text
stringlengths
174
640k
id
stringlengths
47
47
dump
stringclasses
17 values
url
stringlengths
14
1.94k
file_path
stringlengths
125
142
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
43
156k
score
float64
2.52
5.34
int_score
int64
3
5
Poverty is not a new phenomenon in Pakistan since every third Pakistani falls prey to poverty. The wealth distribution in Pakistan is presenting a situation where one family looking for new BMW, while another family looks for one time meal. The ratio of poverty is higher than the other provinces in Balochistan which is known as the richest province of Pakistan where 52 % of total population is living below the poverty line, 33 % of Sindh population is living below the poverty line followed by KPK having 32 % ratio. Punjab which is considered as the urban area also has 19 % population, living below the poverty line. Government should take decisive steps to alleviate poverty in Pakistan, mainly, Balochistan needs outstanding concentration. Effective steps of government are required to reduce poverty in the resource rich Balochistan. Government should provide credit facilities and use labour intensives techniques of production to reduce poverty. Rehan Rind- Khuzdar Published in The Balochistan Point on February 24, 2016 Disclaimer: Views expressed in this letter are those of the author and The Balochistan Point not necessarily agrees with them.
<urn:uuid:9bf70c6c-2996-4bd4-925c-19d0ec08dc3b>
CC-MAIN-2023-14
https://thebalochistanpoint.com/letter-high-ratio-of-poverty-in-balochistan/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949678.39/warc/CC-MAIN-20230331175950-20230331205950-00366.warc.gz
en
0.939393
224
2.765625
3
Studying abroad is one of the best opportunities that students always get. However, for any student to be accepted in another country such as the US, he/she should be aware of the natives of that country. He/she should also be watchful of the backgrounds one comes from, hence whenever given such a chance, it is good to take note of to the host rules and regulations as well as being keen on learning the roots of the host country. In some countries, the natives are aware of the country of the new students and tend to act based on their knowledge of the country or what they think they know about that country (Wu, Garza & Guzman, 2015). Many students especially those from the Middle East find it hard studying in the US due to their understanding of their audience. The Americans normally see the Middle East as a region manifested by vast terrorist activities and dictatorship. Many of the American students see the Middle East inhabitants as people who are subjects to their leaders and lack democracy as well as national self-determination. As of such, they are obliged to conform to the dictates of their culture and the leadership in place. The American culture and policies are also against the Middle East as they refer to it as one full of oppression and brutality. The media has played a role in influencing the Americans in the Middle East. The political environment in the region is seen mostly like that of fear and conflict. This has affected most of the Americans perceptions and views on the Middle East. The media airs out the region as a hotbed of civil war. This has been the cause of misconceptions on all the inhabitants that comes from the region. It is a region full of radicalism and does not uphold the rights and freedoms of its citizens forcing them to take matters into their likings. The Middle East which is mainly Islamic brings in another value that the Americans feel insecure. Since most of the wars that the Middle East indulge in is normally associated with their religion, this scares them. Many of them associate the teachings of the Islamic religion as one which is violence based. Also, the Sharia law that governs them brings discomfort to the Americans. Such laws like cutting thieves hands, capital punishment and stoning are seen as extremists. In America, an individual is the central peak of social being while in the Middle East, social class and family background determine one's social being. Therefore their social being is controlled by their families instead of individual collectivity (Rupp, 2009). As a student, one has to be cautious not to offend the natives of the host country. The beliefs and values that one subscribes should not in any way interfere with the livelihood of the Americans. Some of the beliefs they have in the Middle East are in contrast to the reality. As a student from the Middle East, it is good to note them and clarify the truth about their misconceptions (Lin & Scherz, 2014). Even though the region is termed to be vested with terrorism, not everyone gets involved. The Americans believe in terror oriented people of the Middle East is an illusion. Majority of the people undergo very serious situations due to these terrorist and many are left homeless and live at the mercies of others. Being a student means that you can recognize what is wrong and right and familiarize with people of different diversities. Coming from a war zone gives you the firsthand outlook of what war brings to people and the country at large. Furthermore, terrorism affects all both internally and externally. Consequently, it is unjust for Americans to perceive all the Middle East inhabitants as terrorists especially students (Davie, 2013). Every nation has its own way of dealing with its people whenever they commit crimes. Thus, the laws by which they abide by should not affect one to pursue a career since they come from radical backgrounds. Therefore the extremist should be allowed to use their law as long as they also adhere to other forms of law from other countries. As a student from that region, they need to be aware of the laws that govern the host country and their understanding of the natives norms. The media should as well take note of regions that are peaceful and uphold the values of humanity. The Middle East is not all vested in terrorism and dictatorship since people are allowed to vote hence democracy is taken into account. The view being inflicted on the Americans is not the happenings of the entire region. Moreover, the media should also bring forth the good side of the region and encourage upholding of all cultures from all diversities (Moloney-Egnatios et al. 2014). In conclusion being a student in a foreign country requires one to be prudent on the whereabouts of the host country. As a student, especially in the USA one, is required to be cautious of where he/she comes from. Particularly coming from the Middle East a region known for its terrorist involvement has the natives enshrined in a variety of misconceptions. Everyone is worried and unsure of its inhabitants. None the less not all people are terrorists. Lin, S. Y., & Scherz, S. D. (2014). Challenges facing Asian international graduate students in the US: Pedagogical considerations in higher education. Journal of International Students, 4(1), 16-33. Moloney-Egnatios, L., Mielke, G., Trinh, J., & Young, M. (2014). The International Student Journey in the United States and The Netherlands: A Comparative Analysis. Washington, DC: American University School of International Service Cultural Diplomacy and International Exchange Practicum. Davie, W. R. (2013). The Arab Spring and the US Response: American and Middle Eastern Students Speak Out. Global Media Journal, 12, 1-23. Rupp, R. (2009). Higher education in the Middle East: Opportunities and challenges for US universities and Middle East partners. Global Media Journal, 8(14). If you are the original author of this essay and no longer wish to have it published on the thesishelpers.org website, please click below to request its removal: - Exploring Equity in Special Education - Article Review Example - Taking Naps Service to Improve Psychological Health among College Students - Coursework in Education: Learning Plan - Essay Sample: Second-hand Smoking and How It Affects Students - Presentation Example: My Final Story Project - My Psychological Purpose Final Paper V - Emory University - Admission Essay Example
<urn:uuid:6193d731-705c-49a4-ad20-e1b552c5ed79>
CC-MAIN-2023-14
https://thesishelpers.org/essays/essay-example-foreign-students-studying-in-the-us
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949678.39/warc/CC-MAIN-20230331175950-20230331205950-00366.warc.gz
en
0.960081
1,314
2.9375
3
I earned my Ph.D. in 1984. The hard skills I learned are now out of date. But I still use many of the soft skills most every day. One hard skill I learned, for instance, was how to code in Fortran. Not much call for that today. But I also learned how to use statistics, do experiments, weigh evidence, reach conclusions, defend my thinking, and communicate effectively. When companies invite me to consult with them, they want my process skills, not my Fortran skills. We have traditionally paid more attention – and more money – to hard skills. After all, hard skills are … well, hard to come by. As such, they must be worth more. My Fortran skills were hard to master, useful, and hard to replace in the job market. They were worth paying for. Hard skills, as traditionally defined, are often quantitative, structured, or rules based. They may include accounting, physics, financial modeling, proficiency in certain software packages, programming, data mining, data analysis, diagnostics, and so on. They are also teachable and testable. You can find plenty of coding bootcamps, for instance. If you want to know whether someone can program in Python, you can easily devise a test to find out. Soft skills, on the other hand, are “…more intrinsic to personality and more difficult to judge quickly.” Soft skills include the ability to get along with others, the ability to explain things, self-control, ability to focus, creativity, empathy, critical thinking, politesse, ability to negotiate effectively, and wisdom. You may not be born with soft skills, but you typically don’t acquire them in the classroom. You learn them from life. Additionally, hard skills tend to be immune to culture. Programming in Python is pretty much the same whether you’re French, or American, or Japanese. Soft skills often vary by culture. Communicating with senior executives is very different in Tokyo than in New York. Teaching hard and soft skills also varies. Online education is often effective for hard skills. Many hard skills are rules-based, and we can learn rules remotely. Learning soft skills requires time, coaching, and motivation. Instead of learning rules, we are modeling behaviors. Because they’re rules-based, hard skills are much more likely to be automated. I used to hire an accountant to do my taxes. Now, I use a software package on my laptop. Most rules-based processes – including computer programming, medical diagnoses, actuarial services, accounting, and stock trading – will likely be automated over the next decade. We won’t need nearly as many people in those professions. The pace of automation seems to be accelerating as well. I might have worked for 20 to 25 years as a Fortran programmer. Today, I suspect that learning Python will keep you employed for no more than five years or so. Then you’ll be replaced, perhaps by a computer. For all these reasons, I would like to change the names we use to describe these skills. Instead of hard skills and soft skills, I would call them temporary skills and durable skills. By changing the labels, we will also change our perceptions. Clearly durable skills are more valuable than temporary skills. By describing them more accurately, we can make our investments – in ourselves and others – more wisely. That’s a durable skill. I’m certainly not the first to propose new labels for hard and soft skills. Click here, here, and here for some of the articles that have shaped my thinking
<urn:uuid:4e172ed3-6602-499d-8d1d-020d4f92c5b0>
CC-MAIN-2023-14
https://traviswhitecommunications.com/2019/10/19/temporary-skills-versus-durable-skills/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949678.39/warc/CC-MAIN-20230331175950-20230331205950-00366.warc.gz
en
0.969855
742
2.5625
3
Controlling: A controlling feeding style is one in which parents are forcing, pushing or bribing their child to eat. Responsive: A responsive feeding style is one that works with a child’s developmental abilities but also sets limits for the child to adhere to. Neglectful: A neglectful feeding style could be due to many factors, including the busy lifestyle of the child’s parents, failure to address feeding difficulties or even abuse. Whatever the cause, this eating style is defined by parents not paying enough attention and time to a child’s eating habits. Indulgent: An indulgent feeding style is one in which parents allow their child to eat whatever they want, whenever they want, with no limits. Ideally, parents should strive to practice a responsive feeding style that encourages a child to harness his developmental capabilities, while still putting boundaries in place to discourage bad eating habits.
<urn:uuid:bb7a4f63-fd8e-4611-8208-c584ee5cfc4b>
CC-MAIN-2023-14
https://sg.theasianparent.com/expert-talk-5-feeding-tips-every-mother-should-know
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950373.88/warc/CC-MAIN-20230402012805-20230402042805-00366.warc.gz
en
0.965781
187
2.90625
3
The key difference between Barr body and Davidson body is that Barr body is an inactivated X chromosome in somatic cells of females while Davidson body is a nonspecific appendage in polymorphonuclear leukocytes in females. Sex chromatins in females have two specific structures as Barr body and Davidson body. Barr bodies are the inactivated X chromosomes present in somatic cells in females while Davidson bodies are the drumstick appendages of the polymorphonuclear leukocytes in females. Barr bodies can be visualized in somatic cells using a buccal smear while Davidson bodies can be visualized in a blood smear. 1. Overview and Key Difference 2. What is Barr Body 3. What is Davidson Body 4. Similarities Between Barr Body and Davidson Body 5. Side by Side Comparison – Barr Body vs Davidson Body in Tabular Form What is Barr Body? Barr body is an inactivated X chromosome seen in female somatic cells. This X inactivation takes place during the expression of the genes of somatic cells of females. In males, Barr bodies are absent. Murray Barr named these inactive X chromosomes in female somatic cells as Barr bodies. Barr body is in the state of heterochromatin, which is a transcriptionally inactive structure, while the other copy – active X chromosome – is in the euchromatin state. Once the Barr body is packaged into heterochromatin, none of the molecules involved in transcription can access the chromosome. Since all females have two X chromosomes, X inactivation or lyonization is important in order to prevent them from having twice as many X chromosome gene products as males. In short, Barr body production ensures that only the necessary amount of genetic information is expressed in females rather than doubling it. Throughout the cell’s whole life, one X chromosome of all somatic cells remains silenced. What is Davidson Body? Davidson body is a solitary nuclear appendage of WBC in females. They are drumstick structures with dense chromatic head. Especially in polymorpho-nuclear leukocytes, drumstick shaped mass of chromatin can be seen attached to one end of the nuclear lobe. Structurally, leukocyte Davidson bodies are stalked and rounded chromatin appendages which are 1.5 microns in diameter. They project from the neutrophilic nuclei. Davidson bodies can be used in sex determination in forensic medicine. A blood smear should be taken from the patient and stained with Leishman’s stain. This is a very easy and reliable method that takes very less time. Moreover, it is a cost-effective method. In fact, these Davidson bodies in blood smear are highly specific. Hence, it is highly used in sex determination studies. What are the Similarities Between Barr Body and Davidson Body? - Barr body and Davidson body are found in females. - They are two types of sex chromatins. - Both Barr bodies and Davidson bodies are helpful in the identification of an individual. - Davidson bodies in blood smear and Barr bodies in buccal smear are used for sex determination. What is the Difference Between Barr Body and Davidson Body? Barr bodies are condensed and inactivated X chromosomes of somatic cells. Davidson bodies are nonspecific drumstick appendages in neutrophil nuclear lobes. So, this is the key difference between Barr body and Davidson body. Generally, Barr bodies are identified in buccal smear while Davidson bodies are identified in a blood smear. The below infographic summarizes the difference between Barr body and Davidson body. Summary – Barr Body vs Davidson Body Barr body and Davidson body are two types of sex chromatins in females. Barr bodies are present in somatic cells, while Davidson bodies are present in leukocytes. Barr bodies are condensed inactivated X chromosomes in somatic cells. Davidson bodies are drumstick appendages of polymorphonuclear leukocytes. Thus, this is the key difference between Barr body and Davidson body. Both types of structures are seen only in females. Hence they can be used to determination of sex. 1. Harikrishnan, Prasad, et al. “Comparison_of_Davidson_Bodies_with_Barr_Bodies.” International Journal of Current Research, May 2018, Available here. 2. R Amirthaa Priyadharscini, TR Sabarinath. “Barr Bodies In Sex Determination”. Pubmed Central (PMC), 2020, Available here. 1. “BarrBodyBMC Biology2-21-Fig1” By Stanley M Gartler, Kartik R Varadarajan, Ping Luo, Theresa K Canfield, Jeff Traynor, Uta Francke and R Scott Hansen – BMC Biology 2004, 2:21 doi:10.1186/1741-7007-2-21 (CC BY 2.0) via Commons Wikimedia Leave a Reply
<urn:uuid:f7e11845-4ce0-4f20-8045-0c60bf362bcc>
CC-MAIN-2023-14
https://www.differencebetween.com/difference-between-barr-body-and-davidson-body/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950373.88/warc/CC-MAIN-20230402012805-20230402042805-00366.warc.gz
en
0.890103
1,041
3.265625
3
UGC NET Study Materials for Paper 1 (eBook with MCQ) ⇒ BUY NOW Evolution of Higher Learning and Research in Post Independence India: Our country has always been identified as knowledge hub since the beginning of human civilization. Indian higher education system has been witnessing metamorphic changes and challenges through the years, i.e., from the ancient Gurukul system to the modern technology-based learning system have changed the life of millions of people. This is evident from centres of learning which existed in the 7th century BC were the Buddhist monasteries and in the 3rd century AD was Nalanda (Perkin, 2006). Few of these centres were very large having several faculties. Invasions and disorder in the country have extinguished the ancient Indian education system. Britishers brought western and secular education, with an emphasis on scientific inquiry, to India. To eradicate such prevailing systems in the pre-independence era. Many commissions were set up to propose recommendations to make a change in the educational system. |UNIT X – Higher Education System (Click below on the topic to read the study notes) UGC NET Study Materials for Paper 1 (eBook with MCQ) ⇒ BUY NOW Evolution of Higher Learning and Research in Post Independence India After independence, India legally delegated all powers regarding education to the provincial governments which laid more stress on the objective of increasing access than quality. As per the recommendation of the Sarkar Committee (1945), higher technical institutes were formed based on the Massachusetts Institute of Technology in the four regions of India. This resulted in the setting up of the five Indian Institutes of Technology at Kharagpur (1950), Bombay (1958), Kanpur (1959), Madras (1960) and Delhi (1961). The All India Council for Technical Education was set up in 1945, to oversee all technical education (diploma, degree and post-graduate) in the country. Under the able leadership of Pandit Jawaharlal Nehru, the Government of India set up the University Education Commission (UEC) under the chairmanship of Dr. S. Radhakrishnan in 1948. The UEC discussed all aspects of university education, and based on its recommendation, the University Grants Commission (UGC) was set up in 1953 for the coordination of development and maintenance of standards in higher education. UGC became a statutory organization by the act of parliament in 1956. Since then, UGC has been effectively contributing to the Indian higher education system, framing appropriate policies needed to reform and revamp the higher education system. The Nehruvian Period (1947-1964) was more focused on large-scale industrialization which thereby gave impetus to the growth of higher technical institutions, but with Indira Gandhi taking over in 1964, the focus shifted to poverty and rural issues and the same tone is seen to be reflected in education as well. Set up in 1964, under the chairmanship of D.S. Kothari, the Education Commission (Kothari Commission) submitted its report in 1966 which set in motion the National Policy on Education (NPE) in 1968, still considered to be a landmark event in the history of India. The NPE became the basis of reforms that helped strengthen the higher education system in India. Another important development that followed was the 42nd Amendment to the Constitution, (as a part of the Centralization Agenda of Indira Gandhi during internal Emergency) which made Education a concurrent subject in Indian Constitution, that is, now education became a joint responsibility of the central and the state governments, while earlier it was solely in the hands of the state governments. All this while, the Planning Commission (established in 1950 by Nehru) with the Prime Minister as the ex-officio chairman, has formulated its five-year plans and the chief recommendations (with respect to higher education) of the first six five-year plans are presented in the following table. Five-Year Plans covering the period 1951-1985 (Focused on Evolution of Higher Learning and Research in India) |Five-Year Plan||Major strides in the area of higher education| |First FYP (1951-1956)||✔ UGC was set up in 1953 for proper funding, development and quality maintenance in higher education ✔ Five Indian Institutes of Technology (IITs) were started as major technical institutions. Second FYP (1956-1961) |✔ With an overall shift in focus from agriculture to manufacturing, more stress was laid on setting up of technical and professional institutes to produce skilled manpower ✔ The Tata Institute of Fundamental Research was established as a research institute ✔ Eleven Rural Institutes were established to educate the rural youth |✔ Rapid increase in the number of universities and colleges led to the deterioration of quality. Thus, UGC tried to introduce reforms in the institutions through improvement in the teacher-pupil ratio, introduction of post-graduate courses, improvements in libraries, laboratories and other infrastructures ✔ Larger facilities were provided for diverting students to vocational and technological education Fourth FYP (1969-1974) |✔ Main emphasis was on consolidation and improvement of higher education through the strengthening of staff and library and laboratory facilities. ✔ Affiliated colleges which provide education to more than 88 per cent of the university students were helped. ✔ Assistance for fuller development given to a few colleges selected on the basis of their achievements, existing facilities and potentialities. Fifth FYP (1974-1978) |✔ Fostering equity by providing additional facilities to weaker sections of society and the backward areas ✔ Expansion of facilities through evening colleges and correspondence courses ✔ Strengthening post-graduate and research by developing centres of advanced study ✔ Introduction of programmes of faculty development, like summer institutes, seminars and orientation programmes. Sixth FYP (1980-1985) |✔ Low emphasis on expansion ✔ Greater priority to improvement of quality of higher education ✔ Regulation of admission ✔ Stress on equity by assisting the disadvantaged groups ✔ Restructuring of courses for practical orientation and greater relevance As may be noticed above, the shift in focus from agriculture to manufacturing in the Second Plan led to a parallel shift in emphasis from elementary education to higher and higher technical education. This trend continued for quite some time, until the mid-1980s when the bias against school education was recognized. Thus, came the watershed year 1986, when PM Rajiv Gandhi-led Government of India decided to launch the long-pending revision of the 1968 National Policy on Education in order to prepare India to face challenges of the 21ST century. The National Policy on Higher Education (1986) translated the vision of Radhakrishnan Commission and Kothari Commission in five main goals for higher education, which include Greater Access, Equal Access (or Equity), Quality and Excellence, Relevance and Value-Based. The NPE of 1986 revamped the higher education system by its recommendations of expansion of Higher Educational Institutions (HEIs), development of autonomous colleges, redesigning of courses, enhancing quality research, training of teachers, increasing coordination between national and state-level bodies, fostering mobility between institutions. In 1992, the policy was revised by a committee under Janardhana Reddy, recommending planned development of higher education through different measures. The Action Plan of 1992 included schemes and programs which were directed towards the expansion of intake capacity in general, and that of the disadvantaged groups such as the poor, SC, ST, minorities, girls, the physically challenged persons, and those in the educationally backward regions, in particular. The Schemes/Programmes were designed to improve the quality through strengthening academic and physical infrastructure, to promote excellence in those institutions which have exhibited potential for excellence, and to develop curriculum to inculcate right values among the youth. Summary and journey of Higher education from 1986 to 2015 Five-Year Plans covering the period 1986-2014 |Five-Year Plan||Major strides in the area of higher education| |Seventh FYP (1985-90)||✔ More stress on speedy implementation of various reforms already initiated ✔ Indira Gandhi National Open University (IGNOU) was established ✔ Emphasis on quality and equity Eighth FYP (1992-97) |✔ After a period (1989-91) of political instability, this plan highlighted several weaknesses such as substandard institutions, outdated curriculum, lack of research ✔ Focus on integrated and cost-efficient higher education without compromising excellence and equity ✔ An information and library network “INFLIBNET” was proposed. |Ninth FYP (1997-2002)||✔ Focused on the deterioration of quality, the resource crunch and the problems of governance in higher education ✔ Stress on enhancing access and equity ✔ Target to grant autonomous status to 10% of eligible colleges Tenth FYP (2002-2007) |✔ Target to raise the enrolment in higher education of the 18-23 year age group from the present 6 per cent to 10 per cent by the end of the Plan period through strategies of increasing access, quality, adoption of state-specific strategies and the liberalization of the higher education system ✔ Emphasis on the relevance of the curriculum, vocationalization, and networking on the use of information technology |✔ As a wake-up call to prolonged neglect of higher education, the GOI set targets for the massive expansion ✔ Also, inclusion and rapid movement in quality by enhancing public spending, encouraging private initiatives and initiating the long-overdue major institutional and policy reforms ✔ Improve quality by working on a detailed reforms agenda including a) admission, curriculum and assessment; b) accreditation & ratings; c) teachers competence and motivation; and d) restructure affiliated colleges and research for policy formulation. ✔ Establish 30 new Central Universities, 16 in States where they do not exist and 14 as World-Class Universities, 8 new IITs, 7 new IIMs, 10 new NITs, 3 IISERs (Indian Institutes of Science, Education and Research), 20 IIITs and 2 new SPAs (School of Planning and Architecture) |Twelfth FYP (2012-2014) Planning Commission has been abolished in 2014 to usher in the NITI AAYOG |✔ Plans for inclusive expansion brought in under the RUSA (Rashtriya Uchchatar Shiksha Abhiyan) which would include up-gradation of autonomous and A-rated colleges into universities, increasing the intake capacity of existing higher education institutions, encouraging existing universities to start undergraduate programmers or integrated UG-PG programme; and creation of small, affiliating College Cluster Universities at the regional level ✔ Other steps would be to promote equal access to quality (Focused on Evolution of Higher Learning and Research in India) Current Scenario of Higher Education in India Higher Education sector has witnessed a tremendous increase in the number of Universities/University level Institutions & Colleges since Independence. The number of Universities has increased 50 times from 20 in 1950 to 993 in 2019. The sector boasts of 50 Central Universities of which 43 are under the purview of Ministry of Human Resource Development, 409 State Universities, 349 State Private universities, 127 Deemed to be Universities, 95 Institutions of National Importance (established under Acts of Parliament) under MHRD and four Institutions (established under various State legislations). The number of colleges has also registered a manifold increase of 84 times with just 500 in 1950 growing to 41,901 as on 31st March 2020. At present, the main categories of University/University-level Institutions are Central Universities, State Universities, Deemed-to-be Universities and University-level institutions. These are described as follows: Central University: A university established or incorporated by a Central Act. State University: A university established or incorporated by a Provincial Act or by a State Act. Private University: A university established through a State/Central Act by a sponsoring body viz. A Society registered under the Societies Registration Act 1860, or any other corresponding law for the time being in force in a State or a Public Trust or a Company registered under Section 25 of the Companies Act, 1956. Deemed-To-Be University: An Institution Deemed to be University, commonly known as Deemed University, refers to a high-performing institution, which has been so declared by Central Government under Section 3 of the University Grants Commission (UGC) Act, 1956. Institution of National Importance: An Institution established by Act of Parliament and declared as Institution of National Importance. Institution Under State Legislature Act: An Institution established or incorporated by a State Legislature Act. Important Institutions dealing with Higher Education The following institutions or organisation are responsible for Higher education (also, School Education) and research in India. University Grants Commission (UGC) The University Grants Commission is a statutory organization established by an Act of Parliament in 1956 for the coordination, determination and maintenance of standards of university education. Apart from providing grants to eligible universities and colleges, the Commission also advises the Central and State Governments on the measures which are necessary for the development of Higher Education. It functions from New Delhi as well as its Seven Regional offices located in Bangalore, Bhopal, Delhi, Guwahati, Hyderabad, Kolkata and Pune. National Council of Educational Research and Training (NCERT), New Delhi NCERT is an organisation set up by the Government of India, with headquarters located at Sri Aurbindo Marg in New Delhi, to assist and advise the central and state governments on academic matters related to school education. It was established in 1961. Inter-University Centres (IUCs) The UGC establishes autonomous Inter-University Centres within the university system under Clause 12(ccc) of the UGC Act. The objectives for setting up these centres are: - To provide common advanced centralized facilities/services for universities which are not able to invest heavily in infrastructure and other inputs. - To play a vital role in offering the best expertise in each field to teachers and researchers across the country. - To provide access to research and teaching community to the state-of-the-art equipment and excellent library facilities which are comparable to international standards. The Nuclear Science Centre at New Delhi (now called Inter-University Accelerator Centre) was the first research centre established in 1994. As of today, six Inter-University Centres are functioning within the university system, which is as follows: - Inter University Accelerator Centre (IUAC), New Delhi - Inter University Centre for Astronomy and Astro-Physics (IUCAA), Pune - UGC-DAE Consortium for Scientific Research (UGC-DAECSR), Indore - Information and Library Network (INFLIBNET), Ahmedabad - Consortium for Educational Communication (CEC), New Delhi - National Assessment and Accreditation Council (NAAC), Bangalore - Inter University Centre for Teacher Education, Kakinada Councils for Higher Education and Research 1. Indian Council Of Social Science Research (ICSSR), New Delhi The Indian Council of Social Science Research (ICSSR) was established in 1969 for promoting social science research, strengthening different disciplines, improving quality and quantum of research and its utilization in national policy formulation. To realize these objectives, the ICSSR envisaged development of institutional infrastructure, identifying research talents, formulating research programmes, supporting professional organizations and establishing linkages with social scientists in other countries. The ICSSR provides maintenance and development grants to various Research Institutes and Regional Centres across the country. Regional Centres have been set-up as extended arms of the ICSSR to support research and development of local talents and its programmes and activities in a decentralized manner. Since 1976, the ICSSR has been carrying out surveys of research in different disciplines of social sciences. With a view to give special emphasis to the promotion of social science research in the North Eastern Region, initiatives have been taken in the ICSSR to support research proposals and other activities. 2. Indian Council Of Philosophical Research (ICPR), New Delhi Indian Council of Philosophical Research (ICPR) was set up in 1977 by the Ministry of Education, Government of India as an autonomous organization for the promotion of research in Philosophy and allied discipline. The ICPR was born out of the conviction that Indian philosophy tradition deserves to have an exclusive and special agency in the country. The Council has a broad-based membership comprising of distinguished philosophers, social scientists, representatives of the University Grants Commission, Indian Council of Social Science Research, Indian Council of Historic Research, Indian National Science Academy, the Central Government and the Government of Uttar Pradesh. The Governing Body (GB) and the Research Project Committee (RPC) are the main authorities of the council. These bodies are vested with well-defined powers and functions. 3. Project Of History Of Indian Science, Philosophy & Culture (PHISPC) PHISPC was launched in the year 1990 under the aegis of Indian Council of Philosophical Research (ICPR) with the basic objective of undertaking inter-disciplinary study so that inter-connection between Science, Philosophy and Culture as developed in the long history of Indian civilization, could be brought out in detail. From April 1, 1997, PHISPC was officially de-linked from Indian Council of Philosophical Research (ICPR) for a greater autonomy to complete the project by the stipulated period and is now affiliated to Centre for Studies in Civilizations (CSC). Government of India has recognized CSC as the nodal agency for the purposes of funding the ongoing research project, PHISPC. 4. Indian Council Of Historical Research (ICHR), New Delhi Indian Council of Historical Research is an autonomous organization which was established under the Societies Registration Act (Act XXI of 1860) in 1972. The prime objectives of the Council are to give a proper direction to historical research and to encourage and foster objective and scientific writing of history. The broad aims of the Council are to bring historians together, provide a forum for the exchange of views between them, and give a national direction to an objective and rational presentation interpretation of history, to sponsor historical research programmes and projects and to assist institutions and organizations engaged in historical research. It has a broad view of history so as to include in its fold the history of Science and Technology, Economy, Art, Literature, Philosophy, Epigraphy, Numismatics, Archaeology, Socio-Economic formation processes and allied subjects containing strong historical bias and contents. The ICHR has established two Regional Centres, one at Bangalore and the other at Guwahati with a view to reaching out the far-flung areas of the country. 5. National Council of Rural Institutes (NCRI), Hyderabad The National Council of Rural Institute is a registered autonomous society fully funded by the Central Government. It was established on October 19, 1995, with its Headquarters at Hyderabad. Its main objectives are to promote rural higher education on the lines of Mahatma Gandhi’s vision for education so as to take up challenges of micro-planning for the transformation of rural areas as envisaged in National Policy on Education (NPE) 1986. In order to achieve its objectives, the NCRI has been identifying various programmes for providing support and financial assistance, to be taken up by suitable institutions including voluntary organizations. Refs: Sen, D. (2016). Higher education policies: The Indian experience since Independence. Higher education, 1(10). UGC NET Syllabus (Updated): Paper 1 and 2 Solved Question Papers of UGC NET Paper 1 UGC NET Study Materials for Paper 1 (Download PDF) MPhil and PhD Fellowship
<urn:uuid:b6efe1d7-14af-4fc4-a593-2711fd3870e4>
CC-MAIN-2023-14
https://www.scholarify.in/evolution-higher-learning-research-india/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950373.88/warc/CC-MAIN-20230402012805-20230402042805-00366.warc.gz
en
0.93614
4,198
2.703125
3
Definition, Synonyms, Translations of mileages by The Free Dictionary Total length, extent, or distance measured or expressed in miles. Total miles covered or traveled in a given time. The amount of service, use, or wear estimated by miles used or traveled: This tire will give very good mileage. The number of miles traveled by a motor vehicle on a given quantity of fuel. An allowance for travel expenses established at a specified rate per mile. Expense per mile, as for the use of a car. The amount of service something has yielded or may yield in the future; usefulness: a tape player that still has a lot of mileage left. American Heritage® Dictionary of the English Language, Fifth Edition. Copyright © 2016 by Houghton Mifflin Harcourt Publishing Company. Published by Houghton Mifflin Harcourt Publishing Company. All rights reserved. (Units) a distance expressed in miles (Automotive Engineering) the total number of miles that a motor vehicle has travelled (Commerce) allowance for travelling expenses, esp as a fixed rate per mile (Automotive Engineering) the number of miles a motor vehicle will travel on one gallon of fuel use, benefit, or service provided by something: this scheme has a lot of mileage left grounds, substance, or weight: some mileage in the objectors’ arguments Collins English Dictionary – Complete and Unabridged, 12th Edition 2014 © HarperCollins Publishers 1991, 1994, 1998, 2000, 2003, 2006, 2007, 2009, 2011, 2014 the aggregate number of miles traveled in a given time. length, extent, or distance in miles. the average distance a vehicle can travel on a specified quantity of fuel. wear, use, or profit: to get good mileage out of an old coat. an allowance for traveling expenses at a fixed rate per mile. Random House Kernerman Webster’s College Dictionary, © 2010 K Dictionaries Ltd. Copyright 2005, 1997, 1991 by Random House, Inc. All rights reserved.
