaponize them with nuclear warheads. "North Korea's ballistic and nuclear threat is very much a near-term threat. ... Steady progression in their program is not harmless." — Victor Cha, Centre for Strategic and International Studies. On March 26, 2014, North Korea reportedly test-fired medium-range ballistic Rodong missiles -- capable of reaching Japan and U.S. military bases in the Asia-Pacific region. Since February, South Korean officials claim that North Korea has confirmed at least 90 test-firings, among which ten were ballistic missiles. by Khaled Abu Toameh It is important to note that these cease-fire demands are not part of Hamas's or Islamic Jihad's overall strategy, namely to have Israel wiped off the face of the earth. Many foreign journalists who came to cover the war in the Gaza trip were under the false impression that it was all about improving living conditions for the Palestinians by opening border crossings and building an airport and seaport. These journalists really believed that once the demands of Hamas and the Palestinian Islamic Jihad are accepted, this would pave the way for peace between the Israelis and the Palestinians. To understand the true intention of Hamas and its allies, it is sufficient to follow the statements made by their leaders after the cease-fire announcement this week. To his credit, Ismail Haniyeh, Hamas's leader, has never concealed Hamas's desire to destroy Israel. Hamas and its allies see the war in the Gaza Strip as part of there strategy to destroy Israel. What Hamas and its allies are actually saying is, "Give us open borders and an airport and seaport so we can use them to prepare for the next war against Israel." by Burak Bekdil A front-page headline was particularly revealing: They (Israel) bombed a mosque in Gaza! Including the exclamation mark! A quick internet search, if you typed "mosque bombing Shiite-Sunni," would give you 782,000 results on July 16. Why did we not hear one single Turkish voice protest the death of 300,000 Muslims in Darfur? Hamas's Charter is must-read fun.
<urn:uuid:89b94a0b-179c-4106-a9c3-2f9d5f9a6604>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.gatestoneinstitute.org/3728/germany-new-ottoman-empire", "date": "2014-08-31T08:14:13", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500837094.14/warc/CC-MAIN-20140820021357-00359-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9543068408966064, "token_count": 3210, "score": 2.78125, "int_score": 3 }
View your list of saved words. (You can log in using Facebook.) Italian belltower, originally built beside or attached to a church. The earliest campaniles (7th–10th century) were plain round towers with a few small arched openings near the top; the Leaning Tower of Pisa is an elaborate version of this type. The Venetian form of campanile consisted of a tall, square, slim shaft, frequently tapered, with a belfry at the top, above which rose the spire, sometimes square as in the famous campanile of St. Mark's Basilica (10th–12th century, belfry story 1510). After falling out of favor during the Renaissance, the Venetian type was revived in the 19th century, often in connection with factories, housing, or collegiate buildings. This entry comes from Encyclopædia Britannica Concise. For the full entry on campanile, visit Britannica.com.
<urn:uuid:a92a4214-7ec4-4668-8a78-be57ec9ebbc8>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.merriam-webster.com/concise/campanile", "date": "2014-08-31T09:11:13", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500837094.14/warc/CC-MAIN-20140820021357-00359-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9544927477836609, "token_count": 206, "score": 3.640625, "int_score": 4 }
Chicago: New guidelines from the American Cancer Society urge doctors to make sure their patients fully understand the risks as well as the benefits of prostate cancer screening before any blood is drawn. The updated guidelines issued on Wednesday reflect the ongoing debate over the prostate-specific antigen, or PSA, blood test after two large studies last year produced conflicting results about whether it actually saves lives. "With these newly updated recommendations, the American Cancer Society places even stronger emphasis on shared decision-making between clinicians and patients," Dr. Otis Brawley, chief medical officer of the American Cancer Society, said in a statement. Prostate cancer is the second most common cancer in men worldwide after lung cancer, killing 254,000 men a year. Doctors have routinely recommended PSA tests to men over 50 in the belief that early diagnosis and aggressive treatment for any cancer is better than standing by and doing nothing. But a study published last August in the Journal of the National Cancer Institute found routine screening for prostate cancer resulted in more than 1 million U.S. men being diagnosed with tumors who might otherwise have suffered no ill effects from them. Prostate cancer treatments, including surgery or radiation, can cause incontinence and erectile dysfunction in about a third of patients. Many men also experience bowel problems. "These risks are not inconsequential. We do want to be sure that men know all of this before they make their decision of whether or not to be screened," said Dr. Andrew Wolf of Virginia Health System, who chaired the advisory committee that developed the guidelines published in CA: A Cancer Journal for Clinicians. The updated guidelines recommend that men of average risk get information about the risks and benefits of screening by age 50 before making a decision about the test. Men at higher risk -- including blacks and men with a father or brother who was diagnosed with prostate cancer -- should get this information by age 45. Men with multiple family members who have been diagnosed with prostate cancer before age 65 should have the prostate cancer discussion with their doctors at age 40. The group also recommends that doctors use patient decision aids, including one developed by the Foundation for Informed Medical Decision Making here, which can help men weigh the risks and benefits of screening. "Hopefully, what we`re promoting is that doctors provide as balanced a presentation of the issues as they can," Wolf said in a telephone interview. And they say no screening should be done without giving men a chance to weigh their options. "We are increasingly aware of the fact that many men who do choose to be screened are diagnosed with an early prostate cancer that leads to treatment, and if they had not been screened, they never would have known about a cancer that was never destined to harm them," Wolf said. "That is a very real risk of prostate cancer screening that has become increasingly clear since our last guideline update in 2001," Wolf said. "The other risks are those of treating prostate cancer that is found through early detection."
<urn:uuid:e0b75d6b-99b6-44aa-9eb6-064ef6538462>
{ "dump": "CC-MAIN-2014-35", "url": "http://zeenews.india.com/news/health/health-news/new-guidelines-on-prostate-cancer-urge-frank-talk_7261.html", "date": "2014-08-31T08:28:19", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500837094.14/warc/CC-MAIN-20140820021357-00359-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9695121645927429, "token_count": 607, "score": 2.546875, "int_score": 3 }
Well is a word many people have problems with. I remember when a friend pointed out I was using too many wells in my early writing days, in a manuscript that is temporarily shelved. I ended up deleting quite a few. Thankfully, I tend to catch myself when I write it now, but I still need to go through and take out the unnecessary ones. Here are the examples from The Proper Way to Say Goodbye where I deleted the wells. -Mom wasn’t a pet person, so we never had any— well except for when Brock brought home those hermit crabs in high school. -Well, thank you for the help, Chloe. -Well, I have to get going now. -Well, don’t worry, she’s much nicer than my mom. The well just doesn’t do anything for the sentence. It’s totally unnecessary. But well is also a word you may use to establish the voice of a character. I chose Murphy to be the one who uses it in his speech. Then for most of the other people, I deleted it, except in the rare occasion. 3 Responses to “Sloppy Writing 101.39” Leave a Reply
<urn:uuid:fdc2f28c-fe31-45d4-bfd8-84e25c718f61>
{ "dump": "CC-MAIN-2014-35", "url": "http://literaryengineer.areavoices.com/2012/11/23/sloppy-writing-101-39/", "date": "2014-09-02T23:37:38", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535923940.4/warc/CC-MAIN-20140909031806-00122-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9688223600387573, "token_count": 256, "score": 2.578125, "int_score": 3 }
This definition appears very rarely and is found in the following Acronym Finder categories: See other meanings of UAI We have 49 other definitions for UAI in our Acronym Attic Samples in periodicals archive: 1) Similarly, one can trace current development efforts for directed energy (dE) weapons back to XR's Battlefield Laser Implications Project of 1982 and can trace the Universal Armament Interface back to the stores Integration Program of 1983. Air Force, Air Force Materiel Command, Aeronautical Systems Center and Air Armament Center, Universal Armament Interface Team, worked to standardize the data interface between aircraft and weapons to enable the rapid deployment of precision-guided munitions. Munitions: Increase Precision and Minimize Collateral Damage * Continue development and acquisition of Joint Direct Attack Munitions, Laser-Guided Bombs, and the Small Diameter Bomb * Add weapons data links to ensure day/night/all-weather precision destruction of mobile targets * Incorporate Universal Armament Interface to minimize costs and maximize configuration options * Continue to secure capabilities to enhance interoperability of communication systems to ensure safe operations between Joint and Coalition forces
<urn:uuid:28030ae6-9b32-4a2e-849f-890c9d32db71>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.acronymfinder.com/Universal-Armament-Interface-(UAI).html", "date": "2014-09-02T23:45:50", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535923940.4/warc/CC-MAIN-20140909031806-00122-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.845471203327179, "token_count": 240, "score": 2.640625, "int_score": 3 }
| Other Mechanical Engineering Interview Questions | || Asked @ |what is exactly peripheral velocity in case of two meshing |Explain about powder technology? |IS there any rake angle in blade? which is used to shave the beard ? |why don't we use 2 nd angle and 4 th angle projections ??????(since there is also NOT overlapping of VIEWS in 2 nd angle and 4 th angle projections) |what will happen if we use petrole in diesel engine and diesel in petrole engine |What are the loads considered when designing the Nut and |Kinetic friction when compared to Static friction is? |what is the refrigerent |what type of pump |What would happen if there is air in fuel oil? |what is the purpose of wear rings in centrifugal pumps ? |what are the causes of small two-stroke engine wear? |For more Mechanical Engineering Interview Questions Click Here |
<urn:uuid:0c2ad968-ccad-4090-ad47-af1999580f54>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.allinterview.com/showanswers/151603.html", "date": "2014-09-02T23:44:38", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535923940.4/warc/CC-MAIN-20140909031806-00122-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.8704508543014526, "token_count": 205, "score": 2.578125, "int_score": 3 }
SCHAUMBURG, Ill., May 4 /PRNewswire-USNewswire/ -- Physicians aren't the only ones on the front lines of the 2009 H1N1 flu outbreak. Veterinarians play an important role, too. Whether they're conducting research or serving as "disease detectives" at the Centers for Disease Control and Prevention and the U.S. Department of Agriculture, playing a critical role in state and local health departments or ensuring the health of our domestic swine herds by continuing to give regular vaccinations against influenza and increasing biosurveillance and security measures on farms, veterinarians are in the middle of the action when it comes to identifying and helping control the H1N1 flu. "Veterinary medicine is so much more than giving vaccinations to pets," says Dr. Faye Sorhage, president of the National Association of State Public Health Veterinarians and the New Jersey state public health veterinarian. "When you look at all the new, emerging diseases, there are so many that are zoonotic in origin that require the expertise of both physicians and veterinarians. That's what's happening today. These experts are working side-by-side on this flu virus." And that's a good thing for all involved, says Dr. Russell Currier, the executive vice president of the American College of Veterinary Preventive Medicine, the professional organization responsible for certifying veterinary specialists who work in food animal health and public health. "This new outbreak shows that we have emerging infectious diseases that can spread very quickly," he said. "It took Magellan three years to circumnavigate the globe, but you can do it now in a day." Sorhage echoes those concerns. "Globalization is adding to our concerns, which makes increased surveillance, detection, testing and research, especially when it comes to these new viruses and zoonotic diseases, so important," she said. "The situatio |SOURCE American Veterinary Medical Association| Copyright©2009 PR Newswire. All rights reserved
<urn:uuid:36be3ced-7388-4b08-b9cc-d28450d99dd5>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.bio-medicine.org/medicine-news-1/Flu-Outbreak-3A-Theres-More-Than-One-Doctor-in-the-House-44599-1/", "date": "2014-09-03T01:22:29", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535923940.4/warc/CC-MAIN-20140909031806-00122-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9512475728988647, "token_count": 421, "score": 2.515625, "int_score": 3 }
A report released Thursday on the Slide Fire in Oak Creek Canyon doesn't hold back in laying out the danger facing the burned-out area. The U.S. Forest Service issued the report Thursday afternoon stating the biggest concern is the steeper slopes of Oak Creek Canyon is especially subject to debris flows, rockslides, flash flooding and erosion that could become concentrated flow or a landslide. The report said in smaller streams which flow into larger bodies of water, the time until it peaks can be less than 30 minutes, allowing minimal time to react to a high intensity precipitation event. At high risk are forest campgrounds, day use areas, the Sterling Spring Fish Hatchery and at least 75 homes. Swimming and day use areas along nearly 9.5 miles of state route 89A are now subject to the same potential for rockfalls and debris flow. State Forestry officials are in the midst of emergency treatment to prevent the effects of the Slide Fire. They're using straw bales to anchor down the burned foundation across burned lands. They're implementing aerial seeding and aerial mulching along the hill slopes of weed-free grass which will reduce soil loss and prevent sediment and ash from getting into the water. Along Highway 231, crews will remove three culverts, clean 10 others and repair 20 miles of rolling dips and ditches in the mid- to high-burn areas. Forest officials plan to install warning signs at all access travel ways into the burned area to prevent public entry. They're installing barricades at potential access points into closed areas of the fire. They're also pumping, sanitizing and closing three vault toilets in flood plains to prevent food waters from carrying contaminants to Oak Creek. There's also asbestos testing of a burned cabin adjacent to West Fork of Oak Creek. The human-caused fire started on May 20 and took until June 4 to contain. It burned 21,227 acres and is estimated to have cost $10.1 million. Tuesday, September 2 2014 8:02 PM EDT2014-09-03 00:02:03 GMT The World Food Program says it provided food to a record 4.1 million people inside Syria last month.More > Islamic State extremists released a video Tuesday purportedly showing the beheading of a second American journalist, Steven Sotloff, and warning President Barack Obama that as long as U.S. airstrikes against the militant...More > Tuesday, September 2 2014 4:42 PM EDT2014-09-02 20:42:09 GMT Canadian police say pop star Justin Bieber has been charged with dangerous driving and assault after a collision between a minivan and an ATV led to a physical altercation in southwestern Ontario.More > Canadian pop star Justin Bieber faces new charges after he was arrested for dangerous driving and assault following a collision between a minivan and an ATV that led to a physical altercation involving a photographer, his...More >
<urn:uuid:1ea062dd-4e62-48f7-8e2d-f05f6f9e1904>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.kctv5.com/story/25823691/forest-service-warns-of-dangers-from-slide-fire", "date": "2014-09-03T00:06:08", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535923940.4/warc/CC-MAIN-20140909031806-00122-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9489562511444092, "token_count": 593, "score": 2.546875, "int_score": 3 }
Get the details behind our redesign rickets rick·ets (rĭk'ĭts) A deficiency disease resulting from a lack of vitamin D or calcium and from insufficient exposure to sunlight, characterized by defective bone growth and occurring chiefly in children. Also called infantile osteomalacia, juvenile osteomalacia, rachitis. A bone disease seen mostly in children, caused by a deficiency of vitamin D, usually as a result of inadequate dietary intake or lack of exposure to sunlight. This deficiency causes decreased calcium absorption from the intestine and abnormalities in formation and mineralization of skeletal bone, resulting in defective bone growth and deformity.
<urn:uuid:ecad9533-5b2f-4c26-9418-c1896b22c324>
{ "dump": "CC-MAIN-2014-35", "url": "http://dictionary.reference.com/browse/Rickets%20", "date": "2014-08-20T21:20:08", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500812662.69/warc/CC-MAIN-20140820021332-00227-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.909695029258728, "token_count": 132, "score": 3.1875, "int_score": 3 }
Get the details behind our redesign "There is the proverb, the more cooks the worse potage." [Gascoigne, 1575]Related: Cooker (a type of stove, 1884); cookery (1390s); cooking (1640s). a person employed to perform culinary service. In early times among the Hebrews cooking was performed by the mistress of the household (Gen. 18:2-6; Judg. 6:19), and the process was very expeditiously performed (Gen. 27:3, 4, 9, 10). Professional cooks were afterwards employed (1 Sam. 8:13; 9:23). Few animals, as a rule, were slaughtered (other than sacrifices), except for purposes of hospitality (Gen. 18:7; Luke 15:23). The paschal lamb was roasted over a fire (Ex. 12:8, 9; 2Chr. 35:13). Cooking by boiling was the usual method adopted (Lev. 8:31; Ex. 16:23). No cooking took place on the Sabbath day (Ex. 35:3).
<urn:uuid:2a196c52-d37b-4264-a0f8-ca125193fff3>
{ "dump": "CC-MAIN-2014-35", "url": "http://dictionary.reference.com/browse/f+cook?qsrc=2446", "date": "2014-08-20T20:57:46", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500812662.69/warc/CC-MAIN-20140820021332-00227-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9562422633171082, "token_count": 228, "score": 3.28125, "int_score": 3 }
College Admissions Educational and Parenting Articles Browse college admissions educational and parenting articles. Browse all our articles by topic and grade, or use the search. - Getting Into College: The Personal Statement - How Will I Know What Courses to Take at Community College? - What College Admissions Officers Look For: Transcript, Academic Averages, Class Rank, Types of Courses Taken - 10 Tips for Math Success - How Colleges and Students Differ: Liberal Arts Colleges & Research Universities - ACT Write: Example Essays and Their Scores - What College Admissions Officers Look For: How Important Are Letters of Recommendation? - IB or Not IB? Is International Baccalaureate Right for Your Child? - What College Admissions Officers Look For: How Do Colleges View Summer and Other Experiences? - Why Has College Admissions Become So Competitive? : It Used to be Simple...But Not Anymore
<urn:uuid:71a049d1-9148-44b1-acaf-bea50ced8d90>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.education.com/articles/college-admissions/", "date": "2014-08-20T21:28:43", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500812662.69/warc/CC-MAIN-20140820021332-00227-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.8112236857414246, "token_count": 192, "score": 2.53125, "int_score": 3 }
Television has been an increasingly predominant player in American election politics over the years, especially with presidential elections in the United States. In 1993, Newton M. Minow, director of the Annenberg Washington Program, and Marvin Kalb, director of the Joan Shorenstein Barone Center at Harvard University, stated "[t]he modern presidential campaign is essentially a television event. The campaign reaches nearly all voters through television, and it reaches some of them exclusively through television; for them, the television campaign is the campaign."(1) Given the undisputed impact of television on election campaigns, it is little wonder that the television debate(2) between political candidates has emerged as one of the most crucial events for voters and candidates. NBC Executive Producer William O. Wheatley, Jr. said: I believe the Presidential debates to be of critical importance in the way our nation goes about choosing a leader. Indeed, it seems clear that they have become the most important events of the election-year calendar, the best opportunity for the candidates to make their cases directly to a large audience of potential voters and the best chance for the voters to listen carefully and weigh what the candidates have to say.(3) On the other hand, various issues relating to television debates have been a topic of heated discussion among politicians and broadcasters over the years.(4) Congress held hearings on presidential debates on television in June 1993. Al Swift, chairman of the House Subcommittee on Elections, noted during the hearings: "If Presidential debates are now a fixture, then they should be presented to the voters in the most unfiltered and fair way possible. Many questions need to be addressed. Who should sponsor these debates? ... Who should be included? ... What is the role of the media ...?(5) The questions posed by Swift are not separate from each other; they overlap in that the broadcast media's direct participation as a sponsor of candidate debates often involves the media in determining who should be included in or excluded from the debates. Also, what kind of broadcast media are involved as debate sponsors? Are the sponsoring media public stations or private commercial stations? These and related questions can be critical because the fundamental rationale behind public broadcasting differs significantly from that of commercial television.(6) Nevertheless, public television and radio stations operated by state and local governments have the same rights and responsibilities under the First Amendment as any private commercial station.(7) On the other hand, judicial interpretations of the editorial rights of state-owned stations in their programming decisions have yet to offer a sense of consistency and predictability to public broadcasting stations. The U.S. Court of Appeals for the Fifth Circuit, for example, held in 1982 that the First Amendment rights of viewers do not impose limits on the programming discretion of public television stations licensed to state instrumentalities.(8) The court found that the public television stations in question did not provide the general public a right of access and held that they were not "public forums."(9) By contrast, the U.S. Court of Appeals for the Eighth Circuit in Forbes v. Arkansas Educational Television Communication Network Foundation (Forbes I)(10) ruled that government-owned television stations could be limited public forums when they sponsor debates for political candidates. The Eighth Circuit in Forbes v. Arkansas Educational Television Commission (Forbes II)(11) affirmed its earlier conclusion that the debate was a limited public forum and a legally qualified candidate could be excluded only if the public station sponsoring the debate had a compelling and narrowly tailored governmental interest.(12) In an effort to clarify the lower courts' conflicting interpretations of the editorial decisions of public broadcasting stations, the U. …
<urn:uuid:672950e7-403a-4b14-b13d-f8f12ad755fb>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.questia.com/library/journal/1G1-62357176/editorial-rights-of-public-broadcasting-stations-vs", "date": "2014-08-20T20:34:23", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500812662.69/warc/CC-MAIN-20140820021332-00227-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9628096222877502, "token_count": 733, "score": 2.625, "int_score": 3 }
In J. R. R. Tolkien’s book The Hobbit, the wizard Gandalf explains why he has selected a small hobbit like Bilbo to accompany the dwarves to fight the enemy. He says, “Saruman believes it is only great power that can hold evil in check, but that is not what I have found. I found it is the small everyday deeds of ordinary folk that keep the darkness at bay. Small acts of kindness and love.” That’s what Jesus teaches us as well. Warning us that we would live in dark times, He reminded us that because of Him we are “the light of the world” (Matt. 5:14) and that our good deeds would be the power against the darkness for the glory of God (v.16). And Peter, writing to believers in Christ who were facing severe persecution, told them to live so that those accusing them would “by [their] good works which they observe, glorify God” (1 Peter 2:12). There is one force that the darkness cannot conquer—the force of loving acts of kindness done in Jesus’ name. It is God’s people who turn the other cheek, go the extra mile, and forgive and even love their enemies who oppose them who have the power to turn the tide against evil. So look for the privileged opportunity to perform acts of kindness today to bring the light of Christ to others. Lord, teach me the folly of trying to repay evil for evil. May I be so grateful to You for the loving acts of kindness that You have shown me that I gladly look to share good deeds with others as well! Light up your world with an act of kindness. Taken from the Sermon on the Mount, today’s passage presents some of the behavioral expectations of the kingdom of God and stresses authenticity. Using the recognizable images of salt and light, Jesus tells His listeners that they cannot follow Him in secret. Salt must be salty and light must illuminate. However, we must be careful not to assume that it is goodness for goodness’ sake that is expected of God’s people. Good deeds are what bring God glory and reflect His character to the world (v.16). In the African country where my friend Roxanne lives, water is a precious commodity. People often have to travel long distances to collect water from small, contaminated creeks—leading to sickness and death. It’s difficult for organizations like orphanages and churches to serve the people because of a lack of water. But that’s beginning to change. Through Roxanne’s leadership and the unselfish gifts of some loving people in established churches, clean water wells are being dug. At least six new wells are now operational, allowing churches to be centers of hope and encouragement. A health center and a home for 700 orphans will also be able to be opened because of access to water. That’s the kind of love that can flow from believers in Christ when we have experienced the love and generosity of God. Paul says in 1 Corinthians 13 that if we don’t have love, our voices clang on people’s ears and our faith means nothing. And the apostle John says that if we have material possessions and see others in need and take action, that’s evidence that God’s love is abiding in us (1 John 3:16). God desires that we deal “graciously” (Ps. 112:5) with those in need, for His heart is gracious toward us. Be not weary in your serving; Do your best for those in need; Kindnesses will be rewarded By the Lord who prompts the deed. —Anon. Kindness is Christianity with its working clothes on. While there is no designation of the author of Psalm 112, the common speculation is for Davidic authorship. It may well have been written as a companion to Psalm 111. In both songs, the verses are written in alphabetical order, and both share the theme of the characteristics and life of the person blessed by God. Psalm 111 focuses on the God who blesses, while Psalm 112 focuses on the person who is blessed. There is an old adage that says, “Don’t bite off more than you can chew.” It’s wise not to take on more responsibilities than we can handle. At some time, however, we will likely feel overwhelmed by the size and difficulty of a task we have agreed to do. This can happen even in our walk of faith in Christ when our commitment to God seems too much to bear. But the Lord has an encouraging word for us when our confidence wavers. The writer of Hebrews urged his readers to recall the courage they demonstrated during the early days of their faith (10:32-33). Despite public insults and persecution, they aided believers in prison, and they joyfully accepted the confiscation of their own property (vv.33-34). With that in mind, he says, “Therefore, do not cast away your confidence, which has great reward. For you have need of endurance, so that after you have done the will of God, you may receive the promise” (vv.35-36). Our confidence is not in ourselves but in Jesus and His promise to return at just the right time (v.37). It is God’s power that enables us to continue in our journey of faith. Recalling the Lord’s faithfulness in days past stirs our confidence in Him today. When life becomes a heavy load, An upward climb, a winding road, In daily tasks, Lord, let me see That with me You will always be. —D. DeHaan Trusting God’s faithfulness stirs up our confidence. Severely opposed and persecuted, Jewish Christians were pressured to abandon Christianity and to revert to Judaism. The unnamed writer of Hebrews encouraged them to continue in the faith by affirming the preeminence, superiority, and sufficiency of Christ through His person and position (Heb. 1–4) and His work of propitiation (chs. 5–10). He also warned them against rejecting Christ (2:1-3; 3:7-15; 6:4-6). Here, in his final exhortation, he reminded them of their exemplary faithfulness in enduring the mistreatments thus far (10:32-34) and of the great reward that would be theirs if they persevered (vv.35-36). He was confident that they would succeed (v.39).
<urn:uuid:ffbfaaa7-bf00-4ddd-929f-37092fa8939f>
{ "dump": "CC-MAIN-2014-35", "url": "http://odb.org/", "date": "2014-08-22T05:53:37", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500823169.67/warc/CC-MAIN-20140820021343-00169-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9571931958198547, "token_count": 1383, "score": 2.546875, "int_score": 3 }
About افلام تركيه سكس افلام تركيه سكس افلام نيك كنقو Six months later, when the Earth is on the opposite side of the Sun, the northern hemisphere is tilted away from the Sun and experiences winter. In some cultures, individuals born during a new moon or suffering from epilepsy were considered likely to be werewolves. افلام تركيه سكس The solstices mark the two dates during the year on which the Earth`s position in its orbit is not such that its axis is not most directly tilted either toward or away from the Sun. Although the Milankovitch theory is not well-grounded astronomically, it remains controversial. افلام نيك كنقو افلام نيك اطفال Involuntary werewolves, on the other hand, are werewolves by an accident of birth or health. The Milky Way is also a spiral galaxy, with the youngest and most massive stars collected in arms that curl around the galactic center. When Revers stepped outside, he was astounded to see a creature, which he described as: ??looking like a black cat ? but with hairy wings on its back. They hoped for a life free from the tyranny of kings and queens. Earth`s orbit defines a two-dimensional plane which we call the ecliptic.
<urn:uuid:c7601c28-88af-46e3-9959-a46f3d122afc>
{ "dump": "CC-MAIN-2014-35", "url": "http://tamugaia.com/ssvsch/?v=%D8%A7%D9%81%D9%84%D8%A7%D9%85%20%D8%AA%D8%B1%D9%83%D9%8A%D9%87%20%D8%B3%D9%83%D8%B3", "date": "2014-08-22T06:03:50", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500823169.67/warc/CC-MAIN-20140820021343-00169-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9274570941925049, "token_count": 343, "score": 2.84375, "int_score": 3 }
SCIENCE WATCH; 'Fingerprinting' Insects Published: September 14, 1982 In the insect world, different species can resemble each other, even though they are not the same genetically. This may not matter to the insects, but to scientists seeking ways of controlling insect crop pests by biological means, the outward similarity that masks a genotypic difference can cause a pest control program to fail. A pest-control strategy that relies on sterilizing male insects, and having them mate with female insects in the field to reduce the pest population, requires that the male be of the same species the female belongs to. Otherwise, raising all those sterile males will have gone for naught because different species will not mate with each another. But United States Department of Agriculture scientists have developed a system of identifying insects by electrically charting the molecular movements of their enzymes, using a procedure known as electrophoresis. Each species of insect was found to have its own characteristic ''signature'' pattern of enzyme movements, enabling the scientists to record more accurate genetic profiles of each insect type than they had previously been able to do. In initial experiments on pink bollworms, which inflict heavy losses on cotton crops, the electrophoresis charts enabled the scientists to successfully profile seven different types of bollworms in Arizona, California and the Virgin Islands. Dr. Alan C. Bartlett, insect geneticist for the Agriculture Department's Research Service, said that by identifying the genetic makeup of the similar-appearing but different species, experts were able to select specific insects compatible for mating in pest-control strategies. Combining the more precise profiles with knowledge of each insect's susceptibilities should make it easier to thwart pest outbreaks and to control infestations that spread to a new area. Light-Transmitting Plants After four years of research, most of it in total darkness, a Stanford University plant biologist has discovered that some plants have a system of fiber optics that can transmit light up and down their tissues in a way similar to the method the telephone company uses to transmit many of its telephone calls. Dr. Dina Mandoli, seeking to find the light-transmitting properties of plants, had to rely on her sense of touch as she placed tissues of oat, mung bean and corn grown in total darkness in separate holders in a small cell-like room completely devoid of light. She then focussed a narrow-beam helium-neon laser light on one cut end of a plant tissue segment or on an uncut side. Any transmitted light could then be measured at the opposite cut end by an array of lightsensing equipment. Her research showed that the tissues acted as multifiber optical bundles that could send images faithful to the original light patterns as far as one inch or more along the plant stem, even around curves. In fact, she found that the plant tissues were about 10 percent as good at transmitting light as a glass fiber - a performance inadequate for human messages but apparently good enough for a plant. In other experiments she found that more light was transmitted internally on the far, or shaded, side of the plant stem than along the lighted side. And since light speeds plant growth, it is believed that this unique optical ability of plants is the reason why the stems, stalks and trunks of most plants tend to incline toward the sun as they grow. The results of the study are also thought to help explain why a seedling can respond to light even though most of the plant is underground, a process that has long puzzled plant scientists. Dr. Mandoli's research was conducted at the Carnegie Institution's Department of Plant Biology in Stanford, Cal., and at Stanford University, and was reported in the Proceedings of the National Academy of Sciences.
<urn:uuid:d2805c58-05ca-4854-8c5e-13017a89b438>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.nytimes.com/1982/09/14/science/science-watch-fingerprinting-insects.html", "date": "2014-08-22T06:25:59", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500823169.67/warc/CC-MAIN-20140820021343-00169-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.955776035785675, "token_count": 766, "score": 3.703125, "int_score": 4 }
Water usage in your family’s home can be quite variable and is affected by many factors including the number of adults and children living in your home, the age of your children, your home’s size as well as the number of bathrooms. It is often difficult to measure water usage since the amount of water used for cooking, bathing, showering and cleaning varies in every home and depends on the water fixtures and appliances installed in your home. For example, we all know that teenagers tend to take longer showers and newborn babies create a lot of laundry! However, information from a number of reliable sources estimates that a family of four typically uses from about 150 gallons per day all the way up to 400 gallons per day! Several studies have shown that the average indoor water use in the U.S. is about 50 gallons per person per day.
<urn:uuid:41eb326f-de4d-4c7d-86d5-97ad1f18067d>
{ "dump": "CC-MAIN-2014-35", "url": "http://blog.radiantlifecatalog.com/", "date": "2014-08-23T15:21:37", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500826259.53/warc/CC-MAIN-20140820021346-00111-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9684560298919678, "token_count": 171, "score": 2.78125, "int_score": 3 }
Today's Word of the Day means... v. smelled or smelt (smělt), smell·ing, smells To perceive the scent of something by means of the olfactory nerves. n. The sense by which odors are perceived; the olfactory sense. the detection and identification by sensory organs of airborne chemicals. The concept of smell, as it applies to humans, becomes less distinct when invertebrates and lower vertebrates (fish and amphibians) are considered, because many lower animals detect chemicals in the environment by means of receptors in various locations on the body, and no invertebrate possesses a chemoreceptive structure resembling the vertebrate nasal cavity. For this reason, many authorities prefer to regard smell as distance chemoreception and taste as contact chemoreception.
<urn:uuid:ee1a22a6-807d-4b0d-85a8-453b04b4a73e>
{ "dump": "CC-MAIN-2014-35", "url": "http://dictionary.reference.com/browse/outsmell?qsrc=2446", "date": "2014-08-23T16:02:37", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500826259.53/warc/CC-MAIN-20140820021346-00111-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9387650489807129, "token_count": 164, "score": 3.0625, "int_score": 3 }
Breaking through cancer's shield For more than a century, researchers were puzzled by the uncanny ability of cancer cells to evade the immune system. They knew cancer cells were grotesquely abnormal and should be killed by white blood cells. In the laboratory, in Petri dishes, white blood cells could go on the attack against cancer cells. Why, then, could cancers survive in the body? The answer, when it finally came in recent years, arrived with a bonus: a way to thwart a cancer's strategy. Researchers discovered that cancers wrap themselves in an invisible protective shield. And they learned that they could break into that shield with the right drugs. - Half of All Primary Care, Internal Medicine Jobs Unfilled in 2013 - How Digital Strategy Shapes Patient Engagement at Boston Children's Hospital - CFO Exchange: Smartphones Poised to Disrupt Healthcare, Says Topol - CNO on Hospital Redesign: 'You Can't Over-Communicate' - Some Cancer Hospitals' Quality Data Will Soon Be Public - CA Powers Up $80M HIE to 'Create Value in the Data' - TJC Warns Hospitals of Deadly Medical Tubing Mistakes - 3 Traits Personality Assessments Can't Reveal - PA Ranks See 'Phenomenal Growth,' Lack of Diversity - Carondelet to Pay $35M to Settle Fraud Allegations
<urn:uuid:ea15099b-882d-4764-9f48-411771c4813f>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.healthleadersmedia.com/content/COM-297306/Breaking-through-cancers-shield", "date": "2014-08-23T15:34:43", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500826259.53/warc/CC-MAIN-20140820021346-00111-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9193494915962219, "token_count": 287, "score": 2.65625, "int_score": 3 }
Genital Herpes - HSV-2by of herpes simplex viruses. Herpes simplex virus type 1 (HSV-1) and herpes simplex virus type 2 (HSV-2). HSV-1 causes the most damage primarily on the mouth, throat, face, eye and the central nervous system... Herpes - a complicated primerby Here are the very basics about herpes: There are two strains: HSV1 and HSV2. Typically HSV1 is thought of as oral herpes... there is oral HSV1, genital HSV1, oral HSV2, and genital HSV2. I am going to talk about the two strains (HSV1... also assist with stress reduction. Also, oral L-Lysine combined with Vitamin C is one of the best for HSV-1 and HSV-2. It depends on your situation...there are several different patterns in Traditional Chinese... Herpes and Hepatitis Bby is herpes simplex and it is caused by one of two viruses : herpes simplex virus 1 (HSV-1) or herpes simplex virus 2 (HSV-2). (Pretty obvious names, right?) HSV-1 causes oral sores commonly called cold sores...
<urn:uuid:ba68dd35-4377-43e1-95a3-80ac36f4b060>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.wellsphere.com/wellpage/hsv1-hsv2", "date": "2014-08-23T15:23:01", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500826259.53/warc/CC-MAIN-20140820021346-00111-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.8970192074775696, "token_count": 266, "score": 2.765625, "int_score": 3 }
The National Weather Service provides weather forecasts and climate data to help protect people, property and the economy. An effective way they do that is by issuing what are called "watches" and "warnings." These are terms used to inform you about the potential for dangerous weather. However, you may be wondering what exactly is the difference between the two. Often times a severe weather "watch" will be issued in your area first. This means that the current conditions are favorable for the formation of severe weather. It is an indication for you to be prepared and pay close attention the sky. You should review your severe weather plan and be ready to act at a moments notice. Tune in and follow your local weather conditions closely. If an event were to occur, you will want to know right away. A weather "warning" is issued when the severe weather treat is imminent. The treat has been visually observed by a spotter or weather instrument such as radar, and is heading towards your area. This means it is time to act. You will want to execute your severe weather plan immediately. Weather you need to evacuate or find your safe place, take action immediately as this is the final notice you will receive before a Tornado or Thunders storm effects your area. By following these alerts and paying close attention to your local forecasters you can keep you and your loved ones out of danger. Both Watches and Warnings are very serious alerts to pay attention to and can save a life. It is important to always be ready at all times. Copyright 2013 WNEM (Meredith Corporation) All rights reserved. ObitMichigan.com is dedicated to delivering immediate, up-to-date information on obituaries 24 hours a day, 7 days a week to families and friends in Mid-Michigan. Death notices are displayed during theMore > ObitMichigan.com is dedicated to delivering immediate, up-to-date information 24 hours a day, 7 days a week to families and friends who have lost loved ones.More > A fisherman off the coast of Bonita Springs, Florida thinks he has a pretty nice catch. As he reels in a four-foot shark, his catch is stolen by an even bigger fish. A massive grouper pulls the sharkMore > A massive grouper steals a four-foot shark from a fisherman's line off the coast of Florida.More >
<urn:uuid:590b2503-ea98-4c12-977a-222133b86128>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.wnem.com/story/21919948/watch-vs-warning", "date": "2014-08-23T15:26:06", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500826259.53/warc/CC-MAIN-20140820021346-00111-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9571284055709839, "token_count": 487, "score": 2.796875, "int_score": 3 }
Some of our most ecologically-important native plants are trees and shrubs (aka woodies). They provide critical structure and ecological function to our landscapes. Some are early pollen sources for hungry bees, some have fruits, nuts or seeds for birds and mammals, some are host plants for butterflies, some are nesting sites for songbirds, and some, primarily evergreens, provide cover to many creatures during harsh winters. Woody plants have tremendous importance for humans, as well. Have a storm water problem? Trees, in particular, can draw up and intercept a remarkable amount of storm water. In New York City, street trees are estimated to intercept 1,525 gallons of water per year on average. Improved air quality, slowing of climate change, moderation of summer heat and winter cold, are some of the valuable benefits delivered to us by woody plants. Fall... [Read More]
<urn:uuid:6e1565e3-13dc-4f22-b7e5-d64b5934155a>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.ecobeneficial.com/", "date": "2014-08-30T02:12:47", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500833715.76/warc/CC-MAIN-20140820021353-00469-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9434722065925598, "token_count": 180, "score": 3.3125, "int_score": 3 }
The capital pressures squeezing utilities today need to be offset by stronger alignment among the four critical dimensions of capital planning: strategic, regulatory, financial, and managerial.... Fingerprinting the Invisible Hands Opaque markets inflate power prices. delay in disclosure will not cause a loss of public confidence because much of the time prices in the ERCOT-administered markets are not subject to the type of price spikes that could create an impression of market power abuses or other market failures. In some cases, however, prices may spike to higher than usual levels and cause public concern and the need for more public information. To address such events, the proposed amendment includes an event trigger that would require the public release of entity-specific information on a much quicker timeframe. The proposed amendment requires that, when the trigger is exceeded, the portion of every market participant’s offer curve that is equal to or exceeds the trigger level will be disclosed seven days after the day for which the information is submitted. The commission finds that the disclosure of this limited type of entity-specific information is sufficient to retain public confidence in the ERCOT markets while minimizing early disclosure of entity-specific information. 9 Implementation of the order took place with market data for September 22, 2007. 10 For the first time, a situation existed in which there was a statistically testable hypothesis. Using available data concerning bidding behavior on an hourly basis both before and after the change in disclosure delay, regression analysis can test whether additional transparency does reduce bids, and indirectly, prices. This analysis uses a set of ERCOT bidding rules and market conditions to determine bidding behavior. It doesn’t attempt to model ERCOT’s pricing algorithm since the algorithm is considerably more complex, and less transparent, than the bidding data it uses as part of its calculations (see Figure 2). First, the analysis calculates two measures of bidding behavior in the ERCOT balancing energy services market. “Maximum bid” represents the highest bid during the hour and “average bid” represents the average bid during the hour. The simplicity of these two measures constitutes their primary value. There are an infinite number of possible measures that could be designed to characterize the bid curves. Opening the analysis to each one of these would eliminate the significance of the statistical results, since each alternative potentially would have a high t statistic. The best course is to choose and test the simplest hypothesis to avoid biasing the statistical estimates. Following the same argument, the independent variables also are simple. The first two independent variables are natural gas prices and ERCOT load. These two variables are standard choices for independent variables in wholesale electricity markets and have been used in many studies. The analysis adds three other independent variables: • Shame Cap : For years, ERCOT published bids over a specified price. The price level has changed over time to its current level of 100 times natural gas prices. • Reporting Delay : The number of days until bid data is revealed. • Price Cap : The maximum bid accepted by ERCOT’s computer algorithm. The models tested are: • Max Bid = A + B x Gas Price + C x Load + D x Shame Cap + E x Reporting Delay +
<urn:uuid:bbeec616-8793-4067-9825-901c5ea9f533>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.fortnightly.com/fortnightly/2009/07/fingerprinting-invisible-hands?page=0%252C5%2C4", "date": "2014-08-30T02:40:12", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500833715.76/warc/CC-MAIN-20140820021353-00469-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9262914061546326, "token_count": 659, "score": 2.546875, "int_score": 3 }
Internet Scout Project This Topic in Depth discusses the variety of instruments used to collect climate and weather data. The first two websites provide simple introductions to the many weather instruments. Bethune Academy's Weather Center (1) discusses the functions of psychrometers, anemometers, weather balloons, thermometers, and barometers. The Illinois State Water Survey (2) furnishes many images of various instruments that collect data daily for legal issues, farmers, educators, students, and researchers. The th Internet Scout Project The Department of the Interior (DOI), which oversees nine office/bureaus, including the US Geological Society and National Park Service, has made available online their 2002-2007 Strategic Plan for review by the public. The Adobe Acrobat files include a Departmental Overview and plans for the nine subagencies within the DOI, which describe the outcome goals and performance measures for each. If interested, comments on the plans, which are scheduled to be completed by March of 2002 in time for th Lewis and Clark: Preparing for the Trip (Elementary School) This unit focuses on Meriwether Lewis's preparations for the expedition. It uses Lewis's trip to Philadelphia as a foundation for students to consider the idea that life is a journey of discovery. Students will understand some of the challenges inherent in preparing for the unknown and will learn about the preparations necessary for Lewis and Clark's expedition. They will use maps and paintings to gather information about Philadelphia in 1803. By reading primary and secondary documents, students Distance learning and foreign language teaching Among numerous modes of technology enhanced learning there are not many that have received as much attention as distance learning. Stimulated by the recent rapid developments in Web technologies, researchers in both ICT and education are constantly working to make the most of technological resources and put them to the best pedagogical use. In the area of foreign language teaching a lot has been done to cover a variety of world languages, but there are constant attempts for new solutions, taking Climate Diagnostic Center Plots Through static map interface, the Climate Diagnostic Center provides access to plots of current and historical United States temperature, precipitation and PDSI drought maps. The interface allows users to plot the raw data and view map visualizations of data. Internet Scout Project The US Department of Agriculture's Plants Database (last mentioned in the January 16, 1998 Scout Report) is continually adding improvements. Most recently, the Web sitehas added an advanced query to allow users to search for specific plant data based on many different search characteristics. This new feature is also user friendly; by clicking on any of the fields, a definition of the field is displayed. Also new are targeted links that allow you to link directly from a queried plant profile to o Internet Scout Project The Evergreen Native Plant Database was developed as an educational project providing school groups, home gardeners, and other residents of Canada with information about native Canadian wildflower, aquatic, grass, vine, shrub, and tree species. In addition to this abundance of native plant species information, the website offers an extensive collection of K-12 lesson plans for educators to use in outdoor settings. The concise lesson plans are available in HTML for viewing online or in pdf for do Asian, African, or Australian Inventors and Inventions The lesson integrates both Social Sciences and Language Arts in a research and a creative writing component. The student will further understand inventors or inventions from Asia, Africa, and Australia, the focused continents in the 7th grade Social Sciences curriculum, as well as have the opportunity to develop his/her writing, reading, and oral communication skills. The project also incorporates mathematics with an emphasis on percentages and graphing. Animal slide shows! This project is a culmination of a science unit on animals which integrates computer skills, language arts and art. After a study of animals which includes classification, basic needs of animals, animal adaptations, and animal behaviors, the students will use the computer to complete a slide show of one animal they have studied at length. ABC's by the WEEK This is an ongoing series of lessons to teach the 26 letters of the alphabet through functional skills that can be used on a daily/weekly basis building on and transferring to other educational task. These lessons incorporate coloring, marking, painting, cutting, pasting, creating, listening and following directions. A Comprehensive Study of North Carolina Indian Tribes Students will apply their research skills of gathering and validating information to study the eight state recognized American Indian tribes of North Carolina in order to create an Honors U.S. History Project. Students then will create a comprehensive study of those tribes to be compiled into a notebook to be copied and shared with the eighth grade teachers of North Carolina History in our county. 1869: A report on schools in North Carolina In this lesson, students use a guided reading to look at a report on the status of education in North Carolina in 1869, and discuss the reasons given then for why the Governor and Legislature should support educating North Carolina's children. They are provided an opportunity to compare and contrast the 1869 document against their own ideas about the civic duty to attend school through age sixteen, and its relative value to the state and the country. Is there a way to e-Bologna? Cross-National Collaborative Activities in University Courses This article describes a study of distance collaborative activities that have been conducted in a cross-national setting between a Greek and a German university. We discuss issues related to organization, technology, and curricula considerations. In addition, we analyze the modes of cooperation that have been chosen in the students' work on creative problem solving tasks and conclude that for complex learning scenarios succesful collaboration and peer tutoring in advanced learning support enviro A Craft Unionist Rewrites the Ten Commandments The moral code of craft unionism was part of a larger system of late nineteenth-century working-class values that went well beyond behavior on the job. Moreover, those values drew upon other deeply held moral beliefs, particularly those growing out of religion. In "Labor's Decalogue," G. Edmonston, the first president of the United Brotherhood of Carpenters and Joiners, offered a new twist on the biblical Ten Commandments. Edmonston's novel set of "rules" for workers found its way into a variety Towards a narrative-oriented framework for designing mathematical learning This paper proposes a narrative-oriented approach to the design of educational activities, as well as a CSCL system to support them, in the context of learning mathematics. Both Mathematics and interface design seem unrelated to narrative. Mathematical language, as we know it, is devoid of time and person. Computer interfaces are static and non-linear. Yet, as Bruner (1986; 1990) and others show, narrative is a powerful cognitive and epistemological tool. The questions we wish to explore are – From Stargazers to Starships This is a self-contained book-on-the-web course on basic astronomy, Newtonian mechanics, the sun (and associated physics), and spaceflight and spacecraft. covers elementary astronomy, Newtonian mechanics, the Sun and related physics and spaceflight. Also included are a Spanish translation, 46 lesson plans, a short but complete math course (algebra + trig), teachers' guides, glossary, timelines, 345 questions (current tally) by users and their answers, over 100 problems to solve, and more. Learning Design Engines as Remote Control to Learning Support Environments. Context: Chapter 5 of the Learning Design book describes the operational model of a learning design engine based on the concept of finite automata with output alphabet. We rely on this event concept to include pre-existing learning tools in flexibe and rich learning designs. Contribution: We sketch an approach for the integration of complex learning environments in learning designs. Interactive learning support environments, such as argumentation or modelling tools are pre-existent and have a hi From ER to VR: Analysing interaction in a Collaborative Virtual Environment Not available,PhD thesis of the University of Bergen, Norway Adapting to When Students Game an Intelligent Tutoring System It has been found in recent years that many students who use intelligent tutoring systems game the system, attempting to succeed in the educational environment by exploiting properties of the system rather than by learning the material and trying to use that knowledge to answer correctly. In this paper, we introduce a system which gives a gaming student supplementary exercises focused on exactly the material the student bypassed by gaming, and which also expresses negative emotion to gaming stud Environmental History Timeline Students develop critical thinking skills by interviewing a person who has perspective on environmental history. Students explore the concept of a timeline, including historical milestones, and develop a sense of the context of events.
<urn:uuid:cc5eaf04-799c-4369-b809-e49c2476136b>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.nottingham.ac.uk/xpert/scoreresults.php?keywords=Document%20skills%20:%20maps%20and%20plans&start=5260&end=5280", "date": "2014-08-30T02:29:14", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500833715.76/warc/CC-MAIN-20140820021353-00469-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9353662729263306, "token_count": 1801, "score": 2.796875, "int_score": 3 }
responses of TWO of the following groups to the Indians of North America before 1750. 2. Analyze the differences between the Spanish settlements in the Southwest and the English Colonies in New England in the 17th century in terms of TWO of the following: PLACEMENT EXAMS 1979-2009 The following questions are listed chronologically by subjects. It is hoped that clues as to how subjects in United States History can be presented analytically can be identified by studying this list. Many of the questions required students to comparetwo or more periods of history... Part 1: Colonial Period to Civil War Colonial Times 1607 -1775 1. From 1600 -1763, several European nations vied for control of the North American continent. Why did England win the struggle? (73) 2. In the seventeenth century, New England Puritans tried to create a model society. What were... wrote these on the AP exam did NOT get to see the questions in advance and used no notes to study for them. Those essays marked DBQ came with documents which are not included here. In addition the true difficulty of these questions is essay analysis...what is the question really asking? How is this question... African countries for the purpose of nation building. The article contends that nation building and sustainable development require stable nations in which case multicultural education has a role to play. Multicultural education can be seen as a reform movement that seeks to accommodate society’s cultural... FRQ: Compare and contrast the different ways in which economic development affected politics in Massachusetts and Virginia in the period from 1607 to 1750. Direction: Compare and contrast Divisions: beginning settlement, religion, means of economic stability Thesis: The early settlements of the Massachusetts... course with an understanding of the ideals and philosophies upon which the government of United States was established; to have the students see the evolution of the United States into a powerful and resourceful nation; and to watch the two interact as the government sought to become the "more perfect union"... 1. 1971 “Between 1607 and 1763, Americans gained control of their political and economic institutions.” To what extent and in what ways do you agree or disagree with this statement? 2. 1972 What role did unfree labor play in colonial American society? 3. 1973 From 1600 to 1763, several... the exploration of a concept that affects our perceptions of ourselves and our world. Students explore, analyse, question and articulate the ways in which perceptions of this concept are shaped in and through a variety of texts. Areas of Study are developed by teachers and require students to explore... reproduced or distributed to any other person without the authorization of IB Cardiff. –3– N11/3/HISTX/BP2/ENG/TZ0/XX/M Paper 2 markbands: The following bands provide a précis of the full markbands for paper 2 published in the History guide (2008) on pages 71–74. They are intended to assist marking... AP Exam Essays 2001-2010 2010 AP Exam Essays 1. In what ways did ideas and values held by Puritans influence the political, economic, and social development of the New England colonies from 1630 through the 1660s? 2. Analyze the political, diplomatic, and military reasons for the United States... 1. How did the Indian societies of South and North America differ from European societies at the time the two came into contact? In what ways did Indians retain a “world view” different from that of the Europeans? An obvious distinction between the two civilizations is the Indians lacked weapons, tools... AP US HISTORY FREE RESPONSE QUESTIONS SINCE 1990 I. Colonial Time 1607 - 1775 1. Throughout the colonial period, economic concerns had more to do with the settling of British North America than did religious concerns. Assess the validity of this statement with specific reference to economic... you to "briefly answer" a question, provide 1-3 paragraphs (depending on the question)that answer the question directly in the first two sentences then provide specific factual information (SFI) to support your answer. Don't Copy! not to do so. Around the time of his death, the colonists’ efforts at tobacco farming began to take off, which eventually would have disastrous implications for Powhatan’s people. In the following decades, bloody wars broke out between the Indians and settlers, but the Virginia settlement began to stabilize;... OUTLINE FOR KENNEDY CHAPTERS 1-4 Complete the following questions for each assigned chapter of Kennedy. Handwrite your response sentences for each question. Chapter 1: New World Beginnings, 33,000 B.C. –A.D. 1769 1. How did the geographic setting of North America – including its relation to... The piece of work which is being reviewed is authored by an eminent educationist Krishna Kumar. The title of the book is Prejudice and Pride which has been published by Penguin Books India Limited,Viking in the year 2001. The subtitle of the book ‘School Histories of the Freedom Struggle in India and... Hohoham | Complex political structure | Agricultural | Highland region near present-day Arizona and New Mexico | Used irrigation to grow two crops a year. Had elaborate multi-room stone structures. | Mississippian | Privileged class of nobles and priests | Based almost entirely on the production... RESPONSE QUESTIONS SINCE 1971 I. Colonial Time 1607 - 1775 1. Puritanism bore within itself the seeds of its own destruction. Apply this 2. In the seventeenth century, New England Puritans tried to create a model society. What were their aspirations... A Guide for Instructors THE AMERICAN PEOPLE Creating a Nation and a Society New York Boston San Francisco London Toronto Sydney Tokyo Singapore Madrid Mexico City Munich Paris Cape...
<urn:uuid:b39d24df-7038-4da8-82dc-dddc038c1654>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.studymode.com/subjects/compare-the-ways-in-which-two-of-the-following-reflected-tensions-in-colonial-society-page1.html", "date": "2014-08-30T02:16:36", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500833715.76/warc/CC-MAIN-20140820021353-00469-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9321441650390625, "token_count": 1254, "score": 3.75, "int_score": 4 }
- For Teachers Ç; voiceless palatal fricative Is the below transcription correct? Context: "Plus ça change..." More: Plus ça change (plus c'est la même chose). - definition in British English Dictionary & Thesaurus - Cambridge Dictionary Online Really It's a fricative, not an affricate. Everyone I've ever heard say it - French and English - say /sa/. Francophones use a different vowel (and English speakers rarely manage the [y] of plus), but the fricative part is a simple /s/ (which again is probably different as between English and French speakers, but not in a way that stops the fricative being a fricative).... I use /s/. /tʃa:/ is a drink. And a bit of a dance. I'm sorry, I don't know anything about phonetics and I misunderstood the symbols. There is some confusion here. The letter ‘ç’ in the French word 'ça' is pronounced [s]. The IPA symbol [ç] is very close to the English /tʃ/
<urn:uuid:d8702d14-c48b-4f65-8cee-eab052a4b87f>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.usingenglish.com/forum/threads/184639-Ça", "date": "2014-08-30T03:51:39", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500833715.76/warc/CC-MAIN-20140820021353-00469-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.8447405099868774, "token_count": 247, "score": 2.84375, "int_score": 3 }
Indiana University - Bloomington First Summer Session 2013 (13691) Meeting Thursdays, 9:00a-12:00p in PV 151 Steven W. Cox The Unix Operating System plays a critical role in the contemporary global information technology infrastructure. With at least half the web sites on the Internet hosted by computers running Unix, a similarly broad deployment in underlying database and network infrastructure, a well established role in scientific computing, and a recent increased presence in desktop computing, it almost certain that contemporary information professionals will encounter Unix based systems in their work. This workshop is an intermediate level look at the Unix operating system as compared to the Unix introduction that our S401 students receive. We will have a short review but it will be essential to have the S401-UNIX material internalized as much as possible. The original course materials for the L401-UNIX module (as opposed to the newer S401) covered more UNIX topics but the original slides are linked below. Please review this material before coming to class. Feel free to email me with questions regarding these extra topics. We will first outline the basic purpose and functions of an operating system. I will then provide a base from which to explore many facets of using a Unix operating system: shell environment and customization, a robust text editor supporting regular expressions, more Unix commands (utilities and filters), variable and command substitution, advanced I/O redirection, process management and job control, resource management, TCP/IP networking, file security mechanisms, and an introduction to shell programming. While some Unix system administration topics will naturally arise, this is not intended as a Unix administration course. Developed over 30 years ago, the Unix operating system has become a central fixture in todays information technology infrastructure. Unix did not arrive at this position through clever marketing or slick user interface design. Unix has survived through sound technical engineering and an ability to adapt to changes in the information technology environment. You should come away from this workshop with experience using a range of Unix tools to solve problems but more importantly an understanding of the the design philosophy of Unix. The Philosophy of Unix is to provide the user with a very large set of simple tools and a mechanism for combining them to accomplish a task. This building block approach differs substantially from the monolithic application that tries to do everything typically seen in desktop computer software. The simple Unix tools rarely solve a user's needs completely by themselves, but when combined with other tools they can solve problems never conceived of by the developers of monolithic applications. Understanding the design and traditions of Unix is also essential to self sufficiency when encountering previously unexplored aspects of the operating system. Just as a graphical user interface provides common interface elements to streamline a user's experience learning a new program, there are similar common tool behaviors in Unix which if understood can make new tools relatively easy. By the end of the course, the student should be familiar enough with Unix to utilize many constructive utilities and filters, customize the shell environment, understand and modify system variables, use regex effectively with various tools, edit text files interactively with vi and non-interactively with sed, understand command line parsing and tokenizing, fully grasp I/O redirection and piping to accomplish various tasks, use variable and command substitution, understand how to control metacharacter expansion with quoting, and effectively manage user system resources (files and processes). The student should also be able to write basic shell programs as well as understand and modify more complex ones. It is assumed that students have either taken L401-UNIX (or the newer S401-UNIX) or are familiar with Unix topics covered in that module. If it has been awhile since you've reviewed this material, please do so before attending class. The UNIX module to the older L401 consisted of three weeks so any newer SLIS students will need to go through the slides linked below: L401-UNIX, Week 1 - L401-UNIX, Week 2 - L401-UNIX, Week 3 There will be three assignments worth a total of 100 points. Assignment One is worth 30 points, Assignment Two is worth 40 points, and Assignment Three is worth 30 points. In fairness to students who turn in assignments on time, late assignments will be penalized. I will deduct 10% of the total possible assignment points for each day that they are late, unless prearranged with the instructor 24 hrs prior to the due date. Exceptions will be granted only in extreme circumstances. Please refer to the grading policy for this workshop. We will start out by discussing what makes an operating system and what is its purpose. From there we will look at the evolution of Unix and the events that shaped it and created the various implementations. We will then discuss the events that took place that led to the need for standards and see how they are often derived from implementations. By the end of this section it should be clear as to why Unix has survived so long when many operating systems have come and gone. We will then look at the practical application of this OS with a short review of some important Unix concepts and commands. We will also look into some essential Unix tools and some of their useful options which will be relevent to the topic areas I'll be covering in this workshop. We'll continue by looking at our command shell and how it will tokenize, interpret and process your command line. This will do many things for you such as; expand your metacharacters, perform command substitution, variable substitution, etc. It is important to understand how the shell will see your command line and how it will process your commands. Finally, we will look into some timesaving tips of our shell's editing features. When we work with more complex command lines, especially when we are building pipelines, it is important to be able to add or remove filters, command options, or change the syntax without having to duplicate your efforts. Slides from Day 1 (PDF) Unix is a very text-centric system. A text editor is one of the Unix professional's most important tools. To be proficient with a local Unix editor is a valuable tool whether you are editing your local initialization files, writing programs or modifying your html content. The editor we will concentrate on today is vi, a screen oriented visual editor which is built on the ex superset. The vi editor has been around since 1976 and was developed by Bill Joy (co-founder Sun Microsystems). The editing tools vi and ex are widely available on virtually all Unix/Linux platforms and use familiar regular expressions (regex) to make your text processing much more powerful. We will use vi for the remaining part of this workshop to create and edit files. Finally, we look into sed (stream editor) and see the power that this utility has to offer for batch processing. This utility also supports regular expressions and is often used as a filter in a pipeline. Again, this tool is widely available on Unix/Linux derivatives as well as other operating systems with a command line. Combining sed and regular expressions allows you to non-interactively search and modify bodies of text (in many files at once) based on certain expressions. The shell is the outer layer of the Unix Operating System. It is an interface between the user and the internal components of the operating system. We will focus on the bash shell for this workshop. There are two ways that you will utilize this shell. One is your day to day interactive use and the other is non-interactive use via a shell program (script). Today, we will concentrate on the interactive use of this shell and how to configure and customize your work environment with initialization files. We will then discuss some shell options and how to set them as well as some useful built-in shell commands. We will also discuss the command line history mechanism in-depth so working in your environment can be more efficient. We will then be learning some concepts that will be helpful when we discuss shell programming later in this workshop. We will discuss two types of variables, local and environment (global), and how to set and export these types of parameters. We will also learn about system parameters; we will focus on the PATH and PS1 (prompt) variables. We will then look into the shell hash table and demonstrate how our commands are located. We will revisit the shell history mechanism and discover new ways to utilize this useful feature of the bash shell. We will end the day by looking into some essential Unix filters and their options. Many of them are highly specialized utilities and are often used as part of a pipeline when filtering or extracting data from text files. Slides from Day 3 (PDF) We will begin our day with further shell topics such as understanding and creating command aliases, metacharacters in-depth, and advanced I/O redirection. We will then look at files which are a fundamental concept in Unix and are used to represent not only storage of data, but also physical and virtual devices such as displays, keyboards, and communication links between running programs. Topics covered today include an anatomy of a file, types of files, the hierarchical file and directory structure, how the physical and logical storage structures integrate, and Unix commands relevant to file and disk management. Being a multi-user system, Unix has a representation of users, and ways of controlling access to files based on user credentials. The representation of users and how file access control is managed will be covered. Finally, we return to the shell to look more concretely at a number of specific commands and how to use simple commands as building blocks to accomplish more complicated tasks. This will be accomplished with more complex pipelines. As we learn more about column and row filtering tools we begin to understand more about this core Unix philosophy. Slides from Day 4 (PDF) Assignment Two (HTML) Today we will have a demonstration of one of our device files, our terminal. We will demonstrate how this core Unix design is implemented and why. We will then talk about more concepts that will be useful to the shell programmer; positional parameters, command substitution, and the command exit status. We will then discuss what a bash function is and how to define and export them. Functions are memory resident shell code and will serve as a good introduction to the syntax necessary for creating shell programs. We will continue by discussing the importance of quoting now that we have used more powerful metacharacters (variable and command subsititution) and need to control their expansion (interpretation). Finally, we will end our day revisiting the Unix find utility and looking at some advanced uses for this indispensable tool. Slides for Day 5 (PDF) A program running in Unix exists as a process. We will cover exactly what a process is, and Unix tools for examining and controlling processes. Unix systems provide a bulk of the infrastructure for the Internet. We will cover the basics of TCP/IP networking and some common network related tools in Unix. Finally, we return to the shell and explore it not as an interactive user interface, but as a programming language. We will learn the basics of variables, operators, expressions, statements, and control structures. You will leave the class with a menu-based home directory management script that I wrote for you to modify and enhance. Slides for Day 6 (PDF), Iteration Exercise (HTML), Script Exercise (HTML) Recommended: Peek, Jerry, Grace Todino-Gonquet and John Strang (2002). Learning the UNIX operating System, 5th ed. O'Reilly & Associates Recommended: Newham, Cameron and Bill Rosenblatt (1998). Learning the bash shell, 2nd ed. O'Reilly & Associates
<urn:uuid:d86078ed-ea88-411d-b054-91fd6eae5831>
{ "dump": "CC-MAIN-2014-35", "url": "http://info.slis.indiana.edu/~stevecox/unix/s603/", "date": "2014-09-01T07:27:51", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535917463.1/warc/CC-MAIN-20140901014517-00411-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9282148480415344, "token_count": 2389, "score": 2.515625, "int_score": 3 }
math 4th grade If Sally gave a survey with five colors listed and ask each person who takes the survey to pick one color. She assumes that the results if given to 24 persons the results would be 1/2 blue, 1/12 red, 1/8 blue, 1/4 green, and 1/24 orange. What number of surveys would best prove... January 25, 2007 how about expressing 230 parts per thousand (ppt) of SO4^2- in mol per kg? 230 ppt is 230 g/1000 g = 230 g/kg. Convert 230 grams into mols and you have it. SO, I come up with an answer of 2.39 mol/kg. Correct? J January 22, 2007 What controversy was connected to Surface Mining Control and Recovery Act? Check this site for opposition to that act. http://www.teachcoal.org/aboutcoal/articles/coalamer.html October 27, 2006 australia's role in united nations Outline Australias positions and responsibilities in the United Nations australia plays a big role :P australia's role in the united Nations was to ..... not much Hey, it would help heaps if you could andwer this question, What is Australia's role in the United ... August 8, 2006 What has been Australias involvement in UNESCO, UN conventions and international environmental treaties? These sites detail Australia's involvement in these international organizations. http://www.dfat.gov.au/un/ https://www.cia.gov/cia/publications/factbook/geos/as.... August 8, 2006 MATH - Rational Expressions HELP PLEASE! I am taking my college placement test tomorrow and am working on the sample test now. I need help with this question about Rational Expressions... For all r (<INSERT>is not equal to sign)+ or - 2 r(squared) - 5r+6 (All Over) r(squared)- 4 I know the answer ... August 16, 2005 Linear Equation in Two Variables I have to take a college placement test and am studying hte practive test. He is the question . . . What is the equation of the line that contains the points with (x,y) coordinates (-3,7) and (5,-1)? I know that the answer is y=-x+4, but I cannot remember from high school what... August 2, 2005
<urn:uuid:9c08fe74-2000-4b1e-b8a5-f20c97d9f013>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.jiskha.com/members/profile/posts.cgi?name=J&page=8", "date": "2014-09-01T08:13:18", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535917463.1/warc/CC-MAIN-20140901014517-00411-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9078876376152039, "token_count": 517, "score": 3.125, "int_score": 3 }
Mrs. Lisa Lyall « Teacher Connection / Documents / Calendar Welcome back to school! Elementary ESE teacher Strategies for Summer Reading for Children with Dyslexia | LD Topics | LD OnLine Reading and Social Studies LD OnLine is the leading website on learning disabilities, learning disorders and differences. Parents and teachers of learning disabled children will find authoritative guidance on attention deficit disorder, ADD / ADHD, dyslexia, dysgraphia, dyscalculia, dysnomia, reading difficulties, speech and related disorders. http://www.sumter.k12.fl.us/Departments/ESE.html Sumter County Exceptional Student Education webpage-this site contains many helpful links.
<urn:uuid:84f37a54-76ed-4cc1-9126-959c193c84db>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.thevillagescharterschool.org/charterElementarySchool/teacher.asp?personnelId=%7B6D2E1648-DE9C-456B-A6BA-7866BCC9F2AC%7D", "date": "2014-09-01T07:28:31", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535917463.1/warc/CC-MAIN-20140901014517-00411-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.7978969812393188, "token_count": 148, "score": 2.890625, "int_score": 3 }
Philanthropic Achievement of the Week 1945 - Sloan-Kettering Institute General Motors vice president Charles Kettering is most famously known for his automotive inventions, such as the first electrical starter motor and leaded gasoline, and the 185 patents he held. Less known are his contributions to medicine and science. An extraordinarily broad tinkerer, Kettering also developed several medical innovations, such as an incubator for premature infants, treatments for venereal disease, and magnetic diagnostic devices. In addition, Kettering was a visionary philanthropist who devoted his wealth to funding projects that could be as productive as his contraptions. In 1945, he and Alfred Sloan, another General Motors vice president, established the Sloan-Kettering Institute, the first private biomedical research center of its sort in the world. The center was built next to Memorial Hospital, an institution with its own long and impressive philanthropic history. Founded in 1884 as a specialized cancer hospital by a group that included Mr. and Mrs. John J. Astor, the hospital was moved in 1936 to its current location, on land donated by John D. Rockefeller Jr. From its founding, the Sloan-Kettering Institute aimed to harness the latest technology and research techniques to battle cancer. Matching the spirit of its founders, it held fast to the principle that advances in research always rest on “the creative genius of individual scientists.” In 1980, the institute and the hospital were combined into a single entity and today the Memorial Sloan-Kettering Cancer Center is one of the nation’s leading biomedical research institutions and treatment facilities, treating more than 400 different subtypes of cancer with specialized regimens and advancing the state of the art via more than 120 research labs. In 2012, the first graduates matriculated from the center’s new Ph.D. program in cancer biology. History of Sloan-Kettering Institute and Memorial Hospital, mskcc.org/about/history-overview Charles Kettering biography, mayoclinicproceedings.org/article/S0025-6196(12)00271-6/fulltext (VIDEO) Ryan: Civil society is one of the most important components of American life House Budget Committee Chairman Paul Ryan (R-WI), who is widely expected to take over as Chairman of the House Ways and Means Committee, discussed several charity-related issues in this interview with CNBC last week. In this interview, Chairman Ryan expressed his belief in the critical role of our civil society, support for avoiding a cap of the charitable deduction, and extending the deadline to claim a charitable deduction until April 15. The discussion was part of a broader conversation of the popular “Ice Bucket Challenge” for ALS. Chairman Ryan’s comments begin at 1:20. Philanthropic Achievement of the Week 1954 Columbus Discovers Modern Architecture What brought these architectural giants to little Columbus was private philanthropy. J. Irwin Miller, chairman of the Columbus-based Cummins Engine Company, was an architecture enthusiast. In 1942, he commissioned a new design for his home church from Eliel Saarinen. The church became an instant landmark, and Miller saw a role for philanthropy in beautifying his hometown and raising its worldwide profile. He became a major patron of civic architecture in 1954, when he struck an innovative deal with the city of Columbus: when a new public building was needed, Cummins would pay the commission for any first-rate architect selected from its own list, and the city would pay for construction costs. Miller later expanded his program to cover private buildings with public purposes, such as churches, banks, and malls. And his own house, designed by Eero Saarinen, is a National Historic Landmark. “By the 1960s,” Radley Balko has written, “Columbus had become a world-renowned magnet for privately financed modernist design.” Miller’s vision continues today: architectural grantmaking in Columbus and its surrounding area remains a central interest of the charitable arm of Cummins Inc. Radley Balko, “When Columbus Discovered Modern Architecture,” Reason magazine, reason.com/archives/2009/09/30/when-columbus-discovered-moder Miller House and Garden, Indianapolis Museum of Art, imamuseum.org/millerhouse/columbus-indiana ACR News 08.22.14—Ryan ‘No’ on Cap, Giving Increases in Puerto Rico >> Federal: Washington Roundup >> Federal: Rep. Ryan: No Cap for Charitable Deduction >> Federal: Charitable Deduction Leads to a Sharp Increase of Donors in Puerto Rico >> Federal: New Director for K-12 Programs >> Top Reads: Proving Conventional Wisdom Wrong (Again) on Charitable Giving Tax Incentives Congress is out of session for its August recess. Members are expected to return on September 8. Rep. Ryan: No Cap for Charitable Deduction House Budget Committee Chairman Paul Ryan (R-WI), who is widely expected to take over as Chairman of the House Ways and Means Committee, recently voiced his opposition to capping the charitable deduction, according to a report from Politico. Ryan stated that the charitable deduction is “the one area where I believe we should not have a top cap.” As you may recall, Chairman Ryan was one of the Members of Congress with whom ACR leaders met on July 8 to discuss charity-related issues. He noted in the meeting the critical role of charitable services and the importance of private giving. At the time, ACR leaders made clear the importance of the charitable deduction. Ryan’s recent comment came during an interview with Bloomberg TV in reference to his support for limiting the current mortgage interest deduction. Charitable Deduction Leads to a Sharp Increase of Donors in Puerto Rico Puerto Rico saw a 70 percent increase in the number of individuals who made charitable donations following the implementation of a 100 percent charitable deduction in 2011, according to a report released last week by the Flamboyan Foundation. The charitable deduction was one of several revisions in the Puerto Rican tax code in 2011. “Nonprofit organizations and financial advisors of potential donors have an opportunity to spread the word about the 100 percent deduction for charitable donations and increase the number of taxpayers who make larger donations in Puerto Rico during the next few years,” Dr. Guiomar García Guerra, executive director of Flamboyan Foundation, said in a news release. The number of Puerto Rican citizens who claimed charitable deductions on their Individual Tax Return Form increased from 27,644 individuals in 2010 to 47,004 in 2011, according to the report. That led to an increase of $5 million in charitable donations. Despite the large increase in the number of individual donors, the figure still represents only 4.6 percent of all taxpayers. This contrasts significantly with the 26 percent of those in the continental U.S. who claim a charitable deduction on their taxes. Flamboyan Foundation is a private, family foundation focused on improving educational outcomes for children in public schools in Washington, D.C. and Puerto Rico, according to its website. The foundation plans to expand its research into private charitable giving by partnering with the Indiana University Lilly Family School of Philanthropy—which issues the annual Giving USA report—and the Kinesis Foundation on a future study of household giving patterns and priorities in Puerto Rico. New Director for K-12 Programs On August 1, Nicole Jarbo joined The Philanthropy Roundtable as the new director for K-12 education programs. Prior to joining the Roundtable, Jarbo taught first-grade at a KIPP school in New Orleans and 9th grade English at Carver Collegiate Academy, where she helped students achieve 2.5 years of reading growth in 10 months. She also launched a company, TeacherGym, to train teachers in effective classroom management practices. Watch this five minute video for a brief introduction to Nicole and her vision for the K-12 education program. Please feel free to email us at [email protected] if you have any questions, stories or topics you would like us to include in our newsletter. Looking for ARCHIVES of this newsletter? Click here. (ACR BLOG) Rep. Ryan: No Top Cap for Charitable Deduction House Budget Committee Chairman Paul Ryan (R-WI), who is widely expected to take over as Chairman of the House Ways and Means Committee, recently expressed his support for not implementing a cap on the charitable deduction, according to a report from Politico. Ryan stated that the charitable deduction is “the one area where I believe we should not have a top cap.” (ACR BLOG) Salt Lake Tribune Op-ed: Don’t let tax reform undermine charitable giving Fraser Nelson, executive director of the Community Foundation of Utah, and Jeramy Lund, a Utah private investor, co-wrote an editorial in the Salt Lake Tribune on August 16 urging Utahns to contact their elected officials this month while members of Congress are home. Lund and Nelson explain the importance of constituents letting elected officials know how the decisions they make will affect the nonprofit sector. Philanthropic Achievement of the Week 1999 Gates Millennium Scholars Just before the turn of the millennium, the Bill & Melinda Gates Foundation put into operation a major college scholarship program for minority students, with an initial grant of a cool billion dollars that was later increased to $1.6 billion. Every year, the Millennium Scholars program selects 1,000 new African-American, Hispanic, Asian, or Native American college prospects and offers them good-through-graduation scholarships (set at various levels to cover their need). These can be used at any college the student chooses. The program particularly aims to encourage minorities to enter scientific fields like computer science, math, public health, and engineering (where they are underrepresented), and any Millenium Scholar in good standing who finishes an undergraduate degree and wants to continue on to grad school in one of these technical fields will also have their graduate education paid for by Gates. In addition to financial aid, the program offers leadership development, mentoring, internships, and other resources to help students succeed—which collectively have yielded a rate of college graduation within six years of nearly 90 percent, more than double the average for all African Americans. Since its establishment, the Gates Millennium Scholars program has propelled more than 16,000 young Americans through their educational careers, and 28 percent have gone on to graduate school, half of them in the technical fields that Gates has particularly targeted. Gates Millennium Scholars Program, gmsp.org/publicweb/aboutus.aspx Surprising White House Executive Action Critics: The Brother’s Keeper Philanthropy Controversy By Howard Husock It’s not often that President Obama faces criticism from the liberal left regarding his Administration’s policy initiatives in matters involving race and disadvantage. Which is what makes so notable an opinion piece in the latest Chronicle of Philanthropy criticizing My Brother’s Keeper, the President’s program, announced this past February, “to address persistent opportunity gaps faced by boys and young men of color.” That focus was a cause of concern for NoVo Foundation executive director Pamela Shifman and former Schott Foundation program manager Nakisha Lewis, who wrote that Brother’s Keeper inappropriately overlooks the “dire straits” of many “minority women and girls”, including “epidemic levels of of domestic violence.”. The article goes further in criticizing Brother’s Keeper for “elevating a patriarchal conception of a “good” family—boys of color will grow up to be fathers and heads of households that are made up of nuclear families.” There is little doubt that both minority males and females are not faring nearly as well as they should in the U.S.—and that both philanthropy and government have their roles to play in improving their educational and economic outcomes. But what makes the criticism proffered by Shifman and Lewis notable is their concern that My Brother’s Keeper is sending a signal from the White House to U.S. foundations and philanthropists—to focus one one group at the potential expense of the other. It’s a criticism that matters because of the nature of My Brother’s Keeper. It’s not a federal program so much as an effort by the White House to focus private giving and match it with non-federal government appropriations. As the White House has put it: ”Through this initiative, the Administration is joining with cities and towns, businesses, and foundations who are taking important steps to connect young people to mentoring, support networks, and the skills they need to find a good job or go to college and work their way into the middle class.” Put another way, the President has put his thumb on the scale used by donors when they decide what missions they should support. Whether one agrees with the views of Shifman and Lewis about family structure or not, they are quite right to be concerned that the White House is throwing its weight behind a select approach. Historically, as I’ve argued in my book Philanthropy Under Fire, government and philanthropy have operated independently of each other—allowing philanthropy to identify problems government lacks the means or understanding to deal with. The Obama White has consistently chosen a different approach—choosing, instead, to signal to philanthropy the sorts of causes which should merit support. This has been, for instance, the animating principle of the White House Social Innovation Fund, the Obama Administration initiative mounted through the Corporation for National and Community Service. It invites private donors to match White House-directed funds dedicated to addressing select social ills—ranging from HIV/AIDS to “community-driven initiatives to combat obesity and tobacco use”. As with those addressed by My Brother’s Keeper, these are, without doubt, problems which merit attention. But by signaling what it views as the nation’s most important social problems—in effect through executive action—the Obama White House has risked undermining the traditional independence and creativity of private philanthropy (which, it must be noted, has not been all that reluctant to throw itself into the arms of government, or to see its ideas brought “to scale” as government programs, often ineffectively). The objections to My Brother’s Keeper show us even those who may broadly agree with the concerns of the Obama White House can be put off by what can be seen as a nexus of big government and big philanthropy, which favors some causes over others. It’s worth noting that there was a previous President who undertook a partnership with private philanthropy—one described by historian Oliver Zunz (in Philanthropy in America: A History) as “federally-directed philanthropy.” It was tried in the Administration of a President one suspects is not on President Obama’s short list of favorite predecessors: Herbert Hoover. And, notes historian Zunz, “it collapsed under the sheer scale of what was needed and under the pressure of conflicting visions of social justice.” The White House executive action to direct philanthropy appears to be leading to just those sort of conflicting visions once again. This article originally appeared in Forbes and is published here with permission of the author. ACR Blog: Private Charitable Giving: A New Italian Tradition Private charitable giving has played a significant role in the United States in preserving our country’s historical culture and landmarks. For example, David M. Rubenstein is one of many well-known philanthropists who share a passion for preserving American history. According to a recent Washington Post article, Rubenstein, who agreed to cover $7.5 million of the cost of restoration for the Washington Monument after the 2011 earthquake, has also made a donation of $12.35 million to restore Gen. Robert E. Lee’s home at Arlington National Cemetery. Philanthropic Achievement of the Week 1882 Great Libraries From Enoch Pratt—and Others Enoch Pratt arrived in Baltimore from a Massachusetts farm with nothing but $150 in his pocket, but he was frugal and industrious and eventually thrived in a variety of businesses. In 1882 he offered to give the city of Baltimore a major circulating library for free public use, along with 32,000 books, plus four branch libraries in different quarters of the city, and an endowment of $1,058,333 for upkeep and future expansion. Once built, the Pratt almost immediately became one of the most heavily used libraries in the country, and it thrived over the century and a quarter since. Andrew Carnegie described it in The Gospel of Wealth as the best such institution in the country, and he cited Pratt as his exemplar for his own nationwide library program which he launched the year Pratt’s main library opened. In fact, two decades after the initial opening of the Pratt Library, Carnegie donated a half-million dollars to Baltimore to allow the building of 20 additional branches—part of his wider campaign that paid for the erection of more than 2,500 libraries (see the 1881 Carnegie Library entry in our companion list of major achievements in the arts and culture). These were just two of the many American philanthropists who lifted American literacy and learning by donating important collections of books to the public. The grandfather of them all was Benjamin Franklin, who in league with a group of friends incorporated the Library Company of Philadelphia, the first such entity in British North America, in 1731 (see separate entry below). In 1814, Thomas Jefferson offered his large and impossible-to-replicate library to Congress for official use after the British burned Washington. Judah Touro gave the American West its first public collection of books when he offered to put up the Touro Free Library in the city of New Orleans in 1824, and at his death he helped endow the famous Redwood Library in Newport, Rhode Island. John Jacob Astor gave $400,000 to New York in 1848 to establish a library, later combined with the $2 million library given by James Lennox, as well as a trust containing most of the wealth of Samuel Tilden, to form the New York Public Library. With a $50,000 gift and 30,000 books “of permanent value,” financier Joshua Bates launched the Boston Public Library, whose main reading room remains named for him. These gifts transformed libraries, over the course of just a couple generations, from luxuries possessed by the wealthy for self-improvement available to all. Today there are more than 16,000 public libraries in the U.S., and they are visited a billion and a half times every year. Enoch Pratt Library history, prattlibrary.org/about/index.aspx?id=1604 Original Pratt documents, archive.org/stream/enochprattfreeli00enoc#page/14/mode/2up
<urn:uuid:4fbd51ea-6c3f-4bfc-850a-86b66633c7cd>
{ "dump": "CC-MAIN-2014-35", "url": "http://acreform.com/article/tag/deficit%20reduction/P20/", "date": "2014-09-03T04:34:24", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535924501.17/warc/CC-MAIN-20140909013107-00226-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9569641947746277, "token_count": 3959, "score": 2.53125, "int_score": 3 }
Will adolescent girls save the world? In the West, they are often a byword for trouble – but they may well be the world’s best hope of tackling hunger and population growth. Yes, strange as it may seem, teenage girls could, as the UN has put it, “hold the key to breaking the cycle of poverty” in which so much of humanity is caught. Admittedly, these potential saviours are not unruly British adolescents but the 283 million girls aged between 10 and 20 who live in poverty in the countryside of the developing world. Study after study has shown that when they are given a better chance – above all, a decent education – something miraculous happens: the number of births in the area falls, while income and food production increase. Yet these same teenagers have long been neglected by their families and aid agencies alike, with the result that their adolescence usually sees their horizons not widening, but shrinking. Will the tide ever come in at Britain's depressed seaside resorts? August 17th, 2014 12:33 Both extreme hot and extreme cold weather is likely to be caused by global warming, say scientists August 14th, 2014 9:41 Tidiness helps cause the wildlife crisis August 12th, 2014 10:03 Want to know how fracking will affect you? Sorry, that's a state secret! August 11th, 2014 15:25 There's something distinctly fishy about claims that global warming has stopped August 7th, 2014 12:04
<urn:uuid:867691c1-8f18-49b1-83b4-ac8f3d0dc6a5>
{ "dump": "CC-MAIN-2014-35", "url": "http://blogs.telegraph.co.uk/news/geoffreylean/100109736/will-adolescent-girls-save-the-world/", "date": "2014-09-03T05:14:38", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535924501.17/warc/CC-MAIN-20140909013107-00226-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9341515898704529, "token_count": 312, "score": 2.640625, "int_score": 3 }
1. The flag commonly known as the Confederate Flag was never the national flag of the CSA, however the CSA did have three national flags during its short history, the Stars and Bars , the Stainless Banner , and the Blood Stained Banner 2. The flag is not the Confederate battle flag either, that flag shared the same symbols and colors but was square. The flag is actually a conglomeration of the 2nd naval jack and the battle flag, using the dimensions of the naval jack and the dark blue used on the battle flag. 3. While the modern flag and even some of the historical flags are used by white supremacist groups such as the KKK and the Neo-Nazis, both groups adopted the American flag, without any modifications or symbol defacements, as their official flags. 4. The Army Ranger insignia used at the US Army Rangers School of Ft. Benning includes the Confederate battle flag in honor of John S. Mosby and the 43rd Battalion Virginia Cavalry. 5. The modern flag, often known as the Southern Cross, the Dixie Flag, and the Rebel Flag, is often incorrectly referred to as the Stars and Bars. 6. A starless version of the modern flag has reportedly been used by Novorossiyan insurgents in Eastern Ukraine. Novorossiya is a confederation of two unrecognized breakaway states known as Donetsk and Lugansk that have been formed during the ongoing Ukrainian Crisis. 7. Florida, Georgia, Louisiana, Mississippi, and South Carolina all have laws banning the desecration of any Confederate or American flag, however protection for any flag was ruled unconstitutional by the Supreme Court and thus none of the laws can be enforced. 8. The USS Columbia (CL-56) flew the 2nd Confederate naval jack as a battle flag throughout combat in the South Pacific in World War II. This was done in honor of the ship's namesake, the capital city of South Carolina, the first state to secede from the Union.
<urn:uuid:e99b28db-7e65-4203-8082-52b2097a6a86>
{ "dump": "CC-MAIN-2014-35", "url": "http://oni-defense.deviantart.com/", "date": "2014-09-03T04:32:41", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535924501.17/warc/CC-MAIN-20140909013107-00226-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9430041313171387, "token_count": 409, "score": 2.984375, "int_score": 3 }
Plan has worked in Kenya since 1982, helping poor children to access their rights to health, education, sanitation and protection. Today, more than 800,000 people in community-based organisations and children’s clubs, as well as farmers, youth and women’s groups benefit from our work. We focus on addressing causes of poverty and on managing different cultural practices that hinder the growth and development of children, especially girls. Plan strives to reduce poverty, raise children’s voices, support orphans and vulnerable children, and attend to those with special needs, such as the disabled. Education key to ending child marriage Education is one of the most important interventions in ending child marriage, a Plan ambassador has said.
<urn:uuid:ff07b087-5684-4241-8e1b-3d4e988b8bf3>
{ "dump": "CC-MAIN-2014-35", "url": "http://plan-international.org/where-we-work/africa/kenya", "date": "2014-09-03T04:33:26", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535924501.17/warc/CC-MAIN-20140909013107-00226-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9677311778068542, "token_count": 147, "score": 2.5625, "int_score": 3 }
With whom do the commoners side? What bad tidings does Richard receive in Wales? Find the answers to these and other important questions from Shakespeare's history play with eNotes' Richard II Overview Quiz. With ten essential questions on plot, characters, dialogue and more, this quiz is designed to test your knowledge of the work as a whole. Each of its questions is also ranked so that you can understand the level of difficulty and see how your score compares with others who have taken this quiz. Give it a go below! Harry, Ron, and Hermione set out on a new mission in chapter 20 of Harry Potter and the Deathly Hallows. Who are they looking for and why? What do they find out when they reach their destination? Test your knowledge about these details and others in this eNotes quiz. What details can you remember from chapter 22 of Harry Potter and the Deathly Hallows? Take this eNotes quiz to find out! It contains five questions about a radio show that reports the truth, who believes in the Deathly Hallows, and more. What awaits Harry, Ron, Hermione, and Griphook at Malfoy Manor? Be sure you know who rescues the group, why Bellatrix does not immediately kill Harry, and more in this chapter 23 eNotes quiz on Harry Potter and the Deathly Hallows. In chapter 24 of Harry Potter and the Deathly Hallows, Harry speaks to Ollivander after Dobby’s burial. Make sure you know who buried Dobby, what Ollivander tells Harry about his wand, and more by taking this eNotes quiz. "The Second Nun's Tale" concerns the story of Saint Cecilia's marriage to the heathen Valerian and the angel who chooses to intervene in human affairs. Be sure you understand how the angel alters the relationship by taking the quiz over this tale in Geoffrey Chaucer's classic work The Canterbury Tales from eNotes. Jonathan Edward's fiery sermon is the most frequently anthologized sermon in American literature. Be sure you recall what makes this Puritan document so compelling and worthy of study by taking this quiz over "Sinners in the Hands of an Angry God" from eNotes.
<urn:uuid:9ec9f8e3-3696-4063-988f-ed664140c290>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.enotes.com/quizzes/list/popular?pg=94", "date": "2014-09-03T05:05:18", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535924501.17/warc/CC-MAIN-20140909013107-00226-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9273996949195862, "token_count": 452, "score": 2.671875, "int_score": 3 }
What are Amino Acids? Amino Acids are the building blocks of protein and a key part of every human cell. There are 20 in total, split into essential (must be acquired from food) and non-essential (can be made by the body). Supplementation can help achieve the right balance and Myprotein is here to help with a variety of products to optimise healthy protein maintenance. How much should I take? To find out more information on your recommended amino acid intake, check out our new interactive nutritional guide. There you can will see your recommended amounts broken down by sport, making it incredibly simple to ensure you are getting the most out of your training sessions.
<urn:uuid:8b3591e6-3b40-4c70-8376-d5da8d1d90cf>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.myprotein.com/our-range/bulk-powders/amino-acids.list?pageNumber=1", "date": "2014-09-03T04:43:34", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535924501.17/warc/CC-MAIN-20140909013107-00226-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9479625821113586, "token_count": 139, "score": 2.53125, "int_score": 3 }
Precise, gentle and efficient cell separation from a device the size of a cell phone may be possible thanks to tilt-angle standing surface acoustic waves, according to engineers at Penn State Univ. These waves can separate cells using very small amounts of energy. Unlike conventional separation methods that centrifuge for 10 minutes at 3,000 revolutions per minute, the surface acoustic waves can separate cells in a much gentler way. By striking up the right rhythm in the right brain region at the right time, Brown Univ. neuroscientists report in Nature Neuroscience that they managed to endow mice with greater touch sensitivity than other mice, making hard-to-perceive vibrations suddenly more vivid to them. The findings offer the first direct evidence that “gamma” brainwaves in the cortex affect perception and attention. Researchers in Switzerland have created an Android app which lets users get together to crack a modern cryptographic code. Building on earlier work that used a network of 300 PlayStation consoles, the scientists decided to leverage the power of smartphones. By running the algorithm a very large number of times the code may be broken eventually. For the 2.2 million Americans battling glaucoma, the main course of action for staving off blindness involves weekly visits to eye specialists who monitor increasing pressure within the eye. Now researchers have developed an eye implant that could help stave off blindness caused by glaucoma. The tiny eye implant developed at Stanford Univ. could enable patients to take more frequent readings from the comfort of home. Using a calculation originally proposed seven years ago to be performed on a petaflop computer, Lawrence Livermore National Laboratory researchers computed conditions that simulate the birth of the universe. When the universe was less than one microsecond old and more than one trillion degrees, it transformed from a plasma of quarks and gluons into bound states of quarks. There’s an old saying in the biofuels industry: “You can make anything from lignin except money.” But now, a new study may pave the way to challenging that adage. The study from the National Renewable Energy Laboratory demonstrates a concept that provides opportunities for the successful conversion of lignin into a variety of renewable fuels, chemicals, and materials for a sustainable energy economy. Protein crystals are extremely fragile, highly sensitive and hard to handle. Scientists in China have worked around these downsides by linking a protein crystal to helper molecules from the sugar family. When fixated, the molecules arrange themselves symmetrically within the helper molecule framework, forming crystals in which the proteins achieve high stability and are intricately interconnected into a protein crystalline framework. Specialized cells can break through normal tissue boundaries and burrow into other tissues and organs. This crucial step in many normal developmental processes is guided by an extracellular cue called netrin, which orients the anchor cell so that it invades in the right direction. In a new study, researchers have shown how receptors on the invasive cells rove around the cell membrane ”hunting” for a missing netrin signal. The future of movie, sports and concert broadcasting lies in 4K definition, which will bring cinema quality TV viewing into people’s homes. With its 3840 x 2160 resolution, 4K Ultra HD has four times as many pixels as today’s Full HD. The new HEVC video compression standard now allows broadcasters to transmit live video in the 4K digital cinema standard, and was used recently to broadcast a soccer game in Germany. Findings from a physics study by a Kansas State Univ. researcher are helping scientists accurately predict the once unpredictable. They looked at theoretically predicting and understanding chemical reactions that involve three atoms at ultracold temperatures. Their findings help explain the likely outcome of a chemical reaction and shed new light on mysterious quantum states. A team of scientists from Germany, Canada, and the United States has now developed a promising new measurement method that works without destroying anything yet offers nanoscale resolution. The method, an enhancement of resonant x-ray reflectometry identifies the chemical elements involved and is able to determine both the magnetic order and the electron distribution. David Erickson, a professor at Cornell Univ., will receive a $3 million National Science Foundation grant over five years to adapt smartphones for health monitoring. The program, dubbed PHeNoM for Public Health, Nanotechnology, and Mobility, aims to deploy three systems that can have an immediate impact on personal healthcare. In the past, immune cells were clearly divided into innate cells, which respond to attacks in a non-specific way, and adaptive cells, which learn to recognize new antigens and gain the ability to rapidly react to later attacks. Researchers at RIKEN in Japan have discovered that is not always the case, having found that killer T cells previously thought to be innate, and thus short-lived, can remain in the lung for up to nine months. There’s a certain type of biomolecule built like a nano-Christmas tree. Called a glycoconjugate, it’s many branches are bedecked with sugary ornaments. It’s those ornaments that get all the glory. That’s because, according to conventional wisdom, the glycoconjugate’s lowly “tree” basically holds the sugars in place as they do the important work of reacting with other molecules. Rice Univ. researchers have created a CMOS-compatible, biomimetic color photodetector that directly responds to red, green and blue light in much the same way the human eye does. The new device uses an aluminum grating that can be added to silicon photodetectors with the silicon microchip industry’s mainstay technology, “complementary metal-oxide semiconductor,” or CMOS.
<urn:uuid:dbb2079b-3bcd-42fa-9dd4-0d94bef1ed20>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.rdmag.com/News?folderid=229&page=4", "date": "2014-09-03T05:24:11", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535924501.17/warc/CC-MAIN-20140909013107-00226-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9216992855072021, "token_count": 1195, "score": 2.734375, "int_score": 3 }
help us to understand consumer behaviour. A grasp of these theories will help you to develop a critical appreciation of what influences our decision making and purchasing behaviour. This module extends your understanding of the economic theories of consumer choice and University Studiescourse, we have been through numerous different learning aspects and concepts. We learned about learning styles, and the writing process and help us get to understand our peers in a little better. Despite coming into class with a little apprehension and the dreaded felling that this course... What Leadership Means To Me By: Cindy Ouellette MGT 420 Theory and Practice of Leadership Instructor: Rick Chaffee, Ph.D. January 24, 2012 Leadership is a very broad topic; I never knew just how many different traits and skills... PERSONAL LEARNINGS FROM THE SUBJECT AND HOW CAN I USETHIS IN MY EVERYDAY LIFE During the first meeting, Prof. Esteban thought us about what does SOCILOGY means. Sociology is the scientific study of human social life, groups and societies. It is a social science which originated from the word Socio(socius)... of an organization whether local or global. Overall, leadership is very different than management and some of the outcomes we reviewed help define what leadership truly is and helps drive the business. Power and influence play a major role, along with initiating and managing change and the leadership... interest among college faculty in the teaching methods variously grouped under the terms 'active learning' and 'cooperative learning'. However, even with this interest, there remains much misunderstanding of and mistrust of the pedagogical "movement" behind the words. The majority of all college faculty still... This paper examines how emotional intelligence and cognitive intelligence are associated with academic success and job performance. Emotional intelligence continues to pick up momentum in the world of business and academia. More and more research supports the concept that emotionally... The Concept of Reflective Practice Reflective practice is the capacity to reflect on action so as to engage in a process of continuous learning, which, according to the originator of the term is, one of the defining characteristics of professional practice. According to one definition, it involves... 1.2 Explain how information resources are managed. 1.3 Describe roles of the information systems department. Read the course description and objectives. Read the instructor’s biography and post your own. 1. Personal Profile You are expected to develop and submit a comprehensive personal profile of your behavior as identified by the results of the StrengthsFinder and the Myers-Briggs Type Indicator (MBTI). Your regular entries in your learning journal will provide much of the... Your final project for GEN/105 is a Student Survival Guide. To complete your project, you will draw from skills and information youlearned in the course. STUDENT SURVIVAL GUIDE Adapting Work Habits to Fit My Personality HOW TO WRITE A WINNING STATEMENT OF PURPOSE Firstly, it is better to ask, what is the purpose of writing a 'statement of purpose'? A statement of purpose is in nut-shell, a substitute for your personal interview. The universities you are applying for cannot take your personal interview before admissions... University of Phoenix. All rights reserved. Thiscourse provides an overview of Business Information Systems. This includes a broad foundation for both technical and nontechnical business professionals. Special emphasis is placed on how information is used by different types of businesses... IS ESSENTIAL TO GETTING THE JOB YOU WANT. No matter where you went to school, whatyour GPA was, how much experience youhave, or who you know — if you can’t interview competently, you won’t get the job! Your goal in every interview is to advance one step further toward getting a job offer. Take... Developing Managers: The Functional, the Symbolic, the Sacred and the Profane [*]. This paper offers a new perspective on international al management by examining the role of culture and management development in creating international al expertise, a sense of identity and realizing organizational... THE CONSULTING BIBLE How to conquer any consulting interview from fit questions to case studies Second edition Copyright 2009 Management Consulted. All Rights Reserved. Notice of Rights No part of this book and its contents may be reproduced, modified, or transmitted in any form or by any means... STUDENTS’ VIEWS OF CAREERAND TECHNICAL EDUCATION: A QUALITATIVE STUDY A Thesis presented to the Faculty of the Graduate School at the University of Missouri-Columbia In Partial Fulfillment of the Requirements for the Degree Master of Arts by ANGELA BROWDER Dr. David Bergin, Thesis Advisor AUGUST... I. The Definition of Management II. Organizational Performance III. Management Skills IV. Management Types V. What Is It Like to Be a Manager? A. Manager Activities B. Manager Roles VI. Managing in Small Businesses and Not-for-Profit Organizations When I was told this was an assignment I thought “this should be easy”. Boy was I wrong! I found many things can affect the outcome of my child. If I am too strict or too easy, the child’s behavior will show this. Over time, this will also affect the child’s temperament. I havelearned that some of my... truly seminal works; fundamental concepts towards our understanding and explaining human learning behaviour, and towards helping others to learn A note about Learning Styles in young people's education: Towards the end of the first decade of the 2000s a lobby seems to have grown among certain educationalists...