<urn:uuid:7e89e5a7-2cb6-45ad-a4e9-712a481c2876>
CC-MAIN-2023-14
https://www.mileages.net/mileages/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943845.78/warc/CC-MAIN-20230322145537-20230322175537-00566.warc.gz
en
0.82258
581
3.140625
3
Near Penderyn along the south edge of Brecon Beacons National Park, Cwm Cadlan National Nature Reserve contains alkaline fens, molinia or fen meadows, other marshy grassland, and patches of the acidic grassland that is more typical of this part of Wales - an unusual mix of habitats, which sustains such rare plants as bog pimpernel, bog asphodel, marsh helleborine, marsh lousewort, globeflower, common butterwort and bogbean, together with a wide range of sedges, rushes and grasses. Sundews are also locally abundant, while other orchids found here are early marsh, fragrant, heath spotted and common spotted. Bogbean can bloom as early as March but in general the peak flowering times are in midsummer, from June to August. Two insects of particular note are the marsh fritillary butterfly and the demoiselle damselfly. The site is mostly underlain by limestone and is relatively flat, occupying the floor of a wide, shallow valley between gently sloping land rising to extensive moorland to the north (Cefn Cadlan) and south (Mynydd-y-glog), so the place is naturally wet, due to lime-rich water seeping down from the hills in the form of springs and streams. Past agricultural modifications, principally construction of drainage ditches have led to a decline in the extent of the wetland habitats, and work is ongoing to restore the land to its original state. This reserve is not much publicised so is little visited. The land within the NNR extends for nearly a mile along the valley, and most is also within both the Cwm Cadlan SAC, and SSSI (Special Area of Conservation, and Site of Special Scientific Interest), which continue for over a mile further northeast. A stream, Nant Cadlan, runs through the valley, joined by a few tiny tributaries; all are lined by woodland, but away from the flowing water nearly all the site is treeless, mostly rough grassland with occasional rock piles, crossed by a few ancient field boundaries and also by several tracks and paths. The suggested walk is 0.6 miles, across the main stream and up the far side of the valley through gradually drier surroundings, to the picturesque ruin of a long abandoned farm (Cae'r-Arglwydd), and although the round trip takes less than an hour, a whole day could be spent exploring more extensively, and looking for unusual plants and insects. The nature reserve is reached by the undesignated road linking Penderyn, along the A4059, with Llwyn-on Reservoir beside the A470, north of Merthyr Tydfil. The site is identified by a notice and a small layby for parking, just less than one mile northeast of the village. The entrance path follows an old vehicle track, past three gates then down through a belt of trees, between ancient mossy walls, to a footbridge across the stream. On the far side it climbs slightly across a field to a junction, where the eastern branch leads to the farm ruin, a relatively high location that gives the best overall views of the area, while the other branch follows the valley further downstream to the southwest. There appear not to be any other entry points into the reserve. The rarest plants are concentrated in the alkaline fens, which cover about one sixth of the site; these are permanently wet areas, surrounding seeps and springs. The largest of the fens in the SSSI are east of the NNR further up the valley but there are several smaller areas beside the stream in the reserve, the closest to the path being just before the footbridge, on the east side. Surrounding the alkaline fens are larger areas of fen meadow - wet grassland, still calcareous through not directly fed by flowing water, and a good example of this is on the south side of the stream along the first half of the track to the ruined farm. Away from the paths it is relatively easy to walk cross-country in most areas of the reserve though some places are marshy and/or tufty, while some parts, close to the stream, are quite overgrown.
<urn:uuid:91dd124b-845a-4246-bfb2-4dc2a586fe25>
CC-MAIN-2023-14
https://www.uksouthwest.net/rhondda-cynon-taf/cwm-cadlan-national-nature-reserve/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943845.78/warc/CC-MAIN-20230322145537-20230322175537-00566.warc.gz
en
0.955094
886
2.75
3
As more companies rely on cloud-based technology, particularly because remote working is so widespread, it’s crucial to ensure systems are secure and confidential data remains protected. Using cloud storage is not necessarily dangerous, but there are some security weaknesses that businesses should be aware of and understand how to prevent. The following are some of the most common cybersecurity pitfalls: A key cloud security risk is poor security measures, resulting in data breaches. Businesses must ensure their online storage provider guarantees complete protection against leakage or unauthorised access to personal and sensitive data. Not all cloud service providers are equipped to deal with producing backups when needed, meaning data loss is a risk if businesses do not store their files with an organisation that offers reliable backups. Cloud services often come with publicly-accessible URLs for uploading and downloading files; this may result in data leakage if improper security controls are used. Businesses must mitigate this risk via strong link encryption and restrictive access. Cybercriminals can obtain login information to access sensitive data stored in the cloud and are known to exploit vulnerabilities in network infrastructure, so best practice is to use strong passwords that are changed frequently. Security threats aren’t only external: administrators, developers and other trusted employees with access to sensitive data may cause damage by accident. Training your staff on how to correctly use cloud software is vital. Cloud services with insecure APIs threaten the confidentiality and integrity of information and risk the exposure of your data and systems. Typically, there are three types of attacks that hackers will use to try to compromise APIs: brute force attacks, denial-of-service attacks and man-in-the-middle attacks. No control over repositories You typically have little control over where your data is stored; if a breach occurs, you may not even be aware if it happened or where. To mitigate this risk, it’s advised that admins understand the security measures at each location and encrypt their data before uploading. Best practices for risk management Cloud penetration testing Cloud penetration testing should be conducted regularly as part of your business’s risk management strategy as it’s an effective and proactive way to assess a cloud-based system’s cyber security strength. It probes vulnerabilities within the cloud, as a real-world hacker would, to test the system. Ensure that your online storage provider has a business continuity plan that outlines their strategy for protecting information stored within their servers in the case of any serious emergencies, such as natural disasters or terrorist attacks. You should also ask how often they test this plan to make sure everything works properly. Data security audit Ask your service provider whether they perform routine audits of security controls to protect end users’ personal data and sensitive files stored throughout their networks; if not, then you might want to look for another cloud computing partner who can provide complete transparency regarding the security measures implemented by their system’s administrators. You should also ask your cloud storage provider if they offer training to help educate staff about potential cyber threats and security risks involved with cloud services. Employees must understand the inner workings of their company’s data management system, especially when it comes to avoiding social engineering attacks on end users’ personal information and files stored remotely. Be aware that many service providers fail to provide 24/7 support for clients, which can be very frustrating whenever problems occur outside office hours. Ask your online storage provider if they offer 24/7 technical support for their customers, or at least ensure you know the average response time to resolve any service-related issues. There’s no doubt cloud computing provides businesses with access to their important data virtually, from anywhere, without needing to maintain a server. However, with remote access to sensitive and business-critical data, there is a need for sufficient risk management to prevent hackers from breaching cloud applications. Understanding the risks and vulnerabilities of cloud services is crucial to safeguarding your business against cyber criminals. Cyber security solutions that include cloud penetration testing services will go a long way to providing greater peace of mind for businesses concerned about their cloud security. Cloud pen testing can identify and manage threat monitoring for most cloud service providers and deliver detailed threat assessments to businesses. Before signing up for a cloud provider, you should check they offer the security your business needs. The more you research, the easier it’ll be to determine which companies offer the best features and security for your needs, as well as which ones have a proven confidentiality track record. Defense.com believes cyber security should be a priority for everyone and is helping make world-class cyber protection accessible for all companies.
<urn:uuid:6fad3340-49be-42ac-9718-d8c1b3be8318>
CC-MAIN-2023-14
https://www.cloudcomputing-news.net/news/2022/aug/18/cloud-computing-security-risks/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945218.30/warc/CC-MAIN-20230323225049-20230324015049-00566.warc.gz
en
0.936267
967
2.59375
3
In the absence of bold new policies, the annual production of fossil-fuel-based plastics is set to top 1.2 billion tonnes by 2060 and waste to exceed one billion tonnes, according to the Organisation for Economic Co-operation and Development (OECD). Plastic production is expected to grow faster than the one of most raw materials. The growth will be fastest in developing and emerging countries in Africa and Asia, although the 38 OECD members will still produce much more plastic waste per person (238 kg per year on average) in 2060 than non-OECD countries (77 kg). Even with aggressive action to cut demand and improve efficiencies, plastic production would almost double in less than 40 years, the international organisation projects. However, such globally coordinated policies could hugely boost the share of future plastic waste that is recycled, from 12 to 40 percent. “If we want a world that is free of plastic pollution, in line with the ambitions of the United Nations Environment Assembly, we will need to take much more stringent and globally co-ordinated action,” OECD Secretary-General Mathias Cormann said. Alarm over plastics pollution There is increasing international alarm over volume and omnipresence of plastics pollution, and its impact. Infiltrating the most remote and otherwise pristine regions of the planet, microplastics have been discovered inside fish in the deepest recesses of the ocean and locked inside Arctic ice. The debris is estimated to cause the deaths of more than a million seabirds and over 100,000 marine mammals each year. "Plastic pollution is one of the great environmental challenges of the 21st century, causing wide-ranging damage to ecosystems and human health," Mathias Cormann added. Since the 1950s, roughly 8.3 billion tonnes of plastic have been produced with more than 60 percent of that tossed into landfills, burned or dumped directly into rivers and oceans. Some 460 million tonnes of plastics were used in 2019, twice as much as 20 years earlier. The amount of plastic waste has also nearly doubled, exceeding 350 million tonnes, with less than 10 percent of it recycled. Coordinated policies could strongly increase recycling The report contrasts a business-as-usual trajectory with the benefits of more ambitious global policies of reduced plastic use and pollution. Driven by economic growth and an expanding population, plastics production is set to increase under either scenario, the OECD warns. Where policies can make a huge difference is in the handling of waste. The report looks at the impact of two potential scenarios. The first, a regional action scenario comprising a mix of fiscal and regulatory policies primarily in OECD countries could decrease plastic waste by almost a fifth and more than halve plastic leakage into the environment without a substantial impact on global GDP, which would be lower by 0.3% by 2060. The second, a global action scenario comprising more stringent policies implemented worldwide, could decrease plastic waste by a third and almost completely eliminate plastic leakage to the environment while lowering global GDP by an estimated 0.8%. Currently, nearly 100 million tonnes of plastic waste is either mismanaged or allowed to leak into the environment. "Co-ordinated and ambitious global efforts can almost eliminate plastic pollution by 2060," the report concludes. According to the OECD, policies to reduce the environmental impacts of plastics and encourage a more circular use of them should include: taxes on plastics, including on plastic packaging; incentives to reuse and repair plastic items; targets for recycled content in new plastic products; extended producer responsibility (EPR) schemes; improved waste management infrastructure; increased litter collection rates. Earlier this year, the United Nations set in motion a process to develop an internationally binding treaty to limit plastic pollution.
<urn:uuid:405fb403-9c62-47ba-a1c5-efe0584f6ddb>
CC-MAIN-2023-14
https://www.premiumbeautynews.com/en/global-plastic-waste-on-track-to,20457
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945218.30/warc/CC-MAIN-20230323225049-20230324015049-00566.warc.gz
en
0.934739
756
3.84375
4
In practically every case studied, the lower parathyroid artery came from a prominent branch of the inferior thyroid artery. Ten entire specimens were found suitable for accurate plotting. This would ordinarily give twenty Opportunities for examining the inferior parathyroid artery, but since the gland was not found in one instance, the actual number of Observa tions was nineteen. In six instances the inferior parathyroid gland was clearly below the lower margin of the thyroid, and the parathyroid artery in these cases coursed as a distinct, usually unbranched, vessel to the hilus of the glandule. The findings Of others would indicate that so great a proportion of these cases isiprobably a unique experience. In such cases, the parathyroid artery has measured between two and three centi meters in length; in all other cases its course is seldom in excess Of four or five millimeters. The upper parathyroid gland invariably has a short artery of supply which may arise from one of the main branches Of the inferior thyroid or from an anastomosing ramus joining the superior and inferior thyroid arteries. A very prominent anas tomosing channel was found along the posterior margin of the lateral thyroid lobe in eight of twenty instances and in these cases the superior parathyroid artery was a short branch from this channel. Most often, however, the angle at which the parathyroid vessel came Off from its parent trunk suggested strongly that its blood stream was usually from the inferior source. |Categoria||Lingua Straniera - Inglese|
<urn:uuid:d692c86c-7d54-41b5-8bcd-48e9d8792267>
CC-MAIN-2023-14
https://forgottenbooks.com/it/books/AnnalsofSurgery_10009506
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945317.85/warc/CC-MAIN-20230325064253-20230325094253-00566.warc.gz
en
0.92521
397
2.78125
3
10 Best Foods for Healthy Hair Growth Consuming the right foods for you hair can affect the status of your hair and encourage hair growth. Certain vitamins and minerals found in food are also associated with healthy hair and your daily need. (Learn more about how much of each nutrient you need every day ) The multiple nutrients below are important to hair growth: Vitamin C: It helps your body absorb iron, a mineral necessary for hair growth; creates collagen to strengthen hair structure Vitamin D: It can stimulate hair follicles where new hair can grow. Low levels of vitamin D are linked to alopecia. Vitamin E: It’s an antioxidant to reduce oxidative stress. According to a study, people with hair loss experienced hair growth after supplementing with vitamin E. Biotin: One of several vitamins that play a role in the growth of healthier, thicker hair. If you aren’t getting enough biotin, you may experience hair loss or a scalp red rash. Omega-3: It has anti-inflammatory properties to promote hair growth, thereby making up for hair loss. Also, it prevents dry and flaky scalp. Iron: Iron helps blood cells carry oxygen to your cells and makes an important mineral for many bodily functions, including hair growth. The following sections look at key nutrients for hair growth and which food contain them. 1. Salmon: As a rich source of omega-3 fatty acids and protein, salmon can keep those strands strong. Also on has many benefits: reducing inflammation and benefiting your brain. 2. Egg: Egg is a good source of biotin, a mineral that may help boost hair growth, and also contain other compounds that can boost hair growth, including L-lysine, vitamin D, and certain minerals. 3. Greek Yogurt: Yogurt has probiotics and good bacteria to help your body absorb nutrients and maintain healthy skin and hair. 4. Blueberries: Blueberries are rich in antioxidants, including vitamin B and proanthocyanidins. Thus, your hair follicles get added immunity against damage by free radicals. 5. Nuts: Nuts are very rich in selenium. Newly forming hair takes up selenium after receiving trace elements from the blood. 6. Avocados: Avocados are delicious, nutritious and a great source of healthy fats, also an excellent source of vitamin E, which may promote hair growth and protects areas of skin. 7. Seeds: Seeds deliver a massive nutrients to promote hair growth. These include vitamin E, zinc and selenium. An ounce of sunflower seeds provides nearly 50% of your daily vitamin E needs, with a wide variety of hair-healthy B vitamins. 8. Beans: Beans and other legumes are full of hair-nourishing ingredients, like protein, B-vitamins, and zinc. They are essential to hair growth. 9. Pumpkin: Pumpkin is a natural and powerful method of encouraging hair growth, and full of minerals such as potassium and zinc which work to keep hair healthy and encourage hair re-growth. 10. Barley: If you are suffering from hair loss, eating barley can promote better blood flow to the scalp in order to help hair follicles survive. While having essential nutrients is important for hair growth, using the most advanced laser hair device can boost your hair growth! With FDA Clearance and safety examinations, InStyle-Egg® Laser Cap is effective and safe on hair loss treatment for both men and women! Try it risk-free today!
<urn:uuid:705cafea-b08f-4e14-8323-b3a25fb74c9d>
CC-MAIN-2023-14
https://instyle-egg.net/best-foods-for-hair-growth/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945317.85/warc/CC-MAIN-20230325064253-20230325094253-00566.warc.gz
en
0.930183
734
2.609375
3
Application of Smart Irrigation Controller equipment Application of intelligent irrigation equipment In the United States, outdoor water use alone averages over 9 billion gallons of water per day, primarily for landscape irrigation. As much as 50% of water is wasted due to overwatering due to traditional irrigation methods and system inefficiencies. Smart irrigation technology is the answer.Applications of smart irrigation controllers are becoming more and more common today. Smart irrigation systems automatically customize watering schedules and run times to meet specific landscape needs. These controllers significantly increase outdoor water use efficiency. Smart irrigation controller is more convenient Unlike traditional irrigation controllers that run on preset programs and timers, smart irrigation controllers monitor weather, soil conditions, evaporation, and plant water use to automatically adjust watering schedules based on site conditions. For example, as outdoor temperatures increase or rainfall decreases, smart irrigation controllers consider site-specific variables such as soil type, sprinkler application rates, and more to adjust watering run times or schedules. There are several options for smart irrigation controllers. Soil Moisture Sensors for Use with Smart Irrigation Controllers Smart irrigation controllers based on soil moisture sensors use one of several proven technologies to measure soil moisture levels. When buried in the root zone of turf, trees or shrubs, the sensor can accurately determine the moisture content in the soil and transmit that reading to the controller. There are two different soil moisture sensor based systems available: A pause cycle irrigation system that is set up like a traditional timer controller with a watering schedule, start time and duration. The difference is that the system stops the next scheduled irrigation when there is enough moisture in the soil. On-Demand Watering No need to program watering durations (just start time and days of the week). It has a user-set lower and upper threshold, and it initiates irrigation when soil moisture levels fail to meet those levels.
<urn:uuid:656a281f-ac34-4c71-aa28-4ebb522245d0>
CC-MAIN-2023-14
https://jxctiot.in/news/2576.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945317.85/warc/CC-MAIN-20230325064253-20230325094253-00566.warc.gz
en
0.899814
383
2.84375
3
6 Essential Items Every Science Laboratory Needs to Have Science laboratories are vital for any school, college, or university. They allow students to learn about chemistry, biology, and physics in a hands-on way that can’t be replicated in a classroom. But what are the essential items that every science laboratory needs? 1) Safety Equipment & Materials One of the most important items a science lab can have is safety equipment and materials. With so many dangerous chemicals in use, the odds of something going wrong increase the longer you work with them. Science lab safety gear and materials include goggles, gloves, face masks, other protective garments, safety glasses, hardhats (with or without light), and dust masks. Take careful note that certain paints can also cause serious health problems when breathed in. 2) Eye Wash Stations Make sure to provide eyewash stations for your students. Eyewash stations, also known as washbasins or sink stations, are small sinks filled with running water and used to rinse off after working with chemicals or performing other dangerous procedures. They are also extremely useful in medical labs. A microscope is another essential item for a science lab. Combined with microscopy slides, a microscope makes it easy to observe all kinds of tiny objects that are too small to be seen by the naked eye. Remember to provide your students with both an eyepiece and a standard magnifier, so they can easily adjust the magnification. Microscope kits allow you to make your own slides, but be careful while using these. Some unqualified suppliers sell unsuitable specimens. 4) Fire Extinguisher No one wants to be caught in a science lab fire, and having a fire extinguisher, and a fire blanket nearby is vital. In addition to acting as first-aid gear, these items allow the science lab to function safely after an accident occurs. Fire extinguishers and other fire safety systems are necessary for any laboratory that uses fire. They simply aren’t worth the risk of not using them! 5) Laboratory Fume Hoods Fume hoods are essential for any lab that deals with dangerous chemicals. They allow the fumes to be vented outside, preventing them from building up in the lab and posing a danger to the students. 6) First Aid Kits Make sure to keep a first aid kit in your science lab. First aid kits are nothing but a collection of supplies, some basic medical equipment, and do-it-yourself (or non-do-it-yourself) treatments that can be used on people who become ill while working in the lab. A first aid kit should include medicines, bandages, antiseptics, and other supplies that you can use during or after an emergency. When buying a first aid kit, it is important to consider the type of workplace you have. If your entire lab is working with chemicals and biomedical equipment, then you need a bigger first aid kit than what you may need for a different workplace. Science labs are an essential part of any school or college, but they can also be dangerous. For this reason, they need to be well-equipped with safety materials and equipment found at locscientific.com. Take the time to invest in the proper tools, and your students will pay you back with years of safe, educational work!
<urn:uuid:b755a35c-ad35-47ae-bb6d-a054a3e15f1b>
CC-MAIN-2023-14
https://small-bizsense.com/6-essential-items-every-science-laboratory-needs-to-have/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945317.85/warc/CC-MAIN-20230325064253-20230325094253-00566.warc.gz
en
0.942081
682
3.5625
4
AI in Warehouse Management Learn how Artificial Intelligence is changing the way modern warehouses conduct their business and how it can be used by online retailers. Alexa, please automate my warehouse! If automating the warehouse were that easy, how convenient would that be? The warehouse needs a brain to process all the information it receives and initiate automatic responses to manage a range of scenarios and arrive at a similar future. Artificial intelligence, or AI, is the name for that brain. AI has moved beyond the cinema and into everyday life, from our homes, transportation, and mobile devices to ground-breaking developments in business and Industry 4.0. Warehouse management and supply chain logistics are being transformed by artificial intelligence and machine learning, quickly altering how we think about the industry. Modern warehouses as we know them today have developed thanks to various artificial intelligence solutions. With the help of these tools, businesses can meet the demands of always-on eCommerce, the need to manage a sizable number of SKUs with fewer mistakes, and the need for quicker response times. Here is how artificial intelligence in the warehouse is progressing, both in the past few years and in the future. Value of AI in Warehouse AI in warehouse generates value through various sub-technology, including machine learning, natural language processing, robotics, and computer vision. Here's how each one works. Machine learning employs algorithms to "learn from experience" and make practical warehouse decisions. It detects sensor data patterns and recommends faster replenishment of nearly out-of-stock items, shorter walking routes, and better inventory positioning. Some AI features make warehouse wearable technology possible. Natural language processing enables voice-picking, allowing workers to work hands-free and more safely. Smart glasses have cameras that use computer vision to recognize barcodes automatically. Cameras strategically placed throughout the warehouse also use computer vision to enable end-to-end product tracking. Finally, robotics gives AI a physical presence, spatial awareness, and the ability to move in the real world. The capabilities of AI robots can range from loading or unloading a pallet to moving cargo around the warehouse and performing picking operations. 8 Ways AI is Transforming Warehouse Management Consider traveling back to a large warehousing facility in the 1980s or 1990s. It would bring to light today's warehouse technological advances if you could. Consider what a warehouse might look like in 2050 or later. Probably very different from today. Mentioning AI may elicit strange looks in some warehouses. However, many employees and even managers are unaware they are already utilizing AI solutions. Even if they aren't, their competitors most likely are. Here are eight ways AI is reshaping warehouse management. Increase the efficiency of pick-and-pack processes. Processes are transformed and streamlined because of ML enabling managers to leverage the efficiency of the most productive pickers to develop a fully integrated system-directed solution. Slotting software already includes an interface with operating rules to be implemented in the smart warehouse and a recommended SKU strategy based on sales histories and forecasts. While humans still use personal knowledge and experience to adjust slotting strategies, this will be phased out in favor of ML algorithms. Automated systems that use AI and machine learning algorithms can communicate at a rate that is exponentially faster than human operators. Many warehouse-related activities are already automated, but incorporating IoT-enabled devices into these processes will significantly improve both speed and accuracy. Wireless cloud data communications allow all elements of your system to participate in a conversation that includes system monitoring and control. Additionally, deep learning techniques enable computers to continuously analyze the data streams generated by these parts, allowing them to make adjustments and advancements in an integrated WMS (Warehouse Management System) in real-time. Payroll expenses will be reduced, offset initially by the required technological investment. The most contentious way AI will transform warehouse management is in labor costs. At this stage of development, robot assistance has only a marginal impact on existing operations. Still, AI has the potential - and will have the potential - to improve machine handling capabilities, with 30% of UK warehousing jobs becoming fully automated by 2030. Data collection, processing, and predictable physical activities are the most likely sectors for automation. Established eCommerce enterprises claim that increasing automation will create jobs by increasing the overall scale of their business activities, but this will be determined as time goes on. Reduced operator error and processing times can increase overall efficiency and productivity. Another way AI will transform warehouse management is through logistics optimization. Consider calculating the number of pallets that need to be moved on any given day, the amount of equipment required to handle that movement, and the corresponding labor requirement. Previously, such calculations relied on operator skill level and SKU (stock-keeping units). Now, ML algorithms allow for detailed stock movement forecasting and management to fine-tune material handling. Robots can pick up and redistribute goods in a fraction of the time that human operatives do. Based on the size, number, weight, and product type, ML algorithms can assist warehousing bots in determining the most efficient picking and slotting routes and the best packaging. Some machines can now pack their products, using AI to optimize space and materials. End-to-end visibility across many supply chains is provided for the first time by combining machine learning with advanced analytics, IoT sensors, and real-time monitoring. Many supply chains today require an entirely new operating platform or architecture based on real-time data enriched with patterns and insights not visible with previous analytics tools. Machine learning will be a critical component of future supply chain platforms, revolutionizing every aspect of supply chain management. Machine learning is becoming more widely used in Logistics Control Tower operations to provide new insights into improving every aspect of supply chain management, collaboration, logistics, and warehouse management. Machine learning excels at visual pattern recognition, which opens up a wide range of potential physical asset inspection and maintenance applications across an entire supply chain network. AI and ML enable the discovery of patterns in supply chain data by creating and interpreting algorithms that quickly identify the most influential factors in the success of a supply network while constantly learning in the process. This practice of discovering new patterns in supply chain data can transform any business. Free up resources previously spent on inventory control for other areas of business growth. Radio Frequency Identification (RFID) replaces paper trails and barcode scanners for inventory organization and control, tracking products with digital tags and enabling more precise and accurate inventory control. Because the system uses radio waves to transfer data, RFID scanners do not require direct line-of-sight control; instead, they are pointed in the general direction of a product to identify it and direct its movement into, out of, and around the warehouse. Companies Using AI in Warehouse Let's look at a few cases of businesses that have successfully implemented AI in warehousing and logistics: Amazon, the most valuable brand in the world, uses robots and AI technology in its warehouses to improve productivity, build platforms for the warehouse and online store, and foresee and avoid problems that might arise during the customer journey. AI is used by Lineage Logistics, a business that specializes in keeping food cold for stores and restaurants, in examining the flow of its orders. So that workers can place the pallets in the proper location, AI algorithms can predict when orders will enter and exit a warehouse. Items that move quickly and will not be in the warehouse for long are placed closer to the front, while items that will be in the warehouse for a longer period of time are set further back. Since implementing AI-based smart placement, Lineage has seen a 20% increase in efficiency. By creating and designing AI-powered robots, Symbotic aims to strengthen a company's supply chain by offering universal manual or fully automated solutions based on its products, operational flow, and customer needs. In order to significantly increase warehouse and supply chain efficiency and lower costs, the company's next-generation technology reimagines warehouse automation tools by combining hardware and software. DataArt assists its clients in increasing operational effectiveness, forecasting consumer behavior, and engaging customers through AI and ML. Additionally, the company provides synchronized logistics processes and real-time analysis of supply chain data. The DataArt team consists of highly qualified engineers with extensive knowledge of the industry sectors to assist clients in developing custom software that enhances operations and expands markets. For supply chain solutions, Alloy.ai uses AI to close the gap between planning and execution. The business provides manufacturers with a sales and supply chain platform with a real-time control tower. Customers can plan more effectively and carry out those plans more quickly thanks to Alloy.ai's solution, which connects sell-through data from retail and e-commerce with internal inventory and supply chain data. It also offers an executive overview, plan modifications, and real-time inventory management with collaboration. Impact of AI on Warehouse Management Intelligent, autonomous warehouses technology has already had a significant impact on warehouses all over the world. It has been predicted that by 2030, fully automated systems will replace humans in 30% of UK warehouse jobs. These systems can more easily process information and accurately forecast patterns, allowing businesses to manage their inventory better. Manual database updates will no longer be necessary, and errors will significantly decrease. By enhancing handling systems and conveyors, AI will alter how materials are transported. Utilizing the enormous data sets gathered, the facility, the doors, ramps, and elevators will collect data. Here are a few ways that AI will transform the modern warehouse. Forklifts and other human-driven vehicles will make way for automated vehicles like small carts with 3PL systems, warehouse management software, or smart trucks that can help with parcel management surveillance. AI can assist in forecasting the amount of labor you will need at various warehouses, the types of transport necessary, and the available routes. Products can be automatically stacked and stored in a facility using warehouse automation robots. Depending on the popularity of each product, placement can be determined algorithmically so that frequently purchased items are close by and infrequently purchased things are farther away. Intelligent systems can validate product orders automatically and assist with product dispatch, shipment tracking, and customer feedback collection. Unpredictable situations will inevitably arise in your warehouse. Because AI is so good at spotting patterns, it can help you plan for these scenarios by providing suggestions for handling your inventory and warehouse operations under pressure. Benefits of AI in Warehouse AI is, without a doubt, a revolutionary technology. However, believing that only blue-chip corporations and major international tech companies can benefit from AI would be incorrect. In the end, artificial intelligence will change every industry and business. If AI is not currently used in your warehouse, it may be time to start. Here are some immediate and long-term ways artificial intelligence can enhance your business operations: Warehouses depend on a steady flow of data. However, human error can lead to inefficiencies and expensive mistakes. These errors can be removed by AI, which can also provide accurate data on demand. Although there will always be a need for human labor, there are some tasks that warehouse automation robots can perform more quickly and accurately. You can ditch complicated formulas and spreadsheets. Your company can better understand its current situation, spot patterns, and develop strategic plans with the algorithmic analysis provided by AI. AI tools can continuously monitor the environment and activities in a warehouse. They can evaluate activities and assign them a risk score. High-risk tasks can be delegated to robots, leaving humans to handle safer duties. Simpler Inventory Management AI can assist your warehouse in determining market conditions, allowing you to manage your inventory better. Adopting AI solutions can reduce costs for your company by fostering efficiencies and reducing warehouse overhead. More Effective Contingency Planning Warehouse challenges that could not have been anticipated are frequently encountered without sophisticated systems. By predicting patterns and enabling businesses to manage their inventory and operations during shifting circumstances, AI helps companies increase their preparedness for various contingencies. AI is a cutting-edge technology that will undoubtedly alter warehouse operations. The accuracy of processes and current productivity levels must be increased through technology. AI improves safety standards in buildings and lowers operational costs. There are countless potential applications of AI in warehouse automation. Companies must investigate ways to incorporate and use them in their daily operations. Get ready to automate: Examine your warehouse's performance compared to industry standards, and plan for the digital warehouse transformation.