<urn:uuid:a71e6d15-bb92-44b9-acc7-6cc3265e4c75>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.studymode.com/subjects/what-are-the-most-important-concepts-you-have-learned-in-this-course-how-do-you-think-you-will-use-these-concepts-in-your-further-studies-and-in-your-career-page2.html", "date": "2014-09-03T05:02:10", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535924501.17/warc/CC-MAIN-20140909013107-00226-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9024147391319275, "token_count": 1218, "score": 2.875, "int_score": 3 }
Skip to Main Content An air monitor has been developed at the Oak Ridge Y-12 Plant to sample the air in enriched uranium processing areas and to detect elevated particulate concentrations due to an upset condition. The monitor measures the alpha particle activity from material collected on 47-mm filter paper. Three energy windows are used to allow quantification of background activity from radon and thoron daughters and correction of their spillage into the uranium window. There is sufficient monitor memory to hold a history file of six days' activity from three sampling heads at 20-min status intervals. Alarm signals are activated if the absolute level of activity on a filter exceeds a predefined level, or if an excessively fast rate of buildup is occurring, which would cause the absolute level to be exceeded. This monitor is combined with an absolute particle counter, and data are collected at a processing station where uranium dust is known to be present. The occurrence of high particle count activity in the 3.0-10.0- mu m range is followed by increased alpha activity on the filter paper.
<urn:uuid:0b48a4b5-2416-4ea0-aaed-2658d18b4396>
{ "dump": "CC-MAIN-2014-35", "url": "http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true&arnumber=574207", "date": "2014-08-21T01:04:20", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500813241.26/warc/CC-MAIN-20140820021333-00279-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9372151494026184, "token_count": 213, "score": 2.9375, "int_score": 3 }
Dr. Jeff Masters August 20, 2014 A tropical wave (96L) located near 11°N 53°W, several hundred miles east of the Lesser Antilles Islands, is headed west-northwestwards at about 10 - 15 mph. Satellite loops on Wednesday morning showed the wave had a broad, elongated surface circulation and a modest amount of heavy thunderstorm activity that was steadily increasing in areal coverage and intensity. The storm was poorly organized, though, with a clumpy appearance and just a few low-level spiral bands. Christopher C. Burt August 19, 2014 July was the 4th warmest such since 1880 according to NOAA and the 11th warmest according to NASA data (the difference in assessments is due to several factors which I’ll discuss in a future blog). It was unusually cool in the central portion of the U.S. while record warmth was observed in parts of the U.S. Northwest, Scandinavia and the Baltic nations. Several powerful typhoons made landfall in East Asia and Hurricane Arthur took a swipe at North Carolina. July 3, 2014 This is a live blog set up to provide the latest coverage on Hurricane Arthur as it threatens the North Carolina Coast. Check back often to see what the latest is with Arthur. The most recent updates are at the top. June 30, 2014 Here is some basic, fundamental terminology related to tropical cyclones. Rather than a comprehensive and/or technical glossary, this represents the essence of the meaning & importance of some key, frequently used terms. May 15, 2014 It was a very interesting winter across a good part of the nation from the Rockies through the Plains to the Northeast. Let's break down the most significant winter storms on a month by month basis. September 27, 2013 Melting permafrost has the potential to release an additional 1.5 trillion tons of carbon into the atmosphere, and could increase our global average temperature by 1.5°F in addition to our day-to-day human emissions. However, this effect is not included in the IPCC report issued Friday morning, which means the estimates of how Earth's climate will change are likely on the conservative side.
<urn:uuid:d4d190ba-31f8-4145-8e78-b26d05bb8849>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.wunderground.com/news/best-weather-photos-iwitness-20130125", "date": "2014-08-21T02:14:25", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500813241.26/warc/CC-MAIN-20140820021333-00279-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9639081358909607, "token_count": 451, "score": 2.6875, "int_score": 3 }
5 Written Questions 5 Matching Questions - Shareholder / Stockholder - Money has 3 jobs: 3) Money stores value - Bear Market - a Coins and paper money. It is also called currency. This is fiat money and is the most commonly used form of money - b When an individual person or company has control over the producing and selling of a certain product or service. Has an overall negative impact for consumers (buyers) -consumers have less choice -consumers may have to pay high prices -quality of the good or service may not be good. - c The DOW is down which signals that the stock market is weak - d Money lasts for a long time, so you can keep it for a long time. It lets people store, or keep, their wealth. - e People who buy stock 5 Multiple Choice Questions - Money is an object people use to buy goods and services. Instead of trading goods and services directly for other goods and services, we trade goods and services for money - The DOW is up and the stock market is strong. People are confident and are willing to invest - Money must last a long time - A certificate that a stockholder gets that shows the number of shares in a company that person owns - Money made from selling stocks for more money than what you bought them for. This is one way stockholders earn money from investing in stocks 5 True/False Questions Liable → Legally responsible for something Business owners are liable for their business Money must be PORTABLE → Money must stay valuable for a long time. It is controlled by the government. Charter → A license to become a corporation Securities → Another word for stocks and bonds Command Economy → Also called capitalism Result of many people's buying and selling decisions. This type of economy is not run by anyone, it runs itself. People are free to buy and sell what they please
<urn:uuid:f75c3c56-d715-42aa-ad22-a5c54931a896>
{ "dump": "CC-MAIN-2014-35", "url": "http://quizlet.com/5618836/test", "date": "2014-08-22T10:17:06", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500823528.84/warc/CC-MAIN-20140820021343-00221-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9563913941383362, "token_count": 408, "score": 2.8125, "int_score": 3 }
Consequences of Genetic Testing for Adult-Onset Diseases In the news Technology that allows you to be tested to assess your genetic predisposition for an adult-onset disease Would you want to know when and how you were probably going to die? What is there is no current treatment? What if you could pass your genetic risk on to your children? Who else (if anyone) would you want to know about your genetic test results? Objectives Outline major consumer/family issues related to genetic susceptibility and testing for adult-onset diseases Describe some general findings related to two studies (one done at the UofU) Human Genome Project Mapping the entire human genome Establishment of the National Center for Human Genome Research (NCHGR) Publicity of Disease-Related Genes The “Social Conscience of NCHGR” – ELSI Ethical, Legal, and Social Implications of Genetic Testing Selected Diseases for Which Genetic Tests Currently Exist Huntington Disease Familial Hypercholesterolemia Sickle-Cell Trait Familial Melanoma Colon Cancer Breast Cancer (BRCA1 & BRCA2) Alzheimer’s (APOE4) Who should undergo testing? Predictive gene testing Healthy persons in at-risk families Depends on the disease Depends on the gene mutation Depends on the person Who would undergo predictive testing? TIME/CNN Poll – 50% would take a predictive test. Utah Poll – If a treatable disease (colon cancer), increases to 80%. High Risk Families – if given information about testing, 50-60% are tested. Why are people concerned about testing and test results? Screening Behaviors Psychological and emotional worries Effects on relationships and family Effects on privacy and insurance/employer discrimination Reviewing Genetic testing for adult onset diseases is a relatively new technology Sparked by the Human Genome Project Social science research supported by ELSI Range of serious adult-onset diseases that can now be tested for Raises numerous questions about how people process this information and the consequences for individual and family well-being
<urn:uuid:7bdf65f4-ba50-4100-9774-8362d654703f>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.slideshare.net/jarmanjo/genetic-testing-7107691", "date": "2014-08-22T10:13:54", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500823528.84/warc/CC-MAIN-20140820021343-00221-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.897886335849762, "token_count": 432, "score": 2.796875, "int_score": 3 }
Nuclear Energy Edge |Kent Paterson||March 24th 2014| Serious problems at a U.S. Department of Energy (DOE) nuclear waste dump in southeastern New Mexico have caught the eyes of the press and government officials in Ciudad Juarez, Mexico. The current round of troubles began February 5 at the Waste Isolation Pilot Plant (WIPP) near Carlsbad, New Mexico, when six workers were briefly hospitalized for smoke inhalation after a truck caught fire. A Valentine’s Day radiation leak then released plutonium and americium, resulting in exposures to at least 17 workers. An undetermined quantity of toxic chemicals also leaked. Since February 14, additional radiation releases connected to the original one have been reported, even as more workers are still awaiting test results for possible radiation exposure during the first event. Although Ciudad Juarez is located nearly 200 miles from WIPP, city officials expect to meet with U.S. government representatives on March 26 or 27 to discuss ongoing issues from the February 14 incident. Read more .. The Race for Batteries |Andy Freeberg||March 20th 2014| Scientists at the Department of Energy's SLAC National Accelerator Laboratory and Stanford University have discovered a potential way to make graphene – a single layer of carbon atoms with great promise for future electronics – superconducting, a state in which it would carry electricity with 100 percent efficiency. Researchers used a beam of intense ultraviolet light to look deep into the electronic structure of a material made of alternating layers of graphene and calcium. While it's been known for nearly a decade that this combined material is superconducting, the new study offers the first compelling evidence that the graphene layers are instrumental in this process, a discovery that could transform the engineering of materials for nanoscale electronic devices. Read more .. |Amy Mastand and Diane Swanbrow ||March 19th 2014| Consumers, on average, believe home energy bills would have to nearly double before forcing them to make lifestyle changes to save on costs, according to a new U-M survey. Conducted for the first time last fall, the U-M Energy Survey found that consumers anticipate a proportionally greater rise in home energy bills than in the price of gasoline — 30 percent for home energy versus 15 percent for gasoline — over the next five years. According to federal data, the average U.S. household spent about $2,000 last year on home energy, including electricity and other household fuels, and an average of $2,900 per year on gasoline. Read more .. The Race for Batteries |Peter Ruegg||March 18th 2014| Researchers from ETH Zurich and Empa have succeeded for the first time to produce uniform antimony nanocrystals. Tested as components of laboratory batteries, these are able to store a large number of both lithium and sodium ions. These nanomaterials operate with high rate and may eventually be used as alternative anode materials in future high-energy-density batteries. TEM image (false coloured) of monodisperse antimony nanocrystals. (Photo: Maksym Kovalenko Group / ETH Zurich) The hunt is on – for new materials to be used in the next generation of batteries that may one day replace current lithium ion batteries. Today, the latter are commonplace and provide a reliable power source for smartphones, laptops and many other portable electrical devices. Read more .. The Coal Problem |Timothy Cama||March 17th 2014| The Sierra Club on Monday launched a new ad campaign aimed at pressuring the Environmental Protection Agency into adopting strong regulations against dumping coal ash into water. The ad campaign, dubbed “Thirsty?”, warns that coal ash could pollute drinking water, citing spills in West Virginia, North Carolina and Tennessee. The ads urge the EPA to protect against such pollution, which they said contains arsenic, mercury and lead. “Americans deserve water we can drink, not water that makes us sick,” Mary Anne Hitt, director of the Sierra Club’s Beyond Coal campaign, said in a statement Monday. “The West Virginia water crisis, the Duke Energy coal ash spill and the [Tennessee Valley Authority] coal ash disaster of 2008 all underscore the inadequacy of current state and federal safeguards. Now is the time to act swiftly in order to protect our health and waterways from coal’s toxic legacy.” Read more .. The Battle for Ukraine |David Biello||March 16th 2014| Ukraine is on its own , not least when it comes to energy—and that crimps the country's ability to respond to Russia's land grab in the Crimean peninsula. Ukraine relies on Russia for roughly two thirds of its natural gas supplies, suggesting that the current geopolitical impasse will likely continue to fall in Russia’s favor. Even with a few months of natural gas in storage, "they're in a tough spot if those supplies are cut off," notes Jason Bordoff, one-time Obama administration policy advisor and now director of Columbia's Center on Global Energy Policy, who was a speaker on a panel of experts at Columbia University’s School of International and Political Affairs (SIPA) on March 10. Russia has the leverage to use its energy supplies as a political cudgel in Ukraine or the rest of Europe—the European Union imports one third of its gas from the eastern giant—and has not hesitated to use it in the past, most recently in 2009. Read more .. |Marie-Helene Thibeault||March 15th 2014| They're called the Alberta oilsands but most of the sand actually came from the Appalachian region on the eastern side of the North American continent, a new University of Calgary-led study shows. The oilsands also include sand from the Canadian Shield in northern and east-central Canada and from the Canadian Rockies in western Canada, the study says. This study is the first to determine the age of individual sediment grains in the oilsands and assess their origin. "The oilsands are looked at as a Western asset," says study lead author Christine Benyon, who is just completing her Master's degree in Geoscience in the Faculty of Science. "But we wouldn't have oilsands without the sand, and some of that sand owes its origin to the Appalachians and other parts of Canada." The research, which also involved study sponsor Nexen Energy ULC and the University of Arizona LaserChron Center, was published last week in the Journal of Sedimentary Research. The findings contribute to geologists' fundamental understanding of the oilsands. They also help oilsands companies better understand the stratigraphy, or layers, of sand and the ancient valleys where sediment was deposited, "and that could lead to better production techniques," Benyon says. To determine the origin of the sand, the researchers used a relatively new technique called "detrital zircon uranium-lead geochronology." Read more .. |Laura Barron-Lopez||March 14th 2014| House Democrats are joining the growing campaign to pressure Secretary of State John Kerry to reject the Keystone XL pipeline. A letter sent to Kerry on Friday, signed by 27 House Democrats, details what they said would be the climate impacts of approving the $5.4 billion project, which would run from oil sands in Alberta to Gulf refineries. "The math doesn't add up. In order to meet our commitment to fight climate change, we need to keep at least 80 percent of carbon reserves below ground," the letter, spearheaded by Reps. Jan Schakowsky (Ill.), Mike Quigley (Ill.), Rush Holt (N.J.) and Raúl Grijalva (Ariz.), states. "If the United States is truly committed to avoiding a 2 degree temperature increase, we have to start by resisting this pipeline. We urge you to reject the pipeline and keep tar sands oil in the ground where it belongs.” The representatives were joined by the National Wildlife Federation and activist group 350.org on Friday. Kerry this week said he's a blank slate when it comes to Keystone despite his advocacy for taking action to reduce climate change. Read more .. The Race for Natural Gas |Laura Barron-Lopez||March 13th 2014| Three Republican senators are pushing legislation that fast-tracks permits for natural gas pipelines in an effort to curb gas flaring. Sens. John Barrasso (Wyo.), John Hoeven (N.D.), and Mike Enzi (Wyo.) introduced the bill on Wednesday, which requires the Interior and Agriculture Departments to issues permits for the majority of gas pipelines within 60 days. "Abundant, low-cost energy shouldn’t have to wait on the federal government for approval,” Enzi said in a statement on Wednesday. “But that’s often what happens when we lose natural gas to flaring on account of delays in permitting infrastructure improvements. American energy is ready to power our country if Washington would just get out of the way. We can do better and our legislation is one step in that direction.” Read more .. The Race for Natural |Antoine Blua||March 12th 2014| With shale gas production in the United States booming, Russia’s intervention in Crimea has given a boost to those calling for the United States to expedite natural gas exports to Europe to help it cut its reliance on Russian energy. But how realistic is this idea? Why all the talk about the United States exporting natural gas to Europe? Russia is the world’s largest exporter of natural gas and Moscow has not been shy about using this as a political weapon. With Russia supplying Europe with approximately 40 percent of its energy, and with the main natural gas pipelines running through Ukraine, the potential for new disruptions -- and political blackmail -- are very real. This has led to calls for Europe to seek alternative sources of energy. And one key source could be across the Atlantic Ocean, in the United States. Thanks to breakthroughs in hydraulic fracturing technology, known as fracking, and the subsequent "shale gas revolution," the United States has in recent years become the world's largest natural gas producer. Read more .. The Race for Nuclear |Douglas Birch and R. Jeffery Smith||March 10th 2014| Center for Public Integrity A generation after Three Mile Island and Chernobyl, the world is rediscovering the attractions of nuclear power to curb the warming pollution of carbon fuels. And so a new industry focused on plutonium-based nuclear fuel has begun to take shape in the far reaches of Asia, with ambitions to spread elsewhere — and some frightening implications, if Thomas Cochran is correct. A Washington-based physicist and nuclear contrarian, Cochran helped kill a vast plutonium-based nuclear industrial complex back in the 1970s, and now he’s at it again — lecturing at symposia, standing up at official meetings, and confronting nuclear industry representatives with warnings about how commercializing plutonium will put the public at enormous risk. Where the story ends isn’t clear. But the stakes are large. The impetus for Cochran’s urgent new campaign — supported by a growing cadre of arms control and proliferation experts — is a seemingly puzzling decision by Japan to ready a new $22 billion plutonium production plant for operation as early as October. Read more .. |Edward Yeranian||March 9th 2014| Leaders of eastern Libya's self-declared autonomous region of Barqa declared Saturday that they had begun exporting oil from the port of Sidra and would share revenues with the central government in accordance with a 1951 constitution. Prime Minister Ali Zeidan told journalists later that government authorities have warned a North Korean-flagged oil tanker to leave Libyan waters or face attack. Libyan Prime Minister Ali Zeidan repeated an official warning to a North Korean-flagged oil tanker Saturday afternoon to “leave Libyan waters” or face attack. He said that the North Korean tanker, bearing the name Morning Glory, entered the Libyan port of Sidra, breaking international law, and was warned to leave or face attack. He stressed that the ship has said it would like to leave, but is being forced by militiamen to load crude. Read more .. |Mario Trujillo||March 8th 2014| Sixty-five percent of people support the construction of the Keystone XL pipeline between the United States and Canada, a new poll finds. A Washington Post-ABC News poll released Friday shows only 22 percent are opposed to the project. The poll shows there has been little movement in support or opposition to the pipeline in the last year. A Pew poll last April found 66 percent backed construction. Majorities of every political party back the pipeline, with Republicans most in favor. Eighty-two percent of Republicans back the effort, while 65 percent of independents and 51 percent of Democrats feel the same. In the public’s mind, the economic benefits outweigh concerns about the environmental impact of the pipeline, which is projected to carry 830,000 barrels of oil a day. Eighty-five percent say the pipeline would create a large number of jobs, including 62 percent who believe it “strongly." Another 47 percent think it would pose a significant risk to the environment. Read more .. The Coal Problem |Pete Kasperowicz||March 6th 2014| The House voted Thursday to override a proposed Environmental Protection Agency rule limiting carbon emissions from future coal-fired electricity plants. Members passed the Electricity Security and Affordability Act, H.R. 3826, in a mostly partisan 229-183 vote; 10 Democrats voted for passage. The bill is a response to a proposed EPA rule Republicans say would require new coal-fired plants to achieve an emission standard that is virtually impossible using today's widely available technology. Rep. Ed Whitfield (R-Ky.), the bill's sponsor, says that means the rule will effectively ban new power plants. Read more .. Russia on Edge |Pete Kasperowicz||March 5th 2014| House Speaker John Boehner (R-Ohio) on Wednesday called on the Obama administration to allow more exports of natural gas, which he said is a move that would help weaken the influence of Russia. Boehner said Russia's involvement in Ukraine is "more than a cause for concern, it's a cause for action." He said Congress would work with the White House to counter Russia's move into Ukraine, but said energy policy should also be a part of the U.S. reaction. He said selling more natural gas abroad would help boost U.S. values overseas, but said so far, President Obama's Energy Department is holding these exports back. "We can supplant Russia's influence, but we won't so long as we have to contend with the Energy Department's achingly slow approval process," Boehner said on the House floor. Read more .. |Mark J. Perry||March 3rd 2014| At a time when many people have put off buying a new car until the economy improves, the last thing we need is a stringent government regulation on fuel efficiency that will raise the cost of vehicles and make matters even more difficult for consumers. The Obama administration has mandated Corporate Average Fuel Economy standards that require automakers to make expensive redesigns on new vehicles. By 2016, the fuel efficiency of the America's new vehicle fleet will have to average at least 34.1 miles per gallon. By 2025, compared to 2012 models, automakers will have to nearly double fuel economy to 54.5 miles per gallon. The administration approved the CAFE standards to reduce carbon-dioxide emissions from vehicle tailpipes. It was done without full public discussion and debate, without considering the burden on consumers, or the impact on the automobile industry and working people. Read more .. The Coal Problem |Chris Hamby||March 2nd 2014| Center for Public Integrity Coal miners sick with black lung disease should receive higher-quality medical reports and have a better chance to win benefits cases following a series of reforms announced Monday by the U.S. Department of Labor. The initiatives, effective immediately, represent an attempt by the Labor Department to create a more level playing field for coal miners navigating a byzantine federal benefits system that often favors coal companies and the lawyers and doctors they enlist. The changes come months after the publication of the yearlong Center for Public Integrity investigation Breathless and Burdened, produced in partnership with ABC News, which revealed how doctors and lawyers, working on behalf of coal companies, have helped defeat the claims of miners sick and dying of black lung. The new measures include a pilot program that would provide some miners with an additional medical report, instructions to government lawyers across the country to intervene in some appeals and increased training for doctors and government officials. “We really think this is going to create more balance and fairness,” said Gary Steinberg, the acting director of the Office of Workers’ Compensation Programs, which oversees the black lung benefits program. “Our goal is that it will result in an increase in the number of awards because of an increased quality in the reports and quality in the decisions.” Sen. Jay Rockefeller, D-W.Va., called the Labor Department’s initiatives “a step in the right direction,” and Rep. George Miller, D-Calif., said they were "a good first step toward leveling the playing field.” Both noted, however, that only some miners qualify for them and called for further action. Sen. Robert Casey, D-Pa., said: "While this is certainly an encouraging development, it’s far from what’s needed to ensure these miners and their families receive justice. I’ll continue to push the Department of Labor to make the necessary reforms to get this right.” A spokesman for the National Mining Association declined to comment. Read more .. The Coal Problem |Tim Devaney||March 1st 2014| Environmental Protection Agency Administrator Gina McCarthy on Friday signaled an intent to work with industry groups on the ageny's proposed standards for coal-fired power plants. Speaking from North Dakota, McCarthy said the EPA is not interested in what critics have said is a "war on coal" by the Obama administration, aimed at pushing out coal companies to make room for renewable energy. "Coal is in our energy mix today, and it will be for decades in the future," McCarthy said. Focus has turned to North Dakota as of late, where the state is in the middle of an energy boom, in large part due to coal-fired power plants. McCarthy traveled there at the request of Sen. Heidi Heitkamp (D-N.D.) to see what the state's plants are doing firsthand. The EPA has drawn criticism from industry groups for what they say is the agency's "war on coal." Earlier this year, the EPA proposed tougher standards that would limit carbon emissions from new power plants, which critics say will make it nearly impossible to build new plants. Read more .. The Race for Solar |Hilary Heuler||February 28th 2014| In Uganda, telecom provider MTN and a company called Fenix are gearing up this year for a nationwide rollout of pre-paid electricity, similar to pre-paid airtime, but using solar kits. Uganda has one of the lowest electrification rates in Africa - a continent where some 600 million people are off the power grid. The village of Kiwumu lies less than 32 kilometers from the Ugandan capital, Kampala. But the bright lights of the city seem worlds away. Like the vast majority of Uganda, Kiwumu is off the electrical grid, and teacher Michael Mugerwa does not expect things to change any time soon. "I'm not dreaming of having grid power here in the next 15 years, because power distribution is influenced by government, and government seems to have preference elsewhere. So it's not easy to get grid in these residential communities," he said. Read more .. The Race for Wind and Sun |Ana Hontz-Ward||February 27th 2014| Germany is one of the top producers of renewable energy in the world. Since the year 2000 the country’s production of clean electricity jumped from a modest 6 percent to 25 percent last year in an effort to shift the German economy from nuclear power and fossil fuels towards wind and solar energy. Despite the progress, German consumers pay among the highest electricity prices in the European Union. Lissy Ishang started turning off appliances to save energy when she moved away from home a decade ago. Back then, Lissy’s family was paying half the price Germans pay today for electricity and this year German consumers are expected to pay even more. Today an average family of four in Germany spends about $107 a month for electricity. This year, their monthly bill will be $129, almost three times more than a family in the United States. Read more .. |Timothy P. Carney||February 26th 2014| Should a Canadian corporation be allowed to take land rights from a small Nebraska rancher? Should conservatives side with Big Government and Canadians over private landowners? A court in Nebraska has put the brakes on the Keystone XL pipeline in a case that started with land rights. The plaintiffs were landowners in Keystone's path who didn't want to sell, and so became victims of eminent domain to benefit Keystone. The Keystone XL pipeline, being built by TransCanada, has generated dozens of passionate arguments on both sides. Keystone opponents say the pipeline will disrupt habitats. The pipeline has also become a totem for oil, and thus a symbol of so many things hated on the Left: profits, pollution, climate change, and Republicans. Read more .. |Nicole Casal Moore||February 25th 2014| About 50 percent more of the greenhouse gas methane has been seeping into the atmosphere than previously thought, according to far-reaching findings that synthesize two decades' worth of methane studies in North America. People who go out and actually measure methane pretty consistently find more emissions than we expect. Methane is the main ingredient in natural gas. The study was a broad-based effort led by Stanford University that involved researchers from the University of Michigan, MIT, Harvard University and 11 other institutions and national laboratories. It's the first to integrate studies that looked at both individual ground-based components and continental-scale observations. "People who go out and actually measure methane pretty consistently find more emissions than we expect," said Adam Brandt, an assistant professor of energy resources engineering at Stanford University. Read more .. The Race for Electric |Jeff Shu||February 25th 2014| In the heart of southern California, home of packed freeways and major smog problems, help may be on the way from an unexpected source - China. The Chinese company BYD is trying to make an impact while overcoming new obstacles. Outside the BYD U.S. headquarters in the heart of Los Angeles, Auto Marketing Manager Lifang Yan agilely moved a 12-meter-long BYD electric-powered bus. “Zero emissions, zero pollution, lower fuel costs, and lower maintenance costs," she said. BYD, which is short for “Build You Dreams”, is the first Chinese company to manufacture cars in the United States. Its battery-powered buses should be a dream come true for a city with constant traffic jams and serious air pollution like Los Angeles. And so far, the company has three small orders from southern California transit agencies. But now, it needs to convince buyers to make larger orders. Read more .. |Justin Sink||February 24th 2014| President Obama told governors gathered at the White House on Monday he expects to make a decision on the Keystone XL oil pipeline within the next couple of months, Oklahoma Gov. Mary Fallin said. Fallin and Louisiana Gov. Bobby Jindal, both Republicans, said they raised the issue in a closed question-and-answer session with the president. "He anticipates an answer one way or another in a couple of months," Fallin said. If the timeline holds, it means Obama would make a decision on the controversial project before the midterm elections. The pipeline has been championed by Republicans and vulnerable Senate Democrats, including Sens. Mary Landrieu (La.) and Mark Begich (Alaska), who say it would create construction jobs. White House press secretary Jay Carney declined to comment on the conversation between the president and the governors. "I don't have a timetable to give to you," Carney said. "I'd refer you to the State Department." Read more .. |Keith Laing||February 23rd 2014| The Department of Transportation and Association of American Railroads (AAR) announced an agreement Friday to lower the speed limit for freight trains carrying crude oil. They also agreed to inspect tracks more frequently as part of a new safety effort. The voluntary reforms follow the high-profile December derailment of a train in Casselton, N.D., that resulted in 400,000 gallons of crude oil being spilled and prompted a push for more stringent federal regulation of freight rail shipments involving hazardous materials. Transportation Secretary Anthony Foxx said increasing the safety of freight rail oil shipments was a goal for both the DOT and the freight rail industry. “DOT and the Association of American Railroads (AAR) both recognize that the United States has experienced a significant growth in the quantity of petroleum crude oil being shipped by rail in recent years,” Foxx wrote Friday in a letter to AAR President Ed Hemberger. Read more .. |David Hasamyer, Ben Wieder and Alan Suderman||February 22nd 2014| Center for Public Integrity In January 2011, with air quality worsening in Texas’ booming oil and gas fields and the federal government beginning to take notice, state environmental regulators adopted rules to reduce harmful emissions. The industry rebelled. So did the state legislature. A few months later, the legislature overwhelmingly approved SB1134, a bill that effectively prevented the new regulations from being applied in the Eagle Ford Shale region of South Texas, the fastest-growing oil shale play in the nation and maybe the world. Since then, more than 2,400 air emissions permits have been issued in the Eagle Ford without additional safeguards that would have reduced the amounts of benzene, hydrogen sulfide, formaldehyde and other toxic chemicals that drift into the air breathed by 1.1 million people. Read more .. |Laura Barron-Lopez||February 21st 2014| Green groups say a Nebraska county judge’s ruling this week striking down the Keystone XL pipeline’s route through that state provides an opening for President Obama to delay his decision on the project. The question, observers say, is whether Obama is interested in another delay during a midterm election year, where delay or rejection of Keystone could hurt Democratic Senate candidates. Lancaster County Judge Stephanie Stacy’s ruling should put off the State Department’s determination on whether the pipeline is in the national interest, says Melinda Pierce of the Sierra Club. “I can't imagine State can move forward on the national interest determination when the route is in question,” said Pierce, who added that she can’t envision a scenario where State would move forward until the issues in Nebraska are resolved. Read more .. |Mark J. Perry||February 20th 2014| Spurred by rapid growth in crude oil shipments in the last few years, America's freight railroads are gaining a new lease on life. Small amounts of domestic crude have always been transported by rail, but since the recent shale oil boom, the increase in shipments has been enormous. Last year, about 400,000 carloads of crude oil traveled by rail, up from only 9,500 carloads in 2008, according to the Association of American Railroads. At about 714 barrels of crude oil per railcar, that's more than 782,000 barrels of America's crude oil transported every day last year by rail. To grasp the revolutionary change in the logistics of crude-oil transit, consider that more than 71 million barrels of crude oil were shipped by rail in just the last quarter of 2013. That's 52% more oil than trains hauled during all of 2011, and more than 10 times the volume of oil shipped in 2008. Read more .. The Race for Nuclear |Bernard Shusman||February 19th 2014| In the midst of the current debate over whether to build the Keystone oil pipeline from Canada into the United States and the efforts to develop solar and wind power, nuclear energy is hardly being discussed. However, the Nuclear Energy Institute - an industry lobbying group -- reports the number of nuclear power plants in the United States is growing. The big news is new facilities. Four are currently being constructed: two each in South Carolina and Georgia. The Nuclear Energy Institute said there are 12 additional applications to build nuclear power plants. Steve Byrne, of South Carolina Electric and Gas, said that for his company, nuclear was a good option. “Coal was in disfavor. The price of natural gas relatively high, so nuclear made a lot of sense to us. So we were a company that already operated a nuclear facility, had a tremendous site for adding new nuclear capacity, so we made the decision to go nuclear,” said Byrne. Read more .. The Global Warming Edge |Hannah Hickey||February 18th 2014| University of Washington Spraying reflective particles into the atmosphere to reflect sunlight and then stopping it could exacerbate the problem of climate change, according to new research by atmospheric scientists at the University of Washington. Carrying out geoengineering for several decades and then stopping would cause warming at a rate that will greatly exceed that expected due to global warming, according to a study published Feb. 18 in Environmental Research Letters. “The absolute temperature ends up being roughly the same as what it would have been, but the rate of change is so drastic, that ecosystems and organisms would have very little time to adapt to the changes,” said lead author Kelly McCusker, who did the work for her UW doctoral thesis. The study looks at solar radiation management, a proposed method of geoengineering by spraying tiny sulfur-based particles into the upper atmosphere to reflect sunlight. This is similar to what happens after a major volcanic eruption, and many experts believe the technique is economically and technically feasible. But continuous implementation over years depends on technical functioning, continuous funding, bureaucratic agreement and lack of negative side effects. Read more .. |Justin Sink and Laura Barron-Lopez||February 17th 2014| When President Obama heads down to sunny Toluca, Mexico next week, he might feel an unusual chill in the air. The president is slated to hold economic and trade discussions with Mexican President Pena Nieto and Canadian Prime Minister Stephen Harper — the latter of whom is expected to give President Obama an earful over approval of the controversial Keystone XL pipeline. The Canadian government has vocally advocated for the $5.4 billion construction project, with Harper recently calling the extension "inevitable.” That effort has only intensified since the release less than a month ago of the long-awaited State Department's final environmental analysis, which said the pipeline wouldn't significantly increase greenhouse gas emissions. Read more .. The Race for Nuclear |R. Jeffrey Smith and Douglas Birch||February 16th 2014| Center for Public Integrity A confidential study by the Energy Department has concluded that completing a controversial nuclear fuel factory in South Carolina may cost billions of dollars more than the department has previously promised, according to government officials and industry sources briefed on its results. The study, conducted for Energy Secretary Ernest Moniz, also found that finishing and then operating the factory to help get rid of Cold War-era plutonium as part of a nonproliferation arrangement with Russia would likely cost a total of $25 billion to $30 billion on top of the $4 billion spent on its construction so far, the sources said. That amount is so high, the officials said, that the Obama administration is leaning towards embracing what one described as “some other option” for dealing with the 34 tons of weapons plutonium that the so-called Mixed Oxide (MOX) nuclear fuel plant at Savannah River was supposed to help eliminate. Read more .. |Jeff Seldin||February 14th 2014| Iraq is planning to triple its oil-producing capacity by 2020, hoping to leverage its natural resources in a power arrangement with Iran that could challenge Saudi Arabia’s domination of the world oil market. So far, most of the talk has come from Iraqi officials who have been expressing confidence the country can again become a major regional player despite an upsurge in violence that killed 1,000 people last month, and nearly 9,000 last year. In London last week, Iraq's Deputy Prime Minister for Energy Hussain al-Shahristani announced that Iraq plans to triple its oil output to nine million barrels per day by the end of the decade. And he hinted that is just part of Iraq’s plans. "Iran has been in touch with us," al-Shahristani told the London Telegraph. "They want to share our contracts model and experience." Read more .. |Alexandra Jaffe and Laura Barron-Lopez||February 13th 2014| Sen. Mary Landrieu’s (D-La.) new powers as chairman of the Energy and Natural Resources Committee could end up being a double-edged sword for her already-difficult reelection chances. The Bayou Democrat took over the plum post on Wednesday evening, which could allow her to push legislation popular back home that boosts the oil industry, all while distancing herself from an unpopular President Obama. But it also raises the pressure on her to deliver for home-state constituents. If she falters, her pitch risks ringing hollow as voters questions her ability to deliver. Republicans like Louisiana GOP Chairman Roger Villere are already pledging to make her chairmanship a liability. “For years she has donated to anti-energy Senators and helped keep Harry Reid and his anti-energy team in control of the Senate,” Villere said in a release to be issued Thursday. “She has consistently put special interests above what’s best for Louisiana’s energy economy,” added Villere, who called Landrieu’s chairmanship “the epitome of hypocrisy.” Read more .. The Coal Problem |Laura Barron-Lopez||February 12th 2014| West Virginia is facing another chemical spill, but this time it's coal slurry. On Tuesday, coal slurry from a line in the Patriot Coal facilities spilled into Fields Creek -- a tributary of the Kanawha River near Charleston. The slurry blackened six miles of the creek and inspectors are testing water to determine how much leaked, CNN reports. They believe roughly 100,000 gallons spilled. Patriot Coal began cleanup and containment immediately, said Janine Orf, a vice president at Patriot Coal. State Department of Environmental Protection spokesman Tom Aluise said the water in eastern Kanawha County is safe to drink. Still, West Virginia American Water released a "do not use" alert for the area for pregnant women for the separate Jan. 9 spill into Elk River from a Freedom Industries' site. Read more .. |Laura Barron-Lopez||February 11th 2014| Sen. Mary Landrieu starts her chairmanship on the Senate Energy and Natural Resources Committee on Tuesday. Hours after being notified that she would take the helm, the Louisiana Democrat shared the news with a room full of utility regulators Tuesday morning. "I was just told I will be head of the Senate Energy and Natural Resources Committee at 1 p.m. today," Landrieu said on Tuesday. And the oil-and-gas industry, along with coal advocates, let its excitement be known. “She has been an outspoken critic of EPA’s misguided carbon regulations, often breaking with party lines in order to voice her concerns about the rules’ devastating economic consequences," the American Coalition for Clean Coal Electricity said in a statement. Read more .. The Auto Age |Bernie DeGroat||February 10th 2014| Gas mileage of new vehicles sold in the U.S. improved in January 2014, while emissions are now at their best mark ever, say researchers at the University of Michigan Transportation Research Institute. Average fuel economy (window-sticker values) of cars, light trucks, vans and SUVs purchased last month was 24.9 mpg, up 0.1 mpg from December and up 4.8 mpg since October 2007, the first month of monitoring, according to UMTRI's Michael Sivak and Brandon Schoettle. In addition to average fuel economy, Sivak and Schoettle issued a monthly update of their national Eco-Driving Index, which estimates the average monthly emissions generated by an individual U.S. driver. The EDI takes into account both the fuel used per distance driven and the amount of driving—the latter relying on data that are published with a two-month lag. Read more .. The Grid on Edge |Mark Snowiss||February 9th 2014| An unsolved sniper attack last year on an electrical power substation in California that knocked out 17 giant transformers has mobilized industry leaders to beef up physical security at these vital installations. The incident also has some experts worried that parts of the U.S. power grid are similarly vulnerable. On April 16, 2013, attackers cut fiber optic cables in an underground vault and then fired more than 100 rounds from at least two high-powered rifles on Pacific Gas and Electric's Metcalf power transmission station near San Jose, California. The attack did not cause major power disruptions because officials were able to reroute electricity remotely during the 27 days it took to repair the installation and get it back on line, according to PG&E spokesman Brian Swanson. Read more .. The Race for Batteries |Paul Buckley||February 6th 2014| Researchers at Washington State University have developed a chewing gum-like battery material that is claimed could reduce the fire hazard potential of lithium ion batteries. The development is timely following UK's Civil Aviation Authority (CAA) recent declaration that the huge growth in people carrying lithium batteries on aircraft is posing a growing fire risk. Led by Katie Zhong, Westinghouse Distinguished Professor in the School of Mechanical and Materials Engineering, the researchers reported on their work in the journal, Advanced Energy Materials. The biggest potential risk for high performance lithium batteries comes from the electrolyte in the battery, which is made of either a liquid or gel in all commercially available rechargeable lithium batteries. The liquid acid solutions can leak and pose a fire or chemical burn hazard. Read more .. |Dorian Jones||February 4th 2014| With oil now flowing from Iraqi Kurdistan to Turkey after the two sides signed a groundbreaking agreement late last year, Baghdad is mounting an international legal challenge to the deal. In a deepening row over control of Iraq’s energy, Baghdad has announced it is employing an international law firm to block the sale of oil piped from semi-autonomous Iraqi Kurdistan to Turkey. Last year, Ankara signed a wide-ranging energy agreement with the Iraqi Kurdistan Regional Government, or KRG, and last December, oil from the region started flowing through a newly-constructed pipeline to the Turkish Mediterranean port of Ceyhan. But Iraq's central government insisted only it had the right to sign agreements on exporting energy. Dr. Emre Iseri, an energy politics expert at Izmir’s Yasar University, said the legal challenge posed a threat to the agreement. "It’s a problem. You are talking about international law, it's about legitimacy. If you act against international law, that means your maneuvering space is limited," he said. Read more .. See Earlier Stories 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33
<urn:uuid:541a3ece-4b2c-44ce-8e85-67de672383e2>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.thecuttingedgenews.com/index.php?page=21&PS=4", "date": "2014-08-22T09:48:59", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500823528.84/warc/CC-MAIN-20140820021343-00221-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9509298205375671, "token_count": 8314, "score": 3.015625, "int_score": 3 }
Asthma is a lung disorder that can make breathing difficult and create problems when oxygen is not delivered to cells efficiently. You can still live a normal and manageable life in a safe way, so do not believe your asthma is the end of the world when it comes to having fun and being in good health. Take the advice below to heart, and you can starting living normally today. It is vital that neither you, nor anyone else, smoke around a child with asthma. Secondhand smoke is a trigger for asthma attacks, not to mention the myriad of other diseases it can cause. You also need to be sure that your child isn’t around those that choose to smoke. Stay away from anything that you are aware of that may trigger your asthma. For some people, it may be related to allergies, such as a reaction to dust or pollen. For others, attacks can be caused by physical activities. You need to determine what your triggers are so that you can avoid them. If you have mild to moderate asthma attack, breathe out forcefully to get every bit of air out from your lungs. Exhale quickly and with power. This will force the air from your lungs. Take three breaths in succession. These breaths don’t have to be deep, just breathe a little. Then take a deep breath, pulling as much air as possible into your lungs. When your lungs are as full as you can stand, force the air out. This will force you to pay careful attention to all of your breaths. It will also empty your lungs of air, so that they’re ready to take in new, fresh air. This may cause you to cough or it may cause phlegm, but your breathing will be back to normal again. If you’re someone who gets an asthma attack related to allergy like symptoms, there’s medication you can use to help. Ask your allergist about omalizumab, an antibody drug that can reduce the severity of asthma symptoms and the frequency of attacks. Get a flu shot every season and make sure your family does as well. People who have been diagnosed with asthma should exercise extreme diligence in avoiding other respiratory conditions. This includes taking standard precautions against illness, like hand washing, as well as getting vaccinations that can keep you from getting sick. Think about buying a dehumidifier if your asthma symptoms are bad. Though you may not be aware of it, high levels of humidity in indoor spaces can increase dust mites, which then can affect asthma. Dehumidifiers keep your home dry by keeping the humidity out. Receiving a flu shot annually is very important if you or a loved one are asthmatic. This annual flu shot will prevent infectious damage to your lungs. Even if you seem to be fine, see your doctor regularly for your asthma checkups. You can never tell when an attack will strike, or when your physician may have some better or safer advice for you to follow. It’s a very good habit to use your asthma inhaler as a daily preventative, although the drug residue can cause issues for your gums and teeth. You may be able to avoid this problem by brushing your teeth or rinsing your mouth thoroughly after each use of the inhaler. Do not smoke cigarettes. Most people are aware of the dangers of smoking, but for someone with asthma, the consequences are even more serious. Smoke is very irritating to sensitive lungs, so take care not to smoke or be around others who are. If you suffer from asthma or allergies, avoid using a vaporizer or humidifier unless it is consistently and thoroughly cleaned. Bacteria can breed inside of the machine due to the moisture, which can exaggerate your allergies or asthma. If you are suffering from asthma, you should learn how to utilize your inhaler the right way. It is not as simple as spraying a little into your mouth and inhaling. With each spray, you have to take a deep breath so that the medication gets into your lungs. An inhaler is not of much use if you aren’t taking it correctly. If you are willing to adhere to the treatment plan established by your physician and follow sound medical advice, you will find that living with asthma is by no means impossible. There are new medications being discovered all the time to help treat asthma. With some luck, maybe asthma can be a thing of the past.
<urn:uuid:0e2d22a6-72b0-4ba0-add1-62c7ad291bd6>
{ "dump": "CC-MAIN-2014-35", "url": "http://medicalassistanceaid.info/", "date": "2014-08-23T18:55:54", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500826343.66/warc/CC-MAIN-20140820021346-00163-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9613459706306458, "token_count": 904, "score": 3.1875, "int_score": 3 }
|Time zone||EET (UTC+2)| |• Summer (DST)||EEST (UTC+3)| Previously called Caria (before it changed to Geyre), the village emerged around the 17th century when settlers were attracted to the area due to fertile soil and plentiful water. The village was relocated when excavations began on the ruins. - "Population of city, towns and villages - 2010". Turkish Statistical Institute. Retrieved 23 July 2012. - Deborah L. Jacob (1993-02-07). "Turkey's Monument to a Goddess". The New York Times (New York Times). Retrieved 2010-02-24. - Ring, Trudy; Salkin, Robert M.; La Boda, Sharon (1995). International Dictionary of Historic Places: Southern Europe. Taylor & Francis. p. 46. ISBN 978-1-884964-02-2. - Freely, John (2004). Tauris Parke Paperbacks. p. 176. ISBN 978-1-85043-618-8 [The western shores of Turkey: discovering the Aegean and Mediterranean coasts The western shores of Turkey: discovering the Aegean and Mediterranean coasts]. Missing or empty |This geographical article about a location in Aydın Province, Turkey is a stub. You can help Wikipedia by expanding it.|
<urn:uuid:73a73cc5-04ff-4fac-8f6a-b50ff09c8586>
{ "dump": "CC-MAIN-2014-35", "url": "http://en.wikipedia.org/wiki/Geyre", "date": "2014-08-28T15:21:59", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500830903.34/warc/CC-MAIN-20140820021350-00105-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.7430999875068665, "token_count": 281, "score": 3.03125, "int_score": 3 }
Weird Skin Color Illusion Can Reduce Racism May 15, 2013 | Posted by: roboblogger | Full story: Live Science No need to break out the tanning booth. A new study finds that an illusion that makes people feel that a rubber hand is their own can make white people less unconsciously biased against people with dark skin. Add your comments below |want to buy used psychological test kits (Apr '13)||20 hr||Martin||2| |Collaborative care improves depression in teens||Wed||HumanSpirit||1| |Smartphone Addiction Now Has A Clinical Name||Tue||humanSpirit||4| |Ann Arbor teacher files lawsuit over removal fr...||Mon||humanSpirit||11| |Knee replacement may go poorly for people who t...||Aug 25||HumanSpirit||1| |Robin Williams||Aug 22||Daniel||2| |Suicide Is Not the Answer: Meehl Foundation Off...||Aug 21||humanSpirit||1| Find what you want! Search Psychology Forum Now
<urn:uuid:bb36baf3-e912-4c08-8b34-203fff258e43>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.topix.com/forum/science/psychology/TLI8IG4TNKUJNM5C2", "date": "2014-08-28T16:20:19", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500830903.34/warc/CC-MAIN-20140820021350-00105-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.788017988204956, "token_count": 221, "score": 2.65625, "int_score": 3 }
Key Thought: The law describes who God is and how He lives and how He has meant for us to live. We are free to live in happiness as we let Him write those laws in our hearts and minds. [Teaching Plan for "God the Lawgiver" February 8, 2012] 1. Have a volunteer read Exodus 19:18,19. A. Ask class members to share a short thought on what the main idea of this text is. B. Why did the Lord present the law [...]
<urn:uuid:bdd9ba72-d2e1-43b9-bf36-3a9694bb00be>
{ "dump": "CC-MAIN-2014-35", "url": "http://ssnet.org/blog/author/michael-fracker/page/14/", "date": "2014-08-30T08:21:32", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500834663.62/warc/CC-MAIN-20140820021354-00047-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9661353826522827, "token_count": 107, "score": 2.796875, "int_score": 3 }
Technology in the classroom is the new squirrel up on the hill. Everyone's chasing it. It’s fun, it’s hip and it's done all in the name of what’s best for kids. Let’s look down the road. What happens when the new technology students get now becomes outdated in three years? Three years ago the iPad was just invented. Three years before that the iPod Touch came out. What if we had iPod Touches in all our schools? These would be considered outdated by today’s standards. With education, there is a place for technology, but as with many things, a balance is needed. What if instead of placing an iPad or laptop in every student’s lap, we were to fund a technology class where the most innovative technologies were taught and used and updated annually? Technology should never be given more emphasis than the teacher in the classroom. Students need personal interaction. Teachers should be given the resources and technology to provide the best learning in the classroom, then teach their students to the best of their ability. Let’s stop chasing the squirrel and, instead, focus on giving teachers the resources they need to inspire today’s students. - In our opinion: A slippery 'immoral' Tweet - School fees: Is Utah really family friendly? - Charles Krauthammer: Solution to inversion is... - Letter: Society puzzles - 20 of the most influential and innovative... - Equality in family life does not mean sameness - Jay Evensen: Utahns support Common Core, even... - Michael Gerson: State of Israel: History... - Frank Pignanelli & LaVarr Webb:... 82 - Letter: Police brutality 62 - School fees: Is Utah really family... 48 - Mary Barker: Our economic discourse... 43 - Richard Davis: The State Board can do... 42 - In our opinion: A slippery 'immoral' Tweet 39 - Constitutional commitments trump tribal... 35 - Letter: Society puzzles 32
<urn:uuid:96469d3d-050f-4da1-a3b6-dea378e73a27>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.deseretnews.com/article/865598386/Letter-The-technology-squirrel.html", "date": "2014-08-30T09:14:06", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500834663.62/warc/CC-MAIN-20140820021354-00047-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.924494206905365, "token_count": 424, "score": 2.546875, "int_score": 3 }
Ancient Rome > Politics of Ancient Rome Forms of government > Politics of Ancient Rome Roman law > Politics of Ancient Rome Ancient Rome-related lists > Politics of Ancient Rome Political systems > Politics of Ancient Rome The Roman Empire. Or Republic. Or...Which Was It?: Crash Course World History #10 In which John Green explores exactly when Rome went from being the Roman Republic to the Roman Empire. Here's a hint: it had something to do with Julius Caes... The Political Structure of the Roman Republic This lesson explains the political structure of the Roman Republic by highlighting the importance of social class within the system. It also explains the rol... Star Wars Legacy Revealed: Ancient Rome and Politics Ancient Roman politics seem to strongly resemble the happenings the galactic senate. Ancient Roman Politics : Who Could Hold Public Office in Rome? In ancient Roman society, the people were separated into two classes, consisting of the plebeians and the patricians, among whom only the patricians could vo... Ancient Rome in Modern Politics with Author Jimmy Soni https://www.facebook.com/MediaMayhem https://twitter.com/ahopeweiner http://thelip.tv/ In this short REMIX from our full interview, Author Jimmy Soni shows h... Fall of Rome vs Failure of American Politics, Economy pt 2 Part 1 first! http://www.youtube.com/watch?v=lXGGm4GQAq4 Crumbling domestic infrastructure. A bored, undisciplined population, demanding ever more wasteful a... The Roman Forum - Buildings of Ancient Rome (5/5) Free learning from The Open University http://www.open.edu/openlearn/history-the-arts/history/classical-studies --- The social and political heart of the Rom... Cleopatra's Involvement in Roman Politics Mr. Boone's Social Studies project on Ancient Rome. editing - iMovie (advanced) filming - Canon Rebel t3 Starring: Hadriana Lowenkron as Cleopatra Kathryn St... Practicum TV Episode 1: Ancient Influence on Modern Politics Practicum Publishing's Clio Hellene reports on the surprising influence of ancient Rome on modern politics. Fall of Rome vs Failure of American Politics, Economy pt 1 See Part 2 http://www.youtube.com/watch?v=iTGNgS1toEU Crumbling domestic infrastructure. A bored, undisciplined population, demanding ever more wasteful and ... We're sorry, but there's no news about "Politics of Ancient Rome" right now. Oops, we seem to be having trouble contacting Twitter You can talk about Politics of Ancient Rome with people all over the world in our discussions. Copyright © 2009-2014 Digparty. All rights reserved. | Terms of Service | Contact Us
<urn:uuid:baad9366-36c4-4e8d-9d09-1c72d348bee4>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.digplanet.com/wiki/Politics_of_Ancient_Rome", "date": "2014-08-30T08:32:39", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500834663.62/warc/CC-MAIN-20140820021354-00047-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.7990115880966187, "token_count": 599, "score": 3.296875, "int_score": 3 }
Come on in! Join Pinterest today...it only takes like a second or so. Ik-Kil Cenote, Mexico / Emmanuel Lattes freshwater Cenote of Mexico Mexican Cenotes - A cenote is a deep natural pit, or sinkhole, characteristic of Mexico, resulting from the collapse of limestone bedrock that exposes groundwater underneath Cancun Underwater Museum, Mexico Colors in Guanajuato Swim up room - Grand Riviera Princess, Playa Del Carmen, Mexico. The underground river at Xcaret, Mexico. Been there, Done that Santa Prisca Cathedral, Taxco, Mexico.
<urn:uuid:8d42ec28-5e58-4ce4-98de-13dca6ae9c56>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.pinterest.com/pin/157837161912081006/", "date": "2014-08-30T08:14:38", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500834663.62/warc/CC-MAIN-20140820021354-00047-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.780994176864624, "token_count": 140, "score": 2.625, "int_score": 3 }
Athletes are the heart of Special Olympics. Our athletes are children and adults with intellectual disabilities from all around the world. They are finding success, joy and friendship as part of our global community. They're also having lots of fun! Be a Fan of Joy. Trenice Bell gives a victory hug to Shaniqua Newbold as more teammates rush in to celebrate. The moment came after a Team Bahamas win at the Special Olympics Jamaica Football Invitational Competition. Who Are Our Athletes? Everybody is different. Special Olympics is for people who are different because they learn new skills slowly. They may not understand ideas that other people learn easily. They are different in other ways as well. They have an intellectual disability, or ID. Intellectual disabilities happen in all cultures, races and countries. The goal of Special Olympics is to reach out to the 200 million people in the world with ID. Our more than 4.4 million Special Olympics athletes – ages 8 years old and up -- come from more than 170 countries. We also have a Young Athletes program for children ages 2 to 7. At any age and in every country, our athletes are learning new skills, making new friends and gaining in fitness and confidence. About Intellectual Disability Special Olympics is a global movement of people who want to improve the lives of people with intellectual disabilities. But what are intellectual disabilities? Learn More Special Olympics trainings and competitions happen 365 days a year in more than 170 countries. We offer 33 Olympic-style summer and winter sports. So whatever your age or skill level, Special Olympics has something for you. Many athletes start in one sport, then go on to try others. Through sports, our athletes are seeing themselves for their abilities, not disabilities. Their world is opened with acceptance and understanding.They become confident and empowered by their accomplishments. They are also making new friends, as part of the most inclusive community on the planet -- a global community that is growing every day. Abdel-Raman Hassan is an athlete whose life changed after he joined Special Olympics. He's a swimmer with ID from Saudi Arabia. He is also partially paralyzed. Yet he doesn't let anything -- or anyone -- put limits on his abilities. His talent for swimming did not come naturally or easily. Abdel-Raman's father says it took him a month to hold his breath underwater for three seconds. It took him a year to swim a distance of one meter. He did not give up. Abdel-Raman went on to win gold medals in 25- and 50-meter races at World Summer Games. He is a champion. What is it like having ID? David Egan of Virginia says it can be difficult, but that joining Special Olympics helped him a lot. “It was hard for me to accept the fact that I have Down syndrome. But it became easier when I joined Special Olympics and I discovered that I was not alone.” Over the years, David has taken part in soccer (football), basketball, ice skating, softball and swimming. He says the confidence he built through Special Olympics has helped him find and keep a job for the last 15 years. From Athletes to Leaders Through sports training and competitions, Special Olympics helps people with ID find joy, acceptance and success. As their lives open up, athletes gain the confidence that comes with achievement. They feel empowered. They are ready to take on new challenges to make use of their new abilities. They can become mentors for other athletes. They can train to become coaches and officials. They can also move toward a more public role as a speaker or spokesperson. They can speak to audiences and journalists about the positive changes that Special Olympics helped bring about in their lives. At Special Olympics, our athletes are empowered to share their many gifts and talents with society. Yet, it's more than that. Our athletes also become empowered to be leaders in society -- and teach us all about acceptance and understanding. Stories Written by Special Olympics Athletes August 12, 2014 | Europe Eurasia: Ireland Flying High – Dublin Club Marks Tenth Anniversary By Liam Holmes Sports Club 15 was set up in 2004 in Dublin, Ireland. I joined at the beginning when I was age 11.View Story ▼Our Special Olympics Sports Club 15 was set up in 2004 in Dublin, Ireland. I joined at the beginning when I was age 11. There are about 50 members at present - 33 are boys and 17 are girls. Derek is our head coach and has been in the club since the beginning. Parents and volunteers help run the sessions. There are many sports in the club which include basketball and football. My sport is basketball. Two months ago Sports Club 15 marked its tenth anniversary with a celebration in Weston Airport in County Dublin. We all went flying on small planes. I went with my friend Paul, his dad and the pilot. There was also a lovely meal including an enormous cake. Following this we had a disco, speeches and presentations. My Mum and Dad came to celebrate the event with me. On the day we were each given a red t-shirt with a picture of a plane on it and we all kept them as souvenirs. I enjoyed the flying so much. I am so happy to have been a part of Special Olympics Sports Club 15 for the last ten years. About Liam Holmes:I am 22 years old. I am currently in college. I have been a member of Sports Club 15 in Ireland for the past ten years.View less ▲ August 11, 2014 | North America: Iowa 20 Years, 100 Victories, 1 Goal By Jason Halkias I have been blessed and privileged to have competed in 10 sports. Despite all my success in my career, my goal has never changed: to do my best, and never quit, whether win or lose.View Story ▼I broke into the Special Olympics Iowa scene at age 8 in 1995, scoring my first career gold in my best sport of tennis. Nineteen years later, I scored my 100th career Special Olympics victory (68th gold medal to go along with 32 blue ribbons) with a victory in the mini javelin. But despite all my success in my career, my goal has never changed: to do my best, and never quit, whether win or lose. I have been blessed and privileged to have competed in 10 sports. I formerly competed in speed skating, basketball skills, roller skating, golf, and bowling. I currently compete in figure skating, powerlifting, tennis, track and field, and volleyball. To me, the best athletes are those who never quit, win or lose. For me, none more so than at the 2008 and 2013 SOI Winter Games in speed skating. In both instances, I raced in a 300 meters event with two other skaters, and both times I fell to the ice. Yet both times I knew I would not win but could still finish second, and I got up and did finish second both times. About Jason Halkias:I have lived in Scott County in Iowa (either Bettendorf or Davenport) most of my life. Today, I primarily compete on the team called Scott County Masters. I also currently work at a local YMCA in Davenport and volunteer at a museum in Bettendorf.View less ▲ August 11, 2014 | North America: Virginia How Special Olympics Changed my life By Matthew S Hall Special Olympics really changed my life because I now have a whole lot of friends I have made over the years. Special Olympics has taught me how to be a good teammate, a good team player and taught me a lot of confidence in myself.View Story ▼My name is Matt. I am a Special Olympics Athlete for Special Olympics Virginia Area 8. I started playing Special Olympics 8 years ago for Area 18. I play basketball softball and soccer and track and field. Special Olympics really changed my life because I now have a whole lot of friends I have made over the years and I now have a job and I have graduated from high school on time. Special Olympics has taught me how to be a good teammate, a good team player and taught me a lot of confidence in myself. Special Olympics has helped me become a better leader for my teams and it has helped me develop people skills and be a better person in life. Special Olympics has taught me that even though we athletes have huge barriers to overcome everyday that there is a light at the end of every tunnel, that everything and anything is possible and we can overcome anything and every challenge we face everyday. I have learned in Special Olympics that we are all winners. Winning and losing does not matter. About Matthew S Hall:My name is Matt Hall I am from Roanoke Virginia I am an athlete for Special Olympics Virginia area8. I am the son of a decorated Desert Storm Veteran my father. I graduated from Alleghany High School in Clifton Forge Virginia. I work at Rowe Fine Furniture in Elliston Virginia. I have two dogs Luke and Lucky. I am 29 yrs old.View less ▲ August 11, 2014 | North America: Illinois Finn Twins In Special Olympics Illinois By Jean & Jan Finn My Stepdads Tom Reynolds and Robert Christian was in the 4th Degree and they were at the opening ceremonies when we wre at the ILLINIOS Special OLYMPICS Summer games! It was so much fun!View Story ▼My Stepdads, Tom Reynolds and Robert Christian, were in the 4th Degree and they were at the opening ceremonies when we were at the Ilinois Special Olympics Summer games! It was so much fun! About Jean & Jan Finn:Our Names are Jean & Jan Finn We are originally from San Jose, IL! We were born in St.Francis Hospital In Peoria IL! We went to School in Delevan for awhile and then went to San Jose IL Schools! WE love being In Special Olympics!View less ▲ August 08, 2014 | North America: Michigan The R word is out! My name is Hannah. I have mild Asperger's and very mild dyscalculia, and the R word is a no-no word. The R word is a medical term to describe someone who is an invalid, but the R word CANNOT be used as a joke.View Story ▼My name is Hannah. I have mild Asperger's and very mild dyscalculia, and the R word is a no-no word. The R word is a medical term to describe someone who is an invalid, but the R word CANNOT be used as a joke. About Hannah :I have mild Asperger's and very mild dyscalculia, which are medical terms saying that I have trouble with math AND that I stink at expressing myself. But I do skating at Suburban Ice.View less ▲ July 29, 2014 | North America: Texas My life inside Special Olympics By Jabbar Hasan "I remember the days back then when I wouldn't be able to learn. I remember the days when I wouldn't be able to graduate from High School." That was one of the best quotes from Loretta Claiborne.View Story ▼"I remember the days back then when I wouldn't be able to learn. I remember the days when I wouldn't be able to graduate from High School." That was one of the best quotes from Loretta Claiborne. That was the one video I watched Loretta speak to the Florida athletes everyday on Youtube. Before I became a Special Olympics athlete in Texas, I tried out for my middle school basketball team in the Aldine district. That did not work so well, but I became the manager of the team. Also, my mother passed away in 2006. In 2007, I started my high school life in Eisenhower High School. During one day in P.E. class, I picked up a basketball and started shooting baskets. So, that gave me an idea. "Why don't you give it a shot? You can show your talents," My voice in my head said. So my teacher gave me a form to take home to my dad to fill it out and return it the next day. So, here I am in 2014, in my 8th year as an athlete in Houston, Texas, my goal is to be just like Loretta, to be the athlete. About Jabbar Hasan:I am a basketball-avid fan who knows about the NBA. I play basketball, softball , track and field and bowling. My goal is to make it to the National games and World games for basketball and bowling. My favorite person when I was growing up was Loretta Claiborne. She loves running. I do too.View less ▲ July 29, 2014 | North America: Massachusetts Anything Is Possible By Sean Curtis Been in Special Olympics since I was 8. I love meeting new people from all over the world. I'll do Special Olympics as long as my body will let me.View Story ▼Been in Special Olympics since I was 8. Did it in a few states. (Massachusetts, Maine, Florida, New Hampshire and now back to Massachusetts.) Been on TV and in the newspaper. Met a lot of people in Special Olympics. Met my fiance Stef in Special Olympics. Been on a lot of teams. Love to thank them for pushing me. Paula Murphy, Paula O'Rourke, Dennis Dean Sr, Amy Kirkland and my step dad Dave, also athletes, co-workers and boss. I also did World Games 1999 in North Carolina for powerlifting for Team USA. Met celebs. Got out of my comfort zone and did powerlifting for non-Special Olympics, drug-free. Was 7 time state champ. I love meeting new people from all over the world. I'll do Special Olympics as long as my body will let me. There are still some more stuff I have to do before I hang it up. I did all the sports Special Olympics provided at the time, now there is more. National Games I haven't done. Be on the radio. Also the many other sports. World games would be good. Last but not least, hall of fame. I'm 38 now. I took some time off. But now me and Stef are back in it. See us at an event. About Sean Curtis:I love to write,draw,travel,family is awesome. Love my pets. Love sports. Love taking challenges head on. Love to cook and bake, love movies and music. Love local. Looking for a team stef and I can be on for other sports. Live in Rutland, ma. Trying to get a job. Love the man up stairs(God) not into politics. Love my girl stef. Love to spread my experiences with other people. It's like a ripple effect. They tell me about theirs. I just want to inspire people. Make them feel good. Listen to them. Help them if I can. Hard work really pays off. Tell them reach for goals they can never get and do it no matter how crazy it is. Prove people wrong. Keep reaching for the stars and you might get one. I'm a fun guy. Can be crazy at times. I love special Olympics world wide. Every team.Team is never TEA-I-M. You are like a group of wolf's you gotta take care of your pack. I called every team I was on family. That's just me. Love ya all. Peace and God bless View less ▲ July 21, 2014 | North America: Mississippi Mark played golf By Mark David Setzer My name is Mark Setzer and I am 41 years old today. I played golf in New Jersey at the National Golf Tournament in Newark, NJ.View Story ▼My name is Mark Setzer and I am 41 years old today. I played golf in New Jersey at the National Golf Tournament in Newark, NJ. I really had a great time there, and I would like to thank my parents, David and Barbara Setzer, Auntie and Uncle Jerry who came to see me that Monday to visit and head off to my hole. I really want to thank everybody who helped us get there safely and back, wonderful trips, and very well done. I came in 3rd place with a total of 187, 57 on the first day, 64, on the second day and the last day on Wednesday June 21st, 67. Great weather! About Mark David Setzer:I am a resident at the Baddour Memorial Center in Senatobia, MS. I work on campus and work with Fedex running high speed printers and scanning airbills that goes all over the world. I would like to personally thank Shannon Adams, and Joann Drummright who really helped me move to level 4 to Level 5 which is 18 holes and I am looking forward to go to Rockvale, TN on July 27th and 28th and play golf. Shannon Adams is a golfer herself, and she is a great friend of the Baddour Center, she works very hard and she has great personality and Joann who works extremley hard getting their athletes to their carts on time. Well done to Shannon and Joann. I wish we had more people at the Baddour Center to learn golf, and it is fun once you get used to it. View less ▲ July 21, 2014 | North America: New York By Katy Sanchez In high school I really didn't have any friends at all. I used to be shy and also not really know what to say to other people. Special Olympics really helped me find a lot of friends.View Story ▼In high school I really didn't have any friends at all. I used to be shy and also not really know what to say to other people. After I joined Special Olympics starting in 2007, it really helped me find a lot of friends and find my voice. I have overcome a lot of obstacles in my life but the Special Olympics staff has and still helps me today. I am an athlete from Special Olympics New York and I am also a Global Messenger, too. People say I am a good speaker and a great athlete. My two goals are to compete in the World Games one day and also be International Global Messenger. About Katy Sanchez:My name is Katy Sanchez. The sports I play are soccer, floor hockey, basketball, track and field, cycling and now a Triathlon. I just earned a bronze medal in the Triathlon at Special Olympics USA Games during June 14 to 21st! I like to hang out with friends, go to the movies, play on my computer. View less ▲ July 14, 2014 | North America: Rhode Island Got home fron New Jersey By Christina Peacock I am finally home from New Jersey. I got 2 gold medals and a 6th place. I had lots of fun with team Rhode Island.View Story ▼I am finally home from New Jersey. I got 2 gold medals and a 6th place. I had lots of fun with team Rhode Island. I had great moments with other kids from all over the world. it was so great that I went because I went to different events like the Trenton Thunder baseball game And the dinner cruise and the Special Olympics Town. This was a great for me to do this because one of our coaches did a great video of team Rhode Island. He was the coach of powerlifting. Our head of our delegation was a person that has a heart for our team. She is a great role model for team Rhode Island. About Christina Peacock:I am a good team member and I am a good hard worker and I soport my team as well as my coaches to . I love to work hard and make other people happy as we'll I can do View less ▲ About Special Olympics in North America Your Donation Matters Special Olympics transforms athletes’ lives through the joy of sport. Help us make a difference. Volunteer Near You Volunteering with Special Olympics is fun and very rewarding, for both the athlete and the volunteer!
<urn:uuid:cc0c09ed-bd84-4f89-9cc1-7a1c3d6bb22b>
{ "dump": "CC-MAIN-2014-35", "url": "http://specialolympics.org/RegionsPages/content.aspx?id=19068&Region=SOEE&RegionName=Europe-Eurasia&LangType=1033", "date": "2014-09-01T13:37:54", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535919066.8/warc/CC-MAIN-20140901014519-00463-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9754762053489685, "token_count": 4152, "score": 2.78125, "int_score": 3 }
| Other OOPS Interview Questions | || Asked @ |Program to check whether a word is the first word of the |What is Hashing and how is it done? Pictorial form? |write a c++ code to overload + and - for a stack class such that + provides push and - provides pop operation |the difference between new and malloc |Write a C++ program to conduct an election of a mayor.Declare a class ELECTION With the following Name 25 character symbol 1 character To accept data for 20 contestant To accept symbol as voting from 100 voters. To declare the winner and the loser. |what is object oriented programming and procedure oriented |What is the use of fflush(stdin) in c++? |what is the difference between class and structure in C++? |what is the function of 'this' operator ? |Explain the concept of abstracion and encapsulation with one example. What is the difference between them? |design class for linked list and include struct node &ptr; |when my application exe is running nad i don't want to create another exe what should i do |For more OOPS Interview Questions Click Here |
<urn:uuid:66baf3cb-d50a-4506-a570-6e63b5eb3810>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.allinterview.com/showanswers/166295.html", "date": "2014-09-01T13:54:56", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535919066.8/warc/CC-MAIN-20140901014519-00463-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.8089243769645691, "token_count": 267, "score": 2.671875, "int_score": 3 }
Shephard conveys the grim realities of war in striking vignettes of service members and patients. He captures concisely the personae of the shapers and movers of military psychiatry, including the few, such as Dr. William Rivers of World War I fame, who are known to general readers through literature or films. The book provides a fascinating account of the interplay of competing ambitions, clinical styles and interests, personal and institutional prejudices, and public opinion. Shephard succeeds in linking the ``undoubted successes and numerous disasters'' of military psychiatry with wider societal expectations and military and medical practices as they changed during the 20th century. One disaster was the U.S. screening program in the initial years of World War II. Shephard's account left me simultaneously laughing and appalled, and I remembered the sad patient I had seen as a resident in 1968 whose thick chart for ``inadequate personality disorder'' began when he was rejected for military service because he was unable to urinate if others were watching. Alas, Shephard does not cite later observations and studies indicating that soldiers with substantial psychopathology could function well and even heroically in units with good leadership and comradeship. One provocative theme is the cultural shift from the traditionally Victorian masculine virtues of courage and self-denial of emotional expression in the service of duty (what used to be meant by ``showing nerve'') to the traditionally female virtues of free emotional expression and the giving and seeking of sympathy and care (which could lead to a pathologic ``case of nerves'' or ``nervous breakdown''). This theme culminates in the chapters, ``From Post-Vietnam Syndrome to PTSD'' and ``The Culture of Trauma,'' which will arouse anger in some readers and will reinforce the blind prejudice of others but should be read carefully and thoughtfully by all. Shephard acknowledges the real suffering of many veterans and the honorable intentions of those who created the diagnostic label and criteria for post-traumatic stress disorder and championed treatment and compensation programs for it. His sharp critique is founded on experience during and after the world wars. We have seen similar syndromes before, made similar mistakes, and have sometimes done better. We should also determine why many of the veterans with the worst histories of exposure do well without treatment. Shephard disproves many persistent myths that I hope will be dispelled by widespread reading of his book. He presents hard-learned lessons that are in perpetual danger of being forgotten. Shephard illuminates the struggles of the ``tough realist'' clinicians, in whose path I respectfully follow. In World War I and then starting from scratch again in World War II, the realists worked increasingly close to the battle, trying different but simple techniques to return many overstressed soldiers to duty in a period of hours to days. Those soldiers would have become psychologically disabled if they had been evacuated. The best realist clinicians educated unit leaders, general medical personnel, and chaplains to reduce the psychological and physiologic causes of stress-induced breakdown and to restore many stressed soldiers in their units, not in medical cots. I wish Shephard had included more historical details of that endeavor. The focus of 21st-century combat and operational behavioral health (``stress control'') is on primary and early secondary prevention at the unit and community levels. The same should be true of civilian programs of community mental health and management of psychological trauma, which grew out of the military experience. Better preventive interventions can greatly reduce the need for tertiary treatment of chronic cases far to the rear of combat or after the war. Shephard describes the many approaches to tertiary treatment masterfully, as he does numerous other topics of public interest. I hope the public response to A War of Nerves will encourage Shephard to finish writing the saga of post-World War II military psychiatry (behavioral health). I know he can find more gold by panning deeper in streams he has just skimmed in this book, by exploring the well-studied Israeli experience, and by addressing the special problems of ``peace-keeping'' missions. Shephard's account of the first half of the saga is a masterpiece, but the second half remains to be told. James W. Stokes, M.D. Copyright © 2001 Massachusetts Medical Society. All rights reserved. The New England Journal of Medicine is a registered trademark of the MMS. --This text refers to an out of print or unavailable edition of this title.
<urn:uuid:6d5586b9-595c-49c7-a4b1-79e4d5fab415>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.amazon.com/War-Nerves-Soldiers-Psychiatrists-Twentieth/dp/0674011198", "date": "2014-09-01T14:41:46", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535919066.8/warc/CC-MAIN-20140901014519-00463-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9523312449455261, "token_count": 922, "score": 2.578125, "int_score": 3 }
At Vindolanda this is a common occurrence, a site where the special qualities lie not only in the discovery of gold and silver or artefacts which relate to the military might of the Roman Army but also of everyday ordinary items which nearly 2000 years later become extraordinary to the modern day visitors, volunteers and archaeologists alike. Personal letters, worn shoes, baby booties, socks, combs, jewellery, tools and textiles are just some of the items preserved in a remarkable condition that provide you with a unique window into the lives of people stationed at this most northern outpost of the Roman Empire.Now archaeologists have another piece of this very personal human hoard at Vindolanda, a wooden latrine (toilet) seat, was discovered by the Director of Excavations, Dr Andrew Birley, in the deep pre-hadrianic trenches at Vindolanda. There are many examples of stone and marble seat benches from across the Roman Empire but this is believed to be the only surviving wooden seat, almost perfectly preserved in the anaerobic, oxygen free, conditions which exist at Vindolanda. Although this wooden seat is not as grand as a marble or stone toilet bench, it would be far more comfortable to sit on in the cool climate of Britannia. The seat has clearly been well used and was decommissioned from its original purpose and discarded amongst the rubbish left behind in the final fort at the site before the construction of Hadrian’s Wall started in the early second century. Dr Birley commented on the find ‘there is always great excitement when you find something that has never been seen before and this discovery is wonderful….’ Andrew went on to say ‘We know a lot about Roman toilets from previous excavations at the site and from the wider Roman world which have included many fabulous Roman latrines but never before have we had the pleasure of seeing a surviving and perfectly preserved wooden seat. As soon as we started to uncover it there was no doubt at all on what we had found. It is made from a very well worked piece of wood and looks pretty comfortable. Now we need to find the toilet that went with it as Roman loos are fascinating places to excavate – their drains often contain astonishing artefacts. Let’s face it, if you drop something down a Roman latrine you are unlikely to attempt to fish it out unless you are pretty brave or foolhardy’. Discoveries at Vindolanda from latrines have included a baby boot, coins, a betrothal medallion, and a bronze lamp. Archaeologists now need to find a ‘spongia’ the natural sponge on a stick which Romans used instead of toilet paper, and with over 100 years of archaeology remaining and the unique conditions for the preservation of such organic finds a discovery may just be possible. The wooden seat will take up to 18 months to conserve and once this process is complete the artefact will be put on display at the Roman Army Museum. The post Earliest known wooden toilet seat discovered at Vindolanda appeared first on HeritageDaily - Heritage & Archaeology News. The answer is buried 150 million years in the past, but a new University of California, Berkeley, study provides a new piece of evidence – birds have an innate ability to maneuver in midair, a talent that could have helped their ancestors learn to fly rather than fall from a perch. The study looked at how baby birds, in this case chukar partridges, pheasant-like game birds from Eurasia, react when they fall upside down. The researchers, Dennis Evangelista, now a postdoctoral researcher at the University of North Carolina, Chapel Hill, and Robert Dudley, UC Berkeley professor of integrative biology, found that even ungainly, day-old baby birds successfully use their flapping wings to right themselves when they fall from a nest, a skill that improves with age until they become coordinated and graceful flyers. “From day one, post-hatching, 25 percent of these birds can basically roll in midair and land on their feet when you drop them,” said Dudley, who also is affiliated with the Smithsonian Tropical Research Institute in Balboa, Panama. “This suggests that even rudimentary wings can serve a very useful aerodynamic purpose.”Flapping and rolling The nestlings right themselves by pumping their wings asymmetrically to flip or roll. By nine days after hatching, 100 percent of the birds in the study had developed coordinated or symmetric flapping, plus body pitch control to right themselves. “These abilities develop very quickly after hatching, and occur before other previously described uses of the wings, such as for weight support during wing-assisted incline running,” said Evangelista, who emphasized that no chukar chicks were injured in the process. “The results highlight the importance of maneuvering and control in development and evolution of flight in birds.” The researchers’ study appeared Aug. 27 in the online journal Biology Letters, published by the Royal Society. Dudley has argued for a decade that midair maneuverability preceded the development of flapping flight and allowed the ancestors of today’s birds to effectively use their forelimbs as rudimentary wings. The new study shows that aerial righting using uncoordinated, asymmetric wing flapping is a very early development. Righting behavior probably evolved because “nobody wants to be upside down, and it’s particularly dangerous if you’re falling in midair,” Dudley said. “But once animals without wings have this innate aerial righting behavior, when wings came along it became easier, quicker and more efficient.” Dudley noted that some scientists hypothesize that true powered flight originated in the theropod dinosaurs, the ancestors to birds, when they used symmetric wing flapping while running up an incline, a behavior known as wing-assisted incline running, or WAIR. WAIR proponents argue that the wings assist running by providing lift, like the spoiler on a race car, and that the ability to steer or maneuver is absent early in evolution.Falling, gliding and flying Such activity has never been regularly observed in nature, however, and Dudley favors the scenario that flight developed in tree-dwelling animals falling and eventually evolving the ability to glide and fly. He has documented many ways that animals in the wild, from lizards and lemurs to ants, use various parts of their bodies to avoid hard landings on the ground. Practically every animal that has been tested is able to turn upright, and a great many, even ones that do not look like fliers, have some ability to steer or maneuver in the air. Contrary to WAIR, maneuvering is very important at all stages of flight evolution and must have been present early, Evangelista said. Seeing it develop first in very young chicks indirectly supports this idea. “Symmetric flapping while running is certainly one possible context in which rudimentary wings could have been used, but it kicks in rather late in development relative to asymmetric flapping,” Dudley added. “This experiment illustrates that there is a much broader range of aerodynamic capacity available for animals with these tiny, tiny wings than has been previously realized.” The researchers also tested the young chicks to see if they flapped their wings while running up an incline. None did. Three former UC Berkeley undergraduates – Sharlene Cam, Tony Huynh and Igor Krivitskiy – worked with Evangelista and Dudley through the Undergraduate Research Apprentice Program (URAP) and are coauthors on the Biology Letters paper. Evangelista was supported by a National Science Foundation Integrative Graduate Education and Research Traineeship (IGERT #DGE-0903711) grant and by grants from the Berkeley Sigma Xi chapter and the national Sigma Xi. The post Flapping baby birds offer clues to origin of flight appeared first on HeritageDaily - Heritage & Archaeology News. In this study published in GSA Bulletin, Katharine Huntington and colleagues employ a cutting-edge geochemical tool — “clumped” isotope thermometry — using modern and fossil snail shells to investigate the uplift history of the Zhada basin in southwestern Tibet. Views range widely on the timing of surface uplift of the Tibetan Plateau to its current high (~4.5 km) over more than 2.5 square kilometers. Specifically, interpretations differ on whether the modern high elevations were recently developed or are largely a continuation of high elevations developed prior to Indo-Asian collision in the Eocene. Clumped isotope temperatures of modern and fossil snail shells record changing lake water temperatures over the last nine million years. This is a reflection of changes in surface temperature as a function of climate and elevation change. A key to their Zhada Basin paleo-elevation reconstructions is that Huntington and colleagues were able to contextualize them with sampling of modern and Holocene-age tufa and shells from a range of aquatic environments. Huntington and colleagues find that the Zhada basin was significantly colder from three to nine million years ago, implying a loss of elevation of more than one kilometer since the Pliocene. While surprising given the extreme (~4 km) elevation of the basin today, the higher paleo-elevation helps explain paleontological evidence of cold-adapted mammals living in a high-elevation climate, and is probably the local expression of east-west extension across much of the southern Tibetan Plateau at this time. Huntington and colleagues note that future studies could improve on their own initial “calibration” work with year-round monitoring of water temperature and a focus on specific taxa and their micro-habitat preferences. The post Snails Tell of the Rise and Fall of the Tibetan Plateau appeared first on HeritageDaily - Heritage & Archaeology News. - CBA History - Support Us - Group Publications
<urn:uuid:85a997df-d23a-4ef4-a746-d13bc3219717>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.archaeologyuk.org/aggregator/categories/1?page=1", "date": "2014-09-01T14:08:34", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535919066.8/warc/CC-MAIN-20140901014519-00463-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9515666365623474, "token_count": 2074, "score": 3.125, "int_score": 3 }
Margaret Atwood raises a number of feminist issues in her novel The Handmaid's Tale, a book embodying a vision of a dystopian society, or a utopian society that does not work and does not serve the interests of the majority of its population. The novel is narrated by its protagonist, a young woman known as Offred who has been kidnapped by her government and separated from her husband and child. She is forced into slavery as a Handmaid, or surrogate mother, for a powerful couple that cannot have children of their own. This story is set in a future where such arrangements have become commonplace. Offred encounters not only the enormity of the demand placed on her to be a surrogate mother but a number of other indignities as her society imposes a code upon her, forcing her to dress and behave in a certain way in order not to be punished. Atwood develops here a vision of the place of women in society and uses an extreme situation to comment on the secondary position women occupy in Western society today. The novel uses an exaggerated social setting to delve into issues of women's powerlessness and loss of identity such as can be found in our contemporary society, different from the world of Gilead only in degree. The slavery of these women and the resulting powerlessness and loss of identity is comparable to the plight of blacks in the era before the Civil War. The story is set in a future United States called Gilead. This new version of the U.S. came into being after t Read the full essay by joining our writing community - over 32,000 professional essays and term papers. Access this essay now! Category: Literature - F Some common topics found in the essays are: Europe America, War South, Christianity Gilead, Handmaid's Tale, Danuta Walters, Significantly Atwood, Upstairs Downstairs, Late Victorian, Civil War, Margaret Atwood, women society, story set future, atwood 11, american society, powerlessness loss, slave underclass, family values, family unit, class differences, built rich family, powerlessness loss identity, surrogate mother, rich family, Click Here to Get Instant Access to over 32,000 Professionally Written Papers!!!
<urn:uuid:052414b0-5da5-4b67-b0fe-6da62f09ce90>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.lotsofessays.com/viewpaper/1682060.html", "date": "2014-09-01T13:38:44", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535919066.8/warc/CC-MAIN-20140901014519-00463-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9570337533950806, "token_count": 451, "score": 3.015625, "int_score": 3 }
Frequently Asked Questions |Traditional canning information suggests that blue or green-tinted garlic is caused by iron, tin or aluminum in the water which reacts to the garlic pigments, or as a result of soil minerals which become accentuated during fermentation.| | The latest horticultural and food science research pinpoints the source of the discolorations: “Don’t worry, greenish-blue color changes aren’t harmful and your garlic is still safe to eat – unless you see other signs of spoilage.” – What’s Cooking America “Under acidic conditions, isoallin, a compound found in garlic, breaks down and reacts with amino acids to produce a blue-green color. Visually, the difference between garlic cooked with and without acid can be dramatic, but a quick taste of the green garlic proved that the color doesn’t affect flavor.” From America’s Test Kitchen Newsletter, September 2004 Did you know... Dill pickles are simply fermented cucumbers. Streptococci starts the process of fermentation, but as the pH level falls, leuconostoc and pediococcus species, and Lactobacillus plantarum continue the process. —Microbes & Cucumbers = Dill Pickles Thought to write that I received the 5-liter Pickl-it about two weeks ago. I filled it to the “shoulder” with 3 grape leaves, 4 pealed garlic heads, six flowering sprigs of dill and several pounds of pickling cukes along with carrot “rails” to anchor it all underneath a brine. It went completely without a hitch. Pickling has never been easier. The cukes are crisp and full of flavor. I’ll be ordering from you again soon. —Bill - Oregon
<urn:uuid:5dbdc799-6157-4be7-b4e2-129678a9be42>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.pickl-it.com/faq/113/why-garlic-cloves-pickles-turn-bluish-green/", "date": "2014-09-01T13:38:34", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535919066.8/warc/CC-MAIN-20140901014519-00463-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9197344779968262, "token_count": 389, "score": 2.8125, "int_score": 3 }
States' rights, Vernon L. Parrington wrote in Main Currents in American Thought (1927), "was not an abstract principle but an expression of the psychology of localism created by everyday habit." No, Parrington was not a southern conservative, much less a blood-and-soil reactionary. A decidedly left-wing, in fact radical, midwesterner, he emerged as a prime architect of the "progressive" interpretation of American history. Forrest McDonald, who makes a similar point from a more conservative perspective, should nonetheless expect to be labeled a neo-fascist for writing, with eminent good sense, "Programmed into the human soul is a preference for the near and familiar and a suspicion of the remote and abstract." The doctrine of states' rights provokes fierce negative responses and much knee-jerk denunciation, especially among those who do not have a clue to its meaning. Yet not all of the responses can be attributed to ignorance and ideological bias, for the doctrine's peculiar political history has had a dark side. As McDonald ruefully observes, twice in American history it became identified with discreditable causes—slavery and racial segregation—with which it has no intrinsic connection. Those who insist on an intrinsic connection and dismiss the doctrine as a mere rationale for reactionary politics have a serious problem: If the defenders of slavery and segregation rested their constitutional cases on states' rights, so did the progressives who strove to curb the power of entrenched corporate wealth. Thus Parrington wrote that the repudiation of states' rights by those who properly opposed slavery proved "disastrous to American democracy," because it removed the last brake on the power of big capital and surrendered the country "to the principle of capitalistic exploitation." Indeed, although we tend to think of federal intervention as "progressive" and the relegation of regulatory power to the states as "reactionary," the historical record shows nothing of the sort. After the Civil War the federal government, notably the courts, smoothed the way for big-business combinations ("pools," "trusts"), and it was the states that initiated restrictions. Parrington and others largely interjected their reflections on states' rights en passant, and their work does not gainsay McDonald's claim that no one has attempted a comprehensive history of the subject. McDonald brings exceptional credentials to this task, for he ranks among the most learned and incisive of American historians, as readily at home with constitutional history and theory as with intellectual, political, and economic history. In particular he brings his considerable acumen to bear on knotty problems that may seem abstract but have grave and direct political consequences. The nature of "sovereignty" and the possibility and desirability of dividing it has absorbed political theorists since ancient times and especially absorbed the Founding Fathers, who made a Herculean effort to establish a republic of an unprecedented kind over a territory vast enough to constitute an empire. McDonald works through the theoretical formulations and attendant practical consequences with a sure hand. No small bonus: he writes well and has a gift for explaining complex theories in plain and often spirited English that readers without a Ph.D. can follow easily. A word on his credentials: His array of groundbreaking books, beginning with seminal studies of the founding of the federal government and including a study of early American economic and political thought, would have amply justified his becoming president of one or all of the leading establishment historical associations and winning every prize in sight. (Do yourself a favor and at least read his illuminating The American Presidency: An Intellectual History .) That he has not received the honors he has earned illustrates the extent to which the profession wallows in neo-McCarthyism, systematically ignoring conservative historians when it does not slander them. McDonald is conservative, but he cannot be pigeonholed. A bold, independent thinker, he demolishes the shibboleths of the right as readily as those of the left. In States' Rights and the Union he provides an indispensable history, replete with wise assessments, that may serve as a starting point for those, whether left or right, who eschew soapbox oratory and wish to form sound judgments on an intractable issue that has been central to American political experience and is destined to remain with us. Because destined to remain with us it most certainly is, as the miseries that afflicted the Republican coalition of the Reagan-Bush years made clear. From the beginning only the prestige and political skill of Ronald Reagan papered over the ideological gulf that separated the many factions and tendencies of his coalition. The fault line in what under less able leadership would have been an unstable alliance ran deep. On the one side stood bold free-marketeers and libertarians—classic nineteenth-century liberals who continue to display their sense of humor by describing themselves as conservatives. On the other side stood traditional conservatives, who have always distrusted the market and who enlist their passions on questions of public morality and social policy. On the one side stood people with a rosy view of human nature that has become indistinguishable from the rosy view of the left in its celebration of the beauties of "human liberation." On the other side stood people who, if they do not necessarily uphold the doctrine of original sin, see humanity as sin-prone and regard the cry for "liberation" as an irresistible invitation to unleash the darker side of human nature. The one side thinks that everything, including religion and morals, should be a matter of consumer choice; the other side insists on the maintenance of firm moral standards. Here, however, we focus on the implications for federal-state relations. The traditionalists wanted the federal government stripped down to what they considered its bare essentials, with power returned to states and localities, but those who prevailed had another idea. Put baldly, it came to this: Are you crazy? We finally have the federal government under our control; good sense dictates that we use its power to advance our program. And it might have worked, had the Reaganites been able to put together a coherent program. The amusing spectacle of the recent presidential vote in Florida should remind us of the persistence of the federal-state dichotomy. There was, after all, something delicious in hearing Al Gore's entourage and the left-wing justices of the U.S. Supreme Court, who normally do not even try to hide their enthusiasm for federal centralization, suddenly announce their dedication to states' rights, while the Republicans, who only recently converted to the doctrine, suddenly reverted to their historical commitment to federal power. Instead of leveling charges of inconsistency or, worse, hypocrisy, we would do better to reflect on the enduring tension among people in both camps who, in their more sober moments, recognize that the real quarrel concerns the proper balance between just claims. The doctrine of states' rights has long been confused with separate issues—strong versus weak or unobtrusive government, and the relation of judicial to executive and legislative power. McDonald skillfully guides us through these problems, which the Florida fiasco again brought to the surface. For better or worse, John Marshall and his successors on the Supreme Court established the principle of judicial review, and the country has accepted it with surprisingly little resistance. Even so, the Court had to proceed slowly in the face of political resistance, and not until the Dred Scott decision did it forcefully reassert Marshall's doctrine. But it has gone largely unnoticed that the application of judicial review at the federal level did not imply its application at the state level. Before the Civil War the South, for example, had many distinguished opponents of federal judicial review who nonetheless championed the principle within the states. Conversely, as McDonald records, opposition to the principle resulted in the Confederacy's never establishing a Supreme Court. (Little in the recent events in Florida was more ludicrous than the pretense that the state supreme court could simply assert ultimate jurisdiction over a matter that the state legislature plausibly claimed for itself.)
<urn:uuid:3068ae01-f505-44cb-8d5a-a99ed3587e80>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.theatlantic.com/magazine/archive/2001/03/getting-states-rights-right/302133/", "date": "2014-09-01T14:08:41", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535919066.8/warc/CC-MAIN-20140901014519-00463-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9596604108810425, "token_count": 1607, "score": 3.015625, "int_score": 3 }
1550-60;1840-50 for sense “tutor”; earlier coche(e) < Middle Frenchcoche < GermanKotsche, Kutsche < Hungariankocsi, short for kocsi szekér cart of Kocs, town on the main road between Vienna and Budapest; senses referring to tutoring, from the conception of the tutor as one who carries the student through examinations He briefly joined a club team, but the level of play was so primitive he soon lost interest and turned to coaching swimming. Also when coaching individuals or teams this knowledge is quite helpful. Kids may need coaching to think critically about what they're learning. The route itself is cobbled together of quiet lanes, cycle paths, even a stretch of ancient coaching road. Two hours of coaching are included with the software. Thanks to better protective equipment and safer coaching techniques, football deaths have now dropped to single digits each year. The best results come if, instead of being harangued by a teacher, the pupil watches a tutor coaching someone else. Good players can be steered to teams that regularly suffer from bad decision-making at the level of coaching or management. But defensive abilities are much more variable, and perhaps also more dependent on coaching and team dynamics. Steve, seriously, you need to get some reading comprehension coaching. British Dictionary definitions for coaching a vehicle for several passengers, used for transport over long distances, sightseeing, etc a large four-wheeled enclosed carriage, usually horse-drawn a railway carriage carrying passengers a trainer or instructor a drama coach a tutor who prepares students for examinations to give tuition or instruction to (a pupil) (transitive) to transport in a bus or coach C16: from French coche, from Hungarian kocsi szekér wagon of Kocs, village in Hungary where coaches were first made; in the sense: to teach, probably from the idea that the instructor carried his pupils 1550s, "large kind of carriage," from M.Fr. coche, from Ger. kotsche, from Hung. kocsi (szekér) "(carriage) of Kocs," village where it was first made. In Hungary, the thing and the name for it date from 15c., and forms are found in most European languages. Applied to railway cars 1866, Amer.Eng. Sense of "economy or tourist class" is from 1949. Meaning "instructor/trainer" is c.1830 Oxford University slang for a tutor who "carries" a student through an exam; athletic sense is 1861. Related: Coached; coaching.
<urn:uuid:4ec3cb16-da11-4e75-8ed3-510589012ba0>
{ "dump": "CC-MAIN-2014-35", "url": "http://dictionary.reference.com/browse/Coaching", "date": "2014-08-21T04:22:48", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500814701.13/warc/CC-MAIN-20140820021334-00331-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9558822512626648, "token_count": 556, "score": 2.875, "int_score": 3 }
At 35, Chicago flight attendant Michele Mason says her bones felt like “pins and needles” were in them, and her hands were so swollen that she found it difficult to put on her infant son’s socks. Her knees ached, too. “I couldn’t even get out of the bathtub by myself,” she says. When her doctor suspected rheumatoid arthritis, Mason worried that traditional medicines might not be good for her breastfeeding baby. So with her doctor’s blessing, she took a very low-dose steroid and turned to herbs and... "Arthritis is common, and rheumatoid arthritis often gets confused with the other kinds of arthritis in people's minds,” he says. Plus, rheumatoid arthritis is still mysterious in many ways. Research and new treatments are constantly changing the understanding of the disease. Even the experts still have a lot to learn about rheumatoid arthritis. WebMD teamed up with Kremer to explode a few common myths about this "commonly unusual" disease. Myth No. 1: Rheumatoid arthritis is just like ‘regular arthritis.’ Fact: Rheumatoid arthritis is not "regular arthritis." What we think of as “regular arthritis” is osteoarthritis, caused by injury or normal wear-and-tear on aging joints. Osteoarthritis is the most common joint disease in middle age to older people. By contrast, rheumatoid arthritis is a chronic, progressive autoimmune disorder. In response to an unknown trigger, the body makes antibodies that attack its own tissues. The self-attacks mostly affect the joints, although they can also affect other body parts. Disease attacks, called flare-ups, occur periodically, or can be continuous in some people. "This is the most common confusion -- between osteoarthritis and rheumatoid arthritis. It gets even more confusing, because people with RA often also have osteoarthritis," adds Kremer. Myth No. 2: Only old people get rheumatoid arthritis. Fact: In most people who develop RA, the disease starts between the ages of 30 and 55. "This is the peak age group," says Kremer, "but anyone can get rheumatoid arthritis, even teenagers." At the same time, "older folks may have more severe RA, because it's progressive and they've been living with it longer." Myth No. 3: Rheumatoid arthritis isn't all that serious. Fact: Rheumatoid arthritis can threaten your health and independence, especially if it's inadequately treated. "A lot of people downplay RA as just 'Grandma's rheumatism,' and they miss the boat completely," says Kremer. "They delay seeing a physician, often for months or years, and a lot of joint damage can happen during that time." Rheumatoid arthritis needs prompt diagnosis and regular treatment to protect joints from harm. In turn, this can protect your independence and long-term function. Having rheumatoid arthritis also increases the risk for certain other conditions, says Kremer. “Cardiovascular diseases, infections, and lung disease are all more common in people with RA."
<urn:uuid:d2730a04-9961-477b-8a3f-6eb7a2c4bc81>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.webmd.com/rheumatoid-arthritis/treatments-8/ra-myths", "date": "2014-08-21T06:01:02", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500814701.13/warc/CC-MAIN-20140820021334-00331-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9603112936019897, "token_count": 680, "score": 2.71875, "int_score": 3 }
Also called layout. Journalism. (in newspapers and magazines) an extensive, varied treatment of a subject, consisting primarily either of a number of cuts (picture spread) or of a major story and several supplementary stories, usually extending across three or more columns. c.1200, "to stretch out, to send in various directions," probably from O.E. -sprædan (especially in tosprædan "to spread out," and gesprædung "spreading"), from P.Gmc. *spraidijanan (cf. Dan. sprede, O.Swed. spreda, M.Du. spreiden, O.H.G., Ger. spreiten "to spread"), probably from PIE *sper- "to strew" (see sprout). Reflexive sense of "to extend, expand" is attested from mid-14c. 1691, "extent or expanse of something," from spread (v.). Meaning "copious meal" dates from 1822; sense of "food for spreading" (butter, jam, etc.) is from 1812. Sense of "bed cover" is recorded from 1848, originally Amer.Eng. Meaning "degree of variation" is attested from 1929. Spreadsheet is first attested 1982. Meaning "ranch for raising cattle" is attested from 1927.