<urn:uuid:32bb6984-a41e-480f-be70-fc26709f657d>
CC-MAIN-2023-14
https://firstbridge.io/blog/artificial-intelligence/ai-in-warehouse-management
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945473.69/warc/CC-MAIN-20230326142035-20230326172035-00566.warc.gz
en
0.932489
2,605
2.84375
3
While the ideal goal of cybersecurity is to stop all attacks, 100% prevention is impossible. The reality is that attackers only need to find a weakness or vulnerability. The attack surface that organizations need to defend against is increasingly complex, and the threat landscape continues to expand rapidly, making it nearly impossible to prevent attacks 100% of the time. While detecting and blocking threats is important, the real goal of cybersecurity is cyber resilience — ensuring that cyberattacks do not disrupt operations and productivity. The first step in cyber resilience is understanding the business context of the compromise: which business services are or may be impacted, and what that means for the business. As organizations embrace and pursue digital transformation, the interconnectedness of the applications, devices, users, and data flows that drive the digital enterprise also creates complexity, leading to increased attack surfaces and operational inefficiencies. The impact of these relationships and dependencies can have costly consequences, including business interruption, non-compliance fines, remediation costs, lost revenue, and loss of reputation. The threat landscape is daunting. There are more than 1 billion malware programs, and more than 500,000 new malware samples are detected every day. Ransomware has become the biggest threat keeping IT security teams up at night. There have been a number of high-profile ransomware attacks, such as the attack on Colonial Pipeline in early 2021, or the one on Liberty College, forcing the 157-year-old institution to permanently shut down. However, organizations of all sizes and industries are affected by ransomware attacks every day. From 2019 to 2020, ransomware attacks against businesses increased by 20%, and the average cost of a ransomware incident soared by 40%. Smarter Security Policy Companies understand that reducing cyber risk is an increasingly important business need. The rising threat of malware, ransomware attacks, and other cyber threats has a greater impact on operations, resulting in costly business disruptions. To fight back, businesses spend more of their annual budgets on security solutions. Unfortunately, these investments won’t necessarily solve the problem. Despite these initiatives, 9 out of 10 security leaders believe their organization is not adequately prepared to deal with cyber risks. Increasing spending by itself will not improve network resilience. Mitigating risk is understanding the entire attack surface, understanding the business context of the compromise (for example, is it part of a business-critical application or is it related to a critical application?), and taking steps to identify and address vulnerabilities in defenses. Where and how safe investments are allocated is important. Reduce cyber risk Organizations need to be able to visualize the attack surface in the context of the business services that make up the company to effectively prioritize mitigation efforts. Hybrid and multi-cloud environments, combined with containers, Internet of Things (IoT) technologies, SaaS applications, and digital supply chain issues, make this work even more challenging. Cyber Asset Attack Surface Management (CAASM) solutions provide visibility into internal assets (often through API integration with existing tools) to identify gaps in security controls and reveal weaknesses in the security posture that need to be addressed and remediated. vArmour takes it a step further, providing insight into what many consider impossible or extremely difficult to accomplish: for any given asset, what application, and which business unit that asset belongs to. Additionally, which key applications are relevant to any given asset. For example, understanding whether the compromised workload is part of a critical application that manages interbank SWIFT transactions will greatly determine remediation plans. If you want to build cyber resilience, you need to start with a comprehensive and unified mapping of digital assets across the enterprise. Regular snapshots are not enough because the IT environment is constantly changing and evolving. You need real-time, continuous management and inventory control of all assets, applications and users to effectively improve threat response and security controls. Continuously mapping the attack surface allows you to identify gaps and understand dependencies in real time. vArmour provides this visibility through a step-by-step approach: - Discover and visualize every application, every identity, and every relationship (and data flow) across the enterprise environment to map the entire attack surface. - Observe the interactions between all these identities to establish a baseline of normal activity so you can identify abnormal behavior or behavior. - Establish and validate consistent application-centric access control policies to enforce security natively within your existing infrastructure and applications. vArmour automatically visualizes and maps all application relationships and dependencies in days rather than months, with continuous accuracy, unlike current manual methods that are resource-intensive, error-prone and immediately obsolete. This insight is critical because it provides visibility across the entire attack surface, enabling IT security teams to reduce cyber risk. Understanding the business context of an application and its relationships is critical to effectively managing the attack surface. It reduces the chances of a successful cyberattack and increases an organization’s cyber resilience, so IT security teams can sleep at night, trusting that business will continue no matter what threat actors throw at them.
<urn:uuid:3cbf2d63-7d4d-4b48-96e3-de797f1dcadf>
CC-MAIN-2023-14
https://mktz.com/improve-cyber-resilience-through-business-environment/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945473.69/warc/CC-MAIN-20230326142035-20230326172035-00566.warc.gz
en
0.936904
1,017
2.8125
3
As we inch towards this year’s Union Budget that is to be held on the 1st of February we are here to present the budget in a digestible and simple way. Last week we decoded the structure of the budget and what it entails and this week we aim to demystify and dive deep into how the budget of India of India has grown with the country and what have been the various processes around it. This will also help you understand what trends are considered while making the budget and help you gauge what Budget 2022 should and could contain. The first budget of Independent India was presented on the 26th of November 1947, just a few months after we gained independence. This was historic in many ways, as the practice to have a Union Budget was set into place. The priority of the Budget was to handle the disruption and instability caused due to the partition of the country. The highest spending was towards food grain production, strengthening the defense forces followed by civil expenditure. This made sense as there was a lot of refugee relief and rehabilitation that needed to be done. There were still post partition factors plaguing the country and with floods in Bihar, cyclones in Mumbai and famines on the western coast, the Government of India introduced a budget which sought more control on food grains and imports while operations in Kashmir meant that there was also an increased spending on defense. The first budget after India turned into a republic included the famous planning commission which had 5 year plans and targets for the country. Agriculture also was given priority along with defense expenditure in the budget. The maximum income tax chargeable was also reduced from 30 percent to 25 percent with incomes above 1,21,000 attracting a super-tax of 8.5 aanaas per rupee. These years saw increased demand of indigenous goods made of jute and cotton. Import regulations were also relaxed to cater to the increased demands of consumer goods and medicines. Focus on the agricultural sector as the government receives record revenue to spend from Income Tax, Customs, Excise duties and money made by the post and telegraph department of over Rs. 400 crores. The main focus was Industrial development as the government wanted to cater to the growing consumer demand domestically. Along with industrial development, a major share of the budget went to education and scholarships. As always defense expenditure featured in the top 3. The government imposed severe restrictions on imports with excise duties as high as 400% to protect and promote Indian goods. With the budget, a differentiation was made between active incomes which included salaries and business income and passive income which included income from rent and interest. As industrial production continued to grow and imports decreased and exports blossomed. This was a time when the budget catered to agriculture and materials production like iron, steel and aluminum to aid a rapidly developing country. The early 60s saw the nation grow and the government wanted to improve the life of the common man and hence improved the savings rate. But due to unfavorable climate conditions, the agriculture sector took a hit and a shortage arose in the availability of food grains. But railways and industry saw a lot of foreign investment. Food supply chain was given priority as industrial production grew. The government of India pushed for more people to join industries. Budgets also had provisions for aid to countries like Nepal and Bhutan. While self-assessment tax was introduced for all manufacturers. The budget aimed to increase employment by financing industries while focusing on urban development. General insurance companies, coal mines, copper companies were nationalized for greater government control. While the effects of the green revolution also started to kick in as the budget had provisions for fertilizers, better seeds and water table care. The next 10 years the budgets focused on raising the socio-economic condition of the population that was below the poverty line with special focus towards North East and electrification. With reforms being brought in the banking industry and India entering a new millennium, license raj was abolished by the budget. It was the decade when economic liberalization kicked in. The import-export policy was refurbished and customs duty fell as service tax was introduced. The budget also introduced VDIS (voluntary disclosure of income scheme) and eventually the income tax collected by the government increased to about 19,000 crore rupees. As India became one of the software hubs of the world, a lot of support was provided to the IT industry and services sector. As the economy grew by record numbers, increasing prices of food and other commodities became a cause of concern as inflation increased and there were fingers pointed towards the inefficiency and inadequacy of the budget in controlling them. A lot of focus was given on controlling the economy after the financial crisis of last decade. Rural development was given a big share of the budget as India looked to bounce back. The last 5 years have been a rollercoaster ride for the budget as it had to deal with a worsening GDP, the covid pandemic and increased tensions on both the north west and north east borders. As the government revenues increase exponentially, expenditure on infrastructure and defense has continuously grown. Medical framework of the country was also supported with MSMEs in the post pandemic budgets. The budget that is to come, join us as we decode and demystify what the budget will include this year. Budgets can almost tell the story of India, what will the story be this year?
<urn:uuid:b7a54bde-444d-45fd-84fd-0dc5e29570ef>
CC-MAIN-2023-14
https://bytes.quicko.com/indias-story-through-budgets/amp/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948951.4/warc/CC-MAIN-20230329054547-20230329084547-00566.warc.gz
en
0.976517
1,181
2.640625
3
A new study by David Tilman shows healthier food choices are also healthier for the environment. The study, published in the November 12 online edition of Nature by Tilman and graduate student Michael Clark, synthesized data on environmental costs of food production, diet trends, relationships between diet and health, and population growth. Their integrated analysis painted a striking picture of the human and environmental health costs of our current diet trajectory as well as how strategically modifying food choices could reduce not only incidence of type II diabetes, coronary heart disease and other chronic diseases, but global agricultural greenhouse gas emissions and habitat degradation, as well. "We showed that the same dietary changes that can add about a decade to our lives can also prevent massive environmental damage," said Tilman, a professor in the University's College of Biological Sciences and resident fellow at the Institute on the Environment. "In particular, if the world were to adopt variations on three common diets, health would be greatly increased at the same time global greenhouse gas emissions were reduced by an amount equal to the current greenhouse gas emissions of al all cars, trucks, plans trains and ships. In addition, this dietary shift would prevent the destruction of an area of tropical forests and savannas as large as half of the United States." The researchers found that as incomes increased between 1961 and 2009 people consumed more meat protein, empty calories and total calories per person. When these trends were combined with forecasts of population growth and income growth for the coming decades, the study predicted that diets in 2050 would contain fewer servings of fruits and vegetables, but about 60 percent more empty calories and 25 to 50 percent more pork, poultry, beef, dairy and eggs – a suite of changes that would increase of type II diabetes, coronary heart disease and some cancers. Using life-cycle analyses of various food production systems, the study also calculated that, if current trends prevail, these 2050 diets would also lead to an 80 percent increase in global greenhouse gas emissions from food production as well as habitat destruction due to land clearing for agriculture around the world. The study then compared health impacts of the global omnivorous diet with those reported for traditional Mediterranean, pescatarian and vegetarian diets. Adopting these alternative diets could reduce incidence of type II diabetes by about 25 percent, cancer by about 10 percent and death from heart disease by about 20 percent relative to the omnivore diet. Additionally, the adoption of these or similar alternative diets would prevent most or all of the increased greenhouse gas emissions and habitat destruction that would otherwise be caused by both dietary changes and increased global population. The authors acknowledged that numerous factors go into diet choice, but also pointed out that the alternative diets already are part of the lives of countless people around the world. Noting that variations on the diets used in the scenario could potentially show even greater benefit, they concluded that "the evaluation and implementation of dietary solutions to the tightly linked diet-environment-health trilemma is a global challenge, and opportunity, of great environmental and public health importance." – Mary Hoff
<urn:uuid:24c2e0b0-9511-455f-a3a2-9afae2d0fba8>
CC-MAIN-2023-14
https://cbs.umn.edu/blog-posts/food-thought
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948951.4/warc/CC-MAIN-20230329054547-20230329084547-00566.warc.gz
en
0.953395
616
3.578125
4
Albert Camus' The Plague became the book of the pandemic year 2020-21 because of its 1940s fictional story of bubonic plague menacing the Algerian city of Oran. Philosopher Ron Aronson will discuss its relevance for our times. The book was recently reprinted in several languages, becoming a best-seller in Italy during the height of the pandemic there. More than 1000 articles have been written about the relationship between this book and our plague during the last 2 years. While Camus' Plague ignores women and Arabs, and mainstream commentaries today such as in the New York Times insist on seeing “absurdity” as Camus's main message, he himself thought he was allegorizing the Resistance to the German Occupation. His good friend at the time, Jean-Paul Sartre, had no problem seeing the book's central message as being about solidarity and slow, patient, unheroic collective work of fighting the disease threatening the whole community. This message fits strikingly with the theme of “all in it together” that became so prominent early in 2020 and led naturally to the George Floyd uprising. Ronald Aronson is Prof. Emeritus at Wayne State University and the author of Camus and Sartre: The Story of a Friendship and the Quarrel That Ended It and the Camus entry of the Stanford Encyclopedia of Philosophy--https://plato.stanford.edu/entries/camus/. His most recent book is We: Reviving Social Hope.
<urn:uuid:9780d0c2-8260-4c4c-afc2-dfab3c007ef5>
CC-MAIN-2023-14
https://globaljusticecenter.org/videos/camus%E2%80%99-plague-today%E2%80%99s-pandemic
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948951.4/warc/CC-MAIN-20230329054547-20230329084547-00566.warc.gz
en
0.951894
309
2.84375
3
Welcome to another educational article on the comparative analysis between Certified Registered Nurse Anesthetists and Anesthesiologists. At the end of this piece, you will learn about the similarities and differences between CRNAs and Anesthesiologists, their job functions, salaries, and more. This article discusses the following and more: - CRNA vs Anesthesiologist – Job Description - CRNA vs Anesthesiologist – Education/Certification - CRNA vs Anesthesiologist – Career Path - CRNA vs Anesthesiologist Salary - Choosing between CRNA and Anesthesiologist So, let’s roll! CRNA vs Anesthesiologist – Introduction Nurse anesthetists are officially known as Certified Registered Nurse Anesthetists (CRNA). A CNRA is a type of advanced practice registered nurse (APRN). Medical school, clinical rotations, internships, and residency programs are all completed by anesthesiologists. Anesthesiologists and CRNAs have a lot of overlap in their responsibilities. Both professions provide many of the same services. Both work closely with surgeons and patients, administering anesthesia, monitoring the patient while under anesthesia, and adjusting medicine as needed. Nurse anesthetists and anesthesiologists differ mostly due to a philosophical separation between nursing and medicine. CRNA vs Anesthesiologist – Job Description An anesthesiologist’s clinical responsibilities include leading and supervising the anesthesia care team. An anesthesiologist must learn and practice a range of anesthetic kinds, including: General Anesthesia: Anesthesia that renders the patient completely unconscious and is used during major surgeries is known as general anesthesia. Monitored Anesthesia: Depending on the surgery, this type of anesthesia might produce various levels of sleepiness. Regional anesthesia: A type of anesthetic used to treat pain in a vast body area. During this anesthesia, the patient is fully aware. Local anesthesia: It is similar to regional anesthesia, except it only affects a tiny part of the body. The obligations that come with a CRNA’s title are another area where they differ from an anesthesiologist. An anesthesiologist, understandably, has greater obligations. However, there may be situations when a CRNA is the only option and will take over the anesthesiologist’s responsibilities. There are situations when CRNAs are not qualified, but they can and should be used in most circumstances. Clinical responsibilities of a licensed registered nurse anesthetist may include: - Assessment and evaluation - Administering of pre-anesthetic drugs - Developing an anesthesia care plan - Performing airway management While an anesthesiologist could do these duties, it makes far more sense to delegate them to the CRNAs to enhance the practice’s profit margin. CRNA vs Anesthesiologist Salary According to the most current Medscape compensation analysis, the average annual salary for an anesthesiologist is $398,000. The Bureau of Labor Statistics indicates that the wage range for an anesthesiologist is substantially smaller. Their average yearly pay is only $262,000 per year, according to their data. Of course, the market worth of an anesthesiologist is determined by a variety of criteria. According to the Medscape report, 31% of anesthesiologists use nurse practitioners as part of their practice. A CRNA’s annual pay is $181,000 (Bureau of Labor Statistics report). In the United States, a CRNA who specializes in outpatient treatment can make up to $224,000 per year. While these figures are lower than an anesthesiologist’s, they are higher than a primary care physician. For an anesthesiologist, the median wage varies based on various circumstances, which is true for a CRNA. - The number of years that a CRNA has worked as a nurse - The position’s geographical location - The type of healthcare system that exists There’s no doubt that CRNAs are less expensive to hire than anesthesiologists. They can perform a high volume of repetitive cases to enhance productivity and income at a reduced cost. CRNA vs Anesthesiologist – Education The type and amount of education a CRNA and an anesthesiologist must undergo to achieve their titles is one of the most significant disparities. In comparison to an anesthesiologist, a CRNA’s education is substantially shorter, albeit their educational requirements have grown in recent years. To become a CRNA, you must first complete a nursing program. While many nurses earn a bachelor’s degree, most CRNAs earn a master’s degree from an accredited nurse anesthesia program. As a result, they are now a certified Advanced Practice Registered Nurse (APRNs). You can become a CRNA after completing one to four years of education in nursing programs. Following that, they must spend a year mastering critical care. This training equips a CRNA to deal with anesthesiology emergencies. In an emergency, however, the anesthesiologist is usually the best choice. CRNAs complete a three-and-a-half-year anesthetic curriculum with an optional fellowship year after critical care. The American Association of Nurse Anesthetists (AANA) mandates that you be a licensed registered nurse (RN) who has completed additional graduate coursework in anesthesiology and subsequently passed a national certification exam. On the other hand, an anesthesiologist spends significantly more time in school and training than a CRNA. They must first attend college and obtain a bachelor’s degree in science (classified as pre-medical education), classified as non-medical. Anesthesiologists must then attend medical school for another four years after completing those four years. A medical doctor interested in becoming an anesthesiologist would complete a four-year anesthesia residency after graduating from medical school. Most anesthesiologists take an elective fellowship in anesthesiology to supplement their experience. CRNA vs Anesthesiologist – Certification To practice as an anesthesiologist, you must complete certain requirements. To practice in any state, they must be board-certified and licensed. Anesthesiologists must also complete a MOCA (Maintenance of Certification in Anesthesiology) certification every ten years. This certification is merely a refresher or maintenance of the initial certification. The doctor will be able to use this certification to ensure that they: - Keep up with the most current practices - Are you still in good standing, and have a valid license? - Is their performance steadily improving? A CRNA must also be board-certified and licensed by the state. However, a CRNA must be recertified every four years rather than every 10. Every eight years, they must also complete the Continued Professional Certification exam. CRNA vs Anesthesiologist – Job Outlook Anesthesiologists are in high demand right now. If you’re geographically versatile and willing to relocate to areas where anesthesiologists are in high demand, you’ll have no trouble finding work. Anesthesiologists are in high demand, with 5,410 new posts predicted to be filled by 2029. This speculation equates to a 2.10 percent yearly increase in a few years. CRNAs are in higher demand than they’ve ever been. BLS indicates that nurse anesthetist positions are expected to expand by 14% between 2019 and 2019, while all APRN jobs are expected to grow by 45 percent. Outpatient care centers and home healthcare services are expected to have the most job growth. CRNA vs Anesthesiologist – Quality of Care The most pressing question for a healthcare system is how these two medical professions compare patient care quality. There are numerous aspects of anesthetics that may require attention: - Cardiothoracic Anesthesiology - Critical Care Anesthesiology - Neurosurgical Anesthesiology - Obstetric Anesthesiology - Pain Medicine - Pediatric Anesthesiology Anesthesiologists and CRNAs can both operate in these fields. CRNAs, on the other hand, may need further training to obtain this clinical training. Anesthesiologists are frequently already experts in one of these fields. When used properly, well-trained CRNAs and anesthesiologists should provide the best possible treatment for all patients. When medical professionals take on responsibilities beyond their capabilities or become overwhelmed by too many responsibilities resulting from a lack of support from other health care professionals, the quality of care suffers. As a result, hiring a CRNA to assist your anesthesiologist can dramatically improve your clinic’s anesthetic quality of treatment. Pros of Hiring a CRNA vs Anesthesiologist If one anesthesiologist cannot cover your facility’s anesthesiology tasks, you may hire a CRNA. CRNAs are well-trained, as this article demonstrates. Because of advancements in anesthetic practice technology, they can now do almost everything an anesthesiologist can do by just following a near-perfect formula. CRNAs are certainly valuable members of the anesthesia team when working under the direction of a physician. Their assistance enables more surgeries to be completed each year, resulting in higher profit margins for healthcare organizations. However, CRNAs cannot replace an anesthesiologist’s expertise, which is why anesthesiologists are paid more. Anesthesiologists are better qualified to make executive judgments when an emergency arises. They are trained doctors with comprehensive knowledge of medicine beyond simply anesthesiology. An anesthesiologist’s residency (and optional fellowship) provides far more hands-on anesthesia practice. Their training adequately prepares them to assume responsibility for all anesthetic practices. It also allows certain anesthesiologists to specialize in different areas of the field. An obstetrician may hire a clinician who has completed an obstetric anesthesiology fellowship. Choosing between becoming a CRNA and Anesthesiologist In a fast-paced career like nursing, having the ability to make decisions based on your education and experience is crucial. As a nurse anesthetist, you have the freedom to make decisions on your own to preserve patients’ health and safety. If you’re a registered nurse (RN) searching for more autonomy while working with patients in an ICU, operating room, or surgical facility, a career as a Certified Registered Nurse Anesthetist (CRNA) could be ideal for you. On the other hand, an anesthesiologist benefits from competitive pay and job stability, as well as a wide range of practice opportunities, a flexible work schedule, and more. Between these two occupations, deciding on a career will consider the numerous features and criteria involved. A nurse anesthetist is a nurse, whereas an anesthesiologist is a doctor. On the other hand, nurses and physicians approach clinical practice from diverse perspectives, and their education and certification requirements reflect this diversity. Patients being cared for by a highly qualified nurse anesthetist or an anesthesiologist can relax. However, regardless of which path an anesthesia provider chooses, they must complete extensive, advanced, specialized training, have supervised clinical experience, and meet stringent requirements to obtain and retain their professional credentials. These professional paths have advantages, so it’s impossible to say one is better than the other. Anesthesiologists make more money than nurse anesthetists. But they also devote more time and money to their studies. Are CRNAs better than anesthesiologists? Nurse anesthetists and anesthesiologists use the same approach to putting a patient under anesthesia. However, there may be exceptions to the potential necessity for CRNA monitoring. Nurse anesthetists are more often seen in smaller medical offices. On the other hand, CRNAs and anesthesiologists are usually found at larger hospitals. Can a CRNA do everything an anesthesiologist does? An anesthesiologist may perform all of the tasks of a CRNA. In addition, anesthesiologists can perform more invasive or minor medical procedures because they are doctors. A CRNA can do practically everything an anesthesiologist can do, but their licensure is often limited by state law, so they can’t do everything. Are anesthesiologists going to be obsolete? By 2033, AAMC (Association of American Medical Colleges) expects an estimated shortage of 140,000 physicians, with anesthesiologists accounting for 12,500 of those. In addition, CRNA shortages are also expected, particularly in rural hospitals and healthcare facilities where anesthesia is lower than in other locations. Can a CRNA transition to An Anesthesiologist? A CRNA who wishes to pursue a career in medicine as an anesthesiologist must return to school. She should be eligible for medical school because she already has a master’s degree, and medical schools demand a baccalaureate. Then, the CRNA would go through medical school, residency, and maybe a fellowship. What is the difference between a CRNA and an Anesthesiologist? The major disparity between these two professions is that anesthesiologists are medical doctors that administer anesthesia. At the same time, nurse anesthetists are certified registered nurses who may assist or collaborate with doctors in administering anesthesia or may work entirely independently as they administer anesthesia. How do anesthesiologists feel about CRNAs? The CRNAs are responsible for being there in the room with the patient. Still, they must always contact the anesthesiologist for any necessary treatment and keep them updated on the case’s progress. CRNAs and anesthesiologists have a close working relationship. Prioritizing the treatment of patients is always a top priority. Between CRNAs and Anesthesiologists Anesthesiologists Annual Salary Nurse Anesthetist’s Annual Salary NurseCode Editorial Process The nurse code team only utilizes the highest quality resources. Including academic institutions, recognized publications and peer-reviewed studies. All of our articles are vetted for fact-checking in order to maintain integrity and to provide reliable, accurate and trustworthy information. Read more about our editorial process here.
<urn:uuid:385c22b3-6a12-49c2-849b-621cb0745a0a>
CC-MAIN-2023-14
https://nursecode.com/crna/crna-vs-anesthesiologist/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948951.4/warc/CC-MAIN-20230329054547-20230329084547-00566.warc.gz
en
0.951629
3,026
3.015625
3
Curriculum, Professional Development, and Materials. Description: The dwarf waterdog (Necturus punctatus) reaches a total length of about 7.5 inches as an adult, and is therefore smaller than the related Neuse River waterdog (Necturus lewisi) and mudpuppy (Necturus maculosus).It also has a thinner body than either of those two related species. If you already have an account and are visiting our new site for the first time, click 'Forgot Password?' Sold in packs of 10. Adults are large, aquatic salamander with bushy red gills, well developed limbs, and a large paddle-like tail. Related items 10+ Malaysian Trumpet Snails, Juveniles, Freshwater, Aquarium Cleanup . 25+ Brown Ramshorn Snails Aquarium Or Pond Algae Eater Puffer / Loach Live Food 4 Things You Need to Know About Service Dogs, Smart Ways to Beat the Summer Heat with Your Dog, How to Keep Your Cat Entertained When You’re Not Home, How to Help Your Dog Cope with Back to School Loneliness, Earth Day 2018 – How to be a more Earth-Friendly Pet Owner, Pet Care Information, Resources & Supplies, Traveling Challenges with Emotional Support Animals. Poor Oral Hygiene Is the Likely Culprit. Family: Proteidae (mudpuppies) in the order Caudata (salamanders) Description: The mudpuppy is a permanently aquatic salamander with a gray-brown back and pale gray belly. Necturus maculosus are generally dark colored, ranging through a number of shades of brown to black. Share your own creations on Facebook! Habitat destruction and anthropogenic drivers have led to amphibian population declines worldwide, but the conservation status of many species remains in question. Necturus m. maculosus individuals have rusty brown to gray dorsa with conspicuous spotting. The dorsal side is marked with large spots and sometimes a dorsal stripe. Assess, Assign, and Improve. }); The mud puppy, Necturus maculosus, is a large, aquatic salamander found in southern Manitoba, Ontario, and Quebec, and the central and eastern United States. Shipping discounts or "Free Shipping" applied at checkout. Empower your Math Class. For Sale: Mudpuppies (Necturus maculosus) $30 ea. Common Mudpuppy (Necturus maculosus) Gulf Coast Waterdog (Necturus beyeri) Mudpuppies are known to squeak when in danger. + shipping. In Minnesota, this fully aquatic salamander is found in medium to large rivers and larger lakes within the Mississippi, Minnesota, Red, and St. Croix river basins. Research on mudpuppies in the St. Lawrence River found high levels of pollutants, such as PCBs and organochlorine pesticides in their eggs. Eastern Tiger Salamander Ambystoma tigrinum. The different species of Necturus differ greatly in size, with the largest (N. maculosus) reaching lengths up to 49 cm (19 in), and the smallest (N. punctatus) maturing at 11.5-19 cm (4.5-7.5 in) (Petranka, 1998). Kennel Cough â What Is It and Should I Vaccinate? The belly is light colored with no spots. Brown or grayish in color, the mudpuppy has spots peppered across its back and sides, and its underside is light gray or buff. We want to help you bring learning to life in the classroom and beyond. Threats and Trends. Originally Posted by adamntitch only ever seen them on exotic pets once before in stock but a shop up here in edinbuegh had them in a few years back Breed Discrimination â Is Your Dog at Risk? Your guide to an exceptional shopping experience. Eastern Newt What would your class create with a 50-lb. Blue-spotted Salamander Ambystoma laterale. At Nasco it is more than products ... it's the experience we want to help you create. "slot_uuid":"26097ad1-2e8a-4157-ae39-768e10270835" Western Tiger Salamander Ambystoma mavortium. Holiday Feasting and Your Dogâs Bellyache. Spotted Salamander Ambystoma maculatum. The Common Mudpuppy reaches an adult size of around 33cm, however a size of 43cm has been reported. We offer a huge selection of posters & prints for sale, with big discounts, fast shipping, and custom framing options you'll love. Transform your classroom through experiential learning. Hatchlings and juveniles have a yellow stripe along each side. Probiotics and Prebiotics â Could They Help My Dog? Mudpuppies are not bothered the cold and are active in winter. Historical versus Current Distribution - Mudpuppies (Necturus maculosus) were historically distributed throughout eastern and middle North America (Eycleshymer, 1906). You will find a unique blend of products for Arts & Crafts, Education, Healthcare, Agriculture, and more! !”…This slightly confused inquiry is one that I often get when I talk about Ontario’s largest salamander, the mudpuppy (Necturus maculosus). Bad Pet Breath? Mudpuppy Necturus maculosus. They live an entirely aquatic lifestyle in the eastern part of North America in lakes, rivers, and ponds. Domestic prices only and apply to orders shipped within the United States. Dec 31, 2013 - Herptiles of Michigan: Mudpuppies. The genus Necturus means swimming tail. The common mudpuppy (N. maculosus) is probably the best-known species – as an amphibian with gill slits, it … It inhabits freshwater lakes and rivers where it feeds on crayfish, fish, insects, and other small, aquatic creatures. Mudpuppies are fully aquatic salamanders that retain bright red gills for their entire lives. Perth Road, ON K0H2L0. More Reptiles and Amphibians. PPE, Cleaning Supplies and Social Distancing, BioDome - Explore BIOPROTECTUs™ to help safeguard your students, staff and community. Mud puppy, any of five species of entirely aquatic salamanders in a genus (Necturus) belonging to the family Proteidae (or Necturidae), in the order Caudata.Their popular name derives from the mistaken belief that they are able to bark. Sponsored Advertisements. Explore with the Nasco Art team, how art educators are dealing with the current COVID-19 crisis situation, as well as benefits of Adaptive Art, and the importance of the A in STEAM, and SO MUCH MORE. Mudpuppies, sometimes called waterdogs, can reach 20-48 cm in length and spend their entire life in the water, as is evident by their permanent, red, feathery gills. You must "sign-in" to your account to receive the correct shipping rates.