<urn:uuid:06b7ea8d-da9a-4c35-96c9-decfab7dd005>
{ "dump": "CC-MAIN-2014-35", "url": "http://dictionary.reference.com/browse/spread%20out", "date": "2014-08-22T14:01:14", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500823634.2/warc/CC-MAIN-20140820021343-00273-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9202421307563782, "token_count": 289, "score": 2.859375, "int_score": 3 }
Election 2016: Clinton seeks Iowa redemption The Washington Post Fact Checker section catches BO in another example of him embellishing his and his family’s history: Addressing civil rights activists in Selma, Ala., a year ago, Sen. Barack Obama traced his “very existence” to the generosity of the Kennedy family, which he said paid for his Kenyan father to travel to America on a student scholarship and thus meet his Kansan mother. The Camelot connection has become part of the mythology surrounding Obama’s bid for the Democratic presidential nomination. After Caroline Kennedy endorsed his candidacy in January, Newsweek commentator Jonathan Alter reported that she had been struck by the extraordinary way in which “history replays itself” and by how “two generations of two families — separated by distance, culture and wealth — can intersect in strange and wonderful ways.” It is a touching story — but the key details are either untrue or grossly oversimplified. Contrary to Obama’s claims in speeches in January at American University and in Selma last year, the Kennedy family did not provide the funding for a September 1959 airlift of 81 Kenyan students to the United States that included Obama’s father. According to historical records and interviews with participants, the Kennedys were first approached for support for the program nearly a year later, in July 1960. The family responded with a $100,000 donation, most of which went to pay for a second airlift in September 1960. Obama spokesman Bill Burton acknowledged yesterday that the senator from Illinois had erred in crediting the Kennedy family with a role in his father’s arrival in the United States. He said the Kennedy involvement in the Kenya student program apparently “started 48 years ago, not 49 years ago as Obama has mistakenly suggested in the past.” Obama’s Selma speech offers a very confused chronology of both the Kenya student program and the civil rights movement. Relating the story of how his parents met, Obama said: “There was something stirring across the country because of what happened in Selma, Alabama, because some folks are willing to march across a bridge. So they got together and Barack Obama Junior was born. So don’t tell me I don’t have a claim on Selma, Alabama.” After bloggers pointed out that the Selma bridge protest occurred four years after Obama’s birth, a spokesman explained that the senator was referring to the civil rights movement in general, rather than any one event. What I want to know is, where’s the outrage? Remember Romney’s statement in his “Faith in America” speech about how he supposedly saw his father, then-Governor of Michigan George Romney, march alongside MLK, a remark that liberal bloggers and their cohorts in the MSM jumped on as a “lie”? The coverage on this for days was relentless, to the point that Romney backpedaled and claimed he never literally saw his father march with MLK. Witnesses came forth and said that they saw Gov. Romney marching with MLK, but the myth that his son totally fabricated the story persists to this day. Will we see similar blanket, wall to wall coverage of Obama’s latest faux pax, one of many he’s been caught in on the campaign trail? I won’t hold my breath. Mitt Romney didn’t enjoy the “messiah-like” status that the media bestowed long ago on Barack Obama. Clearly, there is a concerted effort by BO to link himself and his family with the Kennedys, partly because the media and historians have painted the JFK presidential days in particular as Camelot-like, and partly because of the overrated status of not only JFK but the Kennedy name in general. To be looked upon favorably by the Kennedys, as well as to be compared to JFK and/or RFK in a positive light, has been, over the last 40+ years, an aspiration of many a liberal politician. Like, for example, in 2004 when Dem candidate for prez Senator John Kerry (D-MA) and his supporters started using his middle initial when saying his name: “John F. Kerry” – clearly in an effort to draw favorable comparisons to JFK, whom he had met a few times in the early 60s. Let’s also not forget the pictures we saw of Bubba Clinton when he was a young man, shaking hands with JFK in 1963. It was a meeting he talked fondly about on more than a couple of occasions. And while the endorsement of BO by several prominent Kennedy family members including Senator Ted didn’t help him in Massachusetts nor California, the symbolism of the metaphorical “passing of the torch” from Ted Kennedy wasn’t lost even on Obama skeptics like myself. That said, to recap, we know now beyond a shadow of a doubt that Barack Obama has a penchant for “overstating” things (and that’s putting it charitably): His family connections to JFK, his ‘enthusiasm’ and ‘involvement’ on contentious legislation, his ‘commitment’ to Afghanistan, his claim that his campaign is responsible “only to the people,” his ‘accomplishments’ while a State Senator in Illinois, and, among other things, the ‘courage’ it took to give a speech opposing the Iraq war in October 2002, a speech he gave in front of an anti-war crowd, and one that was made three months before he declared his intentions to run for the US Senate. A couple of things he’s understated: His close ties to indicted Chicago money man Tony Rezko, and his mentorship with the hateful Reverend Jeremiah Wright, who Obama now calls his “former pastor,” not because BO left the church in protest but instead because Rev. Wright retired last month from TUCC. That doesn’t change the fact that Obama has had a close bond with the Reverend that goes back 20 years. BO now cleverly downplays his relationship with Wright by saying that Wright was merely his “pastor” but as recently as a little over a year ago, Obama was calling Wright his spirtual mentor as well as a “friend” and a great leader.” With all this exaggerating and downplaying, along with the misleading statements Obama gives to both the press and supporters alike on a routine basis, we’re supposed to believe he’s “different” from all the rest in what way, again? Cross-posted to Right Wing News, where I am helping guestblog for John Hawkins on Sundays. Update/Related: Via Stop The ACLU: Barack Obama – “”Look, I got two daughters — 9 years old and 6 years old” he said. “I am going to teach them first about values and morals, but if they make a mistake, I don’t want them punished with a baby. I don’t want them punished with an STD at age 16, so it doesn’t make sense to not give them information.” His squarely leftist view of abortion isn’t surprising, but the phraseology is interesting coming from a supposedly ‘mainstream Democrat,’ and like MM, I’m wondering how this will play with the pro-life Democrats in PA … and beyond. What’s next? Him calling an unborn child a “parasite“?
<urn:uuid:348cd720-2a7f-4662-806b-353f2376a435>
{ "dump": "CC-MAIN-2014-35", "url": "http://sistertoldjah.com/archives/2008/03/30/obamas-familys-kennedy-connection-greatly-exaggerated/", "date": "2014-08-22T13:49:42", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500823634.2/warc/CC-MAIN-20140820021343-00273-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9732054471969604, "token_count": 1581, "score": 2.515625, "int_score": 3 }
The Dragon's Village and Things Fall Apart There are two significant differences between the novels The Dragon's Village and Things Fall Apart. In The Dragon's Village, the story is told from the point-of-view of the outsider. Ling-ling, although she is Chinese, is an outsider in the far-flung Gansu province. She was raised with middle-class values and in a setting that would be considered wholly luxurious to the peasants she lives with during the course of the novel. Things Fall Apart, however, is written from what would be the equivalent of the peasants' point-of-view in The Dragon's Village. In Achebe's novel, the day-to-day lives of the villagers occupy the first two parts of the novel, inculcating the readers into their social values and norms and positioning them as insiders and the white men who come later in the novel as the outsiders. The other significant difference is our reaction to the fundamental changes occurring in each novel. Chen's point-of-view largely aligns the reader with the benefits of communism and the land reform. We are easily able to identify the inequities under the feudal landlord system and we accept the equity in the land reform. Because Ling-ling points out the difficulties of the peasants' lives despite their valiant attempts just to survive, we as Western readers are not immediately repelled by the idea of Communism as we have been trained traditionally to be. On the other hand, we are immediately repelled by the changes wrought Read the full essay by joining our writing community – over 32,000 professional essays and term papers. Access this essay now! Category: Literature - T Some common topics found in the essays are: Guomindang Ling-ling, Village Achebe's, Fall Apart, Ogbuefi Ugonna, Change Longxiang, Dragon's Village, District Commissioner, Forest Mbanta, Ling-ling Chinese, Cheng Gao, fall apart, land reform, dragon's village, cultural changes, chen 77, immediately repelled, village fall apart, gansu province, village achebe's, achebe's novel, ling-ling observes, dragon's village fall, dragon's village achebe's, carry land reform, Click Here to Get Instant Access to over 32,000 Professionally Written Papers!!!
<urn:uuid:d8c04a64-8615-4fae-addf-99483aa3851f>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.lotsofessays.com/viewpaper/1692160.html", "date": "2014-08-22T13:44:27", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500823634.2/warc/CC-MAIN-20140820021343-00273-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9539031982421875, "token_count": 481, "score": 2.828125, "int_score": 3 }
Winds circulate around the globe because of the rotation of the earth and the energy from the sun. Much like the earth’s atmosphere, which circulates warm and cold air across the earth, the ocean also circulates warm and cold water across the world. A temperature gradient is the change in temperature across a specified boundary or front. Sea and Land Breezes describe the wind that blows onshore from sea to land during the day and blows offshore in the evening. Monsoons are massive, seasonally changing sea breeze circulations that form due to temperature differences between land and ocean.
<urn:uuid:43d3f914-1571-437a-9e03-50e3f5b3ed15>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.nc-climate.ncsu.edu/edu/k12/Circulations", "date": "2014-08-22T13:48:57", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500823634.2/warc/CC-MAIN-20140820021343-00273-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9086247682571411, "token_count": 123, "score": 3.625, "int_score": 4 }
BIRD CONSERVATION AWARNESS CAMP FOR LOCAL FARMERS Bird Education Society Oriental Bird Club Bird Conservation Awareness Camp for Local Farmers was held at Sauraha, Chitwan from May 5 – 11, 2004 with intent to generate conservation awareness and encourage them in organic farming. Total of 35 participants from four-community forest user groups were involved in the training. Participants were provided with wide array of information related to their farming practices and nature conservation. They learnt the importance of birds, wildlife and environment with introduction and conservation initiatives of Royal Chitwan National Park, Baghmara Buffer Zone Community Forest, Bird Education Society and King Mahendra Trust for Nature Conservation. They were given the basic concept of ecosystem, interdependence between human, animals and environment and food chain. Knowing theories of natural growth of plant are key to understand the Improved Agricultural System, which is based on these theories. As EM has been creating worldwide revolution in agriculture and other diverse fields, the participants were very keen to learn use and effect of EM both theoretically and practically. They learnt how to make different derivatives of EM for different uses. They also knew about seed treatment, bio-fertilizers and bio-pesticides and Integrated Pest Management with identification of both harmful and useful insects in farming. The training was provided with lots of figures, charts, diagram, video, games, practical and field works, group sharing and entertainment activities. Some 1500 copies of poster on healthy ecosystem of farmland were published which were distributed to schools, green clubs, green organizations. The posters were pasted in public places like local teashops, VDC office, Park office, health post and some agro vet shops. Bird Education Society (BES), with financial support from Oriental Bird Club (OBC), UK, organized the Bird Conservation Awareness Camp for Local Farmers at Sauraha, Chitwan from May 5 – 11, 2004 with intent to generate conservation awareness and encourage them in organic farming. There were total 35 participants from four buffer zone community forest user groups: Baghmara, Janakauli, Chitrasen, Kumroj Buffer Zone Community Forest User Group. There was equal number of male and female participants from each community forest user group. All the participants were from the nearby villages, which are close to respective buffer zone community forests. All the participants are the local farmers whose land is close to river and /or national park. Participants were provided with wide array of information related to their farming practices and nature conservation. The seven days of intensive training were held on relevant topics with lots of figures, charts, diagram, video, games, practical and field works, group sharing and entertainment activities. Some 1500 copies of poster on healthy ecosystem of farmland were published which distributed to schools, green clubs, green organizations. This project intends to generate conservation awareness for the local farmers. The specific objectives of the project are: 1) to generate bird conservation awareness. 2) To educate them about the effect of chemical pesticides and fertilizers. 3) to educate them about natural pesticides and to encourage them to use these pesticides. 4) To publish a poster of healthy ecosystem of farmland. BIRD CONSERVATION AWARENESS CAMP FOR LOCAL FARMERS The training camp was started from May 5, 2004. On the opening day, Yogesh Adhikari, program coordinator, conducted an introduction program among participants and facilitators (BES members) with the help of an interesting game. Om Bahadur Rijal, president of BES, warmly welcomed all the participants and he briefly introduced participants about BES, importance of birds, wildlife and environment, BES activities and significance of the training. Yogesh Adhikari then gave brief overview of the training with tentative program schedule. He also highlighted the significances of the training and urged participants to learn thoroughly from this training and use it practically in the field. He then formed four groups Danphe, Munal, Dhanes, and Mayur and a schedule was prepared with task of each group. Tasks were reporting, evaluation, suggestion and entertainment. Before the start of session in every day, each group has to present their assigned task according to the schedule. In the afternoon session, Bhagawan Dahal(Biologist) of King Mahendra Trust for Nature Conservation explained the different ecosystems with special focus on farmland ecosystem. Effect of chemicals in our environment is also discussed. Ramji Siwakoti, warden of Royal Chitwan National Park, gave an introduction of the Royal Chitwan National Park and its buffer zone. He mentioned the importance to people's participation and support in conservation. He also focused on how conservation is effective in local economy through the tourism. Manoj Chaudhary of Baghmara Buffer zone Community Forest discussed on concept and importance to community forest with typical example of Baghmara Buffer zone Community Forest. He said that Baghmara Community Forest is a model for conservation of its rich biodiversity, effective implementation of tourism initiatives and local development. On the second day, representatives of Danphe, Munal, Dhanes, and Mayur groups presented their assigned tasks: reporting, evaluation, suggestion, and entertainment. The facilitators discussed over the queries and comments raised. Mr.Basanta Ranabhat of Organino Nepal conducted the session with introduction of agricultural systems (practices). He distinguished old and modern practices and natural system giving examples of positive and negatives sides of each system. He then discussed the Improved Agricultural System, which is the combination of modern practices, old practices, and natural system. Explaining the theory of natural system he said that Improved Agricultural System is mainly based on natural system. As microorganisms in the soil are key to fix the nitrogen for plants, it is important that soil should be chemical free for survival of these microorganisms. A video was shown which was about the effective implementation of multi use of EM (Effective Microorganism) technology in different countries. Participants are playing the food chain game (Photo by Hem Subedi) On the third day, after reporting of the all groups of their assigned tasks, Mr. Bishnu Prasad Pokhrel of Paryabarniya Sewa Kendra (Environmental Service Center) conducted the session with introduction and importance of Effective Microorganism (EM) by showing the bottled EM solution. EM is a combination of various beneficial, naturally-occurring microorganisms mostly used for or found in foods. It contains beneficial organism from 3 main genera: phototrohic bacteria, lactic acid bacteria and yeast. These effective microorganisms secrete benifecial substances such as vitamins, organic acids, chelated minerals and antioxidants when in contact with organic matter. They change soil microflora and fauna so that disease-inducing soil becomes disease-suppressing soil which in turn has the capability to develop into azymogene soil. The anti-oxidation effects of these microorganisms pass directly to the soil. or indirectly to plants maintaining their NPK and CN ratio. This process increases the humus content of the soil and is capable of sustaining high-quality food production. EM solution, which are all helpful for growth of plants. He mentioned that these microorganisms deactivate the other harmful organism in the soil but favor helpful organism. These bacteria are in inactive in the bottled EM but if the solution is put in water with little molasses and keep for 2-3 hours then they start to be active with Ox zone . He then described the method to make the different types of EM derivatives for different use like diluted EM as fertilizer, EM 2 for reducing the bad smell, Bokasi for making compost manure, EM 5 for pest control. Different ingredients are needed to make these derivatives for example rice husk or whet flower, droppings of chicken, pina (Oil cakes), and molasses are required to make Bokasi. All the ingredients are locally available. As usual the fourth day begins with groups' reporting. Bishnu Prasad Pokhrel continued the session with answering the queries about previous day's session. He then practically demonstrated how to make the EM derivatives from the help of the participants. All the participants actively involved in the demonstration. The EM 5 was also used in the nearby field. He also informed how to test the soil fertility with demonstration. With the use of Bokasi and EM, and other materials like dead leaves and branches, green grasses, elephant dung ball the compost manure is prepared. It generally takes normally 30-45 days depend on tempter to get ready for use of the compost. The seed treatment is an important issue in the agriculture, which can be done using the EM solution. Mr Pokhrel then introduced the different types of bio-pesticides and bio-fertilizers (eg. Nisarga, Sedomonas, Buibheria, , Bhatrisilium, Multinol, Ezotobactor, Raizobium and VAM) of Multiplex brand. He explained the useing method of these fertilizers. Participants are preparing EM Bokasi using husk and other matters (Photo by Hem Subedi) On the fifth day, after the groups' reporting, Mr. Krishna Hari Devkota an (Entomologist) lecturer of Rampur Agriculture Campus started the session with introduction of Integrated Pest Management. He talked about useful and harmful insects for the crops. He also showed his collection of both types of insects so that farmers could identify the harmful ones and useful. Mr. Devkota said that there are 98% insects are beneficial and only 2% insects are harmful to our crops due to lack of aware farmer kills several species of useful insects by using the chemical pesticides. He gave idea to the participants about life cycle of the different insects as well as Mr. Devkota explained about the pest controlling by insects. He said that there are several carnivores insects fund in the farmland and the they eat other herbivores insects which are harmful to our crops. He explained that excessive use of chemical in our crops not only wipe out the useful insects and damage our environment, but also affect the human health. He discussed on effective ways to control the harmful insects. While emphasizing the use of the bio-pesticides and bio-fertilizers he suggested to participants for the safe use in the case of using On the sixth day, after the group's reporting, Krishna Hari Devkota continued the session with answering the comments from the participants. They raised the lots of questions regarding the identification of both types of insects. Participants were also taken outside and some insects available there were identified. Then he, with practical demonstration, explained how to prepare the bio- pesticides by using various local organic matter such as Bakaino, Cow's urine, Surtikojhol, Titepati, Tulasi, Sisnu, Kharani, Golveda ko Jhol, Khichadi jad, Ramtoria , Mattitel, Sabun, Lasun, Sayapatri, Payaj, Khaursani, Nimko Jhol, Marcha , Hattikane , Aak, Metiko Biu, Til, Ritha, Jhushe Til, Lasun , Adhuwa and Bhojhoand use it on different crops for controlling different pest will be controlled within 8 days use of bio-pesticides. The participants were also involved in the demonstration. Participants are collecting elephant dung, green fodders and other organic matters to prepare the compost manure(Photo by Hem Subedi) On the last day, Rupendra Karmacharya member of Bird Education Society explained nitrogen cycle, ecosystem and food chain using different games and posters. He explained roles of birds in keeping ecological balance and how the birds are important in agriculture then take participants in the farmland for short birding tour. Yogesh Adhikari reviewed overall program activities and discussed with participants about the use and effectiveness of the program. Then he distributed the evaluation sheet to each participant. Evaluation sheet includes following questions: a) How did you feel about this training program? b) Which area should be improved and which topic should be added when similar training will be held again? c) How much you implement the knowledge and skills you learn from this training? d) What should be done to pass this knowledge and technology to other people? e) Will you share this knowledge and skills to your neighbors? f) What major things did you learn from this training? He then requested participants to fill up this form. He asked them how we could continue to work together to foster the organic farming in large area. Unanimous voice was to set up one committee with objective to aware and foster organic farming locally in the Chitwan District. With consent of all participants, the name of the organization was given as "Paryabaraniya Krisak Manch" (Environmental Farmers Forum). Then participants themselves formed a committee unanimously as follows: President: Mr Gokarna Adhikari Vice-president: Mrs. Ambika Dhamala Secretary: Mr Jiban G.C. Treasurer: Mr Deb Narayan Chaudhary Members: Mr Uttam Adhikari Mrs. Sunita Chaudhary Mr Chandra Lal Chaudhary Miss Puspa Sapkota Mr Lekh Nath Adhikari There is a balance in the number of participants in the committee from each community forest user group. It was agreed that meeting and discussion of the committee would be held at BES office in Sauraha. It is also agreed that BES would provide initial support for secretarial work and formation of bylaws and organizational objectives and plans. In the afternoon, the formal closing ceremony was held under the chairmanship of Mr Om Bahadur Rijal, president of BES. Yogesh Adhikari gave the welcome remarks. On behalf of BES, he provided NRS 3500 and stationeries to Gokarna Prasad Adhikari, president, Paryabarania Krisak Manch. Then certificates and taken of love (t-shirt, cap, bird poster) were distributed by special Chief guest: Mr. Gopal Upadhyaya Chief Warden of DNPWC to all participants. Certificates were also distributed to all facilitators (members of BES). On behalf of gents participants, Mr Gokarna Prasad Adhikari, spoke about the training and its usefulness. He urged all the concerned organizations to help the newly formed Forum. Mr. Adhikari said that the training is very useful and should launch in other villagers also better to launch on several schools. On behalf of ladies participants, Miss Sunita Bartaula gave her speech highlighting the importance of the training. She mentioned that this sort of trainings should be held regularly in other areas also. Then other speakers: Giridhari Chaudhary, president, Hotel Association Nepal Chitwan Chapter, Dr Krishan Prasad Oli, director, King Mahendra Trust for Nature Conservation, Gopal Upadhyaya, chief warden, DNPWC, Ramji Siwakoti (chief guest), warden, Royal Chitwan National Park spoke about the importance of birds and nature conservation appreciating the works and training programs that are being conducted by BES. They congratulated all the participants and organizers for successfully completing such effective program. And they also encouraged participants to use their knowledge and skills they learned from the training in the field. At the end, Om Bahadur Rijal explained about the training program highlighting the goal and objectives of BES. He said that BES is willing to continue this sort of training activities and support the Forum's effort. He urged other concerned organizations for mutual cooperation and collaborative efforts. He congratulated all the participants and thanked them for their concern and time in the program. He thanked all the organizations and people who helped in the program including Oriental Bird Club (UK), King Mahendra Trust for Nature Conservation, Royal Chitwan National Park, Organico Nepal, Paryabarniya Sewa Kendra, Rampur Agricultural Campus, Baghmara Community Forest. Then he declared the end of the closing ceremony. After the light snacks, photo session was held. Some 1500 copies of poster on healthy ecosystem of farmland were published. The heading of the poster, which in Nepali script is "Encourage organic farming. Protect the balance of ecosystem" The poster is depicted by local artist, Man Kumar Chaudhary and concept design by Healthy ecosystem of farmland The posters have been distributed to schools, green clubs, green organizations, Paryabaraniya Krisak Manch, King Mahendra Trust for Nature Cosnervation, Royal Chitwan National Park, community forests, Chitwan District Forest Office, aama samuha (women's group), bachat samuha (saving group). The posters were pasted in public places like local teashops, VDC office, Park office, health post and some agro vet shops. Due to some technical difficulties, the posters were published late. The poster distribution is ongoing. PROJECT EVALUATION RESULT a) How did you feel about this training program? All the participants felt that the training was much helpful and productive as there were not only theories but also practical and hands on activities also. In the evaluation sheets they mentioned that they learned many new things like EM and its multiple use, ecosystem, bird conservation, harmful and useful insects which are all relevant to their daily life. b) Which area should be improved and which topic should be added when similar training will be held again? Following issues should be focused if similar training would be conducted again. 1) More Nepali language should be used. 2) More information should be included about the Park, jungle, wildlife and birds and their importance and how to protect them by increasing the training duration. 3) Observation of EM bacteria in the lab. 4) Training on livestock raising and fruit plantation. 5) More discipline among trainees needed. 6) More practical and field works. 7) Information on vegetation and herbal plants. 8) It would be better if the training is conducted in the village where more field work would be 9) Issues on drinking water pollution. 10) Monitoring and follow-up after the training. 11) Similar training in schools and inform the media about the training activities. 12) More interaction and sharing within the participants. 13) What kind of crop is suitable according to the soil type and season? 14) Field visits to the organic farms. 15) Market issue for organic products. 16) Interaction program among health personnel and journalists. c) How much you implement the knowledge and skills you learnt from this training? All the participants were willing to implement the knowledge they gained from this training in the field. EM technology is new to them however they were determined to use EM in their farming and also inform this technology to their neighbors. Two participants would first try in the separate plot and if it is successful then they use this in other plots. d) What should be done to pass this knowledge and technology to other people? 1) First practice this knowledge and then explain it to other people by showing the outcome. 2) Explain them about its importance. 3) More awareness program is needed. 4) By giving them practical knowledge like teaching them how to make compost manure. 5) Set up environmental group in each village and share this knowledge among the group. 6) Through media. 7) By poster, pamplating and street drama. 8) Training for students also. 9) Award for those who actively involve in the organic farming. e) Will you share this knowledge and skills to your neighbors? They are all willing to share this knowledge and skills to their neighbors and other people. f) What major things did you learn from this training? EM Technology and its multiple use, bio-fertilizers and bio-pesticides, importance of birds and wildlife conservation, community forest, useful and harmful insects, how to use pesticides safely, how to control harmful pests, interdependence between human and environment, objectives and activities of Bird Education Society, theories of natural system, how to make compost manure, chemicals are harmful to our environment so these should not be used. Bird Education Society (BES) would like to acknowledge Oriental Bird Club, UK for providing the financial assistance for this training. BES would like to thank King Mahendra Trust for Nature Conservation's Biodiversity Conservation Center for providing training hall and resource persons. BES is thankful to Royal Chitwan National Park, Baghmara Community Forest, Organico Nepal, Paryabarniya Sewa Kendra, Rampur Agricultural Campus for providing resource persons. BES would like to thank all its members and nature guides who are very much supportive during the training
<urn:uuid:08a6eb29-eb62-43c7-b785-33f62664ec72>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.docstoc.com/docs/133277553/Farmer-Report_2004_web1", "date": "2014-08-27T09:23:49", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500828050.28/warc/CC-MAIN-20140820021348-00215-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9315350651741028, "token_count": 4585, "score": 2.515625, "int_score": 3 }
What are the differences between the Linux kernel we use for embedded system and the kernel we use for our PC? Is the embedded kernel and light-weight version of the PC kernel? (may be a silly question) I have a simple practical question about applications develop on my embedded device. Usually I use linux/windows on my host to deveop applications and see it simulated on my desktop pc. When application running here, then I cross compile for my device and run on target with “qt for embedded” library installed. My question is about qt version. Normally in my host I have a qt version I got a pop-up message that my version of the kernel was going out of support and I installed the new version from the provided link but ever since then my internet connection is not working. How do I roll-back my current kernel version to the previous one? I am running Ubuntu Precise 12.04 and the new version of the kernel 3.13.032-generic. I just updated my Ubuntu 14.04 and got a new kernel. This new kernel is not working properly for me so I booted the previous version. Let's call this good old working version "3.13.0-24.47". Now, I want to keep this "3.13.0-24.47" version until I decide to delete it manually. I want to be able to upgrade my kernel each time there is a new version in hope of getting the one which works again.
<urn:uuid:061291a8-e6e7-4acf-af0a-f064368f0809>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.linuxine.com/story/2-nic-same-sub-do-it-embedded-26-not", "date": "2014-08-27T09:13:52", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500828050.28/warc/CC-MAIN-20140820021348-00215-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.922310471534729, "token_count": 313, "score": 2.578125, "int_score": 3 }
Piano Concerto No. 1 (Brahms) The Piano Concerto No. 1 in D minor, Op. 15, is a work for piano and orchestra completed by Johannes Brahms in 1858. The composer gave the work's public debut in Hanover, Germany, the following year. performed February 2011 |Problems playing this file? See media help.| This concerto is written in the traditional three movements and is approximately 40 to 50 minutes long. - Maestoso (D minor) - The first movement is in sonata form, divided into five sections: orchestral introduction, exposition, development, recapitulation, and coda. This movement is large, lasting between 20 to 25 minutes. This strict adherence to forms used in the Classical Period earned Brahms a reputation for being musically "conservative." The theme heavily makes use of arpeggiated chords and trills. Within the orchestral introduction other themes are introduced, and the thematic material is further developed by both orchestra and soloist. - Adagio (D major) - Rondo: Allegro non troppo (D minor → D major) - The structure of the Rondo finale is similar to that of the rondo of Beethoven's third piano concerto. There are three themes present in this rondo; the second theme may be considered a strong variation of the first. The third theme is introduced in the episode but is never explicitly developed by the soloist, instead the soloist is "integrated into the orchestral effect." A cadenza follows the bulk of the rondo, with an extensive coda that develops the first and third themes appearing afterward. The coda is in the parallel major, D major. Roles of Joachim and Clara Schumann Brahms was himself a professional-level pianist who had first highly impressed the leading violinist Joseph Joachim, who gave him a letter of introduction to Schumann. Brahms and Joachim became close friends for life. In 1853 Brahms had profoundly impressed Schumann and his wife Clara, a turning point in Brahms's career, by playing for them some of his own solo piano pieces. Clara was a leading concert pianist and a composer. She and Brahms began a lifelong friendship, which became more important when Robert was committed to an asylum in 1854 and died in 1856. Clara, 14 years older than Brahms, wrote of him in her diary in 1854 "I love him like a son." Brahms's love of her was respectful, more complex and conflicted, but he much valued her opinions and advice. During the course of composition, the work passed through different forms. In 1854 it began as a sonata for two pianos. By July 27 of that year it was being transformed into a four-movement symphony. Brahms sought advice from his close friend Julius Otto Grimm. "Brahms was in the habit of showing his orchestrations to Grimm, who, with his conservatory training, was better schooled in orchestration." After incorporating some of Grimm's suggestions Brahms then sent the orchestrated first movement to Joachim. Evidently Joachim liked it. Brahms wrote to him 12 September 1854 "As usual, you've viewed my symphony movement through rose-coloured spectacles -- I definitely want to change and improve it; there's still a great deal lacking in the composition, and I don't even understand as much of the orchestration as appears in the movement, since the best of it I owe to Grimm." In January 1855 Brahms wrote to Robert Schumann that after orchestrating the first movement he had "composed the second and third." He ultimately decided that he had not sufficiently mastered the nuances of orchestral colour to sustain a symphony, and instead made the work a concerto for piano, his favored instrument, in 1855-56, still consulting friends about the orchestration. Avins writes that "In all the many volumes of correspondence to and from Brahms, nothing quite approaches the letters he and Joachim exchanged over his First Piano Concerto (there are more than twenty of them) ... Joachim's answers, lengthy, detailed, thoughtful, and skilled, are extraordinary testimonials to his own talent, and to the awe and admiration he felt for his friend." Brahms only retained the original material from the work's first movement; the remaining movements were discarded and two new ones were composed, a second movement adagio, which Gál called "calm and dreamlike," and a third movement rondo, in which Gál heard "healthy, exuberant creativity". The result was a work in the more usual three-movement concerto structure. Brahms corresponded with Joachim about the rondo in winter-spring 1856-1857. Brahms made an arrangement for piano four hands (not close to the earlier attempt at a Sonata). On 1 October 1856 Clara wrote in her diary that Brahms had "composed an excellent first movement" for a piano concerto (he had evidently sent her a score). She further wrote "I am delighted with its greatness of conception and the tenderness of its melodies," Then on 18 October, "Johannes has finished his concerto - we have played it several times on two pianos." Clara heard a rehearsal of the concerto in Hanover in March 1858, nine months before the premiere there, and wrote to a friend that it "went very well ... Almost all of it sounds beautiful, some parts far more beautiful even than Johannes himself imagined or expected." The concerto was first performed on January 22, 1859, in Hanover, Germany, when Brahms was just 25 years old. The second performance, 5 days later, was in Leipzig. The Leipzig Gewandhaus Orchestra was a leading one in Germany. It had premiered Beethoven's 5th and last ("Emperor") piano concerto in 1811. Felix Mendelssohn conducted the Gewandhaus from 1835 until his death in 1847. During his tenure the orchestra premiered Brahms's Violin Concerto with the composer conducting and Schubert's 9th "Great" Symphony, after Schubert's death; Robert Schumann had unearthed a manuscript in Vienna and given a copy to Mendelssohn. The orchestra also premiered Mendelssohn's own "Scottish" Symphony and outstanding violin concerto. It seems that after Mendelssohn's passing, "standards in Leipzig declined." Still, Leipzig remained a highly prestigious venue. Brahms, who served as piano soloist, had two rehearsals in Leipzig with the orchestra and wrote to Clara that the performance "went very well" but not in the audience's opinion, who "regularly hissed"; at the end, "not 3 people troubled to clap." Brahms wrote to Joachim "I am only experimenting and feeling my way," adding sadly, "all the same, the hissing was rather too much." Brahms revised the concerto (not as drastically as before) and in August 1859 sent the revised manuscript to Clara, who replied that she had "hours of joy" from it. In September she wrote that the adagio is "exquisite, beautiful." She said the first movement "gave me great pleasure" although she did not like "some things in it" she had criticized before, but Brahms had not changed them. It seems that the revised concerto was first publicly performed 3 December 1861, with the Hamburg (Brahms's home city) Philharmonic. Brahms conducted and Clara was solo pianist. She wrote in her diary "I was certainly the happiest person in the whole room ... the joy of the work so overcame me", but "the public understood nothing and felt nothing, otherwise it must have shown proper respect." By then the concerto had been performed in concert three times and not yet had a success. Brahms and Clara both put it aside for some years, Brahms' biographers often note that the first sketches for the dramatic opening movement followed quickly on the heels of the 1854 suicide attempt of the composer's dear friend and mentor, Robert Schumann, an event which caused great anguish for Brahms. He finally completed the concerto two years after Schumann's death in 1856, The degree to which Brahms' personal experience is embedded in the concerto is hard to gauge since several other factors also influenced the musical expression of the piece. The epic mood links the work explicitly to the tradition of the Beethoven symphony that Brahms sought to emulate. The finale of the concerto, for example, is clearly modeled on the last movement of Beethoven's third piano concerto, while the concerto's key of D minor is the same as both Beethoven's Ninth Symphony and Mozart's dramatic Piano Concerto No. 20. Symphonic and chamber techniques The work reflects Brahms' effort to combine the piano with the orchestra as equal partners in a symphonic-scale structure, in emulation of the classical concertos of Mozart and Beethoven. It thus differs from earlier Romantic concertos, where the orchestra effectively accompanied the pianist. Even for the young Brahms, the concerto-as-showpiece had little appeal. Instead, he enlisted both orchestra and soloist in the service of the musical ideas; technically difficult passages in the concerto are never gratuitous, but extend and develop the thematic material. Such an approach is thoroughly in keeping with Brahms' artistic temperament, but also reflects the concerto's symphonic origins and ambitions. His effort drew on both chamber music techniques and the pre-classical Baroque concerto grosso, an approach that later was fully realized in Brahms' Second Piano Concerto. This first concerto also demonstrates Brahms' particular interest in scoring for the timpani and the horn, both of whose parts are difficult and prominent. Although a work of Brahms' youth, this concerto is a mature work that points forward to his later concertos and his First Symphony. Most notable are its scale and grandeur, as well as the thrilling technical difficulties it presents. As time passed, the work grew in popularity until it was recognized as a masterpiece.Alfred Brendel considers it among the "purest Brahms", stating that to it "...particularly the D-Minor Concerto, goes my love." - Vladimir Horowitz with Arturo Toscanini and the New York Philharmonic-Symphony (March 17, 1935). - Wilhelm Backhaus with the BBC Symphony Orchestra and Sir Adrian Boult (November 28, 1932). - Artur Schnabel with George Szell and the London Philharmonic Orchestra - Arthur Rubinstein with Fritz Reiner and the Chicago Symphony Orchestra - Julius Katchen with Pierre Monteux conducting the London Symphony Orchestra (recorded Walthamstow Assembly Hall, 24-25 March 1959; issued on Decca LXT5546/SXL2172) - Claudio Arrau with Bernard Haitink and the Royal Concertgebouw Orchestra - Haitink and the Concertgebouw Orchestra also recorded the concerto with Vladimir Ashkenazy and with Arthur Rubinstein (Amsterdam, 1973). - Clifford Curzon with George Szell and the London Symphony Orchestra - Emil Gilels with Eugen Jochum and the Berlin Philharmonic Orchestra - Glenn Gould with Leonard Bernstein and the New York Philharmonic, famous for Bernstein's introductory remarks to the audience in which he said he was not in agreement with Gould's "remarkably broad tempi and ... frequent departures from Brahms' dynamic indications." - Bruno Leonardo Gelber with Franz-Paul Decker and the Munich Philharmonic Orchestra, winner of the Grand Prix Du Disque - Horacio Gutierrez with André Previn and the Royal Philharmonic Orchestra - Radu Lupu with Edo de Waart and the London Symphony Orchestra - Leon Fleisher with George Szell and the Cleveland Orchestra - Krystian Zimerman with Sir Simon Rattle and the Berlin Philharmonic Orchestra - Krystian Zimerman with Leonard Bernstein and the Vienna Philharmonic Orchestra (1985, Deutsche Grammophon) - Stephen Kovacevich with Sir Colin Davis and the London Symphony Orchestra - Maurizio Pollini with Christian Thielemann and Staatskapelle Dresden (October 14, 2011, Deutsche Grammophon) - Emanuel Ax with James Levine and the Chicago Symphony Orchestra - Hélène Grimaud with Andris Nelsons and the Symphonieorchester des Bayerischen Rundfunks (2013, Deutsche Grammophon) Use in film - Ewen, David. Music for the Millions. p. 108. ISBN 1-4067-3926-X. Retrieved 18 December 2009. - Litzmann, p. 94 - Brahms and Avins, p. 50, note 44 - Brahms and Avins, p. 61 - Brahms and Avins, p. 85 - Brahms and Avins, pp. 146-147 - Gál, pp. 114-117 - Brahms and Avins, pp. 148-150 - Piano Concerto No. 1 in D Major; The Composer's Original Arrangement for Piano Four Hands, by Brahms, reprint of 1864 edition. Publishers liked piano four hands arrangements, which could be sold to customers owning only one piano; Brahms's Hungarian Dances for piano four hands were highly profitable for him and the publisher, Simrock. - Litzmann, p. 146 - Litzmann, p. 147. Brahms had written a two-piano arrangement. In 1853 Robert Schumann had bought a grand piano for Clara (Litzmann, p. 39) so that the household had two. - Litzmann, p. 159 - Campbell, Margaret (1981), The Great Violinists, Doubleday, Garden City, NY, p. 76 - Litzmann, p. 170. - Litzmann, pp. 172-173. - Litzmann, pp. 200-201 - The New York Review of Books, July 11, 2013 - Hunt J. A Gallic Trio - Charles Munch, Paul Paray, Pierre Monteux. John Hunt, 2003, 2009, p165 - Conrad Wilson: Notes on Brahms: 20 Crucial Works (Edinboro, Saint Andrew Press: 2005) p. 16 - Brahms, Johannes; Avins, Styra (1997). Johannes Brahms: Life and Letters at Google Books. selected and annotated by Styra Avins, transl. by Josef Eisinger and S. Avins, Oxford, New York: Oxford University Press. I0-19-924773-0. - Gál, Hans (1971), Johannes Brahms: His Work and Personality, translated by Joseph Stein, Knopf, New York. - Litzmann, Berthold (1913), Clara Schumann: An Artist's Life based on material found in Diaries and Letters, Translated and abridged from the fourth German edition by Grace E. Hadow, MacMillan, London, and Breitkopf and Härtel, Leipzig, 1913, vol. 2. (Vol. 1 is about her life up to 1850, before meeting Brahms in 1853.) - Brahms' Orchestral Works (free music score of this composition available. In public domain.) - Piano Concerto No. 1: Free scores at the International Music Score Library Project
<urn:uuid:cd155213-617b-4b09-beae-50f268e612f2>
{ "dump": "CC-MAIN-2014-35", "url": "http://en.wikipedia.org/wiki/Piano_Concerto_No._1_(Brahms)", "date": "2014-08-29T02:21:48", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500831174.98/warc/CC-MAIN-20140820021351-00157-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9488809704780579, "token_count": 3295, "score": 2.65625, "int_score": 3 }
Articles related to relaxation techniques Relaxation Techniques and Tension Tamers: Stress Management ... Below are some stress management techniques proven to effectively help you regain your peaceful state. Experiment, and find a few favorite relaxation tools to ... Music as a Health and Relaxation Aid Jun 19, 2014 ... Learn about music relaxation: how and why music affects the body and ... and Lifestyle Effects of Stress · Stress Management Techniques and ... Guided Imagery for Relaxation and Stress Management Guided Imagery is a convenient and simple relaxation technique that can help you quickly and easily manage stress and reduce tension in your body. Relaxation Exercises for IBS - Irritable Bowel Syndrome - About.com You can take some active steps to ease your IBS symptoms by learning some simple relaxation techniques. Your first step is to understand how it is that stress ... Popular Relaxation Techniques - Panic Disorder - About.com Apr 9, 2014 ... Relaxation techniques are strategies used to reduce stress and anxiety. These techniques can also be used to manage symptoms of panic ... What Is Progressive Muscle Relaxation? - Panic Disorder Jun 17, 2014 ... Progressive muscle relaxation (PMR) is a stress and anxiety management technique. If you have panic disorder, agoraphobia or another type ... How Are Relaxation Techniques Used to Manage Social Anxiety ... Jun 23, 2008 ... Relaxation techniques for managing social anxiety disorder include deep breathing, muscle relaxation, autogenic training and guided imagery. Relaxation Techniques Are an Essential Part of OCD Self Help Apr 28, 2014 ... ... and practice a number of relaxation techniques. Let's explore a number of easy relaxation techniques to help build your ocd self help skills. Deep Breathing Exercises to Reduce Anxiety - Panic Disorder Jun 10, 2014 ... Simple Abdominal Breathing Exercise for Relaxation. The next time you're feeling anxious try this simple relaxation technique: Inhale slowly ... Relaxation and Breathing for Labor and Birth Relaxation for labor doesn't get much easier than the tense - release relaxation technique. This technique is easy to remember, easy to follow and can be used ...
<urn:uuid:8ec6f270-93ae-443f-8fd2-d6445fed1eb0>
{ "dump": "CC-MAIN-2014-35", "url": "http://stress.about.com/lr/emotional_stress/1576640/5/", "date": "2014-08-30T12:13:13", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500835119.25/warc/CC-MAIN-20140820021355-00099-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.8326830863952637, "token_count": 451, "score": 2.640625, "int_score": 3 }
SmartArt graphics are visual representations of information used in PowerPoint, Word & Excel. They help you illustrate processes and make points in a powerful visual way instead of using text. There are more than 80 layouts offered by SmartArt graphics to use in your presentations, documents and spreadsheets. - Create SmartArt graphics based on existing text - Create SmartArt from scratch - Edit the look and layout of SmartArt graphics to fit your content Microsoft Office 2013 - Open Sessions are a great resource for your questions to get answered! There is no need to register, and you are welcome to drop in at any time during a session with any of your Office questions. Thursday, Sept. 11th, 2014 9:30 am- 11:30 am 431 French Hall (FH) Tuesday, Sept. 16th, 2014 9:30 am - 11:30 am 431 French Hall (FH) Wednesday, Oct. 1st, 2014 9:30 am - 11:30 am 431 French Hall (FH) Tuesday, Oct. 7th, 2014 9:30 am - 11:30 am 431 French Hall (FH) Wednesday, Oct. 22nd, 2014 9:30 am - 11:30 am 431 French Hall (FH) Friday, Oct. 31st, 2014 1:30 pm - 3:30 pm 507 Murchie Science (MSB) Monday, Nov. 10th, 2014 1:30 pm - 3:30 pm 431 French Hall (FH) Monday, Dec. 1st, 2014 1:30 pm - 3:30 pm 431 French Hall (FH) This course is designed for those who want to learn the fundamentals needed to create and modify basic presentations using Microsoft Office PowerPoint 2013. - Explore and identify the components of the PowerPoint 2013 interface - Create a presentation - Format text on slides - Add and modify graphical objects - Eyedropper color selection - Work with tables in your presentation - Add charts - Delivering a presentation This course is designed for those who can create and modify documents in Microsoft Word 2013, but need to be able to create or modify more complex documents and customize Word. - Manage lists - Create charts - Customize tables - Modify pictures - Create graphic elements: WordArt, SmartArt, text boxes & shapes - Control text flow - Mail Merge This workshop will take you step-by-step through the Mail Merge feature. The feature produces multiple documents from a master document and a data source. You can use mail merge in Word to create a variety of customized documents, including letters, email messages, envelopes, or even labels. - Create/Open the main document for the mail merge - Create/Open the source data for the mail merge - Insert the merge field codes - Perform the mail merge
<urn:uuid:f60eba68-e59d-4d1f-9031-6ae8310e0477>
{ "dump": "CC-MAIN-2014-35", "url": "http://training.its.umflint.edu/", "date": "2014-08-30T12:10:06", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500835119.25/warc/CC-MAIN-20140820021355-00099-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.8269355893135071, "token_count": 592, "score": 2.640625, "int_score": 3 }
Set aside the doilies and the ribbons for a unique Valentine craft full of quirky charm. A button heart is the perfect project for small hands: all your artsy kid has to do is cut out a heart and start gluing on buttons! What You Need: - Construction paper What You Do: - Have your child fold the construction paper in half. - Show him how to draw half of a heart shape before letting him draw his own on the folded construction paper. The lines of the heart half should start and end on the fold of the paper. - Let him use scissors to cut out the heart half. When he unfolds the shape, he should have a full heart. - With the heart shape laying flat, have him glue on beads and buttons. Encourage him to cover the entire surface. He can even stack the heart for a fun textured look. - Allow time for the glue to dry. - What's the buttons are securely on the heart, have your child flip the entire craft over. - Who does your child want to give his button heart to? Have him use a marker to write a Valentine message to that person. Washington Virtual Academies Tuition-free online school for Washington students.
<urn:uuid:7e2ba000-bd5c-466f-9a1f-09a63e08bf19>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.education.com/activity/article/button-heart/", "date": "2014-08-30T12:22:08", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500835119.25/warc/CC-MAIN-20140820021355-00099-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9128791093826294, "token_count": 257, "score": 2.546875, "int_score": 3 }
By Patrick Sewell With rising gas prices, global warming and the recent movement towards green living, the idea of eating local has been getting a lot of attention recently. After all, the benefits to eating closer to home are pretty impressive: shrink your carbon footprint, support the local economy, eat more nutritious and healthy whole foods, and possibly even save a couple of bucks in the process. Now you can add one more reason to the list for eating local, and it’s one you can grow in your yard—pawpaws. You may have already heard of pawpaws (Asimina triloba), a small, tropical looking tree with large, drooping leaves and large, three-lobed flowers that look like inverted trilliums. A native butterfly attractor (pawpaws are the sole source of food for the Zebra Swallowtail butterfly larvae), pawpaws are often grown ornamentally for conservation and aesthetic purposes. But it is the fruit of the tree that attracts many pawpaw enthusiasts. Having the look and feel of an oblong mango with large, bean-like seeds, pawpaw fruit can grow up to six inches long and weigh as much as two and a half pounds, earning them the honor of being the largest native fruit in the continental United States. This fact alone may entice a gardener to add a few pawpaw trees to their landscape, yet what is most interesting about the fruit is its unique flavor. By Robin Ostfeld, Blue Heron Farm Everyone who has the opportunity should grow some of his or her own food. Even if it’s just a container with herbs or a single tomato plant, it’s worthwhile to grow something. Of course, I’m biased. Plants play a huge role in my own life, being both my livelihood and my hobby. But there are so many reasons to get your hand dirty! One morning last summer, a friend brought a copy of the magazine Discover to the farm. In it was an article that linked contact with soil bacteria to the release of serotonin in the brain. In other words, inhaling or touching the soil bacteria (called mycobacterium vaccae) can cause a peaceful state of mind or, in a depressed person, an alleviation of the symptoms of depression. Wow! A new reason to garden! Not only is it good for the environment (there’s no food more local than that which you pick from your own backyard) and personal health (from the standpoint of the exercise involved and the fact that fresh picked produce has the highest amount of nutrients), but now it’s been shown to promote mental health as well! Of course, I knew it all along. By Kristie Snyder, Hearts starve as well as bodies; give us bread, but give us roses! —James Oppenheim, from a 1911 poem supporting a Lawrence, Massachusetts textile worker’s strike The workers that James Oppenheim’s poem paid tribute to were mostly immigrant women, who fed their families mainly—and meagerly—on a diet of bread. They were striking, ultimately unsuccessfully, against a pay cut. Starving was a very real threat; presumably they were less worried about their hearts. But the “bread and roses” quote endures—a testament to the power that the beauty of flowers holds. Today, it’s South American flower workers, most of whom are also women, who might well be seeking “bread and roses.” Amy Garbincus, a flower and vegetable farmer at Three Sisters Farm and GreenStar Wellness staffer, says she is often asked, “Who cares if flowers are organic?” Page 6 of 9«StartPrev123456789NextEnd» New in Produce |The Grapes are Coming!| You've waited all year for them — Thornbush grapes are here this month! Along with a bounty of local produce of all kinds. Apparently July, not August, is the hottest month of the year. I always think of August as being an unbearable sweltering wash of humidity and scorch ... looks like I'm wrong. What I do know, however, is that late August brings us local grapes from Thornbush! And, it's finally tomato season, one of my favorite times of the year! This month, Stick and Stone Farm brings us summer squash, cherry tomatoes (try them in the recipe on page 8), basil, chard, kale, and green beans! Remembrance Farm continues to deliver greens (also used in this month's recipe), and Blue Heron offers beets, eggplant, cucumbers, and garlic. (August also brings Gaahl, from Gorgoroth's, 38th birthday! Happy Birthday, Gaahl!) So I guess August isn't so bad ... sure it's the end of our two-month summer, but perhaps the local grapes and local tomatoes will quell your seasonal tears? If not there's always a time machine. Wait, no there isn't. Sorry about that.