<urn:uuid:a9b1f025-fb5e-4af6-b8e2-35ba0a9e6a71>
CC-MAIN-2023-14
http://surron.se/breckenridge-whiskey-dhssw/necturus-maculosus-for-sale-c84c0c
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949331.26/warc/CC-MAIN-20230330132508-20230330162508-00566.warc.gz
en
0.911784
1,511
2.578125
3
Yoshu Chikanobu (1838-1912) and Japanese Art: New Japan Emerges Lee Jay Walker Modern Tokyo Times Yoshu Chikanobu (Toyohara Chikanobu) lived between 1838 and 1912, therefore, much of his art highlights the changing nature of Japan. The opening up of Japan after the Meiji Restoration provided many new dreams for Japanese citizens. However, it also was the start of the death knell for many artisans. This applies to the technological changes taking place and the changing values during this period of history. Chikanobu, like other ukiyo-e artists in the Meiji era, understood the need to adapt because many new art forms were altering the artistic landscape in Japan. Western art especially impacted on the new generation of artists. Political elites also wanted to encourage modernism. Therefore, the new crème de la crème of young artists mainly adopted concepts outside of the powerful ukiyo-e art form that was so potent during the Edo period. At the same time, technological advancements and photography were impacting greatly on ukiyo-e from a virtually negative point of view. The old ways that had nurtured art in the Edo period, along with other forms of art, were being challenged by many new art movements. Also, photography would eat away at the need for ukiyo-e because it could not compete on a technological level playing field. Chikanobu highlights an array of subjects in his art and this applies to the power of the past to the changing nature of Japanese society. He also depicted powerful historical figures in Japanese history to highlighting the nationalist side of the Meiji period which applies to war. Also, when you view Chikanobu’s art you can visually witness the imperial aspects of Western powers, which were being replicated in dress styles when it applied to elites. Cultural wise, Chikanobu also painted many adorable themes. This applies to the Japanese tea ceremony, ikebana, kabuki, fashion in the changing Japan, and a plethora of other subjects. In this sense, Chikanobu opens up many aspects of Japan related to many themes. These themes also apply to the “old world” and “new world.” The Toshidama Gallery (http://toshidama.wordpress.com) comments that “Chikanobu is one of the giants of the Meiji era of Japanese Woodblock prints. With Kunichika and Yoshitoshi, Chikanobu distinguished the turmoil of Japanese culture as it came to terms with the new age. Like them, his life and career were inextricably linked to the upheavals in Japanese history and the near civil wars that characterized the time.” Chikanobu and the series titled A Mirror of the Ages is also a classic because of the rich cultural themes related to women and fashion throughout the changing times. The Toshidama Gallery highlights this series strongly by stating that “This whole series is one of the outstanding achievements of late nineteenth century Japanese art. One of his best series, A Mirror of the Ages showed women by fashion and hair style throughout history. There is of course the longing for the past and yet these prints are unmistakably modern and of their time….The quality of printing is outstanding, especially in Chikanobu’s use of white for the rendering of the powdered faces. It is often forgotten by art historians that this was the period about all others when the technique of woodblock printing achieved its zenith whilst at the same time there were artists of stature to execute it.” Other adorable print series include “Chiyoda no Ooku” (Court Ladies of the Chiyoda Palace) and “Shin Bijin” (True Beauties). Of course, Chikanobu produced many amazing pieces of art but both the above-named series relate to genuine aspects of female beauty in Japan. This is highlighted by traditional clothe to the changing nature of the time which applies to Western dress styles. In a past article about Chikanobu, I comment that “Chikanobu not only witnessed the new revolutionary period and how elites looked to the West but by the late 1880s and early 1890s nostalgia also returned. Obviously, for the masses they were outside both themes and the only important thing was survival and adapting.” The art of Chikanobu stands out dramatically and this not only applies to the exquisite skills that he was blessed with, but also to the themes that Chikanobu highlights. He certainly provides many glimpses into Japan which relate to the “old world,” cultural aspects of Japan, and the modernization of the Meiji period. Overall, Chikanobu is one of the greats of the ukiyo-e art movement despite the onset of modernity that would alter the artistic landscape of Japan. Please visit http://toshidama.wordpress.com for more articles and information. Please visit http://toshidama-japanese-prints.com/ – On our site, you will see a wonderful selection of Japanese woodblock prints for sale. Ukiyo-e (the Japanese name for woodblock prints of the 18th and 19thcenturies) are beautiful, collectible and a sound financial investment. Modern Tokyo News is part of the Modern Tokyo Times group DONATIONS to SUPPORT MODERN TOKYO TIMES – please pay PayPal and DONATE to [email protected] http://moderntokyotimes.com Modern Tokyo Times – International News and Japan News http://sawandjay.com Modern Tokyo Times – Fashion https://moderntokyonews.com Modern Tokyo News – Tokyo News and International News http://global-security-news.com Global Security News – Geopolitics and Terrorism PLEASE JOIN ON TWITTER https://twitter.com/MTT_News Modern Tokyo Times PLEASE JOIN ON FACEBOOK Some art and cultural articles by Modern Tokyo Times are republished in order to highlight the unique reality of Japan to our growing international readership.
<urn:uuid:7922257a-db9a-4e7b-85a9-5c1f03d21b2e>
CC-MAIN-2023-14
https://moderntokyonews.com/2016/05/07/yoshu-chikanobu-1838-1912-and-japanese-art-new-japan-emerges/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950383.8/warc/CC-MAIN-20230402043600-20230402073600-00566.warc.gz
en
0.944602
1,343
3.109375
3
Fuel-efficient driving may save you hundreds of dollars in gasoline each year, enhance road safety, and prevent vehicle wear. Use these five fuel-efficient driving strategies to reduce your automobile’s fuel consumption and carbon dioxide emissions by as much as 25%. 1. Accelerate Gently You use more gasoline when you accelerate. By slowly pressing the accelerator pedal in the city, you may use less gasoline. To be as fuel-efficient as possible, take 5 seconds to raise your car to a speed of 20 kilometres per hour from a stop. On the dashboard, imagine an open cup of coffee. Don’t spill it! 2. Maintain a Constant Speed When your speed fluctuates and spikes, you consume extra gasoline and spend more money than you need to. Tests have shown that altering your speed up and down between 75 and 85 kilometres per hour every 18 seconds can result in a 20 per cent increase in fuel consumption. When you’re on the road, utilize cruise control for highway travel when conditions allow. However, keep in mind that little changes in speed might be beneficial under gravity’s influence. Allow your speed to fall as you ascend a hill and then regain momentum as you roll down the other side. 3. Anticipate Traffic Keep a safe distance between your car and the vehicle in front of you, whether you are driving ahead or looking behind. and maintain a constant speed by paying attention to what pedestrians and other vehicles are doing and predicting what they’ll do next. It’s also safer to drive this way. 4. Avoid High Speeds Maintain a safe distance from the vehicle in front of you, and save money on gas! When travelling between 50 and 80 kilometres per hour, most automobiles, vans, pickup trucks, and SUVs are the most fuel-efficient. Above this speed zone, cars use more petrol as they go faster. As a case in point, a vehicle that travels at 120 kilometres per hour uses 20% more gasoline than one that travels at 100 kilometres per hour. On a 25-kilometre journey, this difference in speed—and fuel consumption—would shave just two minutes off your travel time. 5. Coast to Decelerate When you apply your brakes, you lose your forward momentum. You can often predict when it’s time to slow down by monitoring how other drivers are behaving. By taking your foot off the accelerator and coasting to decelerate rather than using your brakes, you will save fuel and money.
<urn:uuid:1c3ae395-6f9e-4e0c-80bb-708352e73e25>
CC-MAIN-2023-14
https://carinsurancequote.net.au/fuel-saving-measures-while-driving/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943695.23/warc/CC-MAIN-20230321095704-20230321125704-00766.warc.gz
en
0.924421
519
3.03125
3
My newborn daughter was screaming during her first bath as I watched helplessly from my bed. She was only about an hour old. I was trying to breastfeed her when the nurse took her from my arms, telling me that the baby had to be bathed before I was transferred to a different room. We don’t do it this way anymore — it is now standard protocol at many hospitals to wait 8-24 hours to give a newborn his or her first bath, and up to 48 hours if the baby was delivered by cesarian section. Delayed newborn bathing is consistent with World Health Organization recommendations and based on medical research. As a hospital-based pediatrician, I know that delayed bathing is the safest medical choice for babies. As a mom, it just seems right. 8 reasons why doctors recommend delaying a newborn’s first bath: Reduced risk of infection Babies are born covered in a white substance called vernix, which is composed of the skin cells your baby made early in development. Vernix contains proteins that prevent common bacterial infections. Think of vernix as a sort of natural antibacterial ointment. Your baby is born covered in this anti-germ barrier. Bacteria such as Group B Strep and E. coli are often transmitted to newborns during delivery and can cause bloodstream infections, pneumonia, and meningitis, and can be fatal. These are not rare infections — we test babies for them daily. Vernix is nature’s protection against these infections. Stabilized infant blood sugar Bathing a baby too soon after birth can cause low blood sugar. Here’s why: in the first few hours after birth, a baby has to adjust to life outside the uterus, including losing the placenta as a source of blood sugar. Bathing causes crying, stress and the release of stress hormones. Stress hormones can cause a baby’s blood sugar to drop, which can make a baby too sleepy to wake up and breastfeed, causing the blood sugar to drop even more. Rarely, low blood sugar can cause neurological injury. Improved temperature control Giving a baby a bath too soon can cause hypothermia. Inside mom it was about 98.6 degrees, but most babies are born in rooms that are about 70 degrees. In the first few hours after birth, a baby has to use a lot of energy to keep warm. If a baby gets too cold, he or she can drop their blood sugar or have other complications. Improved maternal-infant bonding New babies need to snuggle skin-to-skin with their mom be given a chance to try to breastfeed. I have been attending deliveries regularly for more than a decade, and I love it. But those first few minutes of life are not meant to be spent with me, a nurse or any healthcare professional. Those precious few minutes are meant for bonding between baby and parents. As long as the baby does not need help breathing or immediate resuscitation, babies need to be held by their mother. Infants who are held skin-to-skin on mom’s chest have better blood sugar and temperature control and have an easier time learning to breastfeed. We even do skin-to-skin at c-section deliveries. The bath can wait. Studies show more breastfeeding success when moms are allowed to stay skin-to-skin with babies and this time is not interrupted by medical “procedures” or a bath. If you’ve ever struggled to breastfeed a newborn, you know how hard it can be to get them to latch onto your nipple. Breastfeeding can become a stressful burden on a very tired mother. But babies who breastfeed in the first hour of life — and preferably in the first 30 minutes — have a much easier time learning how to latch. Why? Because when the baby is inside mom’s uterus, she is constantly and rhythmically sucking in amniotic fluid and swallowing it. At birth, she cries, breaths air and starts to forget how to suck and swallow. If you wait more than an hour to breastfeed, babies can have a hard time latching, sucking and swallowing. If you breastfeed right away, the baby still remembers how to suck and swallow. It’s good to put a baby skin-to-skin between mom’s bare breasts at delivery, so she will be warm, soothed by mom’s voice, find the breast herself, latch right on and start nursing. Moms giggle and cry. They are so happy. This is how the first few minutes of life are meant to be. Forget the bath. No baby lotion required before a newborn bath Vernix is a natural skin moisturizer and skin protectant. Babies need skin protection during the transition from the amniotic fluid into the air environment. If you delay the bath, there is no need for artificially scented baby lotion. Instead, you get to enjoy that new-baby smell. Everyone will wear gloves Hospital workers are always supposed to wear gloves when caring for an unbathed baby, to prevent exposure to body fluids such as amniotic fluid and blood. Some studies have shown that glove-wearing keeps babies safer too, by preventing transmission of common viruses and other infections from workers to babies. Parents get to enjoy bathing their baby After mom has had time to recover, parents can more easily participate in baby’s first bath and it becomes a teaching opportunity between nursing and parents. You can use whatever special baby bath products you choose and watch your baby coo and smile. Delaying a newborn bath is not yet protocol at some hospitals, but you can still request it. Be sure to include your desire for delayed bathing in your birth plan. Don’t have a birth plan? You need one. Here’s an example to get you started. Before writing your birth plan, be sure to think about these 11 medical decisions to make for your baby before delivery.
<urn:uuid:9833a3cf-2299-4659-ac7a-4832df72097a>
CC-MAIN-2023-14
https://childrensmd.org/browse-by-age-group/pregnancy-childbirth/delaying-babys-first-bath/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943695.23/warc/CC-MAIN-20230321095704-20230321125704-00766.warc.gz
en
0.964695
1,260
2.84375
3
Teleostei (teleosts) > Anguilliformes (Eels and morays) > Muraenidae (Moray eels) > Muraeninae Etymology: Rhinomuraena: Greek, rhinos = nose + Latin, muraena = morey eel (Ref. 45335). More on author: Garman. Environment: milieu / climate zone / depth range / distribution range Marine; reef-associated; non-migratory; depth range 1 - 67 m (Ref. 90102). Tropical; 32°N - 26°S Indo-Pacific: East Africa to the Tuamoto Islands, north to southern Japan, south to New Caledonia and French Polynesia; including Marianas and Marshalls. Length at first maturity / Size / Weight / Age Maturity: Lm 107.0, range 94 - 120 cm Max length : 130 cm TL male/unsexed; (Ref. 2334) Vertebrae: 270 - 286. Has three fleshy tentacles on the tip of its lower jaw, a single fleshy pointed projection at the tip of its snout, and tubular anterior nostrils ending in gaudy, fanlike expansions. Adults occur in lagoon and seaward reefs. They are secretive species normally hidden in sand or rubble, sometimes with only its head protruding. Feed on small fishes (Ref. 9710, 48635, 75154, 89972). Juveniles all black, males have yellow dorsal fin and females change to a nearly all yellow color, but usually with blue in the posterior (Ref. 48635). Only moray that undergoes abrupt changes in coloration and sex: it is a protandrous hermaphrodite, i.e., functioning males reverse sex to become females. Protandry is diagnosed based on colouration, but not confirmed (Ref. 103751). Life cycle and mating behavior Maturity | Reproduction | Spawning | Eggs | Fecundity | Larvae Protandry is diagnosed based on colouration, but not confirmed (Ref. 103751). Chen, H.-M., K.-T. Shao and C.T. Chen, 1994. A review of the muraenid eels (Family Muraenidae) from Taiwan with descriptions of twelve new records. Zool. Stud. 33(1):44-64. (Ref. 6934) IUCN Red List Status (Ref. 126983) Threat to humans ReferencesAquacultureAquaculture profileStrainsGeneticsAllele frequenciesHeritabilityDiseasesProcessingNutrientsMass conversion
<urn:uuid:f6703a7c-318c-4836-814a-34dd8f0cd8a0>
CC-MAIN-2023-14
https://fishbase.mnhn.fr/summary/SpeciesSummary.php?id=8594&lang=English
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943695.23/warc/CC-MAIN-20230321095704-20230321125704-00766.warc.gz
en
0.766439
623
2.84375
3
How do I read a file in Python 3? Python 3 – File read() Method - Description. The method read() reads at most size bytes from the file. … - Syntax. Following is the syntax for read() method − fileObject.read( size ); - Parameters. size − This is the number of bytes to be read from the file. - Return Value. This method returns the bytes read in string. - Example. … How do I read a text file into a string in Python? Generally, to read file content as a string, follow these steps. - Open file in read mode. Call inbuilt open() function with file path as argument. … - Call read() method on the file object. read() method returns whole content of the file as a string. - Close the file by calling close() method on the file object. How do you write a text file in Python 3? To write to a text file in Python, you follow these steps: - First, open the text file for writing (or appending) using the open() function. - Second, write to the text file using the write() or writelines() method. - Third, close the file using the close() method. How do you create a file in Python 3? - Python allows you to read, write and delete files. - Use the function open(“filename”,”w+”) for Python create text file. … - To append data to an existing file or Python print to file operation, use the command open(“Filename”, “a“) - Use the Python read from file function to read the ENTIRE contents of a file. How do you read a text file in Python? To read a text file in Python, you follow these steps: First, open a text file for reading by using the open() function. Second, read text from the text file using the file read() , readline() , or readlines() method of the file object. 1) open() function. |‘a’||Open a text file for appending text| How do you create a text file? Another way to create a text file is to right-click an empty area on the desktop, and in the pop-up menu, select New, and then select Text Document. Creating a text file this way opens your default text editor with a blank text file on your desktop. You can change the name of the file to anything you want. How do I read a text file into a list in Python? Use str. split() to split a text file into a list - my_file = open(“sample.txt”, “r”) - content = my_file. read() - content_list = content. split(“,”) How do you clear a text file in Python? Use file. truncate() to erase the file contents of a text file - file = open(“sample.txt”,”r+”) - file. truncate(0) What is text file in Python? A file In Python is categorized as either text or binary, and the difference between the two file types is important. Text files are structured as a sequence of lines, where each line includes a sequence of characters. This is what you know as code or syntax. How do you write multiple lines in a text file in Python? Use writelines() to write multiple lines to a file - my_file = open(“test_file.txt”, “w”) - text_list = [“abn”, “cdn”, “ef”] - my_file. writelines(text_list) - my_file = open(“test_file.txt”) - content = my_file. read() - my_file. Close file. How do I create a .PY file? Create a Python file - In the Project tool window, select the project root (typically, it is the root node in the project tree), right-click it, and select File | New …. - Select the option Python File from the context menu, and then type the new filename. PyCharm creates a new Python file and opens it for editing. How do I open a Python file? To run Python scripts with the python command, you need to open a command-line and type in the word python , or python3 if you have both versions, followed by the path to your script, just like this: $ python3 hello.py Hello World! Does with open create a file Python? The open() function opens the file in Python, it takes the file path and the mode as input and returns the file object as output. Python Create File if Not Exists Using the open() Function. |w+||Create the file if it does not exist and then open it in write mode|
<urn:uuid:169f5e2b-a931-4e84-aab1-29bb036eed5c>
CC-MAIN-2023-14
https://sunlimetech.com/hints/how-do-i-open-a-text-file-in-python-3.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943695.23/warc/CC-MAIN-20230321095704-20230321125704-00766.warc.gz
en
0.811509
1,133
3.734375
4
As political life in the UK and across Europe embraces the concept of gender equality political life in the Isle of Man has no qualms about the relative inequality between men and women in political life on the Isle of Man. The Isle of Man led the field in terms of Women’s suffrage (5th November 1880) and yet this has not been reflected in terms of the number of women who have come forward and been elected to the Keys over the years. One means to rectify the current imbalance would be to ensure that the unelected upper chamber of Tynwald (the Legislative Council) injected a degree of gender equality into Manx political life. However, when nominations for four seats closed recently of seven candidates to contest four seats none were women. It seems inconceivable that the 24 members of the House of Keys able to nominate for the four vacant seats could not identify at least one (if not more) women candidates who were able and willing to contest these vacancies. As International Women’s Day celebrates its 100th anniversary this week it seems that in terms of Manx political life (despite a good start well over a century and a quarter ago) the Island still firmly remains `the Isle of Man’.
<urn:uuid:ebbd4062-a47a-4d66-aa66-220d48a93e15>
CC-MAIN-2023-14
https://www.celticleague.net/mannin-manx-legco-election-eschews-gender-equality-9-3-2010/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943695.23/warc/CC-MAIN-20230321095704-20230321125704-00766.warc.gz
en
0.972128
252
2.984375
3
You are here Resources for K-4 Classroom Teachers Phenology and Nature’s Notebook can also be used to teach subjects other than science. Phenology can also support the following standards: - English and Language Arts such as reading comprehension, writing, speaking and listening - Social Studies such as American History, World History, Cultural Studies, and Geography - Healthy Living and Physical Education - Foreign and Native Languages including communication, culture, and comparative studies - Arts such as music, theater, and visual arts Where do I begin? Adding a phenology monitoring program to your classroom is easy if your project is well planned. Consider involving other like-minded teachers and staff to make it a meaningful, multi-year experience. If you can commit to establishing a site at your school for at least 2 years, take a look at our Nature's Notebook Planning Resources to help you get started. - Getting Started with Nature's Notebook in the Classroom - Classroom Phenology Project Planning Worksheet (available as word doc) - Lesson Planning Worksheet - Questions on how to get started? Contact our Education Coordinator. There are many hands-on citizen science programs available for phenology monitoring, and some are perfectly suited for K-4 audiences. Visit our partners’ websites for ideas about how to incorporate phenology education in the classroom. - Project BudBurst - Curriculum - Great Sunflower Project - Curriculum - Monarch Watch - Curriculum - The Great Backyard Bird Count - For Kids - Journey North - Teacher Resources More Curriculum Ideas View Nature's Notebook curriculum materials developed for these grade levels in the table below. |Nature's Notebook Program Planning Activity|| Before you begin your program planning activity, read through our guidance document to get some ideas for developing program goals and outcomes. The Program Planning Worksheet helps you to begin planning a long-term phenology monitoring program using Nature's Notebook in the field. A "program" is a series of activities designed to help you achieve a set of outcomes. You can include ideas for short (1 year or less), medium (1-3 years), or long (3-5 years or more) goals and desired outcomes. You should use this worksheet to help think through a relevant science or management question that your program will help to answer. What are the resources you have and what do you need to obtain in order to do the activities you'd like to do? How are you going to share this information with your community and involve as many people in the process to make it sustainable? Use either the Program Mapping Worksheet or the Logic Model Worksheet to help you further articulate your objectives. Then, utilize the Action Planning Worksheet to make a plan for achieving your short-term outcomes. We also offer this planning document in Spanish if you are working with Spanish audiences. USA-NPN Education Resource Number: 2017-003-C; 2014-007-CSP |Needs Assessment Worksheet|| Needs assessments are an important element of developing a site-based long-term phenology monitoring program. Thinking through the reasons you wish to utilize Nature’s Notebook for natural resource management, scientific, or educational purposes will help you to develop something sustainable. Even better would be to identify researchers, land managers, educators, or outreach providers in your community to collaborate on a monitoring program. If you are a researcher or land manager, reach out to educators who can help you recruit and train people to collect the data you need to answer your questions and make better decisions. If you are an educator, find a researcher or land manager who may find data you collect with your participants of value. For more information about the process and to share your form with the National Coordinating Staff, visit the Needs Assessment webpage. USA-NPN Education Resource Number: 2017-002-C |Short Introductory Slide Decks|| This series of introductory slide decks can be edited for your use in Nature's Notebook workshops or other presentations. Voice-over videos of the slide decks can be found here. USA-NPN Education Resource Number: 2016-001-W |2016 UArizona Insect Festival Tabling Materials|| This activity was set up on two 6 foot tables. We utilized four stereo microscopes (dissecting microscopes; a 10x and a 30x lens on a turret) across one table. On each microscope we displayed a life cycle stage of the giant swallowtail butterfly (Papilio cresphontes): a few eggs on a citrus leaf, a live caterpillar in a petri dish with a leaf, an empty chrysalis, and a pinned adult butterfly. We also included a butterfly habitat with several live adult butterflies - a swallowtail and a few queen butterflies, and a milkweed in bloom for a nectar resource. Additionally, we had samples of citrus plants and a variety of P. cresphontes instars available for display. The worksheet for the microscope was designed for students to record what they observed through the scope, either by drawing it or circling the life cycle stage that they viewed. The second datasheet was for older students who were interested in reading the caterpillar phenophase definitions and circling the details exhibited by the captive caterpillars. We also provided information about Nature's Notebook, the local Tucson Phenology Trail and sites, displayed information for teachers, including curriculum materials, and had a sign up sheet for more information. The event was from 11 am until 4 pm. There were about 250 youth who visited our table with their parents. The average age for the visitors was 3-5 years of age, although there were elementary age youth as well (grades 1-4). To a lesser degree there were middle school age youth (grades 5-6). |How to use the Observation Deck's Phenology Calendars|| Learn how to customize your own Phenology Calendars that appear on your Observation Deck. These calanders visually represent data you have collected and allow you to compare up to three species' phenophases at a time. They can be saved as a file, or set to automatically load each time you come to your Observation Deck. USA-NPN Education Resource Number: 2016-004-T
<urn:uuid:1fc754f3-4778-43dc-a2fa-0bc091f1138e>
CC-MAIN-2023-14
https://www.usanpn.org/nn/education/k-4?page=2
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943695.23/warc/CC-MAIN-20230321095704-20230321125704-00766.warc.gz
en
0.92112
1,336
3.53125
4
occasional observations on English pronunciation features, phonetics, teaching and learning Wednesday, 22 June 2011 This theory part is fairly long; it is divided in three main sections dealing with the A. standard pronunciation in Germany B. standard pronunciation in Austria and the C. standard pronunciation in German-speaking Switzerland. One of the most interesting chapters is section A.7.3.4, which deals with the germanisation of English names and words. This section (to be found on pp. 138-143) was written by William J Barry, former (1992 - 2008) Professor of Phonetics at the University of Saarbrücken, Germany. There are three blog posts on this dictionary available here. They made me get hold of the book. The price is €39.95. More on the dictionary in a future entry. Subscribe to: Post Comments (Atom) Post a Comment
<urn:uuid:38cd4d39-a2a2-4c46-8063-0f2a4ee9ae74>
CC-MAIN-2023-14
https://matters-phonetic.blogspot.com/2011/06/deutsches-aussprachworterbuch.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296944452.74/warc/CC-MAIN-20230322180852-20230322210852-00766.warc.gz
en
0.933318
211
2.53125
3
Why do they call it el nino? Lost your password? Please enter your email address. You will receive a link and will create a new password via email. Please briefly explain why you feel this question should be reported. Please briefly explain why you feel this answer should be reported. Please briefly explain why you feel this user should be reported. The term “El Nino” refers to the large-scale ocean-atmosphere climate interaction linked to a periodic warming in sea surface temperatures across the central and east-central equatorial Pacific. The warming phase of the El Nino-Southern Oscillation is associated with a band of warm ocean water that develops in the central and east-central equatorial Pacific, including the area off the coast of Peru. This oceanic warming creates a feedback response in the overlying atmosphere, resulting in increased cloudiness and rainfall. There are a few different theories as to how El Nino got its name. One theory is that Peruvian fishermen originally named it El Nino de Navidad, or “the Christ child,” because it typically arrives around Christmas. Another theory is that the name comes from the Spanish term for “the little boy,” because El Nino events were originally associated with a warm pool of water that formed off the coast of Peru. Whatever the origins of the name, El Nino has become a household word in recent years, thanks to its dramatic effects on weather patterns around the world. The name “El Niño” originates from Spanish-speaking countries along the Pacific coast of South America. The name El Niño, meaning “the little boy” or “the Christ child” in Spanish, refers to the Christ child because this weather pattern typically arrives around Christmas time. El Niño is a naturally occurring phenomenon that takes place every three to seven years and can last up to eighteen months.
<urn:uuid:96e15494-b099-4239-8294-1a01ee226721>
CC-MAIN-2023-14
https://whydotheycall.com/question/why-do-they-call-it-el-nino/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296944452.74/warc/CC-MAIN-20230322180852-20230322210852-00766.warc.gz
en
0.931758
399
4.0625
4
The quail-plover, lark buttonquail or lark-plover (Ortyxelos meiffrenii) is a small ground-living bird in the buttonquail family Turnicidae that is found in the Sahel region of Africa and in a disjunct region of East Africa. It is the only species placed in the genus Ortyxelos. The quail-plover is a small, short-tailed cursorial bird which looks a little like a miniature courser when on the ground. The upperparts are a sandy-rufous colour and the underparts mainly whitish. They show a distinctive wing pattern in flight when the contrast between the white primary coverts and the black with white-tipped remiges to form a distinct diagonal band on the upperwing. Its fluttering flight style is rather lark-like. The females are slightly darker than the males while the juveniles are paler.
<urn:uuid:36815450-c0de-4cb2-8c56-5801605a5d45>
CC-MAIN-2023-14
https://app.birda.org/species-guide/6321/Quail-plover
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945242.64/warc/CC-MAIN-20230324020038-20230324050038-00766.warc.gz
en
0.908783
213
2.96875
3
A baby born somewhere on Tuesday will be the world’s eight billionth person, according to a projection by the United Nations. “The milestone is an occasion to celebrate diversity and advancements while considering humanity’s shared responsibility for the planet,” UN Secretary-General Antonio Guterres said in a statement. The UN attributes the growth to human development, with people living longer thanks to improvements in public health, nutrition, personal hygiene and medicine. It is also the result of higher fertility rates, particularly in the world’s poorest countries — most of which are in sub-Saharan Africa — putting their development goals at risk. Population growth has also magnified the environmental impacts of economic development. But while some worry that eight billion humans is too many for planet Earth, most experts say the bigger problem is the overconsumption of resources by the wealthiest people. “Some express concerns that our world is overpopulated,” said United Nations Population Fund chief Natalia Kanem. “I am here to say clearly that the sheer number of human lives is not a cause for fear.” Joel Cohen of Rockefeller University’s Laboratory of Populations told AFP the question of how many people Earth can support has two sides: natural limits and human choices. Our choices result in humans consuming far more biological resources, such as forests and land, than the planet can regenerate each year. The overconsumption of fossil fuels, for example, leads to more carbon dioxide emissions, responsible for global warming. “We are stupid. We lacked foresight. We are greedy. We don’t use the information we have. That’s where the choices and the problems lie,” said Cohen. However, he rejects the idea that humans are a curse on the planet, saying people should be given better choices. The current population is more than three times higher than the 2.5 billion global headcount in 1950. However, after a peak in the early 1960s, the world’s population growth rate has decelerated dramatically, Rachel Snow of the UN Population Fund told AFP. Annual growth has fallen from a high of 2.1 percent between 1962 and 1965 to below 1 percent in 2020. That could potentially fall further to around 0.5 percent by 2050 due to a continued decline in fertility rates, the United Nations projects. The UN projects the population to continue growing to about 8.5 billion in 2030, 9.7 billion in 2050, and peaking around 10.4 billion in the 2080s.
<urn:uuid:66d26e2b-b9db-420a-b48c-3361063263f4>
CC-MAIN-2023-14
https://osbcng.org/worlds-population-hits-eight-billion-un/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945242.64/warc/CC-MAIN-20230324020038-20230324050038-00766.warc.gz
en
0.94027
535
3.1875
3
The Gut-Brain Axis – Where your big brain meets your little brain We often hear the phrase “the gut is the 2nd brain”, but what does this mean exactly? Whilst many of us can admit to thinking with our tummies on the odd occasion, the brain and the gut remain 2 very separate systems with very different functions. What they do share in common is the ability to communicate. Picture your gut and brain as 2 familiar friends having a phone conversation. The gut is the “chatterbox” of the two, with most of the ‘conversation’ being directed from the gut to the brain, mainly via the vagus nerve. Now picture the various pathways via which the gut and brain communicate (such as hormonal, neural and immune) as the phone line. To help the conversation flow a little easier, the gut and the brain speak the same language in the form of messenger molecules such as hormones, neurotransmitters and cytokines. What messages are sent depends on many factors, including the balance of microbes in your gut. The gut microbiome sets the ‘tone’: The gut-brain axis is now more commonly referred to as the microbiome-gut-brain axis, due to the significant role the microbiome plays in coordinating communication between the two systems. Think of the microbial balance in the gut as setting the ‘tone’ of the conversation. If the gut microbiome is in balance according to the hosts needs, the conversation is filled with ‘good’ messages which are expressed in the form of a healthy body and mind. If the gut microbiome is imbalanced (AKA dysbiosis), the conversation can lead to ‘bad moods’ on both ends. In other words, both the gut and the brain can express signs and symptoms of health imbalances, including digestive discomfort, stress and mild anxiety for example. Supporting the gut-brain axis with a healthy food (and thought) diet: One of the ways you can support the health of your microbiome, gut and brain is via your diet. This not only involves your food diet, but also your ‘thought diet’. Just like with food, your thoughts need to be consumed and processed before they can then be expressed in a physical way. For example, eating a diet rich in nutrients can help support a healthy body and mind, whereas eating a diet rich in junk food does the opposite.[i] The same goes for your thoughts. Over-consuming ‘junk thoughts’ like reading too much negative news, or engaging in frequent negative conversations or arguments, can lead to physical signs of stress and tension. Whereas, resting the mind, meditating and taking peaceful strolls in nature, can lead to improved health outcomes. Synbiotics to support healthy brain(s) function: Another way to support the health of your microbiome-gut-brain axis is through supplementing with a synbiotic. A synbiotic is defined as the combination of a probiotic with a prebiotic. A probiotic being a live microbe that offers health benefits, and a prebiotic being a food source that can be utilised by the probiotic.[ii] Specific types of probiotics and prebiotics have shown to support the gut-brain axis by helping to restore beneficial gut bacteria, as well as support healthy gastrointestinal, immune and nervous function. Some species of probiotic bacteria have even begun to show promising outcomes in the reduction of symptoms of stress and mild anxiety.1 Polyphenols, including those found in herbs like saffron, can also act as prebiotics, in addition to having their own inherit stress relieving properties.[iii] We all enjoy a friendly chat! By understanding the role of the micobiome-gut-brain axis and its importance in health maintenance, we can take better steps to ensure our gut and brain enjoy the health benefits of a ‘friendly conversation’ for years to come! If seeking specific advice on supporting your mental or physical health, talk to your health professional. [i] Taylor AM, Holscher HD. A review of dietary and microbial connections to depression, anxiety, and stress. Nutritional neuroscience. 2020 Mar 3;23(3):237-50. [ii]Swanson KS, Gibson GR, Hutkins R, Reimer RA, Reid G, Verbeke K, Scott KP, Holscher HD, Azad MB, Delzenne NM, Sanders ME. The International Scientific Association for Probiotics and Prebiotics (ISAPP) consensus statement on the definition and scope of synbiotics. Nature Reviews Gastroenterology & Hepatology. 2020 Nov;17(11):687-701. [iii] Thilakarathna WW, Langille MG, Rupasinghe HV. Polyphenol-based prebiotics and synbiotics: potential for cancer chemoprevention. Current Opinion in Food Science. 2018 Apr 1;20:51-7.
<urn:uuid:f8947c72-b1c9-458b-9f20-845a140ee184>
CC-MAIN-2023-14
https://www.lifespaceprobiotics.com/en-sg/blogs/health-tips/the-gut-brain-axis-where-your-big-brain-meets-your-little-brain
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945242.64/warc/CC-MAIN-20230324020038-20230324050038-00766.warc.gz
en
0.918372
1,054
2.703125
3
Renal cell carcinoma makes up approximately nine out of ten kidney cancer cases in adults. This type of kidney cancer originates in the lining of the proximal convoluted tubule, which is part of the small tubes in the kidney that transport waste from the blood to the urine. The symptoms of this disease are typically very hard to recognize, which explains why the cancer has often already spread by the time it is diagnosed. Symptoms and Signs Most patients don’t start showing symptoms for renal cell carcinoma until the later stages of the disease when a tumor has grown larger. Therefore, most of the time this disease is diagnosed when a patient is being examined for another reason. There are some subtle symptoms that you can watch for, though. These can include a variety of signs, ranging from minor ailments like running a fever or experiencing loss of appetite, to more serious afflictions such as constant, intense pain in the back or abdomen or drastic weight loss for no apparent reason. The most common symptom for renal cell carcinoma is hematuria, or blood in the urine, occurring in about 40% of patients. This can range from enough blood to give your urine a pink tint, to microscopic amounts that can only be detected by performing certain tests. If the tumor has grown to a significant size, it will cause a pain that is steady and originates to the side of your lower back, just under your rib cage. This kind of pain will be different than the kind produced by a strained muscle since it does not change with movement. Another symptom produced by a fairly large tumor in your kidney is a noticeable lump extending outward and located on your abdomen, either on your back, under your rib cage, or on your side. This is obviously an indication to seek medical attention immediately. Sudden, unexplained weight loss could be an indication of renal cell carcinoma. Cancer cells in the kidney can steal nutrients from your healthy cells, which will lead to unintentional weight loss. If you are not dieting, and especially if your weight loss accompanies any of the other aforementioned symptoms, this is a good reason to call your doctor. Less common symptoms might include: night sweats, high blood pressure, flank pain, anemia, sudden vision problems, fatigue, unusual hair growth in women, pale skin, and for men, swelling of the veins around one or both testicles. Symptoms of kidney tumors can be very similar to other conditions, such as bladder infections or kidney stones. If you experience any of these symptoms, especially in conjunction with one another, you should call your doctor as soon as possible. The key to treating renal cell carcinoma effectively is catching it as early as possible. The 5-year survival rate for this disease can be as high as 90%, but this depends heavily on whether the cancer has metastasized to any other organs by the time it is diagnosed. Since other common forms of cancer treatments, such as chemotherapy and radiation treatment, don’t typically work for kidney cancer, the best option for recovery is surgery to remove the tumor. If the cancer has spread to other organs like the lungs or the lymph nodes, it becomes much more difficult to remove, causing the survival rate to become significantly lower. Featured Image: Wikimedia
<urn:uuid:05115700-3150-4bc3-9f54-9eee56e0e214>
CC-MAIN-2023-14
https://symptomscheck.net/cancer/symptoms-renal-cell-carcinoma/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945323.37/warc/CC-MAIN-20230325095252-20230325125252-00766.warc.gz
en
0.958968
664
2.8125
3
Tetralogy of Fallot, described in 1888, is seen in about 8% of all congenital cardiac abnormalities. It includes the following defects: - Pulmonary stenosis (PS) - Ventricle septum defect (VSD) - Overriding aorta - Right ventricular hypertrophy Tetralogy of Fallot Embryology It is sometimes hard to remember the 4 components of TOF. However, understanding the little bit of embryology that is required to malfunction can result in an easier understanding of why all the four abnormalities in TOF exist. Remember: the aorta and pulmonary artery start as a single tube the truncus arteriosus which is then divided by the spiral septum. The spiral septum grows down to and attaches to the ventricular septum which isolates the left and right ventricles as well as isolating the aorta and pulmonary artery. However, if the spiral septum is not in the midline, but rather shifted over towards the right side of the heart, then what would happen? - The opening to the aorta would be large - The opening to the pulmonary would be small - The spiral septum would “miss” the ventricular septum - Poof! One abnormality results in 3 of the “defects” in TOF: “overriding” aorta (it opens up to both the right and left ventricles) - pulmonary stenosis (the pulmonary artery is small and narrowed) - VSD (because the spiral and ventricular septa do not line up and connect) What about the 4th abnormality in TOF: right ventricular hypertrophy? Well, it is a compensatory result of having pulmonary stenosis. The RV has to work extra hard to pump blood into the pulmonary artery and therefore hypertrophies to accommodate the The pulmonary stenosis (PS) determines the degree of severity of this defect. Pulmonary perfusion depends on the size of the PS. In some infants and children, there can be profound narrowing of the right ventricular outflow tract. Because of this it is easier for the blood to cross the VSD right-to-left and go out to the aorta instead of the pulmonary artery. If this is the case, the infant or child can become quite cyanotic. The most severe form of Tetralogy of Fallot is associated with pulmonary atresia where no blood can cross from the right ventricle to the pulmonary arteries and lungs. In these infants it is necessary to start a medication (Prostaglandin E1) to help keep open the Ductus Arteriosis (PDA) to maintain some bloodflow to the lungs. Babies with Tetralogy of Fallot may experience intermittent spells of extreme cyanosis, termed “tetralogy spells,” or hypercyanotic spells. These can be serious and even life-threatening. To increase blood flow to the lungs, an operation known as a Moditfied Blalock-Taussig (B-T) Shunt Procedure can be performed in which a “shunt”, or tiny tube made of Gore-Tex® (yellow in the diagrams to left), is attached between the aorta (or one of its branches) and the pulmonary artery (or one of its two branches – the left pulmonary artery (LPA) or right Pulmonary Artery (RPA): If a shunt procedure was previously performed, the shunt is removed and circulation proceeds more or less as in a normal heart. Tetralogy patients after surgical repair usually have a murmur of pulmonary insufficiency (diastolic murmur) and residual pulmonary stenosis (systolic). There may also be a murmur of a residual VSD. Patients after primary surgical repair of Tetralogy in childhood will often require further surgical repairs, especially replacement of the pulmonary valve to minimize right ventricular volume overload as a result of the complete pulmonary insufficiency that is a consequence of the Tetralogy repair. Patients who have undergone the surgical repair of Tetralogy of Fallot are prone to developing arrhythmias later in life, with more than a third of adult patients experiencing atrial arrhythmias
<urn:uuid:78dcef0c-d3bc-4896-a12c-fb63b98df8bc>
CC-MAIN-2023-14
https://www.cardiachealth.org/professionals/cardiac-anatomy/cardiac-defects-with-a-right-to-left-shunt-cyanotic/tetralogy-of-fallot-tof/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945323.37/warc/CC-MAIN-20230325095252-20230325125252-00766.warc.gz
en
0.919239
922
3.390625
3
Tony Ford Science Monday, 1 December 2014 Page 1 8.3 Lesson 2 Principles of Simple Machines From the invention of the wheel and probably before that man has been utilising machines or tools that help him/ her to make life easier and reduce effort when doing work. (Remember from Lesson 1 Work is done when energy is used up and objects move or change.) Imagine trying to push a wheelbarrow uphill without wheels? Imagine trying to lift that wheelbarrow without handles? Wheels and handles or levers are examples of simple machines that help to do work. Other simple machines include axles, gears, pulleys, inclined planes and screws. They are called simple because they contain only one machine type. If you look at more complex machines like wheelbarrows, bicycles, clocks and cranes etc. you will see many of these simple machines used together to assist with doing work. Purpose of machines: Must do at least one of: 1. To reduce effort force 2. To increase distance or speed 3. To change direction Examples 1. If you use a long handled socket spanner (wrench) to undo tight nuts on a car wheel, the longer the handle the easier it is because this is a machine that reduces force. 2. If you use a Hishing rod that bends and the other end of the rod propels the tackle (hook, line, bait and sinker), as you Hlick your end, the longer the rod the further the tackle will go because this is a machine that increases distance. 3. If you hang a pulley with a rope on a beam and tie one end to a weight. You can lift the weight very high because you can pull down on a long rope rather than trying to push it up. This is a machine that changes direction. Tony Ford Science Monday, 1 December 2014 Page 2 Levers are just solid objects like planks and crowbars that can transfer a force from one place to another. A lever allows application of input force or effort 3 at a distance from the output force 1. A fulcrum or pivot 2 is where the lever sits and allows free rotation motion. The further away the application of force is from the pivot, the less input force is needed for a heavy load. The further away the load is from the pivot the further it will travel. Q. How would you change the above diagram for a catapult? Types of Levers 1. CLASS 1 (Pivot in the middle) F out Two types: A. If dIN > dOUT Input Force < Output Force dOUT B. if dIN < dOUT Input force > Output force dIN F in F in 2. CLASS 2 (Pivot on the end) (dIN > dOUT) Input Force < Output force F out dIN F out F in 3. CLASS 3 (Pivot on the end) (dIN < dOUT ) Input Force > Output force Tony Ford Science Monday, 1 December 2014 Page 3 These levers then can be a: 1. Force advantage (input force is less than output force so less effort is needed) 2. Distance advantage (input force is greater than output force so more effort is needed but the load goes further or faster) Q1. Using the Lever Classes on previous page, categorise the classes below into their advantage type (Force or Distance): Lever Crowbar prizing up a rock. Claw hammer removing a nail. Cutting with Scissors Gripping with pliers Using a Catapult Lifting a Wheelbarrow Using a stapler Using a nutcracker Rowing a boat Casting a Fishing rod Using the forearm to lift a rock Using BBQ tongs Q2. In the diagrams below; draw in the input force FIN, output force FOUT and Pivot . Tony Ford Science Monday, 1 December 2014 Page 4 A pulley system uses at least one wheel and a rope that transfers the force from one side of the wheel to the other. Single pulleys change direction of the force but have no force or distance advantage. The load moves the same distance and requires the same force to lift it, but for awkward heights or positions the single pulley is still useful. Multiple pulley systems are more useful, not only providing change in direction if needed but also a force advantage. The force advantage is due to the number of rope sections lifting the weight. The more pulleys and ropes the greater the advantage: “Block and Tackles” have two Hixed pulleys (at the top) and two moveable pulleys that rise with the load. The advantage is the much smaller force required to lift the load. The disadvantage is the large distance needed to pull the rope, for a small rise of the load. In the diagrams shown below, each rope section halves the force. The Effort or input force is ¼ of the load or output force for a 4 pulley system. In real pulley systems though, more than ¼ force is needed because of friction between the rope and pulleys. Tony Ford Science Monday, 1 December 2014 Page 5 Q. In the diagrams below label the input and output forces and label the Hixed and moveable pulleys. Block and Tackle System- expanded diagram Block and Tackle System 3. Wheel and Axles Wheels and axles are similar to: 1. A Second Class lever. The pivot is in the middle. Effort on the wheel and load is on the axle. Example Steering wheels, bicycle handlebar, taps and door handles. The Wheels connected to axles turn a small force on the wheel into a large force on the axle. The bigger the wheel, the easier the force required to turn the axle. Tony Ford Science Monday, 1 December 2014 Page 6 2. A Third Class lever. The pivot is in the middle. Effort on the axle and load is on the wheel. Example wheels of bicycles, cars etc. The axle connected to the wheel turns a small distance and the wheel on the edge turns a much larger distance, increasing the speed. The bigger the wheel, the faster it will go. Train Engine turning axle Cyclist turning pedals to turn axle of wheel Load on wheel Effort On axle Load on wheel Q1. The outside of the wheel of a car moves further than the axle for each rotation so which one which one is faster? Q2. Use the diagram showing FI and FO forces and the DI and DO circumferences to explain it. 4. Inclined Planes Ramps, steps, wedges, axe heads, chisels and screws are all examples of an inclined plane, which is just a sloped edge or table. The force advantage occurs because you have to push for a long distance. The less the angle of the ramp the less the force is needed but you need a longer ramp. • A Wedge (knife, chisel, axe head) is a single or double inclined plane, When you push it into a material , it Tony Ford Science Monday, 1 December 2014 Page 7 goes up a ramp making it easier. • A screw is a spiral ramp, when you twist it into a material, the material is pulled up the ramp. Q. How could you increase the force advantage of wedges and screws? Do Investigation: 8.4 Analysing a machine
<urn:uuid:81f29a66-c95b-40b2-b6d8-a9c03a28902e>
CC-MAIN-2023-14
https://kipdf.com/83-lesson-2-principles-of-simple-machines_5ac3f9d51723dd8c4e9432f6.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296946445.46/warc/CC-MAIN-20230326173112-20230326203112-00766.warc.gz
en
0.897386
1,593
3.703125
4
Trauma and difficult life circumstances are an unfortunate reality for many of our teens; the National Child Traumatic Stress Network states that adolescents who have been exposed to these types of events are more likely to abuse substances in an attempt to alleviate some of their distress. Self-medication is a common factor in adolescent substance abuse – especially if friends, parents or other family members are seen self-medicating as well. Some of the risk factors for adolescent substance abuse are: - Poor academic performance - Skipping school - Isolating themselves from friends or family - Becoming defiant or hostile at school and/or home - Acting secretive - No longer having an interest in hobbies they once used to enjoy - And more A 2017 study published in the journal PLOS One found from a survey of 6,266 students from 99 primary, middle and high schools that self-medication occurs amongst 45.8% of adolescents. For many of these students, pain relievers, cold or cough medicines, analgesics and antacids were the most prevalent substances abused – and at this age, many teens do not properly read drug labels or instructions appropriately, which place them at increased risk for dependency and overdose. Adolescents are at a unique time period where they’re likely to go through hormonal changes which could raise feelings of depression, anxiety, confusion and more. Rather than your teen struggling with these changes alone, they should have a safe space where they can work through their concerns. Practice open communication with your teen. If you can see that they’re struggling, provide them with resources for them to go to for additional support. Show your teens what it means to work through difficult emotions in healthy ways rather than through self-medication. If your teen is abusing substances, contact the Adolescent Recovery of Cumberland Heights today. Adolescent Recovery of Cumberland Heights (ARCH) originally began in 1985 when there were few other adolescent programs like it in the country. In 2019, we’re expanding our continuum of services with ARCH Academy, a unique program that offers 60 days to 6 months of residential care to adolescent boys ages 14-18 who are struggling with alcohol and/or drug addiction. This new program stems from Cumberland Heights, which has been around since 1966, and is located in Kingston Springs, Tennessee. The adolescent age is a critical time for development, making this a crucial time of positive influence. For more information, call us today at 1-800-646-9998.
<urn:uuid:3ceedb49-9029-4852-a4e7-00e01b0f2b51>
CC-MAIN-2023-14
https://www.cumberlandheights.org/blogs/do-adolescents-use-substances-to-cope-with-difficult-emotions/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296946445.46/warc/CC-MAIN-20230326173112-20230326203112-00766.warc.gz
en
0.956013
512
3.078125
3
Preparing meals for a loved one with dementia can be a daily challenge. They may be unable to express why they’re refusing to eat favorite meals or remember the purpose of a fork. But, two things remain constant – – their need for nutrients and your need to make sure that need is met. To improve the experience for both of you, here are twelve tips to help your loved one with dementia get the nutrition they need (courtesy of Family Caregiver Alliance). Avoid food fights Make mealtime as pleasant as possible. Encourage someone to eat, but don’t demand, cajole, or threaten Choice of two things If giving choices, give only two things to choose between. Even if a choice is made, the person may not want it when it is presented. Don’t take it personally. If you know their favorite foods, have them available for backup. Favorite foods might change. Limited quantity sweets People often crave sweet things, so make them available in limited quantities unless medically not recommended, e.g., diabetes. Fruit can often fulfill this need. We all lose taste buds as we age, so food doesn’t taste the same. For some people, bland food is fine, and for others, we need to spice it up. Smaller and Frequent meals People will often not eat a large meal or the traditional three meals a day. Try offering smaller, more frequent meals. Or offer nutritional supplements between meals. Always have water or other liquids available and offer them often so the person doesn’t get dehydrated. Use small plates, as large ones can be overwhelming. Use color contrast of dishes and food for the person to distinguish the food more easily. Turn the plate if the person has eaten all the food on one side. Chop food into small pieces to make it easier to chew. For some people, serving one food at a time might be less overwhelming. If coordination and independence are an issue, offer finger foods—sandwiches, cut-up fruits and vegetables, cheese cubes, fish sticks, chicken nuggets, etc. Straw for liquids If a person has trouble swallowing, use a straw when offering liquids. Or use a thickening agent and pureed foods rather than thin liquids. Get a referral to a speech therapist to assess the problem, and learn ways to cue someone to swallow. Learn the Heimlich maneuver. If someone is reluctant to eat, they may have a chewing problem ranging from dentures that don’t fit correctly to oral pain or other dental issues. Try softer foods, such as applesauce, cottage cheese, yogurt, eggs, and puddings. Atmosphere of friendliness Sit with the person, if possible, while eating to create an atmosphere of friendliness. People often eat very slowly, and so sitting with the care receiver during the entire meal time might be burdensome. However, if you sit at the beginning of the meal, it will be a way to model eating for the person. One food item at a time If your loved one needs to be fed, offer one food item at a time. Make sure they have swallowed before offering the next bite. Demonstrate and cue eating behavior. Serve food at the right temperature to eat right now. Waiting for food to cool might be a deterrent to eating or a burn hazard. People with memory problems may not remember to eat or may ask again for a meal, having forgotten they already ate. Keep healthy snacks available, rather than telling them that they just ate. Alzheimer’s and Dementia Care by Home Instead Home Instead of Southwest Florida is here to provide compassionate, high-quality memory care right in your loved one’s home. Our Alzheimer’s and dementia CAREGivers participate in our unique and critically acclaimed training program called CARE: Changing Aging through Research and Education. As pioneers in this field, Home Instead Senior Care developed the highest quality dementia caregiver training program available. As a result, we have helped change how people live with Alzheimer’s and other dementias. Contact us today to learn more about our Alzheimer’s and dementia care in Southwest Florida. We would be honored to serve your family.
<urn:uuid:aaafd5a3-50e3-476e-af85-c36cf63f5d5e>
CC-MAIN-2023-14
https://www.homeinsteadswfl.com/swfl/dementia-nutrition/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296946445.46/warc/CC-MAIN-20230326173112-20230326203112-00766.warc.gz
en
0.944615
897
2.640625
3
There are 16,000 transfers of premature babies to medical facilities each year in the UK alone. The babies are often transported over large distances from rural to city locations over significant periods of time, in some cases two hours or more. The ambulances, helicopters or aircraft used are miniaturised intensive care units, containing all the equipment required to keep the baby alive. But mechanical vibrations and noise from the equipment and transfer vehicle can provide significant, even life-threatening stress to the most vulnerable and delicate human lives. As we discovered when speaking to clinicians, transfers are sometimes aborted as a result of the stress that develops in the baby. These vehicles need materials and structures to reduce the noise and vibrations to tolerable levels. Continue reading
<urn:uuid:85aea4ec-7ac6-4049-ba63-1cdde22595f1>
CC-MAIN-2023-14
https://policybristol.blogs.bris.ac.uk/tag/medical/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948965.80/warc/CC-MAIN-20230329085436-20230329115436-00766.warc.gz
en
0.940304
146
2.71875
3
The purpose of this activity is to expose you to the Microsoft Project tool for the purpose of developing a project plan and Gantt chart for a hypothetical 30-day hobby project of your choice. Examples include building a deck, painting the garage, or planting a vegetable garden. Completing this activity will help to jump start your successful completion of the project deliverables throughout the course.This activity consists of two parts:Part 1: Project Introduction, or Project PlanYou will write a 3–5-page document outlining the project specifics, such as its key objectives and scope, functional and technical requirements, key components, etc.Part 2: Gantt ChartYou will use Microsoft Project to create a Gantt chart for your hobby project. Download Microsoft Project to your computer if you don’t already have it installed and familiarize yourself with its features. InstructionsPart 1: Project Introduction or Project PlanWrite a 3–5-page project plan in which you: Part 2: Gantt ChartUse Microsoft Project to create a Gantt chart identifying the major and minor tasks, illustrating dependency relationships between activities.FormattingThis course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions. Note the following: Learning OutcomesThe Introduction to Project Management Tools Activity is formative in nature. As a result, it is not tied to a specific course learning outcome. Delivering a high-quality product at a reasonable price is not enough anymore. That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe. You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more
<urn:uuid:df30ff72-f055-4b90-bd04-39a3c535704a>
CC-MAIN-2023-14
https://qualitypaperhelp.com/the-purpose-of-this-activity-is-to-expose-you-to-the-microsoft-project-tool-for-the-purpose-of-developing-a-project-plan-and-gantt-chart-for-a-hypothetical-30-day-hobby-project-of-your-choice/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948965.80/warc/CC-MAIN-20230329085436-20230329115436-00766.warc.gz
en
0.90936
539
3.28125
3
As technology continues to improve, Artificial Intelligence (AI) has been increasingly used in many areas and voiceover is no exception. It’s a domain that I believe will never be replaced by machines because you can’t train bots to be as emotive as humans. From the accuracy of pronunciation to storytelling capabilities, human voice actors remain unmatched by AI technologies. There will always be a need for human voice actors to add subtle nuances and emotive tones that make a performance truly incredible. Their talent and expertise remain invaluable assets in creating engaging audio content that can move listeners in ways that no AI technology ever could. Human voice actors have the ability to add creative flourishes to draw in and keep an audience. They can make the whole audience sit up and listen with their unique vocal inflections and voice-acting skills. This is something that AI technologies still struggle to do accurately. Let’s explore further how human voice actors are still capable of outperforming AI in voice acting. Why do human voice actors still reign supreme over AI? When it comes to highly emotive or emotional content, human voice actors are still in a class of their own. AI technology and computer software have improved greatly over the years, but they still cannot match the flexibility and nuance of a real human voice. Human voice actors bring vocal emotiveness that AI technology cannot replicate. Whether it’s conveying sadness or joy, human voice actors can use their skills to create emotion in a unique way that AI may never fully be able to do. In addition, human voice actors can make vocal inflections and adjust their tone in order to convey a certain feeling or message more effectively than any AI technology can. They also excel in storytelling capabilities, such as bringing characters to life with unique voices. Human voice actors can convey a character’s personality through different vocal tones, whereas AI technology may struggle to do so effectively. For example, if you want to add a warm and friendly tone to your content, a human voice actor can adjust their vocal performance to bring out this emotion. At the same time, if we talk about pronunciation, voice artists can pronounce words more accurately and with greater clarity than AI technologies. This is especially important for voiceover projects involving foreign languages or dialects, as human voice actors better understand the language and pronunciation nuances than AI technology. Adding a human touch: The importance of emotive tone in voice acting Voice acting is an art, and professional voice-over artists can bring emotion to their performances. Human voice actors can convey feelings uniquely and distinctly, which is unmatched by AI technology. These artists can bring subtle changes in their performance to convey emotion more effectively or add a certain tone that would not be possible with AI technology. They can also bring life and color to their performances to make the listener feel like they are part of the story. Whether creating a sense of urgency, conveying sadness or joy, or storytelling, human voice actors remain superior in their emotive tone. This is why AI may only partially replace the art of voice-over, as it simply cannot replicate the emotional delivery and range that a skilled actor can produce. A comparison of AI and human voice-over Below is the in-depth comparison of AI and Human Voice Over in terms of quality, time management, pricing, and accuracy: |Comparison||Human Voice Over||AI Voice-Over Tools| |Quality||Human voice-over is more engaging and personal as voice artists add more emotion and emphasis to the project. Moreover, they can care more accurately and efficiently for tone, pronunciation, and storytelling.||AI voice-over is usually robotic and needs more emotional complexity, which makes it difficult to convey the right message with these recordings.| |Human voice-over is usually time-consuming as it requires more effort and resources to have the performance recorded, edited, and ready for use.||AI technology is much faster than human voice-over artists in recording and editing audio files. It can process audio faster than humans and requires less time to be completed.| |Pricing||Human voice-over is usually more expensive as it requires the talent, time, and resources of an experienced professional to record a quality performance.||AI technology is much cheaper than human voice-over, requiring fewer resources and time to produce a quality recording.| |Accuracy||Human voice-over is more accurate and reliable in handling language tone and pronunciation. Moreover, you can rest assured that your message will be accurately conveyed with a human voice-over.||AI technology can produce automated recordings quickly and accurately but can struggle with language nuances and pronunciations. It is usually less reliable than human voice-over regarding accuracy and delivery.| While AI technology has made great strides in automating audio production, it still needs to compete with talented human voice actors’ emotive delivery and nuanced performance. Human voice-over artists remain the superior choice for projects that require more emotionally complex performances and storytelling. Whether you produce educational content, advertisements, films, or audiobooks, working with a skilled voice actor will ensure your project reaches its full potential. With the right artist, you can create audio content that resonates with your target audience and conveys the desired message accurately and engagingly.