<urn:uuid:236dc684-01f5-4e5a-a6ae-bb7fd9c923e2>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.greenstar.coop/produce/108-news?start=15", "date": "2014-08-30T12:13:30", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500835119.25/warc/CC-MAIN-20140820021355-00099-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9628034830093384, "token_count": 1052, "score": 2.578125, "int_score": 3 }
2010s taxes 2000s taxes 1990s taxes 1980s taxes 1970s taxes 1960s taxes 1950s taxes 1940s taxes 1930s taxes 1920s taxes 1910s taxes 1900s taxes 1890s taxes 1880s taxes 1870s taxes 1860s taxes 1850s taxes 1840s taxes 1830s taxes 1820s taxes 1810s taxes 1800s taxes 1790s taxes Government revenues are collected from only a few types of source. |Income Taxes||$6,740 / person| |Social Insurance Taxes||+ $4,602 / person| |Ad valorem Taxes||+ $3,740 / person| |Fees and Charges||+ $1,378 / person| |Business and Other Revenue||+ $1,400 / person| |Balance||+ $-0 / person| |Total Direct Revenue||$17,859 / person| |Federal Deficit||+ $2,030 / person| |Gross Public Debt||+ $65,656 / person| | For more detailed numbers click here| Find NATIONAL DEBT today. See REVENUE HISTORY briefing. Take a COURSE at Taxes 101. Make your own CUSTOM CHART. Detailed table of revenue data sources here. Federal revenue data begins in 1792. State and local revenue data begins in 1890. State and local revenue data for individual states begins in 1957. File a valid bug report and get a $5 Amazon Gift Certificate. > State Quarterly Taxes FY14 GDP, GO: See GDP, GO Sources Federal: Fed. Budget: Hist. Tables 2.1, 2.4, 2.5, 7.1 State and Local: State and Local Gov. Finances Guesstimated by projecting the latest change in reported revenue forward to future years
<urn:uuid:2b6a4fad-dd9e-4a39-9f63-2a2d7d03d90b>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.usgovernmentrevenue.com/breakdown?gov=local&units=d", "date": "2014-08-30T12:28:42", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500835119.25/warc/CC-MAIN-20140820021355-00099-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.8018820285797119, "token_count": 384, "score": 3.015625, "int_score": 3 }
Word Challenge: Two Words, One Speech, JFK’s Part II of our Word Challenge series examines JFK’s words. Originally posted by Riise on 1/23/12. One of the most beloved presidents in American history (as you can tell by the number of buildings, bridges, and NY fried chicken places named after him), John F. Kennedy was a powerful speaker, and often employed strong language to showcase his authority. In his inaugural address given in 1961, JFK uses an impressive array of common and uncommonly used words to not only describe America but to also underscore some of the bigger challenges the country had to face. Excerpt from the JFK inaugural address:
<urn:uuid:de041025-2e7c-4f08-ab63-6c585ef72be4>
{ "dump": "CC-MAIN-2014-35", "url": "http://blog.bellcurves.com/blog/page/12/", "date": "2014-09-01T21:05:01", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535920694.0/warc/CC-MAIN-20140909055348-00489-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9696763157844543, "token_count": 140, "score": 3.078125, "int_score": 3 }
Aug. 16, 1841: President John Tyler was burned in effigy outside the White House — by members of his own Whig party. The Whigs were furious that Tyler flip-flopped and vetoed a bill to re-establish the Bank of the United States. The president said the bill violated states' rights. Quote of the day "The government should not be guided by temporary excitement, but by sober second thought." -Martin Van Buren More from West Wing Reports... THE WEEK'S AUDIOPHILE PODCASTS: LISTEN SMARTER - What would a U.S.-Russia war look like? - Scottish independence is another financial crisis waiting to happen - Fall movie guide: All the films you should see in September - 10 things you need to know today: September 1, 2014 - Why the West should let Russia have eastern Ukraine - 7 things the world's happiest people do every day - These real-life Rosie the Riveters changed the face of labor - 11 scientific studies that will restore your faith in humanity - The 10 best networking tips for people who hate networking - 9 Harvard dropouts who became fabulously successful Subscribe to the Week
<urn:uuid:36c3f538-283d-41e5-94c3-05e11685a75b>
{ "dump": "CC-MAIN-2014-35", "url": "http://theweek.com/article/index/248338/today-in-history-august-16", "date": "2014-09-01T23:00:49", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535920694.0/warc/CC-MAIN-20140909055348-00489-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9534339904785156, "token_count": 255, "score": 2.515625, "int_score": 3 }
This book nominally covers everything there is to do on a boat of an electrical or mechanical nature including diesel engines. But the vast majority of the book is on electrical equipment. After all, most of the things on the boat sooner or later wind up being part of the electrical system. Many boats have two electrical systems in parallel. There's the basic DC system, usually 12 volt, sometimes 24. Then there's an entirely separate circuit for 115 volt AC power used when the boat is docked at appropriate places. This book covers it all. The first chapters are on the battery itself and the circuitry around the boat. Then it gets into battery chargers, inverters, wind and water generators, solar cells, everything you ever wanted to know. There are chapters on corrosion, lightning protection, radios and antennas and on and on. About half the book is on purely electrical devices. The remaining half has chapters on engines, toilets, air conditioning and so on, but this also includes a lot of electrical devices such as autopilots, bow thrusters, and so on that may require electrical power. Basically this is the bible on how to fix things on the boat. You'll save a fortune on repair bills, and even more if you're halfway across the ocean.
<urn:uuid:86bf380f-8f4d-46c5-959f-e84129a08db3>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.amazon.de/Boatowners-Mechanical-Electrical-Manual-Essential/dp/0071432388", "date": "2014-09-01T22:33:33", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535920694.0/warc/CC-MAIN-20140909055348-00489-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9369412064552307, "token_count": 258, "score": 2.609375, "int_score": 3 }
US 7498710 B2 An arrangement for cooling an electric motor's stator winding coil is described. One area of a conductor insulation is removed to expose the copper conductor. The conductor is wound into a coil with bared, exposed conductor areas facing inward. The vertical edges of a slot or recess in an iron stator are lined with electrically insulating paper. A thermally conductive electrically insulating, ceramic substrate is bonded to the floor or base of the slot. The coil is inserted within the slot over the ceramic substrate with the exposed conductor facing and contacting the ceramic substrate. The coil is bonded to the ceramic substrate by thermally conductive and electrically insulative epoxy that fills the voids between the two. Heat flows from the conductor, through the bared copper surface, into the ceramic and the iron core stator with little resistance. A ceramic strip can be used alone or with copper traces bonded to the ceramic or conductor bared surface. Using a thermally conductive epoxy bond reduces resistance due to epoxy smear and reduces thermal resistance of the heat transfer path. 1. A coil cooling arrangement comprising: an electrical coil having electrical conducting wire with an insulating covering; an open area extending through said insulating cover exposing a portion of said conducting wire while said insulating cover insulates one conductor wire of said coil from another conductor wire; a support having an inner support surface and an outer surface; said electrical coil supported by said support inner support surface; an electrical insulator and thermal conductor substrate extending between said inner support surface and said electrical coil electrical conducting wire to said support inner support surface; said exposed portion of said conducting wire is in contact with said substrate to permit heat to pass from said electrical coil to said support surface. 2. A coil cooling arrangement as in said electrical conducting wire is in the general shape of a rectangle with rounded corners. 3. A coil cooling arrangement as in the voids formed by said rounded comers of said electrical conductor wire adjacent said substrate on said support inner support surface are filled with conductive epoxy. 4. A coil cooling arrangement as in said substrate on said support inner support surface has conducting traces, that are out of contact with each other, to enhance heat transfer between said coil electrical conductor wire and said support inner support surface. 5. A coil cooling arrangement as in said support is an iron stator having a slot with a base and side walls for receiving said coil. 6. A coil cooling arrangement as in said iron stator slot base is provided with said electrical insulator and thermal conductor substrate; said stator slot side walls are provided with an electrical insulation material. 7. A coil cooling arrangement as in said substrate is a ceramic and said electrical insulating material in said stator slot side walls is an insulating paper. 8. A coil cooling arrangement as in said substrate has an inside surface facing said coil and an outside surface facing said support inner support surface; a thermally conductive epoxy coating extends between said substrate inside surface and said coil. 9. A coil cooling arrangement as in a thermally conductive epoxy coating extends over said support outer surface. 1. Field of the Invention The invention is to cooling a coil by shaving off the insulation from an area on the conductor and contacting the bared conductor area with a thermally conductive electrically insulative ceramic to transfer heat away from the conductor and coil. 2. Description of Related Art Large power motors generate proportionally large amounts of heat. Their conductors, usually copper, are insulated by thin electrically insulating coatings or tape. These coatings, while effective as electrical insulators, unfortunately are also thermally insulative, and obstruct free flow of heat out of the conductors. As a result, the conductors used in the prior art motors see a large rise in temperature. The situation is worsened further when the coil is made by packing a large number of conductors inside a coil window or iron slot. The conductors remote from the cooler window boundaries (those near the center of the coil window) are hotter than those close to the wall of the window. Such hotter conductors are referred to as hot spots. Hot spot conductors are the first to fail because of thermal degradation of insulation. If the hot spot temperature exceeds the temperature rating of the insulation, it will start failing. The power rating of the motor is limited to ensure that the hot spot temperature never exceeds the thermal rating of the insulation coating. Methods that can reduce hot spots are needed in order to achieve higher power density and longer coil life. These methods are broadly grouped into those that reduce dissipated power and those that reduce thermal resistance. In the prior art, several methods are used to reduce thermal resistance. These methods include the use of thinner material to reduce thermal gap, more thermally conductive materials that reduce thermal resistence, extended surfaces to increase heat transfer area, using thermally conductive potting compound, eliminating air voids by vacuum pressure impregnation, etc. E. Sines (U.S. Pat. No. 6,777,835, issued Aug. 17, 2004) proposed inserting an electrically and thermally conductive strip between conductors such as a pitch-graphite composite strip. Its thermal conductivity is so high that it can redirect the heat along its narrow section. Its thermal conductivity is ˜600 w/mK which allows heat to flow in a thinner section without increasing resistance. However, this material is electrically conductive, and had to be covered by two electrically insulating layers. The heat has to overcome the resistance of the insulation layers. Thus, even though pitch composite has high thermal conductivity, its insulation layer will obstruct heat flow, increasing thermal resistance. E. Jarczynski (U.S. Pat. No. 5,091,666, issued Feb. 25, 1992) proposed inserting bare copper strips between laminations to reduce the temperature rise in iron laminations. Such copper strips however are in the path of alternating fields and hence generate eddy losses. Liebe et al (U.S. Pat. No. 3,965,378) proposed inserting bare copper strips that protrude out of the coil; cool air grazes over it to remove heat by free convection. However, it is well known that the boundary layer of free convective air is about 0.2 in. thick. Packing of copper protrusions at less than 0.25 in. spacing, as proposed by Liebe, will degrade cooling effectiveness. Liang et al (U.S. Pat. No. 6,744,158, issued Jun. 1, 2004) teaches using conducting rings around the coils for cooling. T. Nilson (U.S. Pat. No. 6,798,105, issued Sep. 28, 2004) teaches insulated winding wires in contact with a cooling medium. R. Nygard (U.S. Pat. No. 5,886,434, issued Mar. 23, 1999) and P. Eckels (U.S. Pat. No. 4,282,450, issued Aug. 4, 1981) are examples of fluid cooling of electrical windings. The invention relates to high power electric motors, particularly to cooling stator coils. Of special interest is reducing hot spots within coils. The intent is to increase the power density of the motor by reducing its operating temperature. To reduce the temperature of stator coils, one side of the coil conductor has the insulation removed exposing the bare copper. The conductor insulation insulates against both electric and heat transfer. By removing the insulation from the conductor and placing the conductor wire in contact with a material that easily conducts heat but acts as an insulation to the flow of electricity, the temperature of the stator coils can be reduced. A thermally conductive ceramic substrate such as alumina or aluminum nitride or beryllium oxide and a thermal epoxy can be used to contact and position the stator coil in place. The combined effect of bared copper, thermally conductive ceramic substrate and thermal epoxy without smear reduces the hot spot temperature. A cooler coil in turn allows significant reduction in the weight of the motor and increases the power density. A central theme of this invention is to present a novel configuration that meets the goal of reducing hot spot temperatures. As shown in As an example, consider the prior art The hot spot temperature or junction is denoted by Tj. The heat flows from the hot spot to the closest cool area along the path of least resistance. This is usually a surface over which coolant flows, and is usually referred to as a thermal ground, denoted by the symbol c. This temperature is denoted by Tc. The temperature of the hot spot is governed by the rms current Irms, equivalent series resistance Resr, and the conductive thermal resistance Rjc between the hot spot j and the ground c. Its temperature can be reduced by reducing one or all of 3 parameters. To cool end windings, two ceramic strips can be glued to the active conductor portions and two more rectangular strips can be glued to the end winding portions. Heat is transferred by providing a thermal ground at the bottom of the ceramic insulators. Another alternative is a single piece of ceramic substrate, with a shape substantially the same as that of the coil, that is used to cover the entire bottom surface of the coil. For example, consider copper 0.150 in. width with 0.010 in. shaved off of the bottom. The bared copper surface is 0.033 in. wide, and is 0.140 in. from the center of the conductor. Assuming a near perfect thermal attachment, this copper to ceramic substrate path offers lowest resistance of Rcu=0.22 C/w (length L=0.072 in., k=390 w/mK; the bared copper area is A=0.033 in.×1 in.) When the conductor carries 150 A, it generates 2.39 w heat at room temperature. This heat is removed mostly by the first path, so the temperature rise will be 0.53° C. A 0.010 in. thick ceramic substrate, with 25 w/mK and area A=0.045 in.×1 in., on the other hand adds 0.35° C./w, so the net resistance is 0.57° C./w from copper to iron. The 2.39 w of heat then yields 1.4° C. rise from the hot spot to the bottom of the substrate. Baring the conductor and attaching the bared surface to a ceramic substrate reduces the temperature rise of 90° C. to 1.4° C. This essentially amounts to the elimination of the hot spot. The coil is made of a conductor 20 bared at one edge 22. A thermally conductive ceramic substrate 25 is inserted onto the floor or base 32 of the slot 36 and bonded to the iron with a thermally conductive epoxy 27. The side walls of the slot are lined with conventional electrically insulative paper 33. The coil 37 is inserted into the slot and clamped to the ceramic substrate 25 and iron stator 31 and bonded in place by a thermally conductive epoxy 27. This epoxy fills the voids, but does not flow into the interface between the bared copper surface 22 and the ceramic 25 surface. The bottom flat surface 39 of the stator is used as the thermal ground. The heat flows vertically down towards the thermal ground from the copper conductor into the ceramic substrate into the iron and thence to ground. The main elements in this path are copper, ceramic and iron, and they offer little resistance to heat flow. As a result the hot spot temperature in the coil is greatly reduced. As in the configuration shown in There is a sharp temperature gradient from one conductor to the other. The thicker the insulation, the greater the temperature gradient. The gradient is highest at the edge conductor as it is subject to the cumulative thermal resistance of all the coatings. The air around the conductors on the open top is relatively hot. A permanent magnet rotating close to the conductors will get hot because it is within this high temperature zone produced by the coil. There is a need to protect the magnets from these hot conductor temperatures. As the top surface of the conductor coils is not provided with any thermal protection, the result is that heat radiates into the surrounding air and into the magnets of the rotor. This invention significantly reduces heat radiation resulting in cooler magnets on the rotor. It is believed that the construction, operation and advantages of this invention will be apparent to those skilled in the art. It is to be understood that the present disclosure is illustrative only and that changes, variations, substitutions, modifications and equivalents will be readily apparent to one skilled in the art and that such may be made without departing from the spirit of the invention as defined by the following claims.
<urn:uuid:420506c7-227a-49c7-919e-c6444c22418b>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.google.com/patents/US7498710?dq=6985872", "date": "2014-09-01T21:41:55", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535920694.0/warc/CC-MAIN-20140909055348-00489-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9401432275772095, "token_count": 2681, "score": 2.78125, "int_score": 3 }
US 7880345 B2 A linear actuator system is described that includes a linear actuator, a first motor, and a second motor. The linear actuator is configured to transmit rotational motion to linear motion. The first motor is operatively connected to the linear actuator. The second motor is also operatively connected to the linear actuator. The first motor is configured to provide a different amount of force and a different speed to the linear actuator than the second motor. Methods of operating a linear actuator are also disclosed. 1. A linear actuator system comprising: a linear actuator configured to transmit rotational motion to linear motion; a first motor operatively connected to the linear actuator; and a second motor operatively connected to the linear actuator, wherein the first motor is configured to selectively provide a different amount of force and a different speed to the linear actuator than the second motor. 2. A system according to 3. A system according to 4. A system according to 5. A system according to 6. A system according to 7. The system according to 8. The system according to 9. The system according to 10. The system according to 11. The system according to 12. The system according to 13. The system according to 14. The system according to 15. A method of operating a linear actuator configured to transmit rotational motion to linear motion, the method comprising the steps of: operatively connecting a first motor to the linear actuator; and operatively connecting a second motor to the linear actuator, wherein the second motor is configured to selectively provide a different amount of force and a different speed to the linear actuator than the first motor. 16. A method according to 17. A method according to 18. A method according to 19. A linear actuator system comprising: means for generating a first rotational torque having a first speed; means for generating a second rotational torque having a second speed; and means for transforming the first and second rotational torques into a linear force. 20. The linear actuator system of 21. The linear actuator system of 22. The linear actuator system of 23. The linear actuator system of 24. The linear actuator system of This application claims priority to U.S. Provisional Patent Application No. 60/790,930, entitled “Method and Apparatus For Linear Actuator with Two Motors, One For High Speed And One For High. Force” filed Apr. 11, 2006. The present invention relates generally to linear actuators; relates more specifically to driving a linear actuator with two motors via a transmission; and relates more specifically still to driving a rotational to linear actuator with both a high torque motor and a high speed motor using a bi-directional over-running clutch. There are many applications that require a linear actuator to both move at high speed with low force, and at low speed with high force. An example application might be a nailing machine, or a riveting or metal pressing machine. The desired machine would rapidly move the ram or rod of the linear actuator with high speed to the point where high force is needed. This first part of the cycle does not itself require high force. This first part of the cycle is typically followed by a need for a short stroke at high force (to insert a rivet or a nail for example). There are other applications that may require a different sequence of high speed and high force moves, but many of these are similar in that a single actuator needs to perform both types of motion. For a linear actuator to meet both the high speed and high force (or torque) requirements using a single motor, the motor must be capable of high power (power is proportional to speed×force for linear motion, or proportional to rpm×torque for the motor's rotary input to a screw type actuator). A high power motor will generally cost more and be larger than a lower power motor, and if drive electronics are required, their cost and size will also typically be greater as power is increased. One solution to this problem is to use separate actuators, one for high force and another for high speed applications. Another solution might be to use a transmission of some sort to change the output of a motor from low torque and high speed to high torque and low speed, perhaps with a two-speed gear box, or a continuously variable belt drive transmission (CVT) for example. These solutions can require expensive or complicated mechanisms, and often require active electronic control. These solutions may require speed changes or stoppage of the actuator (from what would otherwise be a continuous motion) to implement a torque change, or may require sensing the load change to actively shift speeds, or to actuate a shift mechanism in a transmission, or to programmatically actuate a change in a CVT ratio at a given actuator location in temporal anticipation of a load increase at a given location, or to otherwise control the system. Therefore, there is a need in the art for a method, apparatus and system for driving a linear actuator with two motors via a transmission in order to provide both high speed and high force or torque as needed. The invention should also preferably overcome the drawbacks associated with the foregoing systems and methods. Aspects of the present invention overcome these and other shortcomings of the prior art and address these needs in the art. The linear actuator system and method according to the present invention utilizes two motors, the power of which together could sum to a total power requirement less than a single larger motor that would be capable of providing both the high speed and high force requirements. Each motor is connected to a linear actuator through a transmission which allows both motors to operate. The first motor, referred to herein as the high torque motor, is connected to the linear actuator input shaft through the low speed connection/input of a bi-directional over-running (BDOR) clutch of the transmission. The second motor, which may be referred to herein as a high speed motor, is connected to the linear actuator input shaft through the over-running input (i.e., high speed connection) of the bi-directional over-running clutch. The over-running input transmits force and torque as if the high speed motor was directly connected to the input shaft of the linear actuator. According to one aspect of the present invention, the speed and torque changes happen automatically when the load requires high force, are mechanically implemented, do not require elaborate electronic controls (but may use them for enhanced performance), and do not require anticipating the change and/or a significant amount of time to engage or sequence the two motors. The system and method of the present invention responsively reacts to sudden or gradual changes in force required by the load on the linear actuator and provides motion occurring in either direction at any speed. Additional servo controls, or other controls, may be added to further enhance the performance of the system, but are not required for the basic system of the invention to work. Therefore, according to one aspect of the invention, there is provided a linear actuator system comprising: a linear actuator configured to transmit rotational motion to linear motion; a first motor operatively connected to the linear actuator; and a second motor operatively connected to the linear actuator; wherein the first motor is configured to provide a different amount of force and a different speed to the linear actuator than the second motor. According to another aspect of the invention, there is provided a method of operating a linear actuator, the method comprising the steps of: operatively connecting a first motor to the linear actuator; and operatively connecting a second motor to the linear actuator, wherein the second motor is configured to provide a different amount of force and a different speed on the linear actuator than the first motor. According to other aspects of the invention described in connection with the preceding two paragraphs, there is further provided a transmission for connecting the first and second motors to the linear actuator; and further wherein the transmission includes a bidirectional over-running clutch with a high speed input and a low speed input, such that the first motor is connected to the linear actuator through the low speed input of the clutch and the second motor is connected to the linear actuator through the high speed input of the clutch. According to yet another aspect of the invention, there is provided a linear actuator system comprising: means for generating a first rotational torque having a first speed; means for generating a second rotational torque having a second speed; and means for transforming the first and second rotational torques into a linear force. While the invention will be described with respect to preferred embodiment configurations, it will be understood that the invention is not to be construed as limited in any manner by such configurations described herein. Instead, the principles of this invention extend to any environment in which an actuator is driven with both a high torque motor and a high speed motor using a bi-directional over-running clutch. These and other variations of the invention will become apparent to those skilled in the art upon a more detailed description of the invention. The advantages and features which characterize the invention are pointed out with particularity in the claims annexed hereto and forming a part hereof. For a better understanding of the invention, however, reference should be had to the drawings which form a part hereof and to the accompanying descriptive matter, in which there is illustrated and described a preferred embodiment of the invention. In the drawings in which like elements are identified with the same designation numeral: Referring first to The first and the second motors 18, 14 are operatively connected to the input shaft 16 of the linear actuator 12 through a transmission 20. In the depicted preferred embodiment of the system 10, the transmission 20 includes a bi-directional over-running (BDOR) clutch 22. The linear actuator 12 is a rotational to linear motion type actuator. An internal threaded drive shaft 30 is rotated along its longitudinal axis by the input shaft 16 (best seen in Referring now to For a detailed description of a BDOR style clutch, reference may be had, for example, to U.S. Pat. No. 6,655,515; U.S. Pat. No. 5,307,911; and U.S. Pat. No. 5,036,939. However, a brief description of a BDOR clutch is provided herein for convenience. Overrunning roller clutches are typically arranged and configured to include an intermittent friction apparatus operative between a roller cage and a housing—wherein the cylindrical housing is attached to an output shaft. When friction is present, rotation of the cage with respect to the housing is retarded, and so moves the roller cage (and respective rollers) to a forward or reverse engagable position. The force is applied in an intermittent nature wherein when the input shaft is not rotating faster than the housing, no friction is present and the roller cage (and respective rollers) are returned to a central, neutral position, by a circumferential spring. The input shaft generally includes a periphery about which the rollers are located. More specifically, the periphery is generally a polygon with each face of the polygon having a respective roller. The angles between faces of the polygon form camming surfaces. In this manner, the forward and reverse engagable positions are defined when the rollers approach the camming surfaces and become wedged. The neutral position is defined when the rollers return to the center of the respective polygon face. Returning now to a description of the system, it will be appreciated that the resulting system 10 uniquely offers two performance characteristics that are valuable in certain important linear actuator applications: 1) high speed with low force, and 2) low speed with high force, while using motors that are relatively small. Normally, achieving the above performance characteristics would require driving a linear actuator with a single, very much larger motor. The second motor 14 of the system 10 may be referred to herein as a high speed motor. The high speed motor 14 is connected to the linear actuator input shaft 16 through an over-running input 26 (i.e., high speed connection) of the BDOR clutch 22. See The first motor 18 may be referred to herein as the high torque motor. The high torque motor 18 is connected to the linear actuator input shaft 16 through a low speed connection/input 28 of the bi-directional over-running clutch 22. The system 10 of the present invention may use two commercially available rotary drive motors to provide torque to a commercially available linear actuator, which converts the rotary motion into linear motion. An example high speed motor 14 generating high speed output suitable for use with the system 10 may be available from Exlar Corp. under the model designation of SLM Series servo motors. In one embodiment, the high speed motor 14 may have a peak speed of 4000 rpm and maximum continuous torque of 55 lbs-in. An example high torque motor 18 generating high torque output at (typically) lower speed suitable for use with the system 10 may be available from Exlar Corp. under the model designation of SLG Series servo motors. In one embodiment, the high torque motor 18 may have a peak speed of 400 rpm, and a maximum continuous torque of 550 lbs-in. The output from the two motors 14, 18 is combined and selected by coupling the motors 14, 18 with the BDOR clutch 22. The output from this clutch 22 is input to the linear actuator 12. As noted above, an example linear actuator suitable for use with the system 10 may be a commercially available actuator from Exlar Corp. under the model designation of I Series actuators. By way of example, the high speed motor 14 may be a typical servo motor, running at 4000 rpm. Also, for example, the high torque motor 18, may actually be comprised of an identical servo motor with a planetary gear reducer mounted on it, providing an output of 400 rpm at approximately ten times the torque (less a slight amount due to mechanical efficiency considerations) of the high speed motor 14. Without the principles of the present invention, a system using a single motor having both the high speed and high torque requirements would need a motor that would be sized to approximately provide ten times the amount of torque normally provided at the higher speed. Such a system represents a significant cost and size increase for both the motor and any required motor drive electronics. During the operation of the linear actuator system 10, the first and the second motors 14, 18 both run at the same time. During high speed operation of the linear actuator system 10, the high speed motor 14 runs faster than the high torque motor 18, and thus controls the motion of the linear actuator 12. The high torque motor 18 runs slower, and, thus, has no influence on the actuator 12 because of its connection through the over-running clutch 22. Turning briefly to When the linear actuator 12 encounters a high force/load, requiring, for example, a high torque driving force, the high speed motor 14 would stall, or otherwise cease to provide adequate torque (the high speed motor 14 could be current-limited to protect the stator for example). The high speed motor 14 may, depending on ancillary controls, continue to provide some or none of the total input torque required. Thus, the linear actuator 12 would slow down (perhaps rapidly, depending on inertia, electronic control, etc.), until the required input speed was slow enough for the high torque motor 18 connected to the low speed input 28 of the BDOR clutch 22 to engage, and thus provide a high torque input to the linear actuator input shaft 16. It will be appreciated that a controller may slow down the high speed motor 14 prior to encountering the high force/load in order for the high torque motor 18 to provide torque to the input shaft 16. The high torque motor 18 will engage when the speed of the high torque motor 18 exceeds that of the high speed motor 14. This transition from high speed, low force to low speed, high force motion occurs automatically through the normal operation of the BDOR clutch 22. In the depicted embodiment, the system does not require ancillary controls to actuate this change. Similarly, if the force resisting the motion of the linear actuator 12 were to decrease to a point where the torque provided by the high speed motor 14 was adequate to advance the actuator 12, then the over-running aspect of the BDOR clutch 22 would allow the high speed motor 14 to accelerate to a higher speed (perhaps its full speed depending on the speed-torque characteristics of the motor 14 and the speed-force characteristics of the force resisting the motion of the linear actuator 12). Thus, the transition from high speed, low force to low speed, high force mode of operation is reversible (while the actuator 12 is continuously advancing in the same direction), and can be repeated as often as needed, and may occur without input from the motors' control system. Continuing with the above example, thus, when the high speed motor 14 regains its full speed, the linear actuator 12 would advance rapidly, at approximately ten times the speed it operates in the slow mode. When operated in the slow mode, the linear actuator 12 could exert approximately ten times the force it can during the high speed mode, utilizing the torque from the high torque motor 18. It should be understood that this idealized example ignores the small effects of losses due to efficiency considerations. If the high speed motor 14 was operated under suitable controls, it could continue to apply its torque to the linear actuator 12 when the system 10 is operating in the high force mode. In this case, for the above example, the total available torque in the high force mode would be about eleven times the torque of the high speed mode. When the linear actuator 12 needs to operate in the reverse direction, the first and second motors 14, 18 can simply reverse their operating direction. Depending on the specific characteristics of the BDOR clutch 22, it may be necessary to stop or reverse the high torque motor 18 first, to allow the clutch 22 to return to a neutral operating mode, so that the over-running clutch behavior can be realized when the high speed motor 14 is now operated in reverse. A Hilliard brand BDOR clutch may typically need approximately fifteen degrees of reverse shaft rotation of the high torque, slow speed motor 18 (while the overrunning shaft is idle) to reset the clutch 22 to the neutral position for proper operation in the reverse direction. This brief sequence of control over motor motion might be needed to unlock the clutch 22 to prepare it for proper operation in the reverse direction. Once operating in the reverse direction, the linear actuator 12 will have the same behavior as in the forward direction, because of the bi-directional symmetry of the BDOR clutch 22. The controls for this system 10 could be conventional controls. For example, brush type servo motors could be used, requiring only a voltage source of a given polarity to operate the motors in a given direction. Limit switches attached to the linear actuator could directly operate the power provided to the first and second motors 14, 18 to switch polarity and cause the linear actuator 12 to operate in a repeat cycle mode, for example. Alternatively, limit switches could operate relays, or programmable relays, or be used as input signals to a PLC or a motion controller, which could, in turn, operate the motors 14, 18 according to some predetermined motion profile or cycle as desired. Similarly, other forms of input could be used, such as proximity switches, or load sensors, etc. The variety of choices for controls is very broad and would depend on the nature of each specific application. Servo controls might also be used to further enhance the system performance. For example, by purposefully reducing the torque output from the high speed motor 14, the system 10 could be caused to shift from a high speed mode to a high force mode, without the need for an increase in the actuator's load to trigger this change. This type of a control might be useful if one wanted to transition to high force mode prior to encountering a load. According to yet another variation of the invention, one may use a BDOR clutch that is electrically actuated. A typical BDOR clutch (e.g., a Hilliard BDOR clutch) is self actuated by the relative motion of the internal parts—and this requires a certain amount of friction. The friction can be minimized by using an electromagnet to cause the BDOR clutch to properly engage as an over-running clutch. When the electromagnet is off, there is no friction and the clutch will tend not to shift at all. In this variation, the clutch would be controlled with an electrical signal. Also, upon reversal of linear actuator 12 direction, if the high torque motor 18 is required to reverse prior to the high speed motor 14 reversal for proper operation of the BDOR clutch 22 (or if any other predetermined relation or motion or forces were required), a suitable motion sequence could be provided by the control system. It is important to note that these motion controls act on the motors 14, 18 directly, and thus indirectly influence the behavior of the BDOR clutch 22 according to its natural mechanical behavior, and do not act on the BDOR clutch 22 directly. The basic BDOR clutch 22 is a purely mechanical device, not an electro-mechanical device, although electrically actuated versions can be used. Control system 62 controls the operation of high speed motor 64 and high torque motor 66. To do so, control signals are generated by control system 62 that are independently transmitted to high speed motor 64 and high torque motor 66. Control system 62 generates control signals appropriate to control the respective motor. Alternatively, each of motors 64 and 66 has their own control system 62. In possible embodiments, digital control signals are generated by control system 62. Analog or pulse-width modulated signals are generated in other embodiments. In the illustrated embodiment, control system 62 also provides drive power to motors 64 and 66. Alternatively, a separate power source is provided. In another possible embodiment, control system 62 is a power source, or multiple power sources. In the illustrated embodiment, linear actuator system 60 includes two rotary drive motors. As described herein, the rotary drive motors are controlled by control system 62. High speed motor 64 operates at high rpm but has a relatively low torque. In one embodiment, and by non-limiting example, high speed motor 64 operates with a peak speed in a range from about 2000 rpm to about 6000 rpm, and with a maximum continuous torque in a range from about 25 lbs-in to about 100 lbs-in. On the other hand, high torque motor 66 operates at low rpm but has a relatively high torque. In one embodiment, and by non-limiting example, high torque motor 66 operates with a peak speed in a range from about 200 rpm to about 600 rpm. The rotary outputs from motors 64 and 66 are coupled by shaft coupling 68. In one embodiment, shaft coupling 68 is a belt drive, such as illustrated in Clutch 70 operates in cooperation with shaft coupling 68 to enable motors 64 and 66 to operate at different speeds, as described herein. For example, clutch 70 enables high speed motor 64 to provide the drive power to linear actuator 72 when a low load is applied to linear actuator 72. One example of a suitable clutch 70 is a bi-directional over-running clutch, but other suitable clutches may also be used. When the load on linear actuator 72 increases to the point that additional torque is required, clutch 70 enables low speed motor 66 to provide additional drive power. One exemplary embodiment of this configuration is illustrated in Rotational drive power is converted into linear drive power by linear actuator 72. The coupled outputs of high speed motor 64 and low speed motor 66 provide the rotational drive power to an input shaft of linear actuator 72. In one embodiment, linear actuator 72 is a screw actuator. In another possible embodiment, linear actuator 72 includes a motor. For example, high speed motor 64 is constructed within the enclosure of linear actuator 72. This is done by forming motor 64 around linear actuator 72, such that they share a common shaft. This is beneficial for reducing the length of the overall system, but increases the width. High torque motor 66 is coupled to the shaft via shaft coupling 68, such as a belt drive. Clutch 70 is connected between the shaft of low speed motor 66 and shaft coupling 68. One method of stopping the linear actuator is to engage the clutch motor in a reverse direction. However, doing so can cause the system to stop too quickly, resulting in mechanical failure or overspeeding of the high torque motor. To solve this problem, a dynamic braking option is illustrated in In the illustrated embodiment, control system 62 includes power input 80, power supply 82, switch 84, and optional resistor 86. Fail safe condition sensor 88 is a safety or condition sensor which may be provided for an input to control system 62. High speed motor 64 includes first winding 90 and second winding 92. Power supply 82 is connected to the terminals of first winding 90. Switch 84 and resistor 86 are connected in series across the terminals of winding 92. Power to high torque motor 66 is shown designated at 65. Continuing with this embodiment, high speed motor 64 includes first winding 90 and second winding 92. In one embodiment, the windings are wound together. In another embodiment, first winding 90 is wound first and second winding 92 is wound on top of first winding 90. In another embodiment, first winding 90 is wound adjacent to second winding 90. For example, each winding is wound on a separate portion of the motor armature. During normal operation, control system 62 receives power through power input 80 from a power source. In one embodiment, the power source is alternating current power supplied to power input 80. In another embodiment, the power source is a direct current power source, such as a battery, that supplies power to power input 80. Any other power source may also be used. Power is supplied to first winding 90 through power supply 82 to operate high speed motor 64. Switch 84 is maintained in an open state during operation of motor 64, such that little resistance is generated. When dynamic braking is desired, power supply 82 is turned off and switch 84 is closed, causing current to flow. An electromotive force is generated that opposes the rotation of motor 64 and causes motor 64 to rapidly decelerate until it has come to a complete stop. Resistor 86 may be placed in series with the winding 92 in order to improve the braking time of the high speed motor 64. In one embodiment, switch 84 is a high speed relay. In embodiments in which it is desirable to stop the linear actuator upon power loss or when the linear actuator is turned off, a normally closed high speed relay is used. In this way, when power is lost, switch 84 automatically closes to initiate the dynamic braking feature. In such embodiments, control system 62 maintains relay 84 in an open state during normal powered operation. In another embodiment, current generated by the rotating motor windings is used to power switch 84 during braking. In another embodiment, dynamic braking is initiated by control system 62 when a signal is received from fail safe condition sensor 88 or some other external control signal from a cooperating system (e.g., in a production line with other controllers). In one embodiment, fail safe condition sensor 88 is a temperature sensor. In another embodiment, fail safe condition sensor 88 may include a proximity sensor (e.g., to help promote safety of operators) and/or a part misfeed sensor (e.g., to protect tooling and to promote quality). Fail safe condition sensor 88 generates a signal that is input into control system 62 to cause control system 62 to initiate dynamic braking. Alternatively, fail safe condition sensor 88 generates a condition signal that is monitored by control system 62. If a condition signal exceeds a threshold value, control system 62 initiates dynamic braking. For example, if a temperature exceeds a safe operating temperature, control system 62 initiates dynamic braking to avoid overheating motor 64. As noted above, resistor 86 is optional, as braking will occur with or without resistor 86. However, the resistance of resistor 86 may be set to adjust the speed at which dynamic braking occurs. The resistor 86 value for producing the fastest braking time is that which makes the electrical time constant of the motor to be substantially less than the mechanical time constant. Depending on the characteristics of the system and the motor, a higher resistance could well be needed to stop the motor quickly. This is because the electrical time constant equals L/R (motor inductance divided by resistance). The resistance is needed to dissipate the electrical energy of the winding such that the dynamic mechanical braking can occur quickly. In one embodiment, resistor 86 has a resistance in a range from about 0.5 ohms to about 1.0 ohms. It will be appreciated, however, that other values may be used depending on the motor characteristics and winding in which resistor is employed. Another alternative to a discrete resistor in the case of a dual winding as shown in It may be noted that the embodiment illustrated in Those of skill in the art will appreciate that the windings illustrated in In possible embodiments, high speed motor 64 is a permanent magnet motor with a self limiting current characteristic that prevents the motor from generating excessively high currents that could otherwise demagnetize the rotor magnets. The limiting current is a function of the motor Ke, pole count and winding inductance. The maximum current generated is equal to about 2×Ke/P*L. In addition, as noted above, the mechanical and electrical time constants play a role in the braking of the motor, whereby it is desirable to reduce the electrical time constant to a value significantly less than the mechanical time constant to provide improved braking effect. In an alternate embodiment, dynamic braking may also be performed using a single winding motor by shorting the terminals of the motor winding together, with or with out a resistor. In another embodiment, a separate stator or a separate motor is provided to perform the dynamic braking operation. The physical arrangement of the two motors, clutch and the actuator of the present invention may take several forms. One of the benefits of using a torque limited coupling is that it provides offers protection to the high torque motor. For example, in the event that the over-running clutch is engaged at the wrong time, the rapidly moving linear actuator may attempt to backdrive the high torque motor at very high speed. This could result in damage to the high torque motor due to the sudden and possibly excessive torque that would be applied. A torque limited coupling solves this problem by providing a limit to the torque that can be applied. A first type of torque limited coupling is commonly called a “slip clutch” (“TLC-S”). This type of clutch transmits torque between a driving shaft and a driven shaft up to a settable threshold—after which it slips. However, when slipping, it still transmits a torque approximately equal to the torque at which it slips, even though the driven shaft would be turning slower than the driving shaft. When the transmitted torque reduces below this amount, it stops slipping. The TLC-S can be symmetrical, that is either shaft can act as the driving or driven shaft, with the other shaft acting with the driven or driving function respectively, depending on the instantaneous dynamics of the shafts. A second type of torque limited coupling is one that snaps open, and is commonly referred to as a “free wheeling torque limited coupling” (“TLC-FW”). These types of clutches transmit torque between a driving and a driven shaft without slipping until a settable torque limit is reached, at which point they snap open, and the driven shaft is disengaged from the driving shaft allowing both to free wheel. This mode of operation typically continues until the system is brought to a standstill, and the coupling is manually reset. There are many variations of this type of coupling. Some will reset after a particular shaft position is reached, or a particular shaft motion sequence occurs, and some can be electrically actuated. Both types of torque limited coupling can protect the high torque motor from damage, should the clutch be engaged (purposefully or accidentally) when the actuator is moving at high speed. If this happens, the inertia of the actuator will tend to back drive the high torque motor. This can damage the motor. For example, if the high torque motor was a gear motor with a 10:1 reduction, with a normal output shaft speed of 200 rpm, and the high speed motor was running at 3,000 rpm, then if the BDOC clutch were suddenly engaged the system would try to turn the high torque motor at 30,000 rpm (10×3,000 rpm). While a simple energy balance shows that an ultimate speed of 30,000 rpm will not be achieved, it does point out why a large torque pulse could occur. A torque limited coupling (either TLC-S or TLC-FW type) placed between the high torque motor and the BDOC will protect the high torque motor from this source of potentially damaging torque. For example, a torque limited coupling may be used in conjunction with dynamic braking from the high speed motor. In one form, the high torque motor can be operated to rotate slowly, in the direction opposite that of the high speed motor, thereby suddenly engaging the BDOC. This now presents the near zero speed inertia of the high torque motor into the system, as an impediment to continued motion of the high speed motor. This could create a huge torque pulse on the high torque motor, but a TLC placed between the BDOC and the high torque motor will protect it. If the TLC is the TLC-S type, the high torque motor power train will be protected from damaging torque, and yet be able to transmit a braking torque to the high speed motor. In this case, the limiting torque of the TLC-S would be set below a torque that would cause damage to the high torque motor, were it to be otherwise urged to be back driven suddenly and at high speed, and yet set at a high enough torque that the high torque motor can exert most or all of its normal holding torque on the BDOC input shaft, regardless of its actual speed. In this fashion, the energy of the system could be partially dissipated by friction in the TLC-S, and rapidly slowed to the near zero speed of the high torque motor. This in turn could be brought to zero speed by the control system (servo drive motion controller, etc—any means that would otherwise bring the high torque motor to a standstill). Using a TLC-S in conjunction with the high torque motor might be used to shorten the total braking distance for the linear actuator, when dynamic motor braking is used. Alternatively, it could be used alone without dynamic motor braking. The energy dissipated in friction by the TLC-S was in one example calculated to increase the temperature of the TLC-S by 1.5 Deg F. (based on total system mechanical energy, and total mass of the TLC-S), so this may be a practical means for occasional emergency braking. However, the TLC-S is also a maintenance item, since it depends on friction, and thus wear of the friction surfaces occurs over time. Dynamic motor braking is likely to be more reliable for long term use. Turning now to The alternative embodiments illustrated in and described with reference to While particular embodiments of the invention have been described with respect to its application, it will be understood by those skilled in the art that the invention is not limited by such application or embodiment or the particular components disclosed and described herein. It will be appreciated by those skilled in the art that other components that embody the principles of this invention and other applications therefore other than as described herein can be configured within the spirit and intent of this invention. The arrangement described herein is provided as only one example of an embodiment that incorporates and practices the principles of this invention. Other modifications and alterations are well within the knowledge of those skilled in the art and are to be included within the broad scope of the appended claims.