<urn:uuid:5c5d038d-8a43-47ca-bdf1-9f71c6175ef7>
CC-MAIN-2023-14
https://www.datasciencecentral.com/human-voice-over-vs-ai-how-humans-outperform-ai/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948965.80/warc/CC-MAIN-20230329085436-20230329115436-00766.warc.gz
en
0.946325
1,090
2.59375
3
Here are some answers to frequently asked questions about music therapy. What is a Music Therapist? Music therapists assess emotional well-being, physical health, social functioning, communication abilities, and cognitive skills through musical responses; design music sessions for individuals and groups based on client needs using music improvisation, receptive music listening, song writing, lyric discussion, music and imagery, music performance, and learning through music; participate in interdisciplinary treatment planning, ongoing evaluation, and follow up. Who can Benefit from Music Therapy? Children, adolescents, adults, and the elderly with mental health needs, developmental and learning disabilities, Alzheimer's disease and other aging related conditions, substance abuse problems, brain injuries, physical disabilities, and acute and chronic pain, including mothers in labor. Where do Music Therapists Work? Music therapists work in psychiatric hospitals, rehabilitative facilities, medical hospitals, outpatient clinics, day care treatment centers, agencies serving persons with developmental disabilities, community mental health centers, drug and alcohol programs, senior centers, nursing homes, hospice programs, correctional facilities, halfway houses, schools, and private practice. What is the History of Music Therapy as a Health Care Profession? The idea of music as a healing influence which could affect health and behavior is as least as old as the writings of Aristotle and Plato. The 20th century discipline began after World War I and World War II when community musicians of all types, both amateur and professional, went to Veterans hospitals around the country to play for the thousands of veterans suffering both physical and emotional trauma from the wars. The patients' notable physical and emotional responses to music led the doctors and nurses to request the hiring of musicians by the hospitals. It was soon evident that the hospital musicians needed some prior training before entering the facility and so the demand grew for a college curriculum. The first music therapy degree program in the world, founded at Michigan State University in 1944, celebrated its 50th anniversary in 1994. The American Music Therapy Association was founded in 1998 as a union of the National Association for Music Therapy and the American Association for Music therapy. Who is Qualified is Practice Music Therapy? Persons who complete one of the approved college music therapy curricula (including an internship) are then eligible to sit for the national examination offered by the Certification Board for Music Therapists. Music therapists who successfully complete the independently administered examination hold the music therapist-board certified credential (MT-BC). The National Music Therapy Registry (NMTR) serves qualified music therapy professionals with the following designations: RMT, CMT, ACMT. These individuals have met accepted educational and clinical training standards and are qualified to practice music therapy. Is there Research to Support Music Therapy? AMTA promotes a vast amount of research exploring the benefits of music as therapy through publication of the Journal of Music Therapy, Music Therapy Perspectives and other sources. A substantial body of literature exists to support the effectiveness of music therapy. What are some Misconceptions about Music Therapy? That the client or patient has to have some particular music ability to benefit from music therapy -- they do not. That there is one particular style of music that is more therapeutic than all the rest -- this is not the case. All styles of music can be useful in effecting change in a client or patient's life. The individual's preferences, circumstances and need for treatment, and the client or patient's goals help to determine the types of music a music therapist may use. Describe a Typical Music Therapy Session Since music therapists serve a wide variety of persons with many different types of needs there is no such thing as an overall typical session. Sessions are designed and music selected based on the individual client's treatment plan. How can Music Therapy be Utilized by Healthy Individuals Healthy individuals can use music for stress reduction via active music making, such as drumming, as well as passive listening for relaxation. Music is often a vital support for physical exercise. Music therapy assisted labor and delivery may also be included in this category since pregnancy is regarded as a normal part of women's life cycles. How is Music Therapy Utilized in a Hospital? Music is used in general hospitals to: alleviate pain in conjunction with anesthesia or pain medication: elevate patients' mood and counteract depression; promote movement for physical rehabilitation; calm or sedate, often to induce sleep; counteract apprehension or fear; and lessen muscle tension for the purpose of relaxation, including the autonomic nervous system. How is Music Therapy Utilized in Nursing Homes? Music is used with elderly persons to increase or maintain their level of physical, mental, and social/emotional functioning. The sensory and intellectual stimulation of music can help maintain a person's quality of life. How is Music Therapy Utilized in Schools? Music therapists are often hired in schools to provide music therapy services listed on the Individualized Education Plan for mainstreamed special learners. Music learning is used to strengthen nonmusical areas such as communication skills and physical coordination skills which are important for daily life. *From AMTA Frequently Asked Questions How is Music Therapy Utilized by Hospice? Music therapy in hospice is used to enhance quality of life through symptom distraction, spiritual support, coping and processing, elevated mood, and caregiver & family support for anticipatory grief and bereavement.
<urn:uuid:7b033587-84dc-4a3d-904f-673fea3099f7>
CC-MAIN-2023-14
https://centralohiomusictherapy.com/faqs/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949355.52/warc/CC-MAIN-20230330163823-20230330193823-00766.warc.gz
en
0.938273
1,086
2.53125
3
because the wire telephone has wire in it Answer 2 Well, almost all telephones used today are electronic devices, including mobile phone, wire telephone and ip telephone. Wire telephone is just a sub branch of electronic telephone. Regular telephone wire is rated a 28 Types of wire used in installations are copper and aluminium. Ever see the lowest wire on a "telephone" pole? That is the telegraph wire, mostly used by municipal services these days. There are three types of wires. They are solid wire (single piece metal wire used when flexibility is required),stranded wire (group of gauge wire wrapped used in circuit boards), braided wire (strands of wire braided together used as electromagnetic shield). technologies that are used in telephone exchange include manual service, dial service, telephone exchange and telephone switch. Other services include concentrator, off-hook, on-hook and wire center. Telephone cable wire is used as the medium for internet connection. With the incorporation of the internet and the telephone technologies, we can now conveniently and cost effectively exchange audio and video information. the telephone wire it is connected 2
<urn:uuid:bece971b-d660-49d5-9ba1-7375c5a9a16a>
CC-MAIN-2023-14
https://www.answers.com/Q/What_types_of_telephone_wire_can_be_used_underground
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949355.52/warc/CC-MAIN-20230330163823-20230330193823-00766.warc.gz
en
0.91065
249
3.015625
3
In this task, you must estimate the number of trees on a tree farm - without counting every tree. Mathematical Content Standards This task asks students to select and apply mathematical content from across the grades, including the content standards: - 7.RP: Analyze proportional relationships and use them to solve real-world and mathematical problems. - 7.SP: Use random sampling to draw inferences about a population. Note: These references are provisional: we are still developing our critera for consistently linking individual tasks to the CCSS. Assessment Task Type - Expert Rich, less structured tasks requiring strategic problem-solving skills as well as content knowledge. The task types indicate the breadth and depth of CCSS mathematical practices assessed by the task. Novice tasks involve only MP2 and MP6 and do so at a low level. Apprentice tasks add MP3 and MP7 but, because of the guidance within the task, do so at a comparatively modest level. Expert tasks aim to cover the full range of practices. Note: these task types offer a guide as to how tasks relate to the mathematical practices. We are currently considering whether referencing the specific practices relating to each task would be useful or appropriate.
<urn:uuid:e74c98c7-a053-4cf0-9f31-d1bd2501d9ef>
CC-MAIN-2023-14
https://www.map.mathshell.org/tasks.php?unit=ME02&collection=9
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949355.52/warc/CC-MAIN-20230330163823-20230330193823-00766.warc.gz
en
0.89347
254
3.65625
4
As technology continues to advance and play a larger role in our daily lives, it’s more important than ever to teach children about cybersecurity. Not only will these skills help protect them from cyber threats, but they will also be essential for their future careers. Here are five tips for teaching kids the cybersecurity basics. - Start by explaining the importance of keeping personal information private. Children need to understand that certain types of information, such as their home address, phone number, and full name, should not be shared online. This can be done by explaining the potential risks, such as identity theft and online harassment. - Teach them about strong passwords and how to create them. Children should be encouraged to use a combination of letters, numbers, and special characters in their passwords, and to avoid using easily guessable information, such as their name or birthdate. This can be taught by encouraging children to create a strong password for a fictional online account. - Show them how to identify and avoid phishing scams. Phishing scams are a common form of cyber attack that involves tricking people into providing personal information or money. Children should be taught to be skeptical of unsolicited emails or messages that ask for personal information or money. - Discuss the dangers of sharing personal information online and on social media. Children should be taught to be mindful of what they post online, and to think carefully about the information they share on social media. This can be done by discussing the potential consequences of oversharing, such as cyberbullying or identity theft. - Make sure they understand the importance of not clicking on links or downloading attachments from unknown sources. Children should be taught to be cautious when clicking on links or downloading attachments from unknown sources, as these can contain malware or other cyber threats. By following these tips, parents and educators can help children understand the basics of cybersecurity and stay safe online. As technology continues to evolve, it’s important to continue having open conversations with children about the potential risks and how to protect themselves.
<urn:uuid:b3308204-c24a-400a-9221-6d1a9c875df4>
CC-MAIN-2023-14
https://wavytrends.com/keeping-kids-safe-online-5-simple-tips-for-teaching-them-cybersecurity/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949694.55/warc/CC-MAIN-20230401001704-20230401031704-00766.warc.gz
en
0.938617
408
3.953125
4
If you think that plant-based is the hot category in dairy, think again. Sales of lactose-free milk grew twice as fast as sales of plant-based beverages in 2019. In the United States, lactose-free milk is a $1.7 billion retail segment, with 201 million gallons sold in 2020. The category experienced 19% growth in 2020 on both a volume and dollar basis. An impressive 21% of households purchased lactose-free milk in 2020, up from 18% in 2019 and 15% in 2015. (Source: IRI data, courtesy of Dairy Management Inc.) Lactase persistence, or the ability to digest lactose beyond infancy, is actually a genetic mutation that conferred an evolutionary advantage to mankind. In contrast, lactose malabsorption, or the inability to digest lactose, results in some degree of digestive discomfort know as lactose intolerance. An estimated 30 million to 50 million U.S. consumers are lactose-intolerant. Note that lactose intolerance affects the gastrointestinal system, while milk protein allergy affects the immune system. On the shelf While American consumers cannot choose their genes, they can choose from a wide variety of lactose-free dairy products. Lactose-free milks contain all of the protein, vitamins and minerals of regular milk and, in some cases, higher levels of these beneficial nutrients. Lactose is removed through two basic processes. It can be reduced through ultrafiltration, resulting in milk with up to 50% less total sugar, a selling point for the estimated 67% of consumers who are trying to limit or avoid sugars. Lactose can also be removed by adding a lactase enzyme, which cleaves lactose into its two component sugars, glucose and galactose, resulting in a sweeter milk. Innovative dairy companies sometimes use both processes to produce milk with less total sugar, as well as a sweetness level that is closer to traditional milk. An example is the new Fairlife Good Moo’d milk, which was introduced in select U.S. stores in January. Fairlife also offers lactose-free creamers, protein shakes and ice cream. Organic Valley’s lactose-free milks are ultrapasteurized for extended shelf life. The company also offers a lactose-free half & half. The Darigold FIT lactose-free milk line, meanwhile, delivers sustained energy with 75% more protein and 40% less sugar than “regular” whole milk. For a foamy café taste, La Colombe adds nitrous oxide to its draft lactose-free chocolate milk. And Shamrock Farms Rockin’ Protein line offers a wide range of lactose-free milks with innovative flavors that tout 20 to 30 grams of protein in a 12-ounce serving. The lactose-free trend spans the globe. In Germany, for example, Emmi Energy produces a lactose-free whey protein drink with 30 grams of protein and 6,800 milligrams of BCAA per 330-milliliter bottle. In England, Tims Dairy produces a lactose-free Greek style kefir. And Euromonitor predicts that the lactose-free dairy market will grow in the Asia Pacific at double the rate of the regular dairy market (8% versus 4.2%, 2018-2023). On the horizon Lactose determination is important for manufacturers for claims of lactose-free dairy. “There is a need for a simple, rapid, precise or accurate test method to detect lactose in finished products, as well as a rapid check during processing. Current methods to detect lactose are time-consuming and require extensive sample preparation, highly trained personnel and sophisticated instruments,” said Sonia Patel, dairy food application scientist, Midwest Dairy Foods Research Center. The next generation of lactose-free “dairy” might also be animal-free. Perfect Day uses a fermentation process to convert microflora into proteins that are identical to those found in cow’s milk. Brave Robot uses these proteins in its lactose-free vegan frozen dessert. The ingredient is labeled as “non-animal whey protein.” This will be an interesting trend to watch!
<urn:uuid:bb463c72-2170-4120-8faa-4b82f3adee58>
CC-MAIN-2023-14
https://www.dairyfoods.com/articles/94918-lactose-free-dairy-category-matures
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949694.55/warc/CC-MAIN-20230401001704-20230401031704-00766.warc.gz
en
0.922181
883
2.5625
3
Trauma Informed Mediation (2021) Credits: 3.0 G Dawn E. Kuhlman, MA, Executive Director of M.A.R.C.H. Mediation (Mediation Achieving Results for Children), explores the role trauma can play in mediation discussions. Dissect Trauma Informed Mediation Model Explore trauma Apply Transformative Mediation techniques Practice Mindfulness and Emotion Regulation Discuss Capability to mediate Build Resilience and Community Resources Examine brain-based treatments EMDR, neurofeedback, mindfulness
<urn:uuid:4fd8f6ed-e42d-4777-9335-813a6214e0d5>
CC-MAIN-2023-14
https://cle.sbnm.org/courses/8102/sections/51671
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943471.24/warc/CC-MAIN-20230320083513-20230320113513-00167.warc.gz
en
0.762811
128
2.640625
3
Richard Branson on Space Travel The billionaire entertainment mogul talks about the future of transportation and clean energy Richard Branson was born in Surrey, England, and founded Virgin Records in 1970 at age 20. The brand now includes more than 300 companies, including Virgin Atlantic Airways, Virgin Trains and Virgin Galactic, a venture that, by 2012, is expected to ferry six passengers 68 miles above the Earth at a cost of $200,000 each. Sir Richard, who conducts business from a private island in the British Virgin Islands, exchanged e-mails with the magazine’s Megan Gambino. Why commercial space travel? Industrial and scientific development in the void of space that surrounds our delicate planet will help us carry on living on Earth over the next century. Satellites already deliver information (through agricultural weather satellites and the GPS system) that provides the extra margin of food that keeps nearly a billion people a year from starving. Today’s generation has the technological ability to do more industrial work up there, providing communications, advanced science and even, potentially, solar power and [computer] server farms in space—thus taking CO2-intensive industry out of the atmosphere. The challenge is to get the technology up there in a safe, reliable and cheap way with minimal environmental impact. Nonreusable rockets launched from the ground based on designs from the 1940s are not the answer. It will come from the private sector working with—and independent of—agencies like NASA to bring new materials and technologies into space. The future for trains? Rising oil prices, road congestion and tougher tax policy on aviation will force consumers to radically reduce their dependency on car and, yes, domestic air travel. The likely result is that more consumers will turn to rail for domestic travel. It will continue to expand as major manufacturers develop a range of high-speed trains using technology based on non-fossil fuels. What alternatives are attainable by 2050? We face an oil peak well before 40 years is up, making it urgent to rid our dependence on imported oil. There is much debate about just how much oil is left in the world, but what is certain is we have seen the last of the cheap oil, and the price of extracting it is only going up as it gets harder to do. We must work faster to change consumer behavior and develop alternative sources of power. Lightweight carbon composite materials will mean it will take less time for us to travel great distances and require less-dirty fuels. Environmental issues are not a charitable adjunct to normal day-to-day business. Governments must issue clear targets to encourage the adoption of electric cars and incentives to invest in renewable fuels and technologies.
<urn:uuid:92de894a-1d91-4773-88c2-b10f53ee52a2>
CC-MAIN-2023-14
https://www.smithsonianmag.com/science-nature/richard-branson-on-space-travel-724917/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943471.24/warc/CC-MAIN-20230320083513-20230320113513-00167.warc.gz
en
0.93886
546
2.75
3
If there’s one thing that Pennsylvanians actually agree on, it’s the need for cleaner air. Eighty-nine percent of Pennsylvanians say that environmental policies that promote clean air are important to them, according to a new statewide poll conducted by Susquehanna Polling & Research on behalf of the Clean Air Council. A strong majority, 60%, say that it’s “very important.” “This poll shows clean air cannot be framed as a partisan issue,” says said Joseph Minott, executive director of the Clean Air Council. “Strong majorities of all voters, including independents, support policies that promote clean air and carbon-free energy sources.” The poll of 701 registered and likely Pennsylvania voters was conducted from April 13-21. It’s the first statewide poll of its kind since the COVID-19 crisis. When survey respondents were told of a recent Harvard study that connects higher levels of air pollution to greater death rates from coronavirus, 69% said that they support new policies that do more to protect air quality. (Both coronavirus and air pollution affect the lungs.) “People were making the connections in their minds — if you’re chronically exposed to air pollution, you’re more susceptible to viral diseases,” explains Minott. Another finding is that 63% of Pennsylvanians feel that elected officials should support policies that encourage the use of clean energy sources like solar, wind and nuclear — instead of fossil fuels like oil and gas. Twenty-four percent do not support those policies. When asked about the electricity that powers their homes, 72% of Pennsylvanians say it’s important that it comes from energy sources that don’t create carbon emissions. Only 25% said that wasn’t important. This past week was National Air Quality Awareness Week. This is also the beginning of ozone season when nitrogen oxides from vehicle traffic and volatile organic compounds (VOCs) react with heat to create ground-level ozone or smog. That said, the air is clearly improving, because there are fewer vehicles on the road due to COVID-19. “In Philadelphia, where I’m headquartered, traffic has come to a complete stop, and that is the single largest contributor to air pollution in the region, even though you have larger stationary sources (of pollution) in Western Pennsylvania,” says Minott. “I’ll go one step further and assume that if there is less traffic through the summer, we should see an improvement in ozone/smog.” The virus could spur changes that prove long-lasting. “What we may see long term is a greater acceptance of remote working, and that could have greater consequences when it comes to traffic,” says Minott. Southwestern Pennsylvania, of course, also has its own distinct sources of air pollution. “Aging industrial facilities like the coke and steel plants that emit a lot of air pollution — there is a problem with making sure that these facilities comply with their permits and are sufficiently penalized if things go wrong,” explains Minott. Strong support for cleaner air isn’t unusual in the commonwealth but Pennsylvanians don’t always back it up with action. “I’ve been an environmental activist in Pennsylvania since 1982,” says Minott. “One of the things that surprises me is that there’s always strong support here for environmental protection. But it’s an issue people don’t hold their elected officials accountable for. “If it’s important to you, when you go vote, you should know if the person you support has the same values as you — and you need to hold them accountable for that,” he adds. “That doesn’t seem to be happening enough anywhere in the U.S., but especially in Southwestern Pennsylvania.”
<urn:uuid:d92951ff-978a-447f-bc19-1bf9b37d1068>
CC-MAIN-2023-14
https://nextpittsburgh.com/latest-news/support-is-strong-for-cleaner-air-in-pa-and-cuts-across-political-divides-says-survey/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943704.21/warc/CC-MAIN-20230321162614-20230321192614-00167.warc.gz
en
0.946256
837
2.640625
3
Corporate power in state legislatures produces a gerrymandered Congress In January 2010, the Supreme Court’s Citizens United decision allowed corporations, for the first time ever, to spend unlimited money on politics. Within a few months, Republican strategists and the U.S. Chamber of Commerce hatched a plan to take advantage of the newly available corporate cash. They called it Project “RedMap,” or “Redistricting Majority Project.” Its goal was to use corporate money— much of it contributed secretly through the Chamber— to win Republican control of state legislatures in the Fall of 2010. That year’s elections were particularly important because the officials who came into office that year would be charged with redrawing legislative district boundaries based on the 2010 census. The business lobbyists were more successful than they could have hoped. With their help, eleven states that had previously been governed by a combination of Democrats and Republicans became wall-to-wall Republican, with the GOP controlling both houses of the legislature along with the Governor’s mansion. Critically, this included a swath of traditional swing states with strong labor movements running from Pennsylvania to Wisconsin across the upper Midwest. It’s not surprising that corporate money would have an outsized effect in state politics. Few people pay attention to state politics—less than one-quarter of Americans even know who their state representative is— so there’s less opposition to the moneyed interests. And legislative races are relatively cheap to buy. In North Carolina, for instance, supermarket magnate and Koch brothers’ affiliate Art Pope contributed $2.3 million to 20 favored candidates in 2010— effectively doubling these candidates’ campaign budgets. Eighty percent of Pope’s candidates won, and with his help, Republicans gained control of both houses of the North Carolina legislature for the first time since the Reconstruction. The power of corporate money helps explain why so many “purple” states whose population is evenly divided between Republicans and Democrats and that are therefore tossups in presidential elections— including Wisconsin, Michigan, Pennsylvania, North Carolina, and Florida— nevertheless are governed by radical right-wing legislatures. Once winning power, the corporate lobbies have pursued a radical agenda of defunding public services, destroying both public and private sector unions, cutting minimum wage, and making it harder to sue over race or sex discrimination. And they’ve used their power in state legislatures to restrict local democracy, prohibiting cities’ right to establish their own minimum wage, right to sick leave, or mechanism for recovering wages stolen by one’s employer. But the corporate investment in politics has paid dividends at the federal level as well as in the states. A recent study from the Brennan Center for Justice reports that when state legislators redrew the lines for Congressional Districts, they engaged in such severe gerrymandering that the GOP now holds 17 seats that would have been won by Democrats if the district boundaries were fairly drawn. In the current Congress, Democrats would need to win a total of twenty-four Republican-held seats in order to regain the majority. But most of this gap is the product of gerrymandering; if the districts were impartial, Democrats would be only seven seats away from a majority. Unsurprisingly, a majority of the gerrymandered seats in Congress come from states targeted by Project RedMap. The three most intensely gerrymandered states—Michigan, Pennsylvania, and North Carolina, which together gave the GOP 7 extra seats in Congress—were all prime targets of corporate funders. Next time you wonder why the Congress is voting to take away people’s health insurance in order to fund tax cuts for the rich, here’s a big part of the answer. It’s not the will of the people at work: it’s the will of corporations who, free to spend unlimited sums on politics, have bought themselves a rigged system. Gordon Lafer is author of The One Percent Solution: How Corporations are Remaking America One State at a Time. Laura Royden and Michael Li, Extreme Maps, Brennan Center for Justice, 2017. https://www.brennancenter.org/sites/default/files/publications/Extreme%20Maps%205.16.pdf. Enjoyed this post? Sign up for EPI's newsletter so you never miss our research and insights on ways to make the economy work better for everyone.
<urn:uuid:7b4b291b-d237-4baa-be3a-df5535cb7203>
CC-MAIN-2023-14
https://www.epi.org/blog/corporate-power-in-state-legislatures-produces-a-gerrymandered-congress/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296944606.5/warc/CC-MAIN-20230323003026-20230323033026-00167.warc.gz
en
0.956952
916
2.609375
3
Flow regime is among the most important environmental factors influencing population dynamics for stream fishes; however, developing direct relationships between flow regime and growth, recruitment, or mortality rates has proven challenging. However without a thorough understanding of these relationships, it is difficult to develop recommendations for instream flows to benefit species of conservation concern, such as Guadalupe Bass Micropterus treculii. Guadalupe Bass is considered to be vulnerable due to its dependence upon intact stream habitats, yet the flow requirements for the species, or even how flow influences its growth, recruitment, or mortality, is not well understood. Therefore, the objectives of this study are to 1) evaluate the influence of flow regime on the growth and recruitment of Guadalupe Bass across its entire range, and to monitor the impact of changing flow regime on the growth and mortality of young-of-year through their first summer. Samples will be collected from locations within the Brazos, Guadalupe, San Antonio, and Nueces River Basins and euthanized. We will remove their sagittal otoliths and determine the age and growth history of each individual. These data will be used to reconstruct the year classes and to estimate recruitment and mean growth rates related to flow conditions.
<urn:uuid:2bcc2de0-1d1f-4cff-aa8a-da9ad3a37d85>
CC-MAIN-2023-14
https://www1.usgs.gov/coopunits/project/113950023680/heather.m.williams
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296944606.5/warc/CC-MAIN-20230323003026-20230323033026-00167.warc.gz
en
0.945823
251
2.640625
3
Pirates of the Caribbean Written by Irene Trimble Illustrated by Elliot Marks and John Bramley Reviewed by Reid H. (age 9) Jack Sparrow snuck onto a boat claiming that the pirates on board stole his belongings. When he got inside, he touched the bag which contained his belongings. The captain said,"Hey, what are you doing" and Jack said, "I'm taking my belongings back". He got into a fight with the captain. Then the waiter named Arebella came in and she took Jack away from the fight. She took Jack outside and gave him a little talk. He asked her if she wanted to come with him on his journey. She said okay. On the deck before he set sail, another teenager named William came and said, "I'm coming with you". The three of them set sail to find a treasure--the Sword of Cortez. Read the book to find out about the adventures of this threesome and see if they find the Sword of Cortez. I thought all three characters were interesting because they began a dangerous journey so young. They were all brave when they were on the ship. Every time they saw a storm coming, they went full power straight into it. I thought the illustrations were pretty cool and had good detail. They show when it's raining and when they are moving. They are in black and white. I think the thing that's unique about this story is how three teenagers run the ship through all the islands and storms they have been through. My favorite part is when they find an abandoned town with a lot of treasures. The problem is that Jack Sparrow,the captain, doesn't know where he is going. I recommend this book to anybody who likes pirates because that is what the book is about. Third graders and up will enjoy it. is a student in Sr. Janet's 4th Grade Class
<urn:uuid:e83cdb3d-0223-4cfd-97bc-2bbbb2cd576b>
CC-MAIN-2023-14
https://spaghettibookclub.org/review.php?reviewId=9574
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945368.6/warc/CC-MAIN-20230325161021-20230325191021-00167.warc.gz
en
0.991369
391
2.546875
3
Orthodontic Materials Full-time JobConstruction 36 views The components used to provide orthodontic treatments and to construct orthodontic devices, orthodontic materials are used in specialty orthodontic practices as well as general practices that provide Orthodontic Bracket services. These materials are used to plan and provide treatments for malocclusions, and often these materials are used in the fabrication of an orthodontic appliance. The materials required for an orthodontic case depend largely on the clinical situation and the treatment plan being pursued, and it is not uncommon for some orthodontic materials to be ordered on a case by case basis. For this reason it makes sense practice for a practice to be well versed on what is available in order to offer the best options for its patients. What Types of Orthodontic Materials are Available for My Practice The orthodontic materials you will need in your practice will most often be determined by the specifics of the case being treated. If the treatment calls for an Orthodontic Buccal Tube appliance such as braces, you will want to have Dental Archwires And Spring, bracket cement, and might want to consider indirect bonding to make bracket placement more precise and efficient. Cases requiring bands or space maintainers will require you to have space maintainers and wires, or space maintainer kits, and possibly band cement. Major orthodontic and orthognathic treatments could require anchorage in either screw or miniplate form. Regardless of the appliance being created, orthodontic stone for creating orthodontic models, and orthodontic polishing materials for finishing appliances are materials that should be kept on hand. How Do I Select Orthodontic Materials for My Practice? Because the Orthodontic Band materials you will need depend completely on the appliances and the treatments you plan to provide to patients, selecting materials can often be managed a case at a time. However, many orthodontic materials are designed to be used as a part of a system, so it is important to stay familiar with the available options and to try out new options and approaches so you remain ready to meet any orthodontic needs you encounter. Dental Instruments are the tools used by dental specialists to give oral health treatment. It is essential for dental clinics to have a wide range of instruments so that dentists and orthodontists can provide dental surgery. In addition, these dental surgical instruments can examine, treat, manipulate, restore, and remove teeth and surrounding oral structures. There are numerous surgical instruments used in medical and dental practice. In any case, the following tools are some of the primary devices you can usually notice in the dentist’s office. Pipe Fittings: Various aspects of Using them
<urn:uuid:c00bfbea-9fd8-47ef-bd17-38b3bb8dbcbc>
CC-MAIN-2023-14
https://people.balloonsolution.com.hk/job/orthodontic-materials/187
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296946584.94/warc/CC-MAIN-20230326235016-20230327025016-00167.warc.gz
en
0.924868
581
2.546875
3
North Carolina State University engineers continue to improve the efficiency of a flexible device worn on the wrist that harvests heat energy from the human body to monitor health. The researchers report significant enhancements in preventing heat leakage in the flexible body heat harvester they first reported in 2017 and updated in 2020. The harvesters use heat energy from the human body to power wearable technologies — think of smart watches that measure your heart rate, blood oxygen, glucose, and other health parameters — that never need to have their batteries recharged. The technology relies on the same principles governing rigid thermoelectric harvesters that convert heat to electrical energy. Flexible harvesters that conform to the human body are highly desired for use with wearable technologies. Mehmet Ozturk, an NC State professor of electrical and computer engineering, mentioned superior skin contact with flexible devices, as well as the ergonomic and comfort considerations to the device wearer, as the core reasons behind building flexible thermoelectric generators, or TEGs. The performance and efficiency of flexible harvesters, however, historically trail well behind rigid devices, which have been superior in their ability to convert body heat into usable energy. The proof-of-concept TEG originally reported in 2017 employed semiconductor elements that were connected electrically in series using liquid-metal interconnects made of EGaIn — a non-toxic alloy of gallium and indium. EGaIn provided both metal-like electrical conductivity and stretchability. The entire device was embedded in a stretchable silicone elastomer. The upgraded device reported in 2020 employed the same architecture but significantly improved the thermal engineering of the previous version, while increasing the density of the semiconductor elements responsible for converting heat into electricity. One of the improvements was a high thermal conductivity silicone elastomer — essentially a type of rubber — that encapsulated the EGaIn interconnects. The newest iteration adds aerogel flakes to the silicone elastomer to reduce the elastomer’s thermal conductivity. Experimental results showed that this innovation reduced the heat leakage through the elastomer by half. “The addition of aerogel stops the heat from leaking between the device’s thermoelectric ‘legs,’” Ozturk said. “The higher the heat leakage, the lower the temperature that develops across the device, which translates to lower output power.” “The flexible device reported in this paper is performing an order of magnitude better than the device we reported in 2017 and continues to approach the performance of rigid devices,” he added. Ozturk said that one of the strengths of the NC State-patented technology is that it employs the very same semiconductor elements used in rigid devices perfected after decades of research. The approach also provides a low-cost opportunity to existing rigid thermoelectric module manufacturers to enter the flexible thermoelectric market. He added that his lab will continue to focus on improving the efficiency of these flexible devices.
<urn:uuid:4fced6eb-ae2f-4f7a-9c7a-7bd96c5541cf>
CC-MAIN-2023-14
https://www.techbriefs.com/component/content/article/tb/insiders/pm/stories/39358?r=47747
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296946584.94/warc/CC-MAIN-20230326235016-20230327025016-00167.warc.gz
en
0.927358
627
3.296875
3
Deakin University finds a solution to closing the loop for denim Frontier Materials (IFM) will put a new spin on vintage denim jeans, all in the name of reducing the huge environmental impact in the life cycle of the world’s most popular clothing item. The team developed its ‘circular denim’ idea as an entry into the Global Change Award, an initiative of the H&M Foundation that provides seed funding for projects that promote sustainable fashion. The unique process will pulverise used denim into ultrafine particles, and then coat or print the colour particles onto undyed new denim to create the typical denim appearance. The team was awarded €150,000 in stockholm, to take their idea to industry, one of five finalists, out of a total of 2885 entries, to share in the international prize. Team leader Professor Xungai Wang, who heads IFM and the ARC Future Fibres Hub, said on average, the life cycle of a pair of denim jeans produced more than 30 kg of CO2 and used around 3500 litres of water, the equivalent of running 44 baths. Following is a link to the media release.
<urn:uuid:3a0ed47f-f4c8-4859-a2ff-15c39ae646d9>
CC-MAIN-2023-14
https://www.charitablerecycling.org.au/deakin-university-finds-a-solution-to-closing-the-loop-for-denim/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948817.15/warc/CC-MAIN-20230328073515-20230328103515-00167.warc.gz
en
0.903875
241
2.890625
3
18 Apr, 2017 10 : 00 We have been studying how children were affected by World War Two in topic class, and the book Diary of Anne Frank. On April 18, we went on a field trip to see the impact of World War Two right here in Qingdao. We began at the Qingdao Naval Museum, which has a collection of aircraft, tanks and ships. After learning so much through books and videos, the class was excited to see these machines up close. After this we explored Little Qingdao Island, which is a beautiful place to have a snack nowadays. It also has tunnels left over from the wars. The students had a great time exploring this peaceful island for signs from the past. The highlight of the trip for the students was the slightly scary German Prison. While this is a fascinating place to visit, it also taught the students to have respect for historical sites with a dark past. It also helped them to respect and recognise the sacrifices people made in World War Two, so that we can now live in peace.
<urn:uuid:137fa6b6-0503-4d1e-b41d-92afd5d76530>
CC-MAIN-2023-14
https://www.ycis-qd.com/en/article/news/857-primary-moments-ww2-field-trip-in-qingdao
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948817.15/warc/CC-MAIN-20230328073515-20230328103515-00167.warc.gz
en
0.976809
221
3.125
3
Drama is all I get at school – this should be easy! Or not. If you are teaching drama all day and the teacher did not leave any day plans, here are a couple of ideas … 1. Tableaus – you tell or read an interesting story. At any point, say, “tableau” then the students make a motionless picture of that scene. They are like statues that were carved (by amateurs) and arranged to show that scene. They can do this individually showing one character or in groups, showing all the characters. I say, “tableau” anytime they are becoming restless! 2. Play back game – show a short clip of a scene – students have to act it out as closely as possible to the clip. Show the clip again and students can see what they missed. Jackie Chan scenes are hilarious for this one.
<urn:uuid:6c9b5b4b-cc16-4374-86db-aabe07a7fce7>
CC-MAIN-2023-14
https://amandayuill.com/drama-lessons-for-substitutes/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949506.62/warc/CC-MAIN-20230330225648-20230331015648-00167.warc.gz
en
0.972448
183
2.625
3
In this modern era, data is used to make decisions about how to best allocate resources, it can help identify trends and patterns, and it can be used to make predictions about the future. The more data we have, the better our understanding of the world will be. Having accurate data is especially important in fields like business and government; where making informed decisions can mean the difference between success and failure. Data is also becoming increasingly important in the field of machine learning and artificial intelligence, where machines are being taught to learn from data sets in order to improve their ability to perform tasks. There are a number of reasons why data loss in companies is a concern. One reason is that when confidential information is compromised, it can lead to financial losses for the company. Additionally, failed hard drive data recovery is very tough and you can’t do it alone. Data breaches can also tarnish a company’s reputation and cause customers to lose trust in the organisation. Lastly, when companies don’t take measures to protect their data, they may be subject to fines from regulatory agencies. External hard drive Taking a backup of your computer data in an external hard drive, or even a USB drive, is the most conventional of all backup techniques. Backing up to an HDD is simple, fast and economical. The good part about it is that your backup is convenient and you can take it any place you go. In any case, there are sure disadvantages. In the beginning, you really have to update your backup consistently, if not, new data will not be incorporated. Another issue is solidness. An external hard drive is as yet a hard drive, and that implies it can be destroyed. That is the reason it’s ideal to involve an alternate strategy for normal backups as well as putting away data on an external HDD. Creating a disk image Making a disk image is an incredible method for backing up your documents and other sorts of data. Assuming you have a disk image, you don’t need to stress over any blows since you can actually reestablish everything, including your folders, operating software, applications and so on. Basically, add the DVD with the disk image into your DVD-ROM and reestablish the backup. Also assuming that you made a disk image on an external HDD, just interface it to your PC. The vital two liabilities of this backup strategy are that you have to make disk images from time to time to stay up with the latest and that you can’t reestablish individual files without restoring everything. Save your data on cloud storage Cloud backup is important because it provides a layer of protection that can help keep data safe in the event of a disaster. For businesses, cloud backup can help ensure that critical data is not lost in the event of a server crash or fire, and for customers, it can provide peace of mind knowing that their personal data is safe even if their computer is damaged or stolen. Cloud backup also offers other benefits, such as remote access to files from any computer with an internet connection, making it easy to get work done on the go. And because backups are typically stored off-site, they are less likely to be affected by natural disasters such as fires or floods. Although data on the cloud is also sometimes not safe. There are many ways for companies to protect their data by backup on the cloud. One way is to encrypt their data before uploading it to the cloud. This will ensure that even if someone manages to hack into the cloud server, they will not be able to access the company’s data without the proper encryption key. Another way for companies to protect their data is through multi-factor authentication. This means that in order to access the company’s cloud-stored data, you would need not only a username and password but also a special security token or code that is only known to certain authorised individuals. This will prevent unauthorised users from accessing the company’s data even if they manage to obtain login credentials. To sum up: You should consult data recovery company to help you with safe data backup services. They can give you expert opinions and insights on data management, which can be very helpful in making informed decisions. Data Recovery Experts are usually very knowledgeable in their field, and they can help you learn more. Overall, an expert can be a great resource for finding information and getting sound advice. Interested Related Article: “What are file and data recovery?“
<urn:uuid:1ac06848-efb7-4fc8-a2e8-240d113e7b94>
CC-MAIN-2023-14
https://marketbusinessnews.com/how-can-you-back-up-your-computer-data/290863/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949506.62/warc/CC-MAIN-20230330225648-20230331015648-00167.warc.gz
en
0.953505
916
2.96875
3
“Zoologist Dr. George McGavin delves into the strange and often bizarre names given to the planet’s insects. There are an estimated 10 million living insect species, with new specimens being discovered almost daily. Entomologists are turning to ever more imaginative names, referencing everything from literary figures, celebrities and politicians to playground puns. George takes us into the complex and intriguing world of the taxonomist. From the 18th century father of modern taxonomy Carl Linnaeus to the present day, he explains why naming the things that surround us is the foundation of all science. There are flies named Pieza kake and S. beyonceae (after the singer); beetles with political connections – A. hitleri, A. bushi, A. cheneyi and A. rumsfeldi; and some entomologists have even named discoveries after romantic conquests. Unsurprisingly, names can prove controversial but, once set, are difficult to change.” We hope that this will be a fun introduction for anyone who has questions about how and why we name species in the way that we do. We will be writing blog posts in the future that tackle the subjects of taxonomy and classification in both the broader sense and the minutiae so for the moment, let us leave you with a selection of our favourite fun names of insects and animals: - Preseucoila imallshookupis is a species of gall wasp named after Elvis Presley. - Agra schwareneggeri is a species of carabid beetle named after Arnold Schwarzenegger. - Bagheera kiplingi is a species of jumping spider named after Rudyard Kipling and his character Bagheera the panther from ‘The Jungle Book’. - Tianchisaurus nedegoapeferima is an ankylosaurian dinosaur. The species name ‘nedegoapeferima’ is formed from the first two letters of the surnames of the main stars of the film ‘Jurassic Park‘. - Psephophorus terrypratchetti is a species of Eocene turtle named after the author Terry Pratchett who wrote the ‘Discworld Series’ which is set on a world that is carried through space on the back of a giant turtle. One thought on “The Etymology of Entomology” Very interesting post, and I shall watch George's TV programme. My objection to the long specific names is that they are too long. Thought about naming an anthomyiid fly after Delia Smith, we already have the genus Delia, so it would be Delia deliae. But she might object unless I could sell her the Garibaldi biscuit connection.
<urn:uuid:864fe255-9eaa-4d2d-a8a9-047437047445>
CC-MAIN-2023-14
https://morethanadodo.com/2013/03/06/the-etymology-of-entomology/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949506.62/warc/CC-MAIN-20230330225648-20230331015648-00167.warc.gz
en
0.919671
579
2.984375
3
In this age of human ingenuity and innovation, education has acquired an added importance in shaping the leaders of tomorrow. Technology plays a crucial role in making education more appealing and interesting for teachers and students alike. The advent of additive manufacturing has brought about an interesting twist in this relation between education and technology. Utilization of 3D printing in education has served to enrich learning experiences in schools and has made complex and advanced professional degree courses that much easier to impart. Read more: 3D printing in schools: Is it worth it? What is 3D printing? A 3D printer works just like your regular printer – only it prints objects at your command. Instead of using ink, 3D printing technology uses more substantive materials such as plastics, metal, rubber, and so on. The printing process is a little more complex than regular printing. With the help of 3D scanners, a 3D model is first created of the object that is to be printed. It then breaks this model down into layers which are then converted into a physical object. 3D printing in education Educators of today have the added responsibility and duty of being visionaries who can truly foresee where the future is headed and incorporate changes in instructional designs accordingly. Today’s classrooms are spaces for practical application and hands-on discovery. Technology, not surprisingly, has become an integral part of classroom learning. Due to the versatile nature of its applications, 3D printing has become a facilitator for imparting real-world application and knowledge in education. This is especially true for the domains of mechanical engineering, mathematics, medical science, and architecture. Schools, universities, and other forms of educational institutions are gradually waking up to the reality of Industry 4.0 and realize they cannot remain aloof. Many of these educational spaces have already integrated additive manufacturing technology into their classrooms and curriculums. Here are just a few examples of 3D printing applications in education: - Rapid prototyping for engineering design students; - 3D model designs for architecture students; - Recreation of historical artifacts for History students; - 3D models of artwork for students of graphic designing; - 3D prints of topography, demographics, or population maps for geography lessons; - Injection molding application for cooking classes; - 3D printed replacement parts for testing in the domain of automobile engineering; - 3D models of molecules for chemistry students to study and learn from; - 3D models of cells, viruses, organs, and other biological artifacts to aid biology and medical science students. How 3D printing can benefit education The evolution of additive manufacturing and 3D printing solutions is opening up new horizons in educational practices, across varied disciplines and degrees of instruction. Here are a number of benefits that this technology can bring in education: Hands-on learning: 3D printing, with a practical, hands-on approach, helps to transform passive learners into active creators. More interactive engagement: Introducing new technologies, just as was witnessed during the first wave of computer learning in schools, stimulates more interest and interaction between students themselves, and between students and their instructors. Development of problem-solving skills: Leading educators have suggested that their students were able to develop problem-solving skills, self-directed learning, critical thinking, and perseverance with the introduction of 3D technology in classrooms. Aids creativity and innovation: Experts of child development and psychology have stated the importance of imparting new ideas and methodologies in the formative years of children. Encouraging a child’s creativity is also empowering them to innovate without fear of being judged. Introducing and adopting 3D printing in schools as a learning methodology can serve both these purposes. Bringing art back: There can be no doubt about the importance of art in school education. Indeed, art has already made a bit of a comeback with the advent of STEAM education. However, it is equally true that the limitless creative nature of 3D printing technology can enable designing at an elevated level. Not only this, but students will also have the chance to improve upon their spatial reasoning skills and 2D to 3D conversion understanding. Creating responsible digital citizens: Using the innovation of 3D printing in classrooms will allow students to become and feel part of a unique community that promotes discussions around innovation. These discussions will further improve understanding, thus enabling the participants to become responsible digital citizens. Read more: DOs and DON’Ts of teaching digital citizenship Encouraging a feeling of fellowship: Educators are discovering the bonding capabilities of 3D print technologies as students become more interested in taking up projects in partnerships across grades. If the above-listed reasons are not enough motivation for you to consider the incorporation of 3D learning in your school, we add in the ever attractive incentive of low costs. 3D printers have become super affordable, precisely because their makers have realized the inclusive nature of the technology and how it can benefit one and all. Are you looking for the best in class 3D printing service to enrich your classroom experience? The future is 3D. Are you the game changer?
<urn:uuid:0f18b56b-c2f3-4b72-bd8c-7323b5b289c5>
CC-MAIN-2023-14
https://www.cypherlearning.com/blog/k-20/shaping-young-minds-3d-printing-solutions-for-education
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949506.62/warc/CC-MAIN-20230330225648-20230331015648-00167.warc.gz
en
0.952578
1,055
3.859375
4
About GM Oxygen Sensor The role of the oxygen sensor is to effectively control fuel emissions for better engine performance and fuel economy. It analyzes the exhaust fumes and deposits produced by the engine to gather data of the air-fuel ratio. If the ratio is off, the sensor sends feedback to the vehicle's engine control system so the fuel mixture can be adjusted accordingly. Common signs of a faulty GM oxygen sensor are unstable idling speeds and a sudden drop in gas mileage.
<urn:uuid:9621d121-1c6f-47ee-a8e1-d9d6472b6d57>
CC-MAIN-2023-14
https://www.gmpartsgiant.com/oem-gm-oxygen_sensor.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949506.62/warc/CC-MAIN-20230330225648-20230331015648-00167.warc.gz
en
0.916421
95
3.015625
3
2.5 Online fraud So far you have learned how social engineering can be a useful tool for those who wish to distribute malware. However, it can also be used to gain access to personal information, which may allow unauthorised individuals to access accounts, facilitating photo hacking. However, perhaps the most familiar form of social engineering used by cybercriminals is the phishing email, which is normally used to gain information that can be used to commit online fraud. This phishing email often appears to be from a legitimate business or bank and asks for an immediate response from the recipient in order to prevent serious consequences (for example, the account being frozen). When the recipient clicks on the link in the email, they are taken to a fake website and asked to enter their account details. By doing so, they provide fraudsters with the information needed to access their genuine account and steal money. As in the previous examples, by manipulating human behaviour, cybercriminals can gain access to private accounts without being skilled in hacking. Advance fee fraud is another online scam with which you might be familiar with. There are many variants, but the basic format is the same. The fraudster sends an email in which they claim to need help in moving a large amount of money from one country to another and are prevented from doing so due to some unfortunate set of circumstances. The recipient of the email is asked to assist by sending a small amount of money and is offered a share of the large sum of money as their reward (Action Fraud, 2020). Of course, the large sum of money does not exist, and anyone who sends money will never see it again. Online dating romance scam (Buchanan and Whitty, 2014; Whitty and Buchanan, 2012; 2016) is a subtype of advance fee fraud, in which the scammer or scammers pose as someone interested in forming a relationship with their victim. They use photographs of attractive people to create fake profiles and make contact with their victims via social networking sites or online dating sites (e.g. Aransiola and Asindemade, 2011; Rege, 2009; Whitty and Buchanan, 2012). This is sometimes termed ‘catfishing’. The focus in this type of crime is on building a relationship with the victim so that they will then comply with requests for money. Activity 5 Why does online dating scam succeed? Watch the video of FBI Special Agent Christine Beining describing romance scams. As you watch the video, note down any information related to the victims’ likely characteristics and techniques used to gain trust and obtain the desired result. Christine Beining explained that: - Scammers usually target vulnerable women (though men can be targeted but less so than women) , using the internet, with money and willing to give it. More specifically, they target people not in existing relationships and looking for love (divorced or widowed) - they will use information available on the internet to find common grounds and use information to manipulate victims and get their trust. The relationships become intense very quickly. So, they can start asking for money using different excuses and promising to repay back the money. - Scammers are usually part of criminal organisations and data about victims are recorded in ‘sucker lists’, which make them even more vulnerable and easily targeted to repeat victimisations (Button et al., 2009). Buchanan and Whitty (2014) also found that higher scores on ‘idealisation’ of romantic partners were associated with an increased likelihood of being a romance scam victim, but the other factors they investigated – including extraversion, agreeableness, sensation-seeking, neuroticism, and loneliness – were not associated with the likelihood that someone would become a romance scam victim. You can read about the many different types of online fraud at the Action Fraud website [Tip: hold Ctrl and click a link to open it in a new tab. (Hide tip)] .
<urn:uuid:89026a69-8e11-4c0a-ba2c-3eed4f8a7ce6>
CC-MAIN-2023-14
https://www.open.edu/openlearn/health-sports-psychology/psychology/the-psychology-cybercrime/content-section-2.5
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949506.62/warc/CC-MAIN-20230330225648-20230331015648-00167.warc.gz
en
0.95344
807
2.921875
3
if you have a relation with the domains: 0,1,2,3,4 and a range of: 3,1,2,4,2 does this mean it is not a function because there are two outputs of the number 2? Or can it only not be function if there are two of the same inputs with a different output? 1$\begingroup$ The second one. $\endgroup$– BerciSep 2, 2015 at 23:41 $\begingroup$ It's not a function if for some value $x$ you'd have different values of $y$. Let's say you have a random function $f(x)$ and you plug in $x=1$, if it would show something like $f(1) = 2$ and $f(1)= 3$, it wouldn't be a function. The reverse is true though, wherein if you have $f(1)=2$ and $f(2)=2$, it would still be a function. $\endgroup$– mopySep 2, 2015 at 23:48 A function can be described as a cartesian product of the domain and the range, so the relation you describe is a function. You are correct when saying that a function can't have an input with two different outputs
<urn:uuid:d271247b-a390-45cb-a6c4-1bfb675f8580>
CC-MAIN-2023-14
https://math.stackexchange.com/questions/1419046/alegebra-function-or-not-a-function/1419050
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949701.56/warc/CC-MAIN-20230401063607-20230401093607-00167.warc.gz
en
0.89915
275
2.515625
3
Securing Your Blockchain Let’s begin with what a blockchain is. A blockchain is a distributed ledger technology that consists of growing lists of blocks that are securely linked together using encryptions. Blockchain has made it possible for Bitcoin and other decentralized finance (Defi) tools, Decentralized Autonomous Organizations (DAOs) and Non-Fungible Tokens (NFTs) to work. One of the key selling points of a blockchain is that the data on the blockchain is decentralized, immutable and secured with cryptography. These points help prevent tampering and fraud, however, blockchains are still not 100% secure. What are some Security risks in Blockchains? Since 2009, blockchains have become a mainstream topic. Many use cases for blockchains were studied and developed. The main use case for blockchains seems to be in Decentralized Finance. This has made blockchain a target for many hackers and has led to loss in the billions of dollars. Here are some ways blockchains have been attacked in the past: 1. Code Exploitation The smart contract is a computer program or transaction protocol that is intended to automatically execute, control or document events on the blockchain. A smart contract is difficult to change on the blockchain once it is coded, therefore applications that use smart contracts need to be developed with a different approach than normal applications. Think of an aerospace engineer and an airplane. It is important to ensure that everything is safe or the consequences can be catastrophic. In the first quarter of 2022 the Defi industry lost over $1.6 Billion due to code exploits. One DAO was robbed out of more than $60 million worth of Ether due to code exploits. Many of these exploits were done on simple coding errors, incorrect calculations or inefficient contract logic. 2. Stolen Keys When we’re talking about keys, we mean your public and private keys. Your public key can be shared with another user for receiving funds and shows the address of your wallet. Your private key serves as your password to access your own information on the blockchain. This key should not be shared, hence the word private. If anyone gets your private key, they can drain everything you have. Over $73 Million worth of bitcoin was stolen from the crypto exchange Bitfinex, likely due to stolen private keys. Private keys can be stolen by use of hacks, phishing scams or even embezzled by corrupt custodians. 3. Cyber-attacks on individual nodes Centralized exchanges are crypto exchange platforms that act as intermediaries between buyers and sellers of digital assets. In order to do this work, they need to hire employees. Employees means work spaces. A hacker needs to infiltrate only one node of that crypto exchanges network in order to cause damage. The crypto exchange Bithumb, was hacked, had 30,000 of its user’s data compromised and got $870,000 worth of bitcoin stolen through the use of one employee’s computer. This all shows that best cyber security practices need to be employed at all times, even on an inherently ‘safe’ system. When determining the security of a blockchain, it is important to consider the type of blockchain we are looking at. There are four types of blockchains that can determine the privileges of participants and the type of data that can be accessed. The privileges and data are key factors in any blockchain attack. We have already done an article on the types of blockchains you may come across, which you can check out for more context. Here are some best practices for securing your blockchain: 1. Adopt best practices when developing smart contracts Smart contracts are one of the cores of the blockchain system. When designing a smart contract, it is important to use best coding practices, think out your logic carefully and double check your calculations. Doing this at the beginning ensures that changes aren’t necessary. Once a smart contract is created, it is difficult to rework it as it is coded to the blockchain. 2. Define and enforce appropriate endorsement policies The endorsement policy specifies a set of peers on the channel that must execute chaincode and endorse the execution results in order for a transaction to be valid. These policies should be scoped at two levels: the smart contract level and for every single entry. The endorsement policy should also be encoded into a smart contract for added security. 3. Adopt identity and access controls Ensuring that the right individuals have appropriate access is important for security. Methods should be in place for on-boarding individuals so that they can be identified throughout their tenure. Equally, proper off-boarding policies should be enforced to prevent malicious intent such as data leaking. Audits and logs can also be used to track individual operations and help identify malicious intent. Authentication, verification and authorization of individuals can be vetted through the use of OAUTH, OIDC, and SAML2 tokens. 4. Communicate over secure networks The network used to access the blockchain should be secure and properly configured to prevent unauthorized access. This includes using firewalls to block potential threats, enabling secure protocols such as SSL/TLS, and regularly updating the network to fix any vulnerabilities. It is also a good idea to use a virtual private network (VPN) when accessing the blockchain from a public or unsecured network, as this can help protect your data from being intercepted by hackers. 5. Mandate Multifactor Authentication Two-factor authentication requires users to provide a second form of authentication, such as a one-time code sent to their phone, in addition to their password. This makes it much harder for hackers to gain access to the blockchain, even if they manage to guess or steal a password. Two-factor authentication adds an extra layer of security. There are various methods of 2FA available, such as SMS, email, and authenticator apps, which offer different levels of security. It is a good idea to choose a 2FA method that is convenient for you but also provides a high level of security. 6. Use strong cryptographic key/certificate management Use a strong and reliable key management solution to manage the number of keys used in the blockchain solution, including blockchain identity keys, internal TLS certificates, external TLS certificates, and domain certificates. 7. Perform full-scope penetration testing and vulnerability assessment Be sure to perform full-scope penetration testing at every phase of solution deployment. It’s important to perform vulnerability assessments at the individual organization component level and for the overall system in order to ensure all issues are addressed. 8. Use hardware wallets Hardware wallets, such as a USB drive, can be used to store private keys offline and away from potential hackers. Private keys are used to sign and verify transactions on the blockchain, and it is important to keep them secure to prevent unauthorized access to the blockchain. Hardware wallets offer a high level of security, as they are not connected to the internet. It is important for users of blockchains to be aware of the security risks around and exploits of many blockchains. This can help them understand what are the best practices they can employ when navigating the space. Securing your sensitive information like your private key, employing multi factor authentication and using secure networks are some of the basic rules of cyber security. As more possibilities with blockchain technology are uncovered, so will new vulnerabilities and security practices will be updated accordingly. Looking to launch a new product? Unpluggd Digital provides services in SaaS and Blockchain development and we LOVE building awesome ideas. Reach out to set up a chat so we can get to work on your next project.
<urn:uuid:a40e2c74-a37b-4bde-b8ef-bafe3d811634>
CC-MAIN-2023-14
https://medium.com/unpluggd-digital/securing-your-blockchain-8b60f2341616?source=user_profile---------2----------------------------
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949701.56/warc/CC-MAIN-20230401063607-20230401093607-00167.warc.gz
en
0.93376
1,558
2.828125
3
Rapid Radiation Therapy That Takes a Fraction of the Time BYFebruary 15, 2018 Faster isn’t always better, but in the case of radiation therapy for some cancers, accelerating radiation courses can help patients get on the road to recovery sooner. Today, about half of people with cancer are treated with radiation therapy, or radiotherapy. This treatment, which was developed at the turn of the 20th century, harnesses the power of radiation to kill cancer cells while trying to avoid harming nearby healthy tissue. Radiation therapy has come a long way since its discovery. Recent advances have allowed doctors to develop a safer and more rapid delivery method. It’s called hypofractionated radiotherapy, and it helps doctors cut courses of radiation almost in half, significantly reducing the total number of radiation treatments patients need. Having fewer radiotherapy sessions can improve patients’ quality of life—fewer treatment sessions may mean fewer unpleasant side effects, such as the skin irritation, loss of appetite, nausea and fatigue so often associated with cancer treatment. It also means fewer trips to the cancer center. “In some cases, a higher dose delivered in a smaller number of sessions can be a more effective treatment,” reports radiation oncologist Roy Decker, MD, PhD, the director of Yale Medicine’s Thoracic Radiotherapy Program, who treats lung cancer with hypofractionated radiotherapy. While conventional radiation therapy delivers small amounts of radiation to a patient over nine weeks, hypofractionated radiotherapy delivers larger doses, or fractions, of radiation often in about five weeks and sometimes in just a few days. Stereotactic body radiotherapy (SBRT), a precise, high-dose form of hypofractionated radiotherapy, allows physicians to treat cancer in just one to five treatments. In part, rapid radiation treatments are effective because the advanced technology helps physicists to calculate the right dose of radiation—and to precisely position the patient to receive it, so that only tumors are targeted. The goal is to leave as many healthy surrounding cells as possible untouched by radiation. “Our ability to preserve a patient's quality of life improves with each advance in radiation technology,” says radiation oncologist James Yu, MD, director of the Prostate & Genitourinary Radiotherapy Program. Advances include high-tech computing software, technology that helps protect neighboring body parts from irradiation and 4D scanning for treatment planning. “That ability is better than it was five years ago, and leaps and bounds beyond what we were able to do 10 years ago,” Dr. Yu says. Rapid radiation therapy, however, isn’t an option for all patients—or even all cancers. At Yale Medicine, radiation oncologists prescribe hypofractionation for eligible patients being treated for certain prostate, gastrointestinal, lung and breast cancers. Rapid radiation therapy for prostate cancer Treatment times: Standard treatment is a course of 44 treatments given over nine weeks, says Dr. Yu. With hypofractionated radiotherapy, patients are given five treatments over two weeks. New advances: Radiotherapy is a common treatment for advanced prostate cancers. However, radiation can damage the rectum, which is close to the prostate. Protecting the rectum is important; if damaged, a man may experience incontinence. New technologies have “opened the door to safe, rapid treatment of prostate cancers,” says Dr. Yu. One of them, SpaceOAR, is essentially a gel spacer that helps keep the rectum away from the prostate during radiation treatment. “It gives us one more level of safety—we are able to place fluid between the prostate and rectum, effectively protecting the rectum from very high doses of radiation,” says Dr. Yu. Doctors at Yale Medicine also use advanced technology to track the natural movement of the prostate during radiation treatment. It’s a 4D tracking system that uses micro-sized transponders, which are implanted into the prostate by a urologist during a quick outpatient procedure. If the prostate moves during treatment, the transponders set off an alarm that alerts the radiation oncology team. Treatment is automatically stopped until the technicians make necessary adjustments in order to protect the areas surrounding the prostate, especially the rectum and bladder. “We are traditionally conservative when it comes to changing treatment schema for prostate cancer, given our wariness about side effects,” Dr. Yu says. “However, by integrating SpaceOAR and radiofrequency tracking, we were convinced that we could safely deliver prostate SBRT treatment. And it's going very well.” Who is eligible: “Rapid radiotherapy is possible for most patients,” Dr. Yu says. Exceptions include men with severe urinary symptoms (more rapid treatments have slightly higher short-term urinary side effects, he says, such as inflammation and urinary obstruction). Also, this method is not used for men who need androgen deprivation therapy (a hormone therapy that suppresses testosterone) or who need radiation to regional lymph nodes. Rapid radiation therapy for gastrointestinal cancer Treatment times: Gastrointestinal (GI) cancers occur in the esophagus, stomach, biliary system, pancreas, small intestine, large intestine, rectum and anus. With standard radiation treatment, patients receive treatment five days a week for about six weeks. SBRT, however, reduces treatments to a total of five high-dose fractions in all. This faster treatment approach also eliminates the need for concurrent chemotherapy. New advances: “We are using 4D CT scans for treatment planning,” says Kimberly Johung, MD, director of the Gastrointestinal Radiotherapy Program, who explains that the scan is essentially a video that shows the motion of a tumor as the patient breathes. “These 4D planning CT scans allow the radiation field to be focused on the precise area that tumors occupy during the respiratory cycle.” She explains that her department also uses technology to limit tumor motion from breathing, and to track the motion of tumors during treatment. Who is eligible: For patients who aren’t receiving chemotherapy, SBRT is a treatment option in cases where the pancreatic cancer is inoperable or can only be partially removed during surgery, or for patients who are unable to have surgery for other medical reasons. It’s also an option for patients who have a tumor reoccur in the same area after surgery. SBRT is also used in patients with primary liver tumors (such as hepatocellular carcinoma and cholangiocarcinomas) and for patients with a limited number of liver metastases. Rapid radiation therapy for lung cancer Treatment times: Traditionally, patients with early-stage lung cancer receive about seven weeks of radiation therapy. That time can be reduced to just three to five treatments over two weeks, and patients with advanced cancer that has not metastasized can be treated in about four weeks, says Dr. Decker. New advances: “By using high-precision, on-board imaging technology that offers the ability to target tumors more accurately, we can deliver higher radiation doses in a shorter number of treatments,” he says. Who is eligible: Patients with cancer limited to the chest, who are not going to receive chemotherapy, may be candidates for hypofractionated radiotherapy. Rapid radiation therapy for breast cancer Treatment times: For early-stage breast cancer, standard care consists of either having a mastectomy or breast conservation therapy (also known as breast-conserving surgery or a lumpectomy) followed by five to seven weeks of radiation to the breast. For some patients, hypofractionated radiotherapy is now being recommended. “Breast-conserving surgery combined with hypofractionated radiation delivered in three to four weeks has been demonstrated in multiple clinical trials to be as effective as the standard fractionation course of five to seven weeks of radiation to the breast,” says Meena Moran, MD, who is the director of Yale Medicine’s Breast Cancer Radiotherapy Program. The side effects of treatment with the shorter course are also equivalent to, if not better than, standard treatment. The hypofractionated radiation therapy treatment course for breast cancer consists of delivering a slightly larger daily dose of radiation five days a week, with about 15 fractions over four weeks, instead of about 33 fractions over seven weeks. “Ultimately, the total dose delivered with hypofractionated therapy is equivalent and produces similar outcomes and side effects,” explains Dr. Moran. New advances: A technology called Deep Inspiration Breath-Hold (DIBH) makes breast radiotherapy safer for patients with left-sided breast cancers by decreasing the exposure of radiation to their heart. When radiation is targeting the whole breast or chest wall, the radiation beam destroys all tissue it comes in contact with. In left-sided breast cancer patients, portions of the heart and lungs situated under the rib cage are sometimes exposed to the radiation beam. With the DIBH technique, radiation is only delivered when the patient is taking a deep breath, and in a precise position, which expands the rib cage and moves the heart safely out of the way of the radiation beam. Who is eligible: Hypofractionated whole breast irradiation is a recommended treatment approach for a select group of patients with early-stage breast cancer. Ask your radiation oncologist if you’re a candidate for hypofractionated breast radiotherapy. Thanks to hypofractionated radiotherapy, cancer treatments are becoming faster and easier for eligible patients with prostate, gastrointestinal, lung and breast cancers. And clinical trials are underway to determine if quicker treatment times would effectively treat other cancers, too. “We are constantly looking for ways to improve the patient experience, not only making radiation more effective but also safer, and more convenient,” Dr. Decker says. For more information about radiotherapy services at Yale Medicine, visit the Department of Therapeutic Radiology by clicking here.