<urn:uuid:07ca88cd-12f9-41ec-bb6a-dcfb42227dca>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.google.com/patents/US7880345?dq=7,603,356", "date": "2014-09-01T21:56:03", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535920694.0/warc/CC-MAIN-20140909055348-00489-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9137114882469177, "token_count": 7514, "score": 2.515625, "int_score": 3 }
US 8180375 B2 Mobile device user notifications of highly likely call drops or service losses are provided. A wireless network can determine from the location history of a mobile device if that mobile device is likely to lose connectivity to the wireless network or to a particular wireless service and issue an alert to the user. The form of the alert can be through one of various types of mobile device messages, or through an application on the mobile device. The mobile device's location can be determined using the global positioning system. Alternative directions can be provided to the user so that the user can travel without losing connectivity. The user may provide a destination before beginning travel, and receive a suggested course of travel that keeps the user within a higher quality coverage area. 1. A method comprising: predicting a course of a mobile device; collecting course network statistics on network coverage areas surrounding the course; predicting that the course will traverse an area with an unacceptable rate of dropped calls by determining that a rate of dropped calls in the network coverage areas surrounding the course exceeds a predetermined threshold; and in response to predicting that the course will traverse an area with the unacceptable rate of dropped calls, providing, to the mobile device, an indication of a predicted loss of network connectivity. 2. The method of accessing a history of global positioning system (GPS) coordinates of the mobile device; obtaining current GPS coordinates of the mobile device; and predicting the course of the mobile device in accordance with the accessed and obtained GPS coordinates. 3. The method of maintaining a history of the mobile device's location, determined based on network measurements, over a period of time; obtaining a current location of the mobile device, determined based on network measurements, and predicting the course based on the history and the current location. 4. The method of determining at least one alternate course, the at least one alternate course predicted to traverse an area not having the unacceptable rate of dropped calls; and providing the at least one alternate course to the mobile device. 5. The method of 6. The method of 7. The method of 8. The method of 9. A system comprising: at least one memory; and at least one processor in communication with the at least one memory, wherein the at least one processor is configured to: predict a course of a mobile device; collect course network statistics on network coverage areas surrounding the course; predict that the course will traverse an area with an unacceptable rate of dropped calls by determining that a rate of dropped calls in the network coverage areas surrounding the course exceeds a predetermined threshold; in response to predicting that the course will traverse the area with the unacceptable rate of dropped calls, provide, to the mobile device, an indication of a predicted loss of network connectivity. 10. The system of 11. The system of 12. The system of 13. The system of determine at least one alternate course, the at least one alternate course predicted to traverse an area without the unacceptable rate of dropped calls; and provide the at least one alternate course to the mobile device. 14. The system of collect potential course network statistics on network coverage areas surrounding a plurality of potential courses; and determine if the potential course network statistics indicate the unacceptable rate of dropped calls for each of the plurality of potential courses; and select the at least one potential course from among the plurality of potential courses that does not correspond to potential course network statistics that indicate the unacceptable rate of dropped calls. 15. The system of 16. A non-transitory computer-readable medium, the non-transitory computer-readable medium having stored thereon computer-executable instructions for: predicting a course of a mobile device; collecting network statistics on network coverage areas surrounding the course; predicting that the course will traverse an area with an unacceptable rate of dropped calls by determining that a rate of dropped calls in the network coverage areas surrounding the course exceeds a predetermined threshold; and in response to predicting that the course will traverse an area with the unacceptable rate of dropped calls, providing to the mobile an indication of a predicted loss of network connectivity. 17. The non-transitory computer-readable medium of 18. The non-transitory computer-readable medium of 19. The non-transitory computer-readable medium of collecting current location network statistics on a current location network coverage area; determining a current probability of a dropped call based on the current location network statistics; and providing to the mobile device the current probability of a dropped call. 20. The non-transitory computer-readable medium of 21. A mobile communications device, comprising: a transceiver coupled to said antenna for transmitting to, and receiving transmissions from, a wireless network; and a processor configured to: predicting a course of the mobile communications device; collecting course network statistics on network coverage areas surrounding the course; predicting that the course will traverse an area with an unacceptable rate of dropped calls by determining that a rate of dropped calls in the network coverage areas surrounding the course exceeds a predetermined threshold; and in response to predicting that the course will traverse an area with the unacceptable rate of dropped calls, instructing a display to display an indication of a predicted loss of network connectivity. 22. The mobile communications device of 23. The mobile communications device of 24. The mobile communications device of 25. The mobile communications device of The technical field generally relates to communications systems and more specifically relates to systems and methods for predicting loss of wireless signal coverage and providing notification to a user prior to loss of coverage. Today, mobile communications devices, such as mobile telephones, are commonplace. Yet despite their near-ubiquity, there are still many areas where mobile communications devices lack coverage or certain wireless services are unavailable, or coverage or service is not available from their home provider. The user of a device usually finds out about a lack of coverage when they move out of the coverage area and drop a call or loss a service. By the time the call or service is dropped, it is too late for the user to take steps to remain in the coverage area or take other actions in preparation for the termination of the ongoing communication. Current technologies do not predict for a user when the mobile device the user is operating is likely to lose network coverage or access to a network service, nor do they provide to a user notification of impending loss of coverage or service. Current technologies also do not provide to a user suggestions of how to deal with the call or communication before it is lost, or recommendations of actions which may allow the user to remain in the coverage area. Notifications of impending call drops, impending loss of connectivity to a wireless network or a particular wireless service, or traversing an area with other specific characteristics are provided to a user of a mobile device. The determination of an impending call drop or service loss may be made based on network statistics collected on areas around the predicted path or current location of the user and/or the mobile device. An estimated time and probability of loss of connectivity may be provided to the user. Along with the notification, suggested alternate routes may be provided to the user that keep the mobile device in higher quality network connectivity areas, thus reducing the probability of loss of network connectivity. In one embodiment, a user can provide the user's destination to a wireless network or device and be provided with a course from the user's current location to the user's desired destination that keeps the user within quality network connectivity areas. In another embodiment, network connectivity notifications are issued through a navigation system, and alternate course are provided through the navigation system, giving the user turn-by-turn directions to the user's destination via the alternate course. Other objects, features, and advantages of the present invention will become apparent after review of the Brief Description of the Drawings, Detailed Description, and the Claims. The foregoing Summary, as well as the following Detailed Description, is better understood when read in conjunction with the appended drawings. In order to illustrate the present disclosure, various aspects of the disclosure are shown. However, the disclosure is not limited to the specific aspects discussed. In the drawings: The subject matter of the described embodiments is described with specificity to meet statutory requirements. However, the description itself is not intended to limit the scope of this patent. Rather, the inventors have contemplated that the claimed subject matter might also be embodied in other ways, to include different steps or elements similar to the ones described in this document, in conjunction with other present or future technologies. Moreover, although the term “step” may be used herein to connote different aspects of methods employed, the term should not be interpreted as implying any particular order among or between various steps herein disclosed unless and except when the order of individual steps is explicitly described. It should be understood that the explanations illustrating data or signal flows are only exemplary. The following description is illustrative and non-limiting to any one aspect. For the purposes of the present disclosure, a user's home network is one or more networks operated by one or more telecommunications providers with which the user has contracted or otherwise arranged to provide mobile communications services. A home network may be operated by a single telecommunications provider or by a group of affiliated providers. The user's device may be manufactured for use specifically in the home network, and may be provided to the user by the home network provider. For the purposes of the present disclosure, a roaming network is any network other than a user's home network in which the user's mobile device may operate. A roaming network is typically operated by a telecommunications provider with which the user has no direct contract or arrangement. When using a roaming network, a user typically will be charged higher network usage fees than when using the user's home network. A user of a mobile device may find it helpful to receive a notification that the user is soon to be leaving the wireless network coverage area. Such a notification may be helpful when the user is leaving the coverage area of the user's home network and going into roaming mode, or otherwise entering the coverage area of another network where the user's home network does not provide coverage. The notification may also be useful when the user is leaving the home network and going into an area with no wireless network coverage. In either situation, the user may experience a dropped call or interrupted communications. If the user is notified in advance that a call is likely to drop soon or a communication is soon to be interrupted, the user may be able to take actions in preparation for the interruption of the call or communication, or to prevent the interruption. Such actions may include altering the user's course of travel to remain within the wireless network coverage area and ending the call or communication intentionally, perhaps scheduling a time to resume the call or communication. A user may also find it helpful to receive a notification that one or more services are likely to become unavailable. A network may not be able to provide all available services in all areas covered by the network. For example, data services may not be available in an area that is capable of providing voice services. A user performing data communications may want to know that data service is not going to be available if the user's current course is maintained. In some situations, paging services may be maintained while voice and data services may not be available. Any other combination of available and unavailable services are contemplated, and the present subject matter may be used to address any of those situations. A device may also use information about impending loss of services. For example, a mobile device may detect or otherwise be made aware of an impending loss of service and automatically reduce power consumption, in one embodiment using a minimal amount of power to remain in contact with a network. In another embodiment, the device may automatically power off when detecting an impending loss of connectivity. Any actions that may be automatically taken by a mobile device based on an indication of an impending loss of one or more services or connectivity are contemplated as within the scope of the present disclosure. Mobile device 120 may be any wireless mobile communications device that communicates with other devices using a wireless network. Examples of such devices include, but are not limited to, mobile telephones, mobile computers, personal data assistants (“PDA”s), navigation systems, and wirelessly networked computers. Any device which can communicate with any other device by communicating, at least in part, wirelessly with a wireless network is contemplated as being within the scope of the present disclosure. Mobile device 120 may include global positioning system (“GPS”) components and/or software, enabling it to communicate with GPS satellites and determine its own location, speed, direction, and the current time. Mobile device 120 may be constructed such that it can communicate GPS-derived location and direction information to a telecommunications network, other devices, and/or user 110. Mobile device 120 may include other means of determining its own location, speed, and/or direction, including receiving such information from a telecommunications network, or deriving such information from the use of technologies well known to those skilled in the art that utilize one or more cellular towers and analysis of signal strength, time delays, angles of arrival, or other measurements to determine a device's location. Such locating means include, but are not limited to, triangulation and hyperbolic fixing schemes. Such locating means may use time delays between a mobile device and two or more cellular towers to determine a relatively precise location for the mobile device. The various means and methods of locating a device using cellular network measurements, including the use of time delay and/or signal strength to determine the location, speed, and/or direction of a mobile device, are well known to those skilled in the art, and therefore will not be recited herein. Any means of determining a mobile device's current or past location, speed, and/or direction are contemplated as within the scope of the present disclosure. Area 100 is serviced, at least in part, by wireless provider network 190. A wireless provider provides network facilities to operate a wireless network in the form of wireless provider network 190 within area 100. Wireless provider network 190 may be any network that facilitates wireless communications, and any such network is contemplated as within the present disclosure. Examples of such networks include telephony radio networks such as global system for mobile communication (“GSM”) networks and code division multiple access (“CDMA”) networks, and wireless computer networks such as Wi-Fi and IEEE 802.11 networks. Area 100 is overlaid by virtual grid 160. Grid 160 is not physically present in area 100, but serves as a logical tool for referencing sections of area 100. Grid 160 divides area 100 into sections that may be easily referenced by grid coordinates. For example, user 110 is beginning his journey at origination location 130, which is located in section A4 of grid 160. User 110 is traveling to destination location 140, which is located in section C1 of grid 160. Grid 160 serves only as an example of how an area, such as area 100, may be logically divided and referenced. Another example of how a geographical area may be divided and referenced is by ZIP codes. Yet another example of how a geographical area may be divided and referenced, particularly one served by a wireless telecommunications network, is by tower locations. For instance, the coverage area of each tower may be designated as a geographical division. Any other method or means of creating and referencing sections or portions of a geographical area are contemplated as within the scope of the present disclosure. In one embodiment of the present subject matter, user 110 is provided with wireless telecommunications services by wireless provider network 190, which enables mobile device 120 to communicate wirelessly with wireless provider network 190 in at least some portions of area 100. Such wireless telecommunications services may include, but are not limited to, voice, data, paging, email, Internet access, or any other telecommunications service. In this exemplary embodiment, wireless provider network 190 may maintain historical wireless network statistics on the sections of area 100 where it provides wireless service. In another alternative embodiment, mobile device 120 may maintain historical wireless network statistics. Such statistics may be compiled and stored by mobile device 120 itself, or received from wireless provider network 190 and stored on mobile device 120. One example of such a statistic may be the amount of dropped calls. In one embodiment, the amount of dropped calls may be kept as a percentage of calls serviced in each area. In another embodiment, the amount of dropped calls may be a total amount over a predetermined time frame, for example the total number of dropped calls over the past 30 days in a section. In yet another embodiment, the network statistic may be the number of complaints received about a section of area 100. In still another embodiment, the network statistic may be the data rate typically experienced by data users in each area. In another embodiment, the network statistic may be the rate of lost data connections in each area. All other network statistics are contemplated as within the scope of the present disclosure. Any other methods or means of collecting and maintaining historical network statistics are contemplated as within the scope of the present disclosure. In one embodiment, user 110 is traveling along original course 150 from origination location 130 to destination location 140 while using mobile device 120 to have a telephone conversation. In alternative embodiments, user 110 may be using mobile device 120 to send and/or receive text messages, send and/or receive emails, browse the internet, access other computer networks, or perform or participate in any other form of telecommunications. Any form of communications that may be performed using a wireless device or enabled over a wireless network is contemplated as within the scope of the present disclosure. Original course 150 may be a path of travel, along public roads, walkways, private areas, or any other path of travel which user 110 may be traveling. Original course 150 may or may not have coverage by wireless provider 190, or may include areas or sections that have coverage as well as areas or sections that do not. Any path of travel is contemplated as within the scope of the present disclosure. Wireless provider network 190 may track the course of user 110's travels through information gathered from mobile device 120. In one embodiment, mobile device 120 may be equipped with GPS components, and may periodically report its GPS coordinates to wireless provider network 190. In another embodiment, wireless provider network 190 uses triangulation to periodically determine the location of user 110. Other means and methods of determining a wireless user's location are contemplated. After receiving one or more of such reports, wireless provider network 190 may predict one or more future courses of user 110. For example, if wireless provider network 190 receives a report that user 110 is in section A4 of area 100, followed by a report that user 110 is in section A3 of area 100, then wireless provider network 190 may predict that user 110 will soon be in section A2 of area 100. Alternatively, wireless provider network 190 may use received GPS coordinates of user 110 in conjunction with available mapping software to detect that user 110 is traveling on a road, and predict that user 110 will remain on the road. For example, if user 110 is on an interstate which follows the path of original course 150, wireless provider network 190 may predict that user 110 will go through sections A4, A3, A2, A1, B1, and C1 of area 100, in that order. Many methods and means of course prediction are available and known to those skilled in the art, and will not be recited herein. Any means or methods of predicting the future path of a mobile device user based on past location information may be used and are contemplated as within the scope of the present disclosure. After predicting at least one future course for user 110, wireless provider network 190 may then compare the available wireless network statistics to the predicted course. For example, if wireless provider network 190 predicts that user 110 will go through sections A3, A2, and A1 of area 100, then wireless provider network 190 may obtain the dropped call statistics for each of those sections. Wireless provider network 190 may then examine the statistics and determine if any of these sections within the predicted course have unacceptable rates of dropped calls. Alternatively, wireless provider network 190 may obtain the dropped data connection statistics for each section and determine is any section within the predicted course has an unacceptable rate of lost data connections. Any other network statistic may be obtained and evaluated, and all such statistics are contemplated as within the scope of the present disclosure. It is contemplated that any useful measurement of network statistics or threshold of network performance may be used to determine acceptability. For example, wireless provider network 190 may set the unacceptable dropped call or dropped data connection threshold at 50%. In this example, if section A1 of area 100 has an 80% dropped call rate, that is, 80% of calls taking place in section A1 are dropped, then wireless provider network 190 may issue a notification to user 110 via mobile device 120 that the current communication is likely to be dropped or a particular service is likely to be lost if user 110 continues on the predicted course. In an alternative embodiment, mobile device 120 may determine its own location and predict its own course, and therefore the course of user 110. Any means and methods for a wireless device to predict its own course are contemplated as within the scope of the present disclosure. In an embodiment where mobile device 120 maintains or stores network statistics, mobile device 120 may then compare the available wireless network statistics to the predicted course. Mobile device 120 may then examine the statistics and determine if any of the sections within the predicted course have unacceptable rates of dropped calls. If mobile device 120 determines that the current course may encounter areas or sections with unacceptable rates of dropped calls, mobile device 120 may issue a notification to user 110 that the current communication is likely to be dropped if user 110 continues on the predicted course. The notification provided to user 110 may be any of the known types of notifications currently in use with mobile devices, or any type of notification that alerts user 110 that the communication is soon to be dropped. In one embodiment, referring now to In another embodiment, a software application may be installed and running on mobile device 120 which provided notifications to user 110 regarding call drop or service loss status. Message 220 illustrated in Other means and methods of notifying user 110 may be used. For example, a voice message may be injected into the stream of conversation, in one embodiment only audible to user 110, that informs user 110 that the call is likely to be dropped or service likely to be lost in the estimated time. Alternatively, an email may be sent to mobile device 120 alerting user 110 of the impending call drop or service loss. In yet another alternative a page maybe sent to mobile device 120 information user 110 that voice service may soon be lost. Any other means or methods of effectively conveying to user 110 that a service may be lost are contemplated as within the scope of the present disclosure. In one embodiment, the notification of impending call drop or service loss is repeatedly sent to mobile device 120 as long as mobile device 120 continues to be actively participating in a communication. This will serve as a reminder to user 110 that steps should be taken to gracefully terminate the call or communication soon, or to take other steps to ensure that mobile device 120 stays within the coverage area of wireless provider network 190. In another embodiment, the probability of the call dropping or service loss and the estimated time of drop or loss is continuously updated, for example in real-time or near real-time at predetermined time increments, so that user 110 can be made aware of the current status of a potential call drop or loss of service. In another embodiment, the notification may be issued when mobile device 120 is not active in a wireless communication. Such a notification may serve to notify user 110 that mobile device 120 will be in roaming mode, without one or more wireless services, or without wireless network coverage soon. This may be useful to user 110 in the event that user 110 needs to make a call or transmit some other form of communication, or if user 110 would like to stay within range of mobile device 120's home network. The notification may be coupled with suggestions for alternate courses that would allow user 110 to remain within wireless provider network 190's coverage area, or it may be coupled with options to acquire such alternate course suggestions. In In another embodiment, the notification may be coupled with an option for user 110 to provide destination location 140 to wireless provider network 190. By obtaining user 110's destination location 140, wireless provider 190 can determine a more precise changed course 180 that will allow user 110 to travel through areas with higher quality or more complete wireless network coverage. Changed course 180 may be determined in part by examining network statistics to derive a course that remains in higher quality coverage sections of area 100. Such network statistics may be compared to potential courses that lead to the predicted destination to determine the shortest, or otherwise optimal, course or courses which travel through contiguous quality coverage areas or sections or areas or sections that offer the services of interest to user 110. For example, after predicting or learning that user 110's destination location 140 is in section C1 of area 100, wireless provider network 190 may determine that, while user 110's original course 150 brings user 110 through section A1 of area 100 which has an 80% dropped call rate, if user 110 were to travel from section A2 through section B2 and C2 on the way to section C1, following changed course 180, the likelihood of the call dropping would be much less. This may be because sections B2 and C2 have much lower dropped call rates than section A1. In another embodiment, directions for a course that keeps user 110 within the coverage area of wireless provider network 190 may be provided by default to user 110 through mobile device 120, and without requiring user 110 to take any actions to obtain such directions. In yet another embodiment, the directions provided to user 110 may be cardinal or ordinal directions. For example, the suggested alternate course directions may be to go North, West, or Southeast. In an alternative embodiment, user 110 provides destination location 140 to wireless provider network 190 before beginning to travel on original course 150. Destination location 140 maybe provided to wireless provider network 190 in any effective manner, including inputting it in mobile device 120 and transmitting it to wireless provider network 190 through the use of a software application loaded on mobile device 120, or through a web page or web form viewed or completed via mobile device 120. Any other means or methods of providing destination location 140 to wireless provider network 190 is contemplated as within the scope of the present disclosure. User 110 may also provide origination location 130 to wireless provider network 190, or wireless provider network 190 may derive origination location 130 via means discussed herein, including by acquiring the GPS coordinates of mobile device 120 or locating mobile device 120 through triangulation. In one embodiment, destination location 140 may be provided to a GPS capable device, such as a navigation system, which is wirelessly enabled. Referring now to Alternatively, navigation system 300 may be instructed or configured to provide coverage notifications as described herein with respect to At block 420, the location information, or any other relevant information, gathered at block 410 is stored. Such information may be stored on a server, computer, network device, or on any other device capable of maintaining a record of data. Alternatively, such information may be stored on the mobile device itself. Along with the location or other gathered information, other helpful information may be stored, such as a timestamp and mobile device identifier. Any useful additional information and any means of storing such information is contemplated as within the scope of the present disclosure. At block 430, a determination is made as to whether, given the location information gathered and stored at blocks 410 and 420, a prediction can be made about the course of travel of the mobile device. For example, if only one piece of location information has been obtained, then it may be difficult to predict the mobile device's current course. Alternatively, one piece of location information coupled with direction and speed data may provide sufficient data to predict a course. In another alternative, a threshold may be set limiting course prediction to only situations where a minimum amount of location data has been acquires, such as five location data points. Any means or methods of determining whether sufficient data exists to predict a course are contemplated. This determination may be made on a mobile device, such as mobile device 120, or on a device or devices within a telecommunications network. If it is determined that sufficient data does not exist to predict a course, then further data is collected by returning to block 410. If a course prediction is possible, then at block 440, the course is predicted. As discussed herein, this may be accomplished in any effective way. For example, course prediction may be strictly directional, and the predicted course may be based solely on the current direction of travel of the mobile device. Alternatively, course prediction may be based on maps, such as those available to navigation systems, and presume that the course of travel follows the current road on which the user and the mobile device are traveling. Other means of course prediction are known to those skilled in the art, and all such means and methods are contemplated as within the scope of the present disclosure. Course prediction may be performed on a mobile device, such as mobile device 120, or on a device or devices within a telecommunications network. At block 450, a determination is made about whether the predicted course takes the user through an area with an unacceptable potential for dropped calls or loss of a wireless service. As described above, many methods and means of determining whether an area has an unacceptable rate of service loss are possible and known to those skilled in the art, and all such methods and means are contemplated as within the scope of the present disclosure. This determination may be made on a mobile device itself, such as mobile device 120, or on a device or devices within a telecommunications network. If no unacceptable call drop or service loss rates are determined for the predicted course, location information gathering resuming by returning to block 410. If unacceptable call drop or service loss rates are found over the predicted course, then, at block 460, a notification is issued. As described above, the notification may be a text message, an email, a voice message, a page, or may be provided to the user through an application operating on the user's mobile device. Any other means or methods of providing a notification may be employed, and all are contemplated as within the scope of the present disclosure. The notification may be generated on a device within a telecommunications network and delivered to a mobile device, or it may be originate on a mobile device. Furthermore, other options may be offered or provided to the user, such as alternative directions. All of the methods and processes described herein in regard to providing notification to a user about pending call drops based on the user's predicted course of travel may be performed entirely on the mobile device, entirely on the provider network, or using a combination of the two. Those skilled in the are will recognize that the present subject matter maybe applied to any network characteristic that may vary within a coverage area. Notifications may be provided to any user of a wireless network and/or device that alert the user to a change in any particular network characteristic or quality. All such characteristics, network qualities, and notifications are contemplated as within the scope of the present disclosure. Those skilled in the art will also recognize that notifications and/or indications of impending loss of one or more services or connectivity to a network may also be used by a mobile device to make adjustments on the mobile device. For example, a mobile device may automatically adjust power to accommodate a weaker connection to a network, or a loss of a connection to a network. Any other adjustments triggered by a detected network characteristic may be initiated by a mobile device, and all such adjustments are contemplated as within the scope of the present disclosure. The processor 58 comprises a processing portion 60, a memory portion 62, and an input/output portion 64. The processing portion 60, memory portion 62, and input/output portion 64 are coupled together (coupling not shown in The processor 58 can be implemented as a client processor and/or a server processor. In a basic configuration, the processor 58 can include at least one processing portion 60 and memory portion 62. The memory portion 62 can store any information utilized in conjunction with determining or generating mobile device location information and course prediction and generation and transmitting or receiving such information as well as user notifications. For example, as described above, the memory portion is capable of storing user device location information, predicted and alternate courses, applications and software to generate or retrieve user device location information and predicted and alternate courses, or any combination thereof. Depending upon the exact configuration and type of processor, the memory portion 62 can be volatile (such as RAM) 66, non-volatile (such as ROM, flash memory, etc.) 68, or a combination thereof. The processor 58 can have additional features/functionality. For example, the processor 58 can include additional storage (removable storage 70 and/or non-removable storage 72) including, but not limited to, magnetic or optical disks, tape, flash, smart cards or a combination thereof. Computer storage media, such as memory portion 62, 70, 72, 66, and 68, include volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules, or other data. Computer storage media include, but are not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, universal serial bus (USB) compatible memory, smart cards, or any other medium which can be used to store the desired information and which can be accessed by the processor 58. Any such computer storage media can be part of the processor 58. The processor 58 can also contain the communications connection(s) 80 that allow the processor 58 to communicate with other devices, for example through wireless provider network 190. Communications connection(s) 80 is an example of communication media. Communication media typically embody computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media. The term “modulated data signal” means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection as might be used with a land-line telephone, and wireless media such as acoustic, RF, infrared, cellular, and other wireless media. The term computer readable media as used herein includes both storage media and communication media. The processor 58 also can have input device(s) 76 such as keyboard, keypad, mouse, pen, voice input device, touch input device, etc. Output device(s) 74 such as a display, speakers, printer, etc. also can be included. The following description sets forth some exemplary telephony radio networks and non-limiting operating environments in which caller identification and caller geographical location information can be implemented. The below-described operating environments should be considered non-exhaustive, however, and thus the below-described network architectures merely show how caller identification with caller geographical location information can be incorporated into existing network structures and architectures. It can be appreciated, however, that potential call drop notification and course prediction and generation can be incorporated into existing and/or future alternative architectures for communication networks as well. The global system for mobile communication (“GSM”) is one of the most widely utilized wireless access systems in today's fast growing communication environment. The GSM provides circuit-switched data services to subscribers, such as mobile telephone or computer users. The General Packet Radio Service (“GPRS”), which is an extension to GSM technology, introduces packet switching to GSM networks. The GPRS uses a packet-based wireless communication technology to transfer high and low speed data and signaling in an efficient manner. The GPRS attempts to optimize the use of network and radio resources, thus enabling the cost effective and efficient use of GSM network resources for packet mode applications. As one of ordinary skill in the art can appreciate, the exemplary GSM/GPRS environment and services described herein also can be extended to 3G services, such as Universal Mobile Telephone System (“UMTS”), Frequency Division Duplexing (“FDD”) and Time Division Duplexing (“TDD”), High Speed Packet Data Access (“HSPDA”), cdma2000 1x Evolution Data Optimized (“EVDO”), Code Division Multiple Access-2000 (“cdma2000”), Time Division Synchronous Code Division Multiple Access (“TD-SCDMA”), Wideband Code Division Multiple Access (“WCDMA”), Enhanced Data GSM Environment (“EDGE”), International Mobile Telecommunications-2000 (“IMT-2000”), Digital Enhanced Cordless Telecommunications (“DECT”), etc., as well as to other network services that become available in time. In this regard, the techniques of potential call drop notification and course prediction and generation can be applied independently of the method for data transport, and do not depend on any particular network architecture, or underlying protocols. Generally, there can be four different cell sizes in a GSM network, referred to as macro, micro, pico, and umbrella cells. The coverage area of each cell is different in different environments. Macro cells can be regarded as cells in which the base station antenna is installed in a mast or a building above average roof top level. Micro cells are cells whose antenna height is under average roof top level. Micro-cells are typically used in urban areas. Pico cells are small cells having a diameter of a few dozen meters. Pico cells are used mainly indoors. On the other hand, umbrella cells are used to cover shadowed regions of smaller cells and fill in gaps in coverage between those cells. A mobile switching center can be connected to a large number of base station controllers. At MSC 771, for instance, depending on the type of traffic, the traffic may be separated in that voice may be sent to Public Switched Telephone Network (“PSTN”) 782 through Gateway MSC (“GMSC”) 773, and/or data may be sent to SGSN 776, which then sends the data traffic to GGSN 778 for further forwarding. When MSC 771 receives call traffic, for example, from BSC 766, it sends a query to a database hosted by SCP 772. The SCP 772 processes the request and issues a response to MSC 771 so that it may continue call processing as appropriate. The HLR 774 is a centralized database for users to register to the GPRS network. HLR 774 stores static information about the subscribers such as the International Mobile Subscriber Identity (“IMSI”), subscribed services, and a key for authenticating the subscriber. HLR 774 also stores dynamic subscriber information such as the current location of the mobile subscriber. Associated with HLR 774 is AuC 775. AuC 775 is a database that contains the algorithms for authenticating subscribers and includes the associated keys for encryption to safeguard the user input for authentication. In the following, depending on context, the term “mobile subscriber” sometimes refers to the end user, such user 110, and sometimes to the actual portable device, such as mobile device 120 or navigation system 300, used by an end user of the mobile cellular service. When a mobile subscriber turns on his or her mobile device, the mobile device goes through an attach process by which the mobile device attaches to an SGSN of the GPRS network. In After attaching itself with the network, mobile subscriber 755 then goes through the authentication process. In the authentication process, SGSN 776 sends the authentication information to HLR 774, which sends information back to SGSN 776 based on the user profile that was part of the user's initial setup. The SGSN 776 then sends a request for authentication and ciphering to mobile subscriber 755. The mobile subscriber 755 uses an algorithm to send the user identification and password to SGSN 776. The SGSN 776 uses the same algorithm and compares the result. If a match occurs, SGSN 776 authenticates mobile subscriber 755. Next, the mobile subscriber 755 establishes a user session with the destination network, corporate network 789, by going through a Packet Data Protocol (“PDP”) activation process. Briefly, in the process, mobile subscriber 755 requests access to the Access Point Name (“APN”), for example, UPS.com (e.g., which can be corporate network 789 in Once activated, data packets of the call made by mobile subscriber 755 can then go through radio access network 760, core network 770, and interconnect network 780, in a particular fixed-end system or Internet 784 and firewall 788, to reach corporate network 789. Thus, network elements that can invoke the functionality of caller identification with caller geographical location information can include but are not limited to Gateway GPRS Support Node tables, Fixed End System router tables, firewall systems, VPN tunnels, and any number of other network elements as required by the particular digital network. The GSM core network 801 also includes a Mobile Switching Center (MSC) 808, a Gateway Mobile Switching Center (GMSC) 810, a Home Location Register (HLR) 812, Visitor Location Register (VLR) 814, an Authentication Center (AuC) 818, and an Equipment Identity Register (EIR) 816. The MSC 808 performs a switching function for the network. The MSC also performs other functions, such as registration, authentication, location updating, handovers, and call routing. The GMSC 810 provides a gateway between the GSM network and other networks, such as an Integrated Services Digital Network (ISDN) or Public Switched Telephone Networks (PSTNs) 820. Thus, the GMSC 810 provides interworking functionality with external networks. The HLR 812 is a database that contains administrative information regarding each subscriber registered in a corresponding GSM network. The HLR 812 also contains the current location of each MS. The VLR 814 is a database that contains selected administrative information from the HLR 812. The VLR contains information necessary for call control and provision of subscribed services for each MS currently located in a geographical area controlled by the VLR. The HLR 812 and the VLR 814, together with the MSC 808, provide the call routing and roaming capabilities of GSM. The AUC 816 provides the parameters needed for authentication and encryption functions. Such parameters allow verification of a subscriber's identity. The EIR 818 stores security-sensitive information about the mobile equipment. A Short Message Service Center (SMSC) 809 allows one-to-one Short Message Service (SMS) messages to be sent to/from the MS 802. A Push Proxy Gateway (PPG) 811 is used to “push” (i.e., send without a synchronous request) content to the MS 802. The PPG 811 acts as a proxy between wired and wireless networks to facilitate pushing of data to the MS 802. A Short Message Peer to Peer (SMPP) protocol router 813 is provided to convert SMS-based SMPP messages to cell broadcast messages. SMPP is a protocol for exchanging SMS messages between SMS peer entities such as short message service centers. The SMPP protocol is often used to allow third parties, e.g., content suppliers such as news organizations, to submit bulk messages. To gain access to GSM services, such as voice, data, and short message service (SMS), the MS first registers with the network to indicate its current location by performing a location update and IMSI attach procedure. The MS 802 sends a location update including its current location information to the MSC/VLR, via the BTS 804 and the BSC 806. The location information is then sent to the MS's HLR. The HLR is updated with the location information received from the MSC/VLR. The location update also is performed when the MS moves to a new location area. Typically, the location update is periodically performed to update the database as location updating events occur. The GPRS network 830 is logically implemented on the GSM core network architecture by introducing two packet-switching network nodes, a serving GPRS support node (SGSN) 832, a cell broadcast and a Gateway GPRS support node (GGSN) 834. The SGSN 832 is at the same hierarchical level as the MSC 808 in the GSM network. The SGSN controls the connection between the GPRS network and the MS 802. The SGSN also keeps track of individual MS's locations and security functions and access controls. A Cell Broadcast Center (CBC) 833 communicates cell broadcast messages that are typically delivered to multiple users in a specified area. Cell Broadcast is one-to-many geographically focused service. It enables messages to be communicated to multiple mobile phone customers who are located within a given part of its network coverage area at the time the message is broadcast. The GGSN 834 provides a gateway between the GPRS network and a public packet network (PDN) or other IP networks 836. That is, the GGSN provides interworking functionality with external networks, and sets up a logical link to the MS through the SGSN. When packet-switched data leaves the GPRS network, it is transferred to an external TCP-IP network 836, such as an X.25 network or the Internet. In order to access GPRS services, the MS first attaches itself to the GPRS network by performing an attach procedure. The MS then activates a packet data protocol (PDP) context, thus activating a packet communication session between the MS, the SGSN, and the GGSN. In a GSM/GPRS network, GPRS services and GSM services can be used in parallel. The MS can operate in one three classes: class A, class B, and class C. A class A MS can attach to the network for both GPRS services and GSM services simultaneously. A class A MS also supports simultaneous operation of GPRS services and GSM services. For example, class A mobiles can receive GSM voice/data/SMS calls and GPRS data calls at the same time. A class B MS can attach to the network for both GPRS services and GSM services simultaneously. However, a class B MS does not support simultaneous operation of the GPRS services and GSM services. That is, a class B MS can only use one of the two services at a given time. A class C MS can attach for only one of the GPRS services and GSM services at a time. Simultaneous attachment and operation of GPRS services and GSM services is not possible with a class C MS. A GPRS network 830 can be designed to operate in three network operation modes (NOM1, NOM2 and NOM3). A network operation mode of a GPRS network is indicated by a parameter in system information messages transmitted within a cell. The system information messages dictates a MS where to listen for paging messages and how signal towards the network. The network operation mode represents the capabilities of the GPRS network. In a NOM1 network, a MS can receive pages from a circuit switched domain (voice call) when engaged in a data call. The MS can suspend the data call or take both simultaneously, depending on the ability of the MS. In a NOM2 network, a MS may not received pages from a circuit switched domain when engaged in a data call, since the MS is receiving data and is not listening to a paging channel. In a NOM3 network, a MS can monitor pages for a circuit switched network while received data and vise versa. The IP multimedia network 838 was introduced with 3GPP Release 5, and includes an IP multimedia subsystem (IMS) 840 to provide rich multimedia services to end users. A representative set of the network entities within the IMS 840 are a call/session control function (CSCF), a media gateway control function (MGCF) 846, a media gateway (MGW) 848, and a master subscriber database, called a home subscriber server (HSS) 850. The HSS 850 may be common to the GSM network 801, the GPRS network 830 as well as the IP multimedia network 838. The IP multimedia system 840 is built around the call/session control function, of which there are three types: an interrogating CSCF (I-CSCF) 843, a proxy CSCF (P-CSCF) 842, and a serving CSCF (S-CSCF) 844. The P-CSCF 842 is the MS's first point of contact with the IMS 840. The P-CSCF 842 forwards session initiation protocol (SIP) messages received from the MS to an SIP server in a home network (and vice versa) of the MS. The P-CSCF 842 may also modify an outgoing request according to a set of rules defined by the network operator (for example, address analysis and potential modification.) The I-CSCF 843, forms an entrance to a home network and hides the inner topology of the home network from other networks and provides flexibility for selecting an S-CSCF. The I-CSCF 843 may contact a subscriber location function (SLF) 845 to determine which HSS 850 to use for the particular subscriber if multiple HSS's 850 are present. The S-CSCF 844 performs the session control services for the MS 802. This includes routing originating sessions to external networks and routing terminating sessions to visited networks. The S-CSCF 844 also decides whether an application server (AS) 852 is required to receive information on an incoming SIP session request to ensure appropriate service handling. This decision is based on information received from the HSS 850 (or other sources, such as an application server 852). The AS 852 also communicates to a location server 856 (e.g., a Gateway Mobile Location Center (GMLC)) that provides a position (e.g., latitude/longitude coordinates) of the MS 802. The HSS 850 contains a subscriber profile and keeps track of which core network node is currently handling the subscriber. It also supports subscriber authentication and authorization functions (AAA). In networks with more than one HSS 850, a subscriber location function provides information on the HSS 850 that contains the profile of a given subscriber. The MGCF 846 provides interworking functionality between SIP session control signaling from the IMS 840 and ISUP/BICC call control signaling from the external GSTN networks (not shown.) It also controls the media gateway (MGW) 848 that provides user-plane interworking functionality (e.g., converting between AMR- and PCM-coded voice.) The MGW 848 also communicates with other IP multimedia networks 854. Push to Talk over Cellular (PoC) capable mobile phones register with the wireless network when the phones are in a predefined area (e.g., job site, etc.) When the mobile phones leave the area, they register with the network in their new location as being outside the predefined area. This registration, however, does not indicate the actual physical location of the mobile phones outside the pre-defined area. While example embodiments of potential call drop notification and course prediction and generation have been described in connection with various computing devices, the underlying concepts can be applied to any computing device or system capable of implementing predetermined potential call drop notification and course prediction and generation. The various techniques described herein can be implemented in connection with hardware or software or, where appropriate, with a combination of both. Thus, the methods and apparatus for determining or generating mobile device location information and course prediction and generation and transmitting or receiving such information as well as user notifications, or certain aspects or portions thereof, can take the form of program code (i.e., instructions) embodied in tangible media, such as floppy diskettes, CD-ROMs, hard drives, or any other machine-readable storage medium, wherein, when the program code is loaded into and executed by a machine, such as a computer, the machine becomes an apparatus for implementing mobile device location information and course prediction and generation. In the case of program code execution on programmable computers, the computing device will generally include a processor, a storage medium readable by the processor (including volatile and non-volatile memory and/or storage elements), at least one input device, and at least one output device. The program(s) can be implemented in assembly or machine language, if desired. In any case, the language can be a compiled or interpreted language, and combined with hardware implementations. The methods and apparatus for potential call drop notification and course prediction and generation also can be practiced via communications embodied in the form of program code that is transmitted over some transmission medium, such as over electrical wiring or cabling, through fiber optics, or via any other form of transmission, wherein, when the program code is received and loaded into and executed by a machine, such as an EPROM, a gate array, a programmable logic device (PLD), a client computer, or the like, the machine becomes an apparatus for implementing potential call drop notification and course prediction and generation. When implemented on a general-purpose processor, the program code combines with the processor to provide a unique apparatus that operates to invoke the functionality of potential call drop notification and course prediction and generation. Additionally, any storage techniques used in connection with potential call drop notification and course prediction and generation can invariably be a combination of hardware and software. While potential call drop notification and course prediction and generation has been described in connection with the various embodiments of the various figures, it is to be understood that other similar embodiments can be used or modifications and additions can be made to the described embodiment for performing the same function of providing potential call drop notification and course prediction and generation without deviating therefrom. For example, one skilled in the art will recognize that a system for implementing potential call drop notification and course prediction and generation as described may apply to any environment, whether wired or wireless, and may be applied to any number of devices connected via a communications network and interacting across the network. Therefore, potential call drop notification and course prediction and generation should not be limited to any single embodiment, but rather should be construed in breadth and scope in accordance with the appended claims.
<urn:uuid:bdddb4d4-f6e3-4191-94a2-1cdedef638ec>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.google.com/patents/US8180375?dq=5166694", "date": "2014-09-01T22:02:37", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535920694.0/warc/CC-MAIN-20140909055348-00489-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9163427352905273, "token_count": 11431, "score": 2.515625, "int_score": 3 }
At least 5 percent of American adults -- 12 million people -- are misdiagnosed in outpatient settings every year, and half of these errors could be harmful, a new study indicates. The findings, from an analysis of data from several published studies, should lead to greater efforts to monitor and reduce the number of misdiagnoses that occur in primary care, said Dr. Hardeep Singh, at Baylor College of Medicine, and colleagues. The researchers noted that most efforts to improve patient safety have focused on hospitalized patients and on issues such as medication errors, infections and falls. However, the researchers added, most diagnoses are made in outpatient facilities. There have been no reliable estimates of how often misdiagnoses occur in outpatient settings, making it difficult to develop methods of reducing such errors, according to the authors of the study published online April 16 in the journal BMJ Quality & Safety. The researchers' review of the published studies involving U.S. adults showed that outpatient facilities have a misdiagnosis rate of just over 5 percent, or about one in 20 patients. Applied to the U.S. population, that means that 12 million adults are misdiagnosed in outpatient settings each year, according to a journal news release. The results should be used by patient advocates, health care organizations, policymaker and researchers to seek ways to reduce the number of such misdiagnoses, the study authors concluded. Editor's Note: Prostate Cancer Is Almost Epidemic - Prevent It
<urn:uuid:3c2b2a84-aa00-4580-a2ca-7db70f4cb55c>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.newsmaxhealth.com/Health-News/outpatients-misdiagnosis-medical-mistakes/2014/04/17/id/566203/", "date": "2014-09-01T20:59:50", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535920694.0/warc/CC-MAIN-20140909055348-00489-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9482473731040955, "token_count": 301, "score": 2.53125, "int_score": 3 }
Get the details behind our redesign "In MedL. rithmus was used of accentual, as opposed to quantitative, verse, and, as accentual verse was usually rhymed, the word acquired the meaning which it has in all the Rom[anic]. and Teut[onic] langs." [Weekley]Persistence of older form is due to popular association with O.E. rim "number," from PIE base *re(i)- "to reason, count." The verb is first attested 1670s (of words), "to have the same end sound;" 1690s (of poets), "to make rhymes." Phrase rhyme or reason "good sense" (chiefly used in the negative) is from 1660s. Rhyme scheme is attested from 1931. Rhyme royal (1841) is a stanza of seven 10-syllable lines rhymed a-b-a-b-b-c-c. A similarity of sound between words, such as moon, spoon, croon, tune, and June. Rhyme is often employed in verse.
<urn:uuid:3b455d12-71f3-4905-a0b9-ae6f972e8d42>
{ "dump": "CC-MAIN-2014-35", "url": "http://dictionary.reference.com/browse/rhyme?qsrc=2446&o=100074", "date": "2014-08-21T09:04:27", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500815756.79/warc/CC-MAIN-20140820021335-00383-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9704328179359436, "token_count": 236, "score": 3.28125, "int_score": 3 }
1. A flagpole is situated on a hill that makes an angle of 18 degrees with the horizontal. How tall is the flagpole if its shadow is 14 meters when the angle of elevation of the sun is 31 degrees? 2. Two people are walking toward each other on a path thro
<urn:uuid:cd2bef9b-cbea-45bc-a8c2-f9f2f7d7662b>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.coursehero.com/sitemap/schools/3310-McLennan-Community-College/departments/144659-MATH/", "date": "2014-08-21T08:15:24", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500815756.79/warc/CC-MAIN-20140820021335-00383-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9412217140197754, "token_count": 59, "score": 2.625, "int_score": 3 }
The purpose of this research is to examine gender differences and the effect on second-language learning and teaching. The plan of the research will be to set forth the context in which gender, second-language acquisition, and instructional dynamics have gained currency in recent years and then discuss ways in which the interplay of these three elements are operationalized in the classroom, the principal focus of discourse being on the Mexican-American community. A significant attribute of Mexican-American society across social classes is the multigenerational cohesiveness of family life, shaped by hierarchically determined values and priorities (Griggs and Dunn). The binding of parents and children extends not just between the generations but across three generations. This is a hierarchical generational relationship, with children at the bottom; they are expected to show respect and unquestioning obedience to both parents and grandparents in general and to their father in particular, as well as to those included in the extended family such as baptismal godparents, in the tradition of what is called "compadrazgo or coparenthood. Compadres (coparents) are sponsors who assume carefully defined roles . . . linked by tradition through interlocking obligations of mutual aid and respect" (Madsen 48-9). To a significant degree, these roles are engendered. Madsen connects the tradition of a male's "supremacy . . . within his own home" (50) to the hard social reality that Mexican-Am Read the full essay by joining our writing community – over 32,000 professional essays and term papers. Access this essay now! Category: Misc - G Some common topics found in the essays are: Griggs Dunn, Sadker Sadker, York Illinois--have, , Hispanics Hispanics, Dunn Yepez, Meanwhile Hernandez, Caucasians Hispanics, Skirboll Taylor, American ESL, et al, griggs dunn, august 2004, esl classroom, speak spanish, 15 august, hernandez et al, 15 august 2004, hernandez et, classroom dynamics, education 1996 15, hispanics hispanics, father particular, culture children bring, dynamics culture children, Click Here to Get Instant Access to over 32,000 Professionally Written Papers!!!
<urn:uuid:8d4d2044-2de8-4961-9a17-01f449d37198>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.lotsofessays.com/viewpaper/1680589.html", "date": "2014-08-21T08:13:32", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500815756.79/warc/CC-MAIN-20140820021335-00383-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9257019758224487, "token_count": 461, "score": 3.21875, "int_score": 3 }
19 days to full moon 4 days to new moon more... An inauspicious day. Don't start anything new, be temperate, and get rid of anything superfluous or harmful. Also, try to avoid unnecessary outlays of money and energy. At the same time, this day helps you to see the real face of other people and unveils those who wish you harm. Its influence on health is mostly negative. This full Moon corresponds with the time of harvesting corn. It is also called the Barley Moon, because it is the time to harvest and thresh the ripened barley. The Harvest Moon is the full Moon nearest the autumnal equinox, which can occur in September or October and is bright enough to allow finishing all the harvest chores. This full moon's name is attributed to Native Americans because it marked when corn was supposed to be harvested. Most often, the September full moon is actually the Harvest Moon.
<urn:uuid:e0100a81-4110-4525-90d5-c18dc3abda10>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.vdbot.com/moon/", "date": "2014-08-21T08:12:26", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500815756.79/warc/CC-MAIN-20140820021335-00383-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9584001898765564, "token_count": 193, "score": 2.84375, "int_score": 3 }
"Bring it." "Oh, I'll bring it, bird." Some of my friends argue that birds are super-smart – maybe even smarter than human children! So far, I haven’t been convinced. And now, depending on how you look at it, one of us has some new evidence on their side! Scientists at the University of Cambridge have completed a study comparing how kids and birds behave when trying to solve a certain birdbrained... You’ve probably heard parents joking that their kids need to burn off some energy. What if, instead, the adults told them to go outside and make some electricity? Here's a neat idea: using playtime to produce power! Energy harnessing playgrounds can use the movement of play to generate electricity, which can then be used to light the area at night or be stored for later.... - Art and Culture (3) - Attitude and Behavior (9) - Chemistry (9) - Computer and Digital Technology (7) - Earth Science (6) - Education and Policy (4) - Energy (5) - Engineering (8) - Environment and Sustainability (9) - Health and Medicine (17) - Manufacturing and Industry (7) - Math (2) - Museums (2) - Physics (8) - Space and Astronomy (16) - Technology (18) - Transportation (3) - Happening Now Explore nine decades of The Walt Disney Company's history and artifacts. Seventy years ago, a historic landing changed the world. - Coming Soon Write the team behind the blog with your questions or comments.
<urn:uuid:2e5cb182-771a-49f3-9eb4-ac087a1d3632>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.msichicago.org/blog/tags/kids/", "date": "2014-08-22T17:41:49", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500824391.7/warc/CC-MAIN-20140820021344-00325-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.901831865310669, "token_count": 350, "score": 2.9375, "int_score": 3 }
I was intrigued by Kerala's Akshaya program. Kerala is uniquely, a most decentralized state, the only one of 17 in India to enact the Right to Public Services and, to open citizen service centers called Akshaya, run under the oversight of panchayats, 3-tier local self-governments, in 14 districts set within a 2 km radius of households. Akshaya was designed in its first phase in 2003 by the Kerala IT Mission to improve e-literacy in underserved areas and, in its second phase to provide a platform for government to citizen services through a public-private partnership. Over 60% of Kerala's 33 million citizens have been served by 2070+ Akshaya centers run by private entrepreneurs who collectively earn 30 million INR a month, creating employment for over 20,000 individuals. (For more details, see Akshaya Overview and UNDP Report on Akshaya). A common notion in public policy is that policy-making and implementation are divorced from each other, in the sense that politics surrounds decision-making activities (to be carried out by the elected political leadership) while implementation is an administrative activity (to be handled by bureaucracies). However, researchers have found that such distinctions are not helpful in understanding policy implementation in developing countries. The broad objective of the World Bank’s India Country Partnership Strategy Report (CPS) for the period 2013-2017 is to support poverty reduction and shared prosperity in India. The Report states that between 2005 and 2010, India’s share of global GDP increased from 1.8 to 2.7% and 53 million people were lifted out of poverty. But it also states that with population growth, it has proved difficult to reduce the absolute number of poor at a rapid pace and 400 million Indians still live in poverty. Each of the seven low income states (Bihar, Chhattisgarh, Jharkhand, Madhya Pradesh, Odisha, Rajasthan; Uttar Pradesh) and seven special category states (Assam, Himachal Pradesh, Manipur, Meghalaya, Mizoram, Sikkim, Uttrakhand) have poverty rates that are higher than that of the more advanced states. The low income states, where a large majority of the poorest 200 million Indians reside, are a priority for the World Bank Country Strategy funding during 2013-2017 (estimated to be $ 5 billion annually with 60 percent lending through direct financing of state projects of which half will go to low income and special category states). India, both in the above mentioned and its advanced states (e.g. Punjab, Haryana, Kerala) is undergoing a massive rural- urban transformation- one of the largest in the 21st century. For the first time since independence, India has seen a greater absolute growth in urban population. The number of towns has increased from about 5000 in 2001 to 8,000 in 2011 and some 53 cities have a population exceeding one million. Today 30.1 percent of the population lives in urban areas and the share is expected to rise to 50% in the next 20 years (with urban India expected to generate 70% of its GDP by 2030). Though villages vastly outnumber towns in India (660,000 villages as per Census 2011), the construct of these villages is changing as the economy grows. When it comes to primary education, there are many reasons to be optimistic. Enrollment has jumped across the world, and more children are in school than ever before. In the last decade, the number of out-of-school children has fallen by half, from 102 million in 2000 to 57 million in 2011. But is showing up to school enough? According to UNESCO’s Education for All Global Monitoring Report, almost one quarter of the youth in the developing world cannot read a sentence. In countries with large youth populations, this can leave behind a crippling ‘legacy of illiteracy’. Despite almost universal primary enrollment in India – 97 percent – half of second grade students cannot read a full sentence, and almost a quarter cannot even recognize letters. Reading is a foundational skill. Children who do not learn to read in the primary grades are less likely to benefit from further schooling. Poor readers struggle to develop writing skills and absorb content in other areas. More worryingly, learning gaps hit disadvantaged populations the hardest, limiting their economic opportunities. In Bangladesh, only one in three of the poorest quartile is literate, compared to almost nine out of ten in the richest. A good friend of mine recently returned from her mother’s funeral in Germany. She had died of lung cancer after spending the last eight years of her life in a slum in New Delhi where she taught orphaned children. I can’t help but wonder if breathing the dirty indoor and outdoor pollution in New Delhi contributed to her cancer. My friend has the same question. In new estimates released March 25, the World Health Organization (WHO) reports that in 2012, about 7 million people died - one in eight of total global deaths – as a result of air pollution. Indoor air pollution was linked to 4.3 million deaths in households that cook over coal, wood and biomass stoves. Outdoor air pollution was linked to 3.7 million deaths from urban and rural sources worldwide. (As many people are exposed to both indoor and outdoor air pollution, mortality attributed to the two sources cannot simply be added together.) South and East Asia had the largest number of deaths linked to indoor air pollution. The WHO finding more than doubles previous estimates and confirms that air pollution is now the world’s single largest environmental health risk. In particular, the new data reveal a stronger link between both indoor and outdoor air pollution exposure and cardiovascular diseases, such as strokes and ischemic heart disease, as well as between air pollution and cancer. In the case of both indoor and outdoor air pollution related deaths, 6 percent were attributed to cancer. Thinking that my friend’s mother perished as result of pollution may not be so far-fetched. "1700 people Sir!” Satya said. “Everybody is fine.” Satya had just shown me the equipment of the multi-purpose cyclone shelter in Ganjam District, where Cyclone Phailin made landfall. The equipment had looked exactly the same as what I had been shown during the briefing the day before at the Odisha Disaster Management Agency in Bubaneshwar. That had surprised me because the shelter where we were was almost ten years old, being one of the first ones to be built after the super cyclone of 1999. “I am the Secretary of the Shelter Management Committee Sir; I am in charge of maintenance.” Satya had said when I asked him how come everything looked in such good shape. “I have done this for seven years.” He added proudly. I was amazed. It is not often that a field visit highlights a facility that is close to ten years old. Even new facilities rarely look this good… Few consumers in developing countries are aware of the standard safety features in vehicles, and in most cases, the government has failed to mandate the minimum crashworthiness safety standards as recommended by the UN. But the situation is starting to change, and it is exciting to see some progress since the last time I wrote about this important topic. In that blog, I had mentioned how the New Car Assessment Program (NCAP) in Latin America highlighted the fact that new cars sold in that region were 20 years behind in safety technology compared to similar models sold in the US and the European Union. Earlier this year in New Delhi, the Global New Car Assessment Program, a consumer-awareness non-profit, presented for the first time independent consumer crash test results for five of India’s most popular small cars. Besides increasing awareness among Indians about safety performance of the cars they buy, the event also explored how regulatory standards, in combination with consumer information and incentives, can create a ‘market for safer vehicles’ in the rapidly motorizing nations of the developing world.