<urn:uuid:dacff4db-d1a5-4b6b-8d5d-09408d0e95f0>
CC-MAIN-2023-14
https://www.yalemedicine.org/news/rapid-radiation-therapy
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949701.56/warc/CC-MAIN-20230401063607-20230401093607-00167.warc.gz
en
0.942396
2,083
3.046875
3
Guide to Virtual Meeting with Students: If meeting virtually with students over Meet or Zoom, read this all-inclusive guide to help you learn more about settings, limitations, and tips for a successful meeting. Virtual meeting resources page: Find resources and materials to support virtual meetings with both students and with adults. How to Record a Synchronous Lesson Without Identifiable Student Information: Rather than recording a separate video later for students who weren't able attend a lesson, learn how to record the lesson as you deliver it over Meet or Zoom without capturing student names, voices, or images. Zoombombing: Learn about what Zoomboming is and how to prevent it happening to you & your Zoom meetings. Zoom: Activating Your Managed Account: Follow these steps to activate your district Zoom account. Zoom: Recommended Settings: Read about some default settings and some suggested settings to ensure you and your students get the most out of Zoom. Zoom update to fix calendar (video): If Zoom isn't working well with your Google Calendar, watch this video to fix issues with the extension. How to Support Students Who Can’t Participate Synchronously: Make alternative learning materials for students who can't join your lessons in Meet or Zoom using this resource created jointly by C&I and DoT. Screencastify- Backpack support (how-to resource): Use Screencastify to record your screen and/or webcam to present information, model an activity, or flip your instruction. Digital Learning's YouTube playlists: Watch videos created and curated by SFUSD's Digital Learning team to support topics like personalized learning environments, assessment tools & strategies, digital citizenship, and more.
<urn:uuid:73b0f46a-83a0-4fa2-853e-3179a81b7eb2>
CC-MAIN-2023-14
https://help.sfusd.edu/hc/en-us/articles/360053223674-Virtual-Meeting-Resources-for-people-working-with-students
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943483.86/warc/CC-MAIN-20230320114206-20230320144206-00367.warc.gz
en
0.902111
353
2.875
3
Fish meat is a type of meat that comes from fish, which are aquatic animals found in various bodies of water, including oceans, rivers, and lakes. Fish is a popular food source for humans because it is a rich source of protein, omega-3 fatty acids, vitamins, and minerals. Fish meat can be prepared in a variety of ways, such as baking, grilling, frying, or steaming. Different types of fish have different textures and flavors, so the cooking method used can also affect the taste and texture of the meat. For example, some fish, like salmon, have a more oily and rich flavor that is enhanced when grilled or baked, while other fish, like tilapia, have a more mild flavor that can be complemented with a variety of spices and seasonings. Fish meat is also commonly used in sushi and sashimi, which are traditional Japanese dishes that involve raw fish sliced thinly and served with rice and other accompaniments.
<urn:uuid:6b27f955-178c-4186-bd57-295c47b9be92>
CC-MAIN-2023-14
https://themeatmill.com/product/fish/?v=ed82fd869440
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943746.73/warc/CC-MAIN-20230321193811-20230321223811-00367.warc.gz
en
0.967143
201
3.421875
3
The Macintosh used the same Motorola 68000 microprocessor as its predecessor, the Lisa, and we wanted to leverage as much code written for Lisa as we could. But most of the Lisa code was written in the Pascal programming language. Since the Macintosh had much tighter memory constraints, we needed to write most of our system-oriented code in the most efficient way possible, using the native language of the processor, 68000 assembly language. Even so, we could still use Lisa code by hand translating the Pascal into assembly language. We directly incorporated Quickdraw, Bill Atkinson's amazing bit-mapped graphics package, since it was already written mostly in assembly language. We also used the Lisa window and menu managers, which we recoded in assembly language from Bill's original Pascal, reducing the code size by a factor of two or so. Bill's lovely Pascal code was a model of clarity, so that was relatively easy to accomplish. The Mac lacked the memory mapping hardware prevalent in larger systems, so we needed a way to relocate memory in software to minimize fragmentation as blocks got allocated and freed. The Lisa word processor team had developed a memory manager with relocatable blocks, accessing memory blocks indirectly through "handles", so the blocks could be moved as necessary to reduce fragmentation. We decided to use it for the Macintosh, again by recoding it from Pascal to assembly language. The primary author of the Lisa word processor and its memory manager was Tom Malloy, an original member of the Lisa team and Apple's first recruit from Xerox PARC. Tom had worked on the Bravo word processor at PARC under the leadership of Charles Simonyi, and used many of the techniques that he learned there in his Lisa code. Even though Bud Tribble had to leave the Mac team in December 1981 in order to retain his standing in the M.D./Ph.D. program at the University of Washington, he decided that he could still do the initial implementation of the memory manager, as we were planning all along, hoping to finish it quickly after he moved back to Seattle, before classes started. He obtained a copy of the memory manager source from Tom Malloy, but he was in for a shock when he began to read the code. The memory manager source lacked comments, which was disappointing, but the biggest obstacle was the names selected for variables and procedures: all the vowels were gone! Every identifier seemed to be an unpronounceable jumble of consonants, making it much harder to understand the code, since a variable's meaning was far from obvious. We wondered why the code was written in such an odd fashion. What happened to all of the vowels? It turns out that Tom Malloy was greatly influenced by his mentor at Xerox, a strong-willed, eccentric programmer named Charles Simonyi. Charles was quite a character, holding many strong opinions about the best way to create software, developing and advocating a number of distinctive coding techniques, which Tom brought to the Lisa team. One of the most controversial techniques was a particular method of naming the identifiers used by a program, mandating that the beginning of each variable name be determined by the type of the variable. However, most of the compilers in the early eighties restricted the length of variable names, usually to only 8 characters. Since the beginning of each name had to include the type, there weren't enough characters left over to use a meaningful name describing the purpose of the variable. But Charles had a sort of work-around, which was to leave out all of the vowels out of the name. The lack of vowels made programs look like they were written in some inscrutable foreign language. Since Charles Simonyi was born and raised in Hungary (defecting to the west at age 17), his coding style came to be known as "Hungarian". Tom Malloy's memory manager was an outstanding specimen of Hungarian Pascal code, with the identifiers looking like they were chosen by Superman's enemy from the 5th dimension, Mr. Mxyzptlk. Bud decided that it would be too error prone to try to translate the Hungarian memory manager directly into assembly language. First, he made a pass through it to strip the type prefixes and restore the vowels to all the identifier names, so you could read the code without getting a headache, before adding lots of block comments to explain the purpose of various sub-components. A few weeks later, when Bud came back to attend one of our first retreats, he brought with him a nicely coded, efficient assembly language version of the memory manager, complete with easy to read variable names, which immediately became a cornerstone of our rapidly evolving Macintosh operating system.
<urn:uuid:95134e21-3cf5-4dd6-9082-e47d98c1fc62>
CC-MAIN-2023-14
https://www.folklore.org/StoryView.py?project=Macintosh&story=Hungarian.txt&sortOrder=Sort+by+Date&topic=Lisa&showcomments=1
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943746.73/warc/CC-MAIN-20230321193811-20230321223811-00367.warc.gz
en
0.973805
959
2.9375
3
Peripheral artery disease Peripheral vascular disease or PVD refers to the narrowing of the arteries other than those which supply the heart and the brain. It most commonly affects the legs, but other arteries may also be involved. PVD can be organic, where the narrowing is caused by a blockage, or functional, where the blood vessel is constricted. PVD causes a reduction in blood flow to the tissue supplied by the artery, resulting in tissue ischemia, gangrene, and necrosis. The classic symptom is leg pain when walking which resolves with rest, known as intermittent claudication. Other symptoms including skin ulcers, bluish skin, cold skin, or poor nail and hair growth may occur in the affected leg. Treatment involves lifestyle changes, medication to reduce clotting, or rarely surgery. - "Robbins Basic Pathology" Elsevier (2017) - "Harrison's Principles of Internal Medicine, Twentieth Edition (Vol.1 & Vol.2)" McGraw-Hill Education / Medical (2018) - "Pathophysiology of Disease: An Introduction to Clinical Medicine 8E" McGraw-Hill Education / Medical (2018) - "Peripheral vascular disease: diagnosis and treatment" Am Fam Physician (2006) - "Peripheral vascular disease assessment in the lower limb: a review of current and emerging non-invasive diagnostic methods" BioMedical Engineering OnLine (2018) - "Peripheral Vascular Disease" Circulation (2000)
<urn:uuid:9be279b2-404b-4a53-a03c-71c11c102dd1>
CC-MAIN-2023-14
https://www.osmosis.org/learn/Peripheral_artery_disease?from=/md/foundational-sciences/pathology/cardiovascular-system/cardiovascular-system-pathology-review
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943746.73/warc/CC-MAIN-20230321193811-20230321223811-00367.warc.gz
en
0.905867
313
3.3125
3
A few more links to online resources to help with choosing colors for maps and related graphics: Color.org – Upload your own graphic image, then select colors from it by moving your cursor over the graphic and clicking on a color block. Add colors to a color scheme, or find complementary colors. Interface is a bit confusing, though, and there’s no help file. ColorSchemer – Click on a single color, or enter the RGB/Hex value, and get a set of 16 complementary colors. Whatsitscolor – “Whats its color is an image-color processing utility that will evaluate an image and give you the image’s primary and complementary dominant colors of an image, how many visually unique colors are in an image, and the top ten visually unique colors in an image. Extremely useful when creating any type of designs around an image. The more colorful the image, the better the results. Results will display your image on the best suited background for that image.” See some of the other posts on this blog about color tools (1, 2, 3).
<urn:uuid:a9f6723c-c98b-417d-bf80-a83464033b9e>
CC-MAIN-2023-14
https://freegeographytools.com/2007/more-color-design-resources
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945282.33/warc/CC-MAIN-20230324113500-20230324143500-00367.warc.gz
en
0.851134
228
2.65625
3
There's a charming myth that the 18th-century poet Alexander Pope said, "The proper study of mankind is man, but when one regards the elephant, one wonders." One wonders particularly after reading an extraordinary essay by Caitrin Nicol in the journal The New Atlantis. She makes a powerful case for the moral status of elephants, a case that is especially poignant when the creatures are faced with the prospect of utter destruction. Only 500,000 or a little more still roam the Earth, and poachers slaughter tens of thousands a year. Elephants aren't just gentle giants, but complex and intelligent ones. They are intensely social, with bands of females staying together for life and assisting one another in giving birth and raising their young. They communicate vocally — including with sounds inaudible to humans — and seismically through the ground. They weep. The phrase "an elephant never forgets" is such a cliché that we neglect its foundation in the creature's truly astonishing memory. "This is attested to," Nicol writes, "by outward indicators ranging from the practical — a matriarch's recollection of a locale, critical to leading her family to food and water — to the passionate — grudges that are held against specific people or types of people for decades or even generations, or fierce affection for a long-lost friend." Nicol notes an essay by the philosopher of biology Hans Jonas discussing three uniquely human qualities, and sets out how elephants arguably share each one. They make and use tools. Elephants clean their ears with clumps of grass. In Asia, when collared by bells, they can plug the bells with mud to stealthily steal bananas. In one recorded instance, when confronted with an electric fence, elephants followed the current around to the generator, destroyed it and made their escape. They make images. Elephants will draw and, given the materials, paint. The drawings of an elephant named Siri in the Syracuse, N.Y., zoo were collected into a book in the 1980s, and Willem de Kooning praised them. They commemorate the dead. When an elephant dies, other elephants bury it and stay with the body, mourning. The conservationist Cynthia Moss writes, "Even the bare, bleached old elephant bones will stop a group if they have not seen them before." The title of Nicol's essay is "Do Elephants Have Souls?" We don't have to answer that question to realize the special respect owed these fascinating, awe-inspiring, mysterious creatures. Cooping them up in zoos is wrong, and holding them in captivity to force them to perform for our amusement — in other words, a key part of the Ringling Bros. business model — is in the same moral category as bear baiting. All of this is nothing, of course, compared with the savagery of the poachers. In an eloquent jeremiad in The Atlantic, Matthew Scully flays the vast, far-flung industry devoted to ivory that begins with fear and death. He quotes a National Geographic writer describing the scene in Cameroon from the air: "[T]he scattered bodies present a senseless crime scene — you can see which animals fled, which mothers tried to protect their young, how one terrified herd of 50 went down together." Poachers will kill one elephant and then kill more when they come to mourn. The will cut out tusks before the creatures have even died. They will kill them with poisoned pumpkins or watermelons. Then, when their bloody work is done, the tusks are fed into the greedy maw of an underworld of criminals and sundry other lowlifes who sate the appetite for ivory in China and other parts of Asia. Scully argues for devoting greater material and diplomatic resources to disrupting this trade. Nicol ends her essay with a plea for an enhanced sense of fellow-feeling: "Listen with your ears, your eyes, your heart, your mind, your soul for the message from these kin as improbable as life itself, different and yet the same. We are not alone." Although on the current trajectory, we will be soon enough. Rich Lowry is the editor of National Review and author of the new bestseller “Lincoln Unbound: How an Ambitious Young Railsplitter Saved the American Dream — and How We Can Do It Again.” He has written for The New York Times, The Washington Post, The Wall Street Journal, Los Angeles Times, and a variety of other publications. Read more reports from Rich Lowry — Click Here Now.
<urn:uuid:e989d90c-d29c-4bc5-90c3-ded253486017>
CC-MAIN-2023-14
https://cloudflarepoc.newsmax.com/richlowry/elephant-extinction-poaching-ivory/2013/08/02/id/518421/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945372.38/warc/CC-MAIN-20230325191930-20230325221930-00367.warc.gz
en
0.942336
939
3.546875
4
Vitamin D and Covid-19 Peter Mas-Mollinedo, CEO of ICR Ltd, joins Professor Rose Anne Kenny to discuss why vitamin D is so important to our immune system, why so many people are lacking in it, and the next steps and recommendations. 1). Laird, E.; Rhodes, J.; Kenny, R.A. Vitamin D and Inflammation: Potential Implications for Severity of Covid19. Ir. Med. J. 2020, 113, P81. 2). Laird E, Kenny RA. Vitamin D deficiency in Ireland – implications for COVID-19. Results from the Irish Longitudinal Study on Ageing (TILDA). 2020. https://tilda.tcd.ie/publications/reports/pdf/Report_Covid19VitaminD.pdf 3).Rhodes JM, Subramanian S, Laird E, Kenny RA. Editorial: low population mortality from COVID-19 in countries south of latitude 35 degrees North supports vitamin D as a factor determining severity. Aliment Pharmacol Ther. 2020;180.
<urn:uuid:a9740c7b-fc27-4ce2-9846-46cd202b7fe0>
CC-MAIN-2023-14
https://medicalupdateonline.com/2020/05/vitamin-d-and-covid-19/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945372.38/warc/CC-MAIN-20230325191930-20230325221930-00367.warc.gz
en
0.738628
237
2.8125
3
Walter (Stahl am Tarlyk) Gottfried Walter, his sister, his mother, and his stepfather Christian Richter arrived from Lübeck at the port of Oranienbaum on 8 August 1766 aboard the snow-brig Der Merkur under the command of Skipper Johann Heinrich Abelmann. They settled in the Volga German colony of Stahl am Tarlyk on 13 August 1767 and are recorded there on the 1767 census in Household No. 24. - Mai, Brent Alan. 1798 Census of the German Colonies along the Volga: Economy, Population, and Agriculture (Lincoln, NE: American Historical Society of Germans from Russia, 1999): St45. - Pleve, Igor. Einwanderung in das Wolgagebiet, 1764-1767 Band 4 (Göttingen: Göttinger Arbeitskreis, 2008): 210. - Pleve, Igor. Lists of Colonists to Russia in 1766: Reports by Ivan Kulberg (Saratov: Saratov State Technical University, 2010): #3267.
<urn:uuid:fc7439db-e595-4136-ba1e-de3bffb877c7>
CC-MAIN-2023-14
http://volga.domains.unf.edu/surnames/walter-stahl-am-tarlyk
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948858.7/warc/CC-MAIN-20230328104523-20230328134523-00367.warc.gz
en
0.805798
243
2.546875
3
Given an integer N, the task is to find all the self-descriptive numbers from 1 to N A self-descriptive number is an integer n in given base b is b digits long in which each digit at position p (the most significant digit being at position 0 and the least significant at position b – 1) counts how many times a digit p is in n. For example in base 10, 6210001000 is a self descriptive number as there are six 0s, two 1s, one 2 and one 6. Explanation : It is 10 digit number in base 10. It has 6 at the position 0 and there are six 0s in 6210001000. It has 2 at the position 1 and there are two 1s in 6210001000. It has 1 at the position 2 and there is one 2s in 6210001000. It has 0 at the position 3 and there are zero 3s in 6210001000. It has 0 at the position 4 and there are zero 4s in 6210001000. It has 0 at the position 5 and there are zero 5s in 6210001000. It has 1 at the position 6 and there is one 6 in 6210001000. It has 0 at the position 7 and there are zero 7s in 6210001000. It has 0 at the position 8 and there are zero 8s in 6210001000. It has 0 at the position 9 and there are zero 9s in 6210001000. [Source : Wikipedia] Input: N = 10000 Output: 1210 2020 Explanation: From 1 to N only these two numbers are the self-descriptive numbers Input: N = 10 Output: Explanation: There is no self descriptive number in range [1, 10] Here is a program to print all self-descriptive numbers below 100000000. In the below program we have just ignored one fact about the self-descriptive number that it should have as many number of digits as much the base is given. Description of Program : 1 . Firstly all the digits get extracted from the outer loop and are stored in a variable b in each iteration. 2 . Then in the inner loop there is a count on how many times number i (this i is ith index of outer loop) is present in the string. 3 . Finally that count is compared with the digit present at the ith index stored in variable b. Please Login to comment...
<urn:uuid:8607dda1-20dd-4908-bc21-646b8e886f04>
CC-MAIN-2023-14
https://www.geeksforgeeks.org/self-descriptive-number/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948858.7/warc/CC-MAIN-20230328104523-20230328134523-00367.warc.gz
en
0.947096
516
3.546875
4
A Student Handbook to Politics By Maggie Eckhart Democracy, America’s and all of those old English dudes baby. The U.S. government and its elected officials are both confusing beings. With all of the rhetoric used in their speeches, it can be hard to define what on earth they are trying to express. This handbook is going to make it 1000 times easier to say definitively yes or no to where you agree with the officials. It shouldn’t take someone who has studied economics, lived and breathed politics for 20 years and a professional lawyer to understand what the people in charge of our country are doing for us. First off, we have to determine what politics even means and why you should care about it. Politics is defined as this: an activity surrounded by our government and other activities such as a debate between parties. Why you should care about any of this mess? Because it affects your everyday life! Do you know that pothole that you drove over this morning? That relates to politics. What about your hourly wage? That is politics. What about those annoying taxes take out of your check every day? That is politics. Your world revolves around who we vote into offices based on our core beliefs of what is most important to us. Whether that maybe climate change or taxes, it’s all about your right to vote on politics. Branching off of that, in the emotional and chaotic world of politics, there are parties in which you can identify as. The quiz below helps you determine what party you mostly fit into. Now that you have your party, just remember to take it with a grain of salt. Your views may change as situations arise and fall. Who to Support As hard as it may seem to stay tuned in with the candidates and frankly, their mostly boring speeches, the best topic to listen to is what they are going to do in office. If their core beliefs align with yours, they may be the best-suited candidate for you. Although, you can never go wrong with your good old gut feeling. This is a tiny tip of the iceberg that is politics. These are the fundamentals of politics, what it is, parties and who to support. Good luck in your quest at fulfilling your American citizen duty. Leave a Reply
<urn:uuid:4b91ee53-1dd2-419b-953d-afeeaa228a49>
CC-MAIN-2023-14
https://shspress.com/2020/01/30/whats-going-on/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949533.16/warc/CC-MAIN-20230331020535-20230331050535-00367.warc.gz
en
0.971091
478
2.5625
3
Two years ago today the Burma Army seized power in a coup on February 1, 2021 under the pretense of electoral irregularities that ended nearly a decade of Burma’s transition from dictatorship to democracy. State Counselor Aung San Suu Kyi, President Win Myint, and other officials of the National League for Democracy (NLD) administration were immediately detained or forced to flee their homes to seek safety. The 2021 coup was met with almost immediate resistance from the Burmese public as citizens took the streets and civil servants went on strike. However, a pro-democracy uprising that began as large, colorful protests and acts of civil disobedience has devolved into armed resistance as the regime employs increasingly brutal methods to quash opposition to its rule. The military’s attempt at a power grab has shattered the lives of millions across the country that has imposed an insurmountable economic and human toll on Burma. Since the 2021 coup, the military has returned Burma to levels of political repression not seen since the days of previous Burmese military regimes. The Assistance Association for Political Prisoners has documented 2,940 democracy activists and civilians that have been killed by pro-military forces, a likely underestimate as it has restricted internet and telecommunications access across Burma. A total of 13,763 people remain detained in often grim conditions and face the risk of torture. Military junta officials carried out the first use of capital punishment in Burma since the 1980s when it executed democracy activists Kyaw Min Yu (aka Ko Jimmy), Phyo Zeyar Thaw, Hla Myo Aung and Aung Thura Zaw. One hundred and one people remain on death row in Burma. The Committee to Protect Journalists reported that 42 journalists were imprisoned in the country as of December, making Burma one of the worst jailers of journalists alongside China and Iran. Hundreds of thousands of people in Burma have become displaced as violence has escalated over the last two years. According to recent UN figures, an estimated 1,215,000 have become Internally Displaced Persons (IDPs) within Burma since the coup, bringing the total IDPs in the country to 1,545,000 as of January 9, 2023. More than 72,000 Burmese refugees have fled to neighbouring countries since Feb. 1, 2021. Thousands of families have been rendered homeless as military forces torched 48,463 civilian houses in a bid to crush resistance across the country in 2022, according to statistics released by independent research unit Data for Myanmar on Jan. 15. Thousands of homes and businesses have been demolished as military authorities have issued eviction notices in Burma’s cities under dubious justifications. The Rohingya – who were victims of the Burma Army’s genocidal campaign in northern Rakhine in 2017 – continue to suffer immense persecution. Over 100 Rohingya have been arrested and sentenced by regime forces as they sought to flee the precarious situation in northern Rakhine. The United Nations High Commissioner for Refugees (UNHCR) stated that 348 Rohingya have died or gone missing as thousands take dangerous boat journeys at sea to flee horrific conditions in Burma as well as the refugee camps in Bangladesh. The year 2022 was reportedly one of the deadliest years at sea as Rohingya took to boats bound for Malaysia and Indonesia for an opportunity to seek a better life. Children have not been spared from the ill effects of the 2021 military coup. The UN Special Rapporteur on the situation of human rights in Burma announced last June that at least 382 children have been killed or maimed due to Burma’s armed conflict – including a grisly episode where nearly a dozen school children were killed when a helicopter opened fire on a monastery school in Sagaing Region in September 2022. Over 1,400 children have been detained since the coup. Millions of would-be students have missed significant class time. Countless children have missed their annual routine immunizations. Many more have been displaced as the junta’s violent repression has had major ramifications on Burma’s economy. Once widely heralded as one of Asia’s premier frontier markets, Burma’s economy has all but collapsed. Burma’s economy shrank by 18 percent in 2021 and only grew by a paltry three percent in 2022, according to the World Bank. The country’s GDP per capita remains 13 percent less than its pre-COVID-19 level. The Burmese Kyat’s value to the USD remains less than half of its pre-coup rate. Nearly half of Burmese households reported income losses in 2022. Hundreds of thousands of workers have lost their jobs since the 2021 military coup. The prices of basic commodities have soared due to inflation. A myriad of international investors and businesses have either suspended their operations or pulled out of Burma entirely as political realities and ethical concerns make it increasingly difficult to operate in the country. Despite these dire realities, people in Burma continue to resist the military’s attempt to consolidate its rule across the country. Tens of thousands of people have traveled to the border regions to take up arms against the Burma Army and its coup regime. Significant swathes of the country remain outside of military control. Burma’s diaspora across the world continues to hold demonstrations to raise international awareness of Burma’s fight for democracy and lobby foreign governments. Journalists both inside and outside of Burma continue to report on the situation on the ground to bypass media censorship. The military’s ability to govern for the foreseeable future is far from being set in stone as pro-democracy forces remain resolute in their fight to take control of Burma’s future in spite of immense costs.
<urn:uuid:374f31a0-9fae-4757-b971-f3c29bfeafd6>
CC-MAIN-2023-14
https://english.dvb.no/the-cost-of-the-2021-coup-in-burma-continues-to-mount-two-years-on/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949958.54/warc/CC-MAIN-20230401094611-20230401124611-00367.warc.gz
en
0.969037
1,149
2.578125
3
- Foster independent living in seniors by ensuring they have the knowledge, skills, and confidence needed for autonomous independence. - Provide physical assistance with everyday tasks to help seniors maintain independence and normalcy. - Offer emotional support by listening, sympathizing, and affirming the feelings of seniors to foster feelings of security and belonging. - Promote social engagement to give seniors meaning and purpose, connection to their peers, and physical and mental health. As people age, they often require additional support to remain independent and enjoy a high quality of life. Empowering seniors is vital in helping them maintain their autonomy and dignity as they age gracefully. There are many ways to empower seniors, from physical assistance with everyday tasks to emotional support. By understanding the unique needs of each senior, caregivers can provide effective solutions that help improve their overall well-being. Foster independent living Fostering independent living is the key to empowering seniors and improving their quality of life. It is essential to ensure that seniors can maintain as much independence and control over their lives as possible, from learning new skills to providing them with the necessary resources. This allows seniors to remain engaged in their community and benefit from all that independent living offers. Equipping them with the knowledge, skills, and confidence needed for autonomous independence can help reduce ageism, reduce social isolation, encourage mobility, and promote self-respect. This kind of support system allows seniors to be active agents of their well-being. Provide needed support Here are some ways how to provide the support seniors need: Offer physical assistance Physical assistance with everyday tasks is a great way to empower seniors in your communities. You must treat them as autonomous individuals and provide them the option to receive assistance if needed. This provides seniors with extra support during their daily activities, from shopping to getting around town, which helps them maintain independence and normalcy. You honor their dignity, capabilities, and autonomy by providing physical assistance with everyday tasks and fostering positive relationships between seniors and community members. Provide emotional support Emotional support for seniors is essential to helping them remain engaged with society and maintain their independence. It is important to understand that even if a senior already has a caregiver or some other form of support, it still benefits them greatly to have emotional support from someone who can listen, sympathize, and affirm their feelings. This communication is essential if the senior needs family and friends nearby who can provide encouragement or advice. Emotional support helps foster feelings of security and belonging among seniors – something that is often compromised as they age. Providing emotional support encourages self-efficacy and empowerment – critical factors in promoting a more healthy sense of personal identity among seniors. Thus, when seniors feel respected, supported, and empowered, they experience improved overall quality of life, more significant health outcomes, and feel more connected to those around them. Promote social engagement Promoting