<urn:uuid:d8d5bece-30bb-447f-b4de-0759fc4360c9>
{ "dump": "CC-MAIN-2014-35", "url": "http://blogs.worldbank.org/category/countries/india?page=6", "date": "2014-08-27T14:34:07", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500829393.78/warc/CC-MAIN-20140820021349-00267-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.964402437210083, "token_count": 1651, "score": 2.640625, "int_score": 3 }
|SSM Cardinal Glennon Children's Medical Center| What Is Anxiety? Liam had always looked out for his younger brother Sam. But whenever Sam took the late bus after soccer practice, Liam worried about him so much he couldn't concentrate on his homework. Liam watched the clock, worrying and imagining the worst — picturing bus accidents and fearing, for no particular reason, that Sam might be injured or dead. Only when Sam arrived home safe could Liam finally relax. It's completely normal to worry when things get hectic and complicated. But if worries become overwhelming, you may feel that they're running your life. If you spend an excessive amount of time feeling worried or nervous, or you have difficulty sleeping because of your anxiety, pay attention to your thoughts and feelings. They may be symptoms of an anxiety problem or disorder. Anxiety is a natural human reaction that involves mind and body. It serves an important basic survival function: Anxiety is an alarm system that is activated whenever a person perceives danger or threat. When the body and mind react to danger or threat, a person feels physical sensations of anxiety — things like a faster heartbeat and breathing, tense muscles, sweaty palms, a queasy stomach, and trembling hands or legs. These sensations are part of the body's . They are caused by a rush of adrenaline and other chemicals that prepare the body to make a quick getaway from danger. They can be mild or extreme. The fight-flight response happens instantly when a person senses a threat. It takes a few seconds longer for the thinking part of the brain (the cortex) to process the situation and evaluate whether the threat is real, and if so, how to handle it. If the cortex sends the all-clear signal, the fight-flight response is deactivated and the nervous system can relax. If the mind reasons that a threat might last, feelings of anxiety might linger, keeping the person alert. Physical sensations such as rapid, shallow breathing; a pounding heart; tense muscles; and sweaty palms might continue, too. Everyone experiences feelings of anxiety from time to time. Anxiety can be described as a sense of uneasiness, nervousness, worry, fear, or dread of what's about to happen or what might happen. While fear is the emotion we feel in the presence of threat, anxiety is a sense of anticipated danger, trouble, or threat. Feelings of anxiety can be mild or intense (or anywhere in between), depending on the person and the situation. Mild anxiety can feel like a sense of uneasiness or nervousness. More intense anxiety can feel like fear, dread, or panic. Worrying and feelings of tension and stress are forms of anxiety. So are stage fright and the shyness that can come with meeting new people. It's natural for new, unfamiliar, or challenging situations to prompt feelings of anxiety or nervousness. Facing an important test, a big date, or a major class presentation can trigger normal anxiety. Although these situations don't actually threaten a person's safety, they can cause someone to feel "threatened" by potential embarrassment, worry about making a mistake, fitting in, stumbling over words, being accepted or rejected, or losing pride. Physical sensations — such as a pounding heart, sweaty hands, or a nervous stomach — can be part of normal anxiety, too. Because anxiety makes a person alert, focused, and ready to head off potential problems, a little anxiety can help us do our best in situations that involve performance. But anxiety that's too strong can interfere with doing our best. Too much anxiety can cause people to feel overwhelmed, tongue-tied, or unable to do what they need to do. Anxiety disorders are mental health conditions that involve excessive amounts of anxiety, fear, nervousness, worry, or dread. Anxiety that is too constant or too intense can cause a person to feel preoccupied, distracted, tense, and always on alert. Anxiety disorders are among the most common mental health conditions. They affect people of all ages — adults, children, and teens. There are many different types of anxiety disorders, with different symptoms. They all have one thing in common, though: Anxiety occurs too often, is too strong, is out of proportion to the present situation, and affects a person's daily life and happiness. Symptoms of an anxiety disorder can come on suddenly, or they can build gradually and linger until a person begins to realize that something is wrong. Sometimes anxiety creates a sense of doom and foreboding that seems to come out of nowhere. It's common for those with an anxiety disorder to not know what's causing the emotions, worries, and sensations they have. Different anxiety disorders are named to reflect their specific symptoms. How Anxiety Disorders Affect People For people dealing with anxiety disorders, symptoms can feel strange and confusing at first. For some, the physical sensations can be strong and upsetting. For others, feelings of doom or fear that can happen for no apparent reason can make them feel scared, unprotected, and on guard. Constant worries can make a person feel overwhelmed by every little thing. All this can affect someone's concentration, confidence, sleep, appetite, and outlook. People with anxiety disorders might avoid talking about their worries, thinking that others might not understand. They may fear being unfairly judged, or considered weak or scared. Although anxiety disorders are common, people who have them may feel misunderstood or alone. Some people with anxiety disorders might blame themselves. They may feel embarrassed or ashamed, or mistakenly think that anxiety is a weakness or a personal failing. Anxiety can keep people from going places or doing things they enjoy. The good news is, doctors today understand anxiety disorders better than ever before and, with treatment, a person can feel better. What Causes Anxiety Disorders? Experts don't know exactly what causes anxiety disorders. Several things seem to play a role, including genetics, brain biochemistry, an overactive fight-flight response, stressful life circumstances, and learned behavior. Someone with a family member who has an anxiety disorder has a greater chance of developing one, too. This may be related to genes that can affect brain chemistry and the regulation of chemicals called neurotransmitters. But not everyone with a family member who has an anxiety disorder will develop problems with anxiety. Things that happen in a person's life can also set the stage for anxiety disorders. Frightening traumatic events that can lead to PTSD are a good example. Growing up in a family where others are fearful or anxious can "teach" a child to view the world as a dangerous place. Likewise, someone who grows up in an environment that is actually dangerous (if there is violence in the family or community, for example) may learn to be fearful or expect the worst. Although everyone experiences normal anxiety in certain situations, most people — even those who experience traumatic situations — don't develop anxiety disorders. And people who develop anxiety disorders can get relief with proper treatment and care. They can learn ways to manage anxiety and to feel more relaxed and at peace. How Are Anxiety Disorders Treated? Anxiety disorders can be treated by mental health professionals, or therapists. A therapist can look at the symptoms someone is dealing with, diagnose the specific anxiety disorder, and create a plan to help the person get relief. A particular type of talk therapy called cognitive-behavior therapy (CBT) is often used. In CBT, a person learns new ways to think and act in situations that can cause anxiety, and to manage and deal with stress. The therapist provides support and guidance and teaches new coping skills, such as relaxation techniques or breathing exercises. Sometimes, but not always, medication is used as part of the treatment for anxiety. What to Do Getting the problem treated can help a person feel like himself or herself again — relaxed and ready for the good things in life. Someone who might be dealing with an anxiety disorder should: Try to stay patient and positive. It can take time to feel better, and courage to face fears. But letting go of worry allows space for more happiness and fun. Reviewed by: D'Arcy Lyness, PhD
<urn:uuid:a1d20921-3898-4c1e-9ca7-bc2c94de3af0>
{ "dump": "CC-MAIN-2014-35", "url": "http://kidshealth.org/PageManager.jsp?dn=S_S_M_CardinalGlennon_ChildrensMedicalCenter&lic=377&ps=207&cat_id=20123&article_set=21031", "date": "2014-08-27T13:21:10", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500829393.78/warc/CC-MAIN-20140820021349-00267-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9474366903305054, "token_count": 1666, "score": 3.78125, "int_score": 4 }
In the documentary Tim’s Vermeer Tim Jenison, a complete newbie to painting, paints Johannes Vermeer’s The Music Lesson based on a real-life reproduction of the painting’s composition, which he painstakingly constructs himself in a warehouse. He does this using an optical setup of lenses and mirrors built on the foundations of what many believe artists like Vermeer used back in the day. Jenison believes he’s re-discovered the means by which Vermeer was able to create his unbelievable, photographic-like paintings. His method, although requiring creative ingenuity to think up and build, as well as huge amounts of patience and perseverance, transforms the act of painting itself into a mechanical and objective process – it transforms the human doing the painting into a non-subjective machine. Whether or not his painting is proof that Vermeer’s long-acclaimed genius is actually mechanically replicable is not something I feel a need to explore. Rather, my interest lies more in our culturally emotive reactions to this debate. The very strong feelings so many of us have against the idea of reducing art to a technologically driven and mechanical process is significant (to me, at least). Tim’s documentary, as well as various books that advance the theory of artists using optical devices, are criticised for missing the point of Art; that by focusing on technological trickery, one naively misunderstands what it is that makes Vermeer one of history’s most celebrated artists. So what does it lack? The film implies anyone can make a beautiful work of art with the right application of science. There is no need for mystical ideas like genius. But the mysterious genius of Vermeer is exactly what’s missing from Tim’s Vermeer. It is arrogant to deny the enigmatic nature of Vermeer’s art. I think the Art-loving outcry emanates from how we choose to define and, in turn, place cultural importance on Art, with a capital A. Art is a brilliantly illusive concept. There’s much confusion and flexibility around its definition, yet most of us have very emotive and philosophical affiliations to it. It seems to transcend ideas around aesthetics, and scoffs condescendingly at the proposal of it merely being form without function. Art is a prevailing means of commentary and expression. Most of all, it is regularly seen as the end result of genius. Because of this, only a special few are celebrated from one generation to the next. I really don’t think I’m imagining the very real rift that consequently exists in the minds of many, whereby Art is seen as a special human-only artefact, while technology is the clever, but otherwise ugly, Frankenstein child of our increasingly mechanised drudgery. The two are considered by many as immiscible, or rather that technology detracts from the true essence of Art; that it somehow robs Art of its expression, diminishing its human commentary. In The Story of Art, E.H. Gombrich writes, There really is no such thing as Art. There are only artists. Once these were men [sic] who took coloured earth and roughened out the forms of bison on the walls of a cave; today some buy their paints, and design posters for hoardings; they did and do many other things. There is no harm in calling all these activities art as long as we keep in mind that such a word may mean very different things in different times and places, and as long as we realise that Art with a capital A has no existence. There are three important things to take from this very popular introduction to Art (I’m persisting with the capital A, for reasons soon to be explained): - The only thing that defines something as Art is whether a human artist produced it. - There are many different definitions and these are mutable over time and geography. - Art with a capital A does not exist, apparently. Points 1 and 2 reaffirm my preceding assumptions. Point 3 is where things become wonderfully contradictory. You see, Gombrich has chosen to denounce Art with a capital A because it brings with it with too many intellectual pitfalls, which he’d rather avoid. By saying Art doesn’t exist, he avoids having to define it. This is fine, I guess, but as I’ll now try to explain, it is, I’m afraid, a contradictory cop out. It is impossible for Art not to exist. If there was only art with a lowercase a, then any person who calls herself an artist should be celebrated as one. I’m personally okay with this, but it seems the Art world, including old Gombrich, aren’t (my own emphasis added): Praise is so much duller than criticism, and the inclusion of some amusing monstrosities might have offered some light relief. But the reader would have been justified in asking why something I found objectionable should find a place in a book devoted to art and not to non-art, particularly if this meant leaving out a true masterpiece. Okay, so if I’m following all of this correctly, it seems there are and there are not things worthy of being called ‘art’. I’m sorry, but this is when art starts to eat all of its greens and grows into a big and healthy Art – it most certainly comes into existence when you say there is ‘art’ and ‘non-art’. Gombrich’s hugely circulated book on the subject operates on the epistemological foundation that his subject matter can only be addressed in light of the humans who produce it and that, as humans, we define it differently over time and space. This democratic foundation quickly crumbles under contradictory conservatism, however, because he clearly reaffirms well-known Art-type criticisms by deeming only some productions as being worthy of this categorisation. Logically speaking, one is left confused by a book framed as an introduction to a select group of celebrated people who produce something that supposedly does not exist, but has simultaneously existed in various forms since troglodytes started vandalising their caves. Considering Gumbrich’s work is such a huge bestseller (the copy I own at home is a whopping 15th edition), is it safe to assume his framing of, and thinking around, Art is shared by a good many of us? I venture to think so. Most of us seem to share this judgemental and contradictory understanding of Art, even if we try to democratise the way we talk about it at times. I think the reason is that it fundamentally comes down to us using Art as a way to elevate ourselves; a means by which we point at our human uniqueness in relation to other animals and, in more recent times, as a cultural device to argue for our value over machinery and the ever-booming ingenuity of technology. What is a bit concerning is that by creating this dichotomy between Art and technology, we seem to do so with the assumption that technology is anti-human. The harsh criticisms of Tim Jenison’s painting of a Vermeer fails to recognise that here is a man of glorious creativity and talent, and is by all accounts unbelievably dedicated to any undertaking he pursues. What he achieves is just as worthy of celebration in my mind as Vermeer’s unbelievable talent. There are Vermeers everywhere. Some use paint, some use hammers, some use keyboards – but all of them use technology in some way or form. Something as simple as a paintbrush is technology. There’s nothing more human than the technology we invent and use to do great things. As long as we don’t lose sight of the inherent humanity in our technology (which we unfortunately do from time to time), I think we’ll be okay. Art can continue to be mysterious, uplifting, and judgemental, but so can technology and it will continue to be involved in the production of Art, whether or not Art snobs like it or choose to admit it. At work I’ve been faced with the problem of maintaining front-end code that is shared across different applications worked on by different teams of developers. In addition to redesigning and rebuilding a consumer-facing e-commerce-type website, there’s a significantly more hefty operational side of the business, made up of various kinds of admin interfaces that have either yet to be developed or are in need of some serious TLC. So, there are currently two general collections of front-end code that need to be managed across a number of different apps: the new consumer-facing and the more admin-type collection of front-end components. Some background on the actual code The problem was how do I keep working on this front-end code in a fast, iterative manner while not having to manually update code from one application to the next, constantly being worried about whether changes in the context of one app would end up breaking another. I frequently remind myself that the code I spend a bit too much time agonising over at times ultimately only exists for the sole purpose of delivering an enjoyable interface to a user in the best way possible. The preciousness or cleverness of my code setup should not dictate decisions around the user experience design. This means the approach can’t be rigid to fast design iterations. If it becomes clear that a certain change or addition will improve the user experience, I don’t want that change or addition to be potentially sidelined or delayed due to it not easily falling inline with a code-centric workflow or some misplaced sense of code conservation. I need to be able to break away from my my nice, clean framework when a more optimised interface design requires it, but I need to do this without sullying the cleanliness of the fundamental design principles behind that framework, nor with it having breaking consequences elsewhere. I need the shared tools necessary to make these changes cleanly if possible, or, if not, I need to be able to create some technical debt that is easy to quarantine from one day to the next, as well as from one application to the next, but can still be deployed immediately for its specific use. I can then go back to this slightly faster and looser code and work out if it is in fact technical debt 2, and if so, look into repaying that debt by working it more cleanly into the base framework. Beyond this need for design flexibility, there’s also the need to be able to make more considered, code-centric changes that improve the base framework, but to be able to do this in a selective fashion from one application to the next. This means updates can remain flexible to both mine and other developers’ priorities, and are also sensitive to any app-specific requirements that should temporarily delay or even skip certain updates. The aim is to do this while still only making this update to a single, distributed code repository. So, tell us code monkey, how? First, I worked on how best to divide up the code. What I settled on was the following: - A core framework - A framework specific to the consumer site - A framework for admin interfaces Both 2 and 3 are dependant on the core (1). Pretty simple, nothing too fancy about that. What was a little less simple is how I hoped to work with these repos, and how I hoped other front-end devs (if we ever found any to join the company) would work in tandem on them across different applications without crossing swords. I didn’t want to be challenged to a dual to the death every time I pushed changes to the origin. The idea of being stabbed in the face at a very efficient rate of 60fps by another front-end developer scares me. What about Bower? Talking through this problem with a smart and helpful senior developer in the team, his suggestion was to have a look into Bower. This made complete sense, as Bower is a tool for automating the management of front-end components and their relative dependencies. We were already using it for 3rd-party components. One could convert those 3 repositories mentioned above into versioned Bower components, and then each app can download the correct version it requires (which in turn downloads the correct version of the core framework it requires). So I got stuck in, all excited-like. Unfortunately, the more I played around with Bower in relation to these repos, the more Bower felt wrong for this. Bower is perfect for 3rd-party stuff, as hooking up to the browser-ready distribution files of other people’s generic components is perfectly suited to how one normally uses a 3rd-party component. One naturally installs Bower components into a publicly accessible directory, because these components are front-end in nature and because you should be using the components as they have been automatically provided – why else would you be using a dependancy automation tool like Bower if you weren’t? You would concat and minify for production, but these components would be public files all the same. This, in my mind at least, means that you start breaking your assumptions around Bower components as soon as you start installing source files that require server-side compilation (such as Sass and SVG files and maybe, who knows, CoffeeScript files in the future). The key difference here is that these repos are intended to be used during front-end development, not simply included or implemented. The Bower workflow kind of assumes the latter. What we really needed was a server-side module manager for front-end development. So the same, very smart developer suggested Node Packaged Modules (NPM) instead, and he setup a private registry on a local development server for me to start playing with. I’ve been using the NPM approach (with a strong process dependancy on Grunt) for a few sprints now, and it feels like a great recipe thus far. Below is some more detail about the approach. The solution: NPM & Grunt sitting in a (dependency) tree… Using a private NPM registry had its problems. It couldn’t be accessed outside of the office network (I work a lot from home after hours, especially when a brainwave strikes me), but most importantly it caused problems with the continuous integration build process on the staging server. In short, there were network security issues with build process. So we instead switched to having the NPM config fetch the packages directly from Github, using git tags for versioning. The same concept as before, except instead of publishing to an NPM registry, I just push them to their repos on Github, tagging them with a version number. It, in effect, removed a step for me, as I would have maintained a git repo in addition to the NPM registry anyway. Firstly let’s take a look at the structure of the 3 repositories in question (1, 2, and 3 above – core, consume-facing, and admin-type UIs). Each repo contains the following: - An images directory with uncompressed and fully editable SVGs - A styles directory made up of .scss files organised into: - modules (global component-centric modules, each in a separate file to make it easier to cherry pick the ones you want) - sections (bespoke styling for certain pages or sections, also in separate files based on the page or section) - ie (IE specific styles which follow Paul Irish’s recommended approach to IE overrides) - An NPM config (package.json) - A Bower config for 3rd-party components (bower.json) The core repo doesn’t have a ‘/styles/sections’ directory, as it never directly implements any particular page or interface. Other than this, all repos follow the same file and folder signature. The core repo contains most of the modular .scss and .js files, with the consumer-facing and admin repos extending these with their own global (i.e. section-agnostic) modules as well as with their own section-specific styling. Unlike the consumer-facing repo, the admin repo’s sections refer more to types of sections or page areas, as apposed to actual pages, as it is more generic in nature. The admin repo introduces some different design patterns, both macro and micro in scale, as well as bringing in some more heavy data-orientated components and edit controls. The consumer-facing repo has some global elements specific to it, while introducing a lot more page-specific styling and breakpoints to squeeze out the best design possible for our customers across a huge continuum of screen sizes and browser capabilities. You could ask the question, Why create a repo for the consumer UI, if it is only applied to one application? That’s a mighty fine question. I’m starting to like you. Well, the answer is two-fold. Firstly, this repo can be used for other consumer-facing offerings, which have been proposed for the future. Secondly, this repo can be automatically pulled into some form of externalised documentation if need be, used to codify and communicate design patterns in a centralised place for the whole company. In other words, for the creation of a pattern or UI library of sorts that can play an important part in bolstering organisational memory – the thing so crucial to creating cohesive user experiences. Each app then includes the admin or consumer-facing packages in their NPM config, pointing specifically to the version (via the git tag) which they are using. Those versions, in turn will be dependant on a specific version of the core (as defined in their own NPM config). An app can pull in both the admin and consumer-facing package and more (as does our actual consumer-facing app, as it has backend admin pages). Because each are kept in their own directory within the node modules directory with each in turn having their own version of the core package, you can continue to keep them separate for different sections of the app. All you need to do is run ‘npm install’ and wazam! you have the packages you require with the correct version of core automatically pulled in. In addition to this you can add a ‘postinstall’ declaration to your packages that kick starts a process of your choosing. So we used this to kick start the installation of 3rd-party Bower components specific to each front-end package. This means, by simply running ‘npm install’ in the app, we get all our necessary front-end packages installed along with their Bower components, without having to commit these components to the package repositories themselves. Now the second very pertinent question you may ask is, Does this mean you have to keep pushing commits to your package repos in order to see your changes reflected in the app you’re currently working on? I’m really starting to like you now, because that is indeed a great question. The answer is: npm link, which allows you to effortlessly define symlinks to your own npm registry on your development machine. Meaning any updates to your local copy will be reflected immediately in the app. Can I have a what what? Pretty sweet, huh? Once you’re done working on a specific task, feature, bug fix etc, simply update your version number and commit it with a matching git tag version. 3 How do all these things get compiled? Now that we have all the front-end source files we need to start doing some rapid, kick-ass design implementations on a specific app, how do we actually gather and compile these files in an efficient manner. The answer is Grunt. I’d been using Grunt for a while now, but for me it has really come into its own with this particular workflow. With the source files now available within the node modules directory, I use Grunt to automate the following (in order): - Copy any browser ready scripts (3rd-party components and my own package scripts to a public location to be included into the document. I also copy all SVG source files from each package into an assets folder specific to the app in question. Seeing as all the packages follow the same directory structure, this automation is pretty painless to setup and maintain, and appropriate nesting can be maintained (vis-a-vis different versions of core etc). - I then run an SVG minifier to reduce file sizes (due to all sorts of meta information and redundancies, generally from something like Adobe Illustrator). There are savings in excess of 60%, so the juice is definitely worth the squeeze. - With the optimised SVGs in place, I then run grunticon, which is a wonderful plugin that generates all the necessary SVG CSS data and classes (according to my own file organisation and class naming specifications), and then uses phantomjs to create fallback PNGs for browsers that don’t support SVG. Can I have a HellsYeah!? - I then do an initial compile of the Sass brought in from the packages, including the SVG data. We now have fully scalable and retina sharp images and all of them are loaded with a single http request, ready and waiting in the cache for every page thereafter. Load times after the initial load (which is pretty darn quick itself) are super-lightning quick. 4 - I then have some uglification setup to keep an eye on combined and minified file sizes of scripts. This will only really come into play when we start live deployments, though. So that’s that in a very wordy hat. I could write a more fine-grained collection of posts breaking down the thinking behind certain things later, but the idea here was to share a top-level approach to what I think is quite a nice code management and workflow. - Using jQuery is a somewhat unavoidable and pragmatic choice, especially within a team. ↩ - Technical debt is sometimes hard to define with front-end code – but this is a whole post in itself, which I may address at some other time ↩ - I’ve yet to start using proper versioning standards (around breaking changes etc), but I will start doing that once we get closer to actual go-live deployment. Right now I’m the only one working with these packages, so it currently isn’t a problem if the version number lacks that kind of implicit information. ↩ - I am busy working on splitting the image data stuff out from the main CSS and using yepnope.js to conditionally load it at the end of the document (based on SVG support) to increase initial load speed. But this is my own pedantic like-to-do right now, as the combined CSS is still surprisingly small (with all image data used throughout the consumer site, as an example, currently sitting at only 70kb). ↩ The last few years, I’ve found myself using the word human with great regularity. I don’t speak of people or users, I instead harp on about a human. Some guy I’ve never met. The reason is a simple one: I worry over an ever-looming disconnect between the things we design and build, and the humans for whom these things are intended. This is not to say that this disconnect is a ubiquitous totality. It has an ebb and flow; it gathers significance in one place while narrowing (and even disappearing) in another place in a complex and multitudinous way within the tech industry. Either way, this disconnect is something that needs to be fought. The crowbars that cause it to widen need to be railed against. I believe this disconnect is levered open by two kinds of social crowbars: - A technophile minority dictating to a technophobe majority - A fundamentalist and morally bankrupt belief in capitalism The technophilic dictatorship We need to understand that black magic is alive and well in the modern era. It takes the form of computers (handheld, desktop, and the general internet of things). Digital technology is now the leading religion, and all us tech folk are the power-wielding clergy. Our Latin version of the bible is instead written in code, jargon, and an overwhelming sense of self-importance and impatience. User experience design is the exorcist. Successful user experiences happen when producer whims get sidelined, and primary focus is placed on that little bit of common sense shared by the majority of humans using your product or service. It’s when you empathetically put yourself in the most common psychological flow of a human using a piece of technology they know almost nothing about. The above doesn’t happen as often as it should because we live in a world where everyday millions of browser-indifferent humans use a web of computers and software created and maintained by a bunch of browser snobs. Most people don’t care about the elegant simplicity of some programmer’s data model. They don’t care about how clever that programmer is. They just want to get through it. They don’t care about how the pistons fire under the hood. They just want a steering wheel and an automatic gearbox. They’ve bought the car to get to work, to take their children to school. They haven’t bought it to marvel at its engineering. They’re too tired for that. In all our technophilic cleverness and snobbery we sometimes forget about this, or we stubbornly choose to ignore it. Our fragile egos want to broadcast how clever we are to our peers. For some time now I’ve been feeling a bit down about user testing. I’ve been unable to shake the feeling that the specific conclusions drawn from it are mostly the result of artificial data and interpretative folly. Despite this, I believe user testing continues to be valuable in the design process. It may not be great for making very specific usability decisions, but it is invaluable in reminding the more obnoxious of us of the divide between makers and users; it regularly highlights the technological disconnect created by aloof cleverness. It breeds empathy. If ego-driven cleverness in technology is left unchecked it starts us down the road of technological evangelism, whereby technology becomes endowed with value in its own right, irrespective of its value to the humans who are forced to use it. In one of my favourite posts of the year, Zeynep Tufekci laments over the inhumanity of caregiver robots 1: In my view, warehousing elderly and children—especially children with disabilities—in rooms with machines that keep them busy, when large numbers of humans beings around the world are desperate for jobs that pay a living wage is worse than the Dickensian nightmares of mechanical industrialisation, it’s worse than the cold, alienated workplaces depicted by Kafka. It’s an abdication of a desire to remain human, to be connected to each other through care, and to take care of each other. The author says we will be fine with machines because look how much we stare into our phones! What a misunderstanding! That is the opposite of what most are doing on the phone: as I’ve long argued, it’s a desperate desire to remain connected to each other, in a world that makes this hard through suburbs, long work-hours and other physical barriers. Tufekci’s great lament leads me nicely onto my second social crowbar, excessive capitalism. The fundamentalist belief in capitalism While excessive technophilia can contribute to a human/technology disconnect through the misplaced elevation of technology to such a degree that it loses sight of its original human purpose, the same happens when the evaluation of success is ruthlessly and wholeheartedly linked to business success within the capitalistic ecosystem. Business success, in pure capitalistic terms, is monetary excess. Nothing else. This is not to say that all profitable businesses lack value beyond the profits they reap, but morally and ethically questionable things are regularly done because the only real metric used to adjudge business value is monetary profit. If you’re an Ayn Rand fan, you may argue that capitalism is self-regulating, in that if you do morally questionable things your bottom line will inevitably suffer for it. This may be true in some cases (certainly not all), but even if it is true it doesn’t change the fact that such a system creates a vapid yardstick which many do use to motivate inhuman decisions. Just like technological evangelism, profit evangelism switches the focus away from humans. Instead of creating human livelihoods, the focus becomes a game of who can be the wealthiest irrespective of who or what it harms along the way. This harm can be very small (in the form of user frustrations caused by news sites that break their stories over multiple pages simply to game their “engagement”, which they can then sell to advertisers), or it can be much more significant – the type of harm where our health and that of our environment is compromised, and where human life is lost. This schema for evaluating success is why thinking like this seems to be the norm in the marketing world: The only reason to build a website is to change someone. The goal is profit, therefore we are expected to bend humans to our monetary will, instead of bending our monetary will to service the needs of those pesky humans. Drop those crowbars As designers and caretakers of a vast technological landscape, we really need to not lose sight of who this technology is for and why it supposedly exists in the first place. Technology is supposed to service human needs, make their lives easier, and businesses exist in order to provide products, services, and livelihoods for these creative and hardworking humans. These are the goals. Money and clever tech are simply by-products of these goals. Do a solid for your fellow humans by not forgetting this.
<urn:uuid:ce31d400-f002-47f1-beca-0b1bdbe3f81c>
{ "dump": "CC-MAIN-2014-35", "url": "http://maughan.me/", "date": "2014-08-27T12:49:57", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500829393.78/warc/CC-MAIN-20140820021349-00267-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9476021528244019, "token_count": 6258, "score": 2.71875, "int_score": 3 }
|Save Up to 50% on "For Dummies" Books Explore the For Dummies Store and save up 50% on trusted books written by subject matter experts. Get Dummies, Get Results. And save up to 50%. Shop now.| Mathematics for the International Student Year 7 MYP 2 by Robert Haese, Sandra Haese and Kim Harris (Aug 1 2008) Standards at KS2 English, Mathematics and Science Report on the 1998 National Curriculum Assessments for 11-Year-Olds... Mathematics in Action - G.C.S.E.and Scottish Standard Grade: Answers Bk. 3A by Mathematics in Action Group (Aug 1992) Mathematics in Action - G.C.S.E.and Scottish Standard Grade: Assessment Copymasters Bk. 5S by Mathematics in Action Group (Nov 1992) Infant Mathematics: Workbk.4 Stage 1: A Development Through Activity by Scottish Primary Mathematics Group (Feb 23 1987) Calculator Mathematics: Tchrs' Bk. 2 by Ken Tyler and Hugh Burkhardt (Nov 1982) SMP 11-16 Teacher's Guide to Book R1 by School Mathematics Project (Jul 3 1986) Modern Basic Mathematics: Standard 4 by B. Naude and G. van der Westhuizen (Oct 19 1994) Smp 7-13 Revised Unit 2 Answer Book by School Mathematics Project (Mar 27 1986) MSM Mathematics: Teachers' Resource Pack Bk. 4X by Jim Miller and G. Newman (Dec 1992) SMP 11-16 Number Properties and Patterns and Sequences Review book Y7 and Y8 (pack of five) by School Mathematics Project (Jan 11 1996) - Currently unavailable Comprehensive Medicinal Chemistry II, Eight-Volume Set by David J Triggle and John B Taylor (Dec 15 2006) - Eligible for FREE Super Saver Shipping.
<urn:uuid:c12feedb-a79d-40d9-94be-9dbd80e44d10>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.amazon.ca/Science-Mathematics-Childrens-2000-4999-Books/s?ie=UTF8&page=1&rh=n%3A935948%2Ck%3AScience%2FMathematics%2Cp_36%3A200000-499999", "date": "2014-08-27T12:56:25", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500829393.78/warc/CC-MAIN-20140820021349-00267-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.8435036540031433, "token_count": 401, "score": 2.921875, "int_score": 3 }
Latest photos on AncientFaces No one from the müller-wagener community has shared photos. Here are new photos on AncientFaces: Müller-wagener Surname History The family history of the Müller-wagener last name is maintained by the AncientFaces community. Join the community by adding to to this genealogy of the Müller-wagener: - Müller-wagener family history - Müller-wagener country of origin, nationality, & ethnicity - Müller-wagener last name meaning & etymology - Müller-wagener spelling & pronunciation - genealogy and family tree Müller-wagener Country of Origin, Nationality, & Ethnicity No one has submitted information on müller-wagener country of origin, nationality, or ethnicity. Add to this section No content has been submitted about the Müller-wagener country of origin. The following is speculative information about Müller-wagener. You can submit your information by clicking Edit. The nationality of Müller-wagener may be very difficult to determine because countries change over time, leaving the original nationality a mystery. The original ethnicity of Müller-wagener may be in dispute as result of whether the name originated naturally and independently in multiple locales; e.g. in the case of family names that come from a professional trade, which can appear in multiple places independently (such as the surname "Clark" which evolved from the profession of "clerk"). Müller-wagener Meaning & Etymology No one has submitted information on müller-wagener meaning and etymology. Add to this section No content has been submitted about the meaning of Müller-wagener. The following is speculative information about Müller-wagener. You can submit your information by clicking Edit. The meaning of Müller-wagener come may come from a profession, such as the name "Gardener" which was given to people of that profession. Some of these craft-based family names may be a profession in a different language. For this reason it is important to understand the ethnicity of a name, and the languages spoken by its early ancestors. Many names like Müller-wagener originate from religious texts like the Bible, the Bhagavadgītā, the Quran, and so on. Often these names are shortened versions of a religious expression such as "Favored of God". Müller-wagener Pronunciation & Spelling Variations No one has added information on müller-wagener spellings or pronunciations. Add to this section No content has been submitted about alternate spellings of Müller-wagener. The following is speculative information about Müller-wagener. You can submit your information by clicking Edit. Family names like Müller-wagener transform in how they're written as they travel across villages, family branches, and countries over time. In times when literacy was uncommon, names such as Müller-wagener were transcribed based on how they sounded when people's names were written in court, church, and government records. This could have led to misspellings of Müller-wagener. Knowing misspellings and alternate spellings of the Müller-wagener family name are important to understanding the etymology of the name. Last names similar to Müller-wagenerMüller-wagner, Müller-wahl, Müller-wahle, Müller-waic, Müller-waidikat, Müller-walckhoff, Müller-walde, Müller-waldeck, Müller-waldheim, Müller-waldraff, Müller-walker, Müller-wallbaum, Müller-wallenborn, Müller-wallerang, Müller-wallerich, Müller-wallraf, Müller-wallstab, Müller-wallstein, Müller-wallwaey, Müller walter müller-wagener Family Tree Here are a few of the müller-wagener genealogies shared by AncientFaces users. Click here to see more müller-wageners
<urn:uuid:0a7eb736-6c0c-49ac-9c38-bcd0ca81b18f>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.ancientfaces.com/surname/mller-wagener-family-history/2096276", "date": "2014-08-27T13:45:33", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500829393.78/warc/CC-MAIN-20140820021349-00267-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.8998948335647583, "token_count": 910, "score": 2.6875, "int_score": 3 }
Final Test - Hard |Name: _________________________||Period: ___________________| This test consists of 5 short answer questions and 1 (of 3) essay topics. Short Answer Questions 1. What do most men fear being drawn into during their military service? 2. Admiral Kester orders an airstrip built on the tiny island of ____________. 3. What ceremony takes place on the island of Vanicoro? 4. Who is the Marine who is tasked with shutting down Bloody Mary's business? 5. What item has Luther gone in search of on the island? Essay Topic 1 What is the overall setting for the majority of the book? Be sure to include geography, time period and any pertinent popular culture events. Why did Michener feel compelled to tell the stories from this time and place? Essay Topic 2 Describe the format of the book. What is the purpose of the Stories? Why did Michener write the stories instead of a novel format? Explain. Essay Topic 3 There are several events of foreshadowing in the stories. Define foreshadowing. Cite at least two situations in the stories that serve as foreshadowing. This section contains 190 words (approx. 1 page at 300 words per page)
<urn:uuid:31e1e1eb-051e-436b-8929-49d2dd4bbca6>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.bookrags.com/lessonplan/tales-of-the-south-pacific/test6.html", "date": "2014-08-27T13:49:08", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500829393.78/warc/CC-MAIN-20140820021349-00267-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9219605326652527, "token_count": 272, "score": 2.828125, "int_score": 3 }
Reconstruction:This compilation of primary sources provides a detailed view of the post-Civil War Reconstruction period, covering freed slaves, carpetbaggers, presidential policy, Radical Republicans, social and economic problems in the South, Black codes, voting rights, the KKK, and the impeachment of Andrew Johnson. Back to top Rent Reconstruction 1st edition today, or search our site for JoAnne Weisman textbooks. Every textbook comes with a 21-day "Any Reason" guarantee. Published by History Compass, LLC.
<urn:uuid:f1a5d589-5abd-4042-a38c-66f40590acab>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.chegg.com/textbooks/reconstruction-1st-edition-9781579600723-1579600727?ii=4&trackid=beba7093&omre_ir=1&omre_sp=", "date": "2014-08-27T13:34:16", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500829393.78/warc/CC-MAIN-20140820021349-00267-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.8459742069244385, "token_count": 105, "score": 2.59375, "int_score": 3 }
Reminiscences of the Royal Burgh of Haddington Coal and Candle |N the 18th day of May 1593, Haddington was nearly consumed by fire. Tradition affirms that a careless maid-servant, who had put clothes to dry too near the fire, had ignited them, and so caused this dire conflagration. Many of the houses in the town at that time were made of wood and thatched, and would the more easily burn. The calamity is thus noticed in the town's records :On the 23d of May the Town Council thought good that the Provost (probably Sir William Seton of the Barns) and Mr James Carmichael, minister of Haddington, should travel with the kings majesty and council and other noblemen for support to repairing the burgh, presently destroyed upon the 18th May instant, Thomas Spottiswood and Paul Lyle to ride with the provost and ministers first voyage. The following entry in the Council records shows the success of the minister and provosts mission;December 8th,The collection which was given by the City of Edinburgh to those who had their houses and geir burned within the burgh in May last, was ordered for distribution." It was from the circumstance of this great conflagration having happened, that the following rhyme and warning, called Coal and Candle,M was instituted: A gude men-servants whereer ye be, Keep coal and canle for charitie, In bakehouse, brewhouse, barn, and byres, Its for your sakes, keep weel your fires; Baith in your kitchen and your ha, For oftentimes a little spark, Brings mony hands to meikle wark; Ye nourices that hae bairns to keep, Tak* care, ye fa' na o'er sound asleep; For losing o' your gude renown, And banishing o this burrow town. Its for your sakes that I do cry, Take warning by your neighbours by. The name of the author has not been handed down. From 1573 down to within thirty years ago, Coal and Candle was proclaimed by the town-crier every night except Sunday, from Martinmas to Candlemas. After ringing his bell at eight oclock, he commenced in a sing-song chant to cry it continuously through the principal streets of the town, which occupied half an hour or so. During the first two or three nights he was followed by a crowd of children. Whenever Coal and Candle" was heard, it was the signal for the youngsters of the family to go to bed. Old Haddingtonians will still recollect Willie Baird, the town-crier. He performed his task in excellent style and with taste, giving the principal words great emphasis and expression. He was succeeded by John Sinclair, who cried it for many years. The last crier was William Souness. They were all town-officers. The perquisite allowed was a pair of shoes, but other odds and ends used to be added. It is a pity that the calling of such an interesting relic as Coal and Candle, two hundred and fifty years old at least, should have been given up. Old Haddingtonians much regret its discontinuance, as it was associated with their earliest days, and had become quite historical. It would be a very popular move if the present rulers of the burgh would take means to This comment system requires you to be logged in through either a Disqus account or an account you already have with Google, Twitter, Facebook or Yahoo. In the event you don't have an account with any of these companies then you can create an account with Disqus. All comments are moderated so they won't display until the moderator has approved your comment.
<urn:uuid:20edfd3d-1597-4ef7-9fe5-406d53a417e3>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.electricscotland.com/history/haddington/chapter11.htm", "date": "2014-08-27T13:11:14", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500829393.78/warc/CC-MAIN-20140820021349-00267-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9646481871604919, "token_count": 864, "score": 2.578125, "int_score": 3 }
Definition of Lining, uterine Lining, uterine: The inner layer of the uterus (womb); the cells that line the womb; anatomically termed the endometrium. This tissue is normally shed monthly in response to the hormonal changes of the menstrual period.Source: MedTerms™ Medical Dictionary Last Editorial Review: 6/14/2012 Medical Dictionary Definitions A - Z Search Medical Dictionary Women's Health Resources - Symptoms of a Severe Allergic Reaction - Breast Cancer Treatment Options - Is Your Body Ready for Pregnancy?
<urn:uuid:be983d14-2269-4f07-9812-6d816f6818d7>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.emedicinehealth.com/script/main/art.asp?articlekey=9922", "date": "2014-08-27T13:14:00", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500829393.78/warc/CC-MAIN-20140820021349-00267-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.7396083474159241, "token_count": 118, "score": 3.3125, "int_score": 3 }
Colin Ian Jeffery OVER THE TOP Going over the top in World War One was when soldiers climbed from their trench to attack enemy trenches. At the battle of the Somme a British general ordered his men to walk towards the German trenches and not run. ' We don't want the enemy to think we British are cowards.' Thousands died because of his command. Birds no longer sing Where young men cower in trenches Rifle and bayonet fixed Wondering if they will live or die Wanting the comfort of a mother's kiss. Officers blow whistles And the brigade climb out of trenches Walking over shell craters and through barbwire On towards waiting machine gunners Surmounting terrors that make men mad. There is no sound But beating of each soldier's heart As he steps forward into hell Trying to control his fears and panic Thinking of his loved ones back home. Machine gunners open up With chatter of bullets raking the ranks Noise is deafening, screams as men are hit and fall With wounded struggling in the mud And for the dead grieving mothers to mourn. Read this poem in other languages This poem has not been translated into any other language yet. Comments about this poem (OVER THE TOP by Colin Ian Jeffery ) The Road Not Taken If You Forget Me Still I Rise Edgar Allan Poe I Know Why The Caged Bird Sings Stopping by Woods on a Snowy Evening William Ernest Henley - Wonderful World, fareha fatima - COPLA 88 INVOCATION: This Bad Guy World, T (no first name) Wignesan - Nature's Law, Asit Kumar Sanyal - Irritation Of Gestures, Naveed Akram - OVER THE ROCK OF SUICIDE فوق صخرة الانتحار, MOHAMMAD SKATI - Just For the Record, Joyce Sutphen - lonely wanderer, The lonely wanderer - The day my angel died, whole world cried, The lonely wanderer - the day I get to call you mine, The lonely wanderer - No goal, hasmukh amathalal
<urn:uuid:ce259652-ac56-4e01-bc49-5e4f01aa8f7d>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.poemhunter.com/poem/over-the-top-6/", "date": "2014-08-27T14:43:03", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500829393.78/warc/CC-MAIN-20140820021349-00267-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.8527513742446899, "token_count": 482, "score": 2.921875, "int_score": 3 }
Franklin Delano Roosevelt (1882-1945), also known as FDR, was our 32nd President. He was an immensely popular public figure, being elected to the Presidency four consecutive times. He is still regarded as one of our nation’s greatest leaders. FDR led our nation through some of its greatest upheaval and distress. He came into office during the Great Depression and died still in office near the end of World War II. But before he was President, at age 39, FDR contracted polio, causing him permanent paralysis from the waist down. Eleanor Roosevelt, his wife, would later say “Franklin's illness gave him strength and courage he had not had before. He had to think out the fundamentals of living and learn the greatest of all lessons -- infinite patience and never-ending persistence." FDR did not display his physical disability to the world but rather made efforts to conceal his condition. While the public was somewhat aware of his battle with polio, they were in large part unaware of the extent of his disability. It was only ‘behind the scenes’ that FDR was seen as having any sort of ailment. Only two photographs exist (one pictured on the right), of him using a wheelchair, and only one video exists of his method of walking. FDR was able to walk short distances with the help of metal braces (pictured on left), a cane, and a companion’s arm. But for the most part, FDR used a wheelchair, one in fact, that he custom designed to meet his needs, by converting a dining room chair into a wheelchair. He even included a built-in ash tray. FDR also drove his own car, as evidenced in numerous photos, using hand controls. His living quarters were also, of course, adapted for accessibility. FDR is a towering American historical figure, and while his disability greatly affected his daily life, it only served to further strengthen his spirit for life as a whole.
<urn:uuid:a503f84a-754c-45ff-bfaf-e466c11df26b>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.skilonline.com/index.php?option=com_content&view=section&layout=blog&id=1&Itemid=236&limitstart=280", "date": "2014-08-27T13:08:03", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500829393.78/warc/CC-MAIN-20140820021349-00267-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9933604598045349, "token_count": 398, "score": 3.609375, "int_score": 4 }
Home School History Day: Bug Bonanza Learn the characteristics of insects by examining a variety of these fascinating creatures. Students will inspect insect parts through a microscope, create bug rubbings, and more. The second Tuesday of every month we offer a special program for home schooling families. These programs feature one of our field trip classes, a chance to go through the Museum, and an activity. Reservations recommended. Created by chasmuseum 360 Meeting St. Charleston, SC 29403
<urn:uuid:abe62d06-dc5c-4838-b7aa-94880d791ea9>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.zvents.com/charleston_sc/events/show/369430953-home-school-history-day-bug-bonanza", "date": "2014-08-27T13:01:28", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500829393.78/warc/CC-MAIN-20140820021349-00267-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.8641713261604309, "token_count": 102, "score": 2.8125, "int_score": 3 }
Among other things, Ferguson shows us that systemic racial injustice persists, often with “states’ rights” or “local rights” as justification. The stories of women who participated in focus groups led by SisterSong, included in a new report, convey the gross under-education and discriminatory treatment of Black women living in the South, in particular, where sexual and reproductive health education is nonexistent and stigma is rampant. The controversial photos that some visitors took at the exhibit are not only troublesome because they disrespect the art, but because the mocking and dehumanization of the Black female body has a long history in our society. Although the reproductive rights movement and the broader feminist movement have become increasingly intersectional, there is still much work to be done in centering the issues faced by women who are not white, economically advantaged, heterosexual, and cisgender. The anniversary of the Loving case on June 12 and Juneteenth on the 19th should remind us that, within the African-American freedom struggle and broader movements for equality, there has always been a struggle to determine the right to marry, select an intimate partner of one’s choice, and to form the families that we want. The report shines a light on the harmful racial stereotypes driving one of the right’s latest anti-abortion efforts. Modern Mississippi freedom fighters must remain committed to Hamer’s legacy of bridging voting and reproductive rights into a comprehensive reproductive justice effort to protect Black women and other populations that are vulnerable to violations of both. Rodger’s actions have a chilling rationality to them in the terms of our gendered society, which makes objects and possessions of women, and rapacious, status-conscious animals of men. Whatever else Rodger’s crimes are, they are not unintelligible; they merely wrote in blood what too many of us hear, see, and say every day. Two groups have appealed the dismissal of their challenge to an Arizona anti-choice restriction that they argue unconstitutionally relies on harmful racial stereotypes to discriminate against and shame Black and Asian American and Pacific Islander women who decide to end their pregnancies. What conservatives really mean when they talk about “religious freedom” has been revealed already by their longstanding crusade against the birth control benefit afforded by the Affordable Care Act. For them, having religious freedom requires the right to discriminate—against specific people, and in a specific way.
<urn:uuid:86fa1b7d-ccf5-46c9-8187-5993d40ba176>
{ "dump": "CC-MAIN-2014-35", "url": "http://rhrealitycheck.org/tag/racism/", "date": "2014-08-29T05:36:31", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500831903.50/warc/CC-MAIN-20140820021351-00209-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9508976936340332, "token_count": 496, "score": 2.671875, "int_score": 3 }
This is an animated interactive that displays, on a Global Viewer, NOAA datasets on hazards, ocean, and climate. User can visualize data on phenomena such as hurricanes, humpback whale migrations, carbon tracker, sea ice extent, IPCC scenarios on global warming. This activity from NOAA Earth System Research Laboratory introduces students to the current scientific understanding of the greenhouse effect and the carbon cycle. The activity leads them through several interactive tasks investigating recent trends in atmospheric carbon dioxide. Students analyze scientific data and use scientific reasoning to determine the causes responsible for these recent trends. By studying carbon cycle science in a visual and interactive manner, the activity provides students with a conceptual framework with which to address the challenges of a changing climate. This video features University of Wisconsin-Madison researcher John Magnuson, who studies the ecology of freshwater systems. He explains the difference between weather and climate using data on ice cover from Lake Mendota in Madison, WI. Analysis of the data indicates a long-term trend that can be connected to climate change. Two graphs from the NASA Climate website illustrate the change in global surface temperature relative to 1951-1980 average temperatures. The NASA plot is annotated with temperature-impacting historic events, which nicely connect an otherwise challenging graphic to real-world events. In this short video segment Native Americans talk about climate change and how it impacts their lives as they experience unexpected changes in environmental conditions. They describe observed changes in seasonality, how these changes affect ecosystems and habitats, their respect for Mother Earth, and the participation of tribal colleges in climate change research projects. This video is one of a series from the Switch Energy project. It reviews the environmental impacts of various energy resources including fossil fuels, nuclear, and renewables. CO2 emissions as a specific environmental impact are discussed. In this classroom activity, students analyze visualizations and graphs that show the annual cycle of plant growth and decline. They explore patterns of annual change for the globe and several regions in each hemisphere that have different land cover and will match graphs that show annual green-up and green-down patterns with a specific land cover type. This video documents the impact of the 2011 drought on the water supply of two Texas towns. It discusses how the higher temperatures have increased the evaporation from open reservoirs, resulting in a drop in their water levels. The use of water in fighting wildfires has also contributed to this drawdown. While some jurisdictions have been able to develop pipelines to other sources, others have had to resort to trucking water in.
<urn:uuid:f37f9cb4-a4ed-44a5-8652-53a96206eed5>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.climate.gov/teaching/resources?keywords=&page=8", "date": "2014-08-29T05:15:36", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500831903.50/warc/CC-MAIN-20140820021351-00209-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9224320650100708, "token_count": 507, "score": 3.515625, "int_score": 4 }
A dessert plum of a blue-black variety, that is often crystallized. More example sentences - On the 1933 and 1936 expeditions, ‘there were plenty of gourmet treats such as quails in aspic, Carlsbad plums and champagne.’ - The Portuguese candy sweet greengages, while Carlsbad plums are a speciality of the Czech Republic. - With whipped cream, toasted nuts and crystallised pears, apricots and Carlsbad plums, the result is something of a Fabergé egg. late 19th century: named after Karlsbad (now Karlovy Vary). Definition of Carlsbad plum in: - The British & World English dictionary
<urn:uuid:1f14f06c-367d-4081-9d36-2800502e587d>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.oxforddictionaries.com/definition/american_english/Carlsbad-plum", "date": "2014-08-29T06:39:56", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500831903.50/warc/CC-MAIN-20140820021351-00209-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.8858599662780762, "token_count": 153, "score": 2.5625, "int_score": 3 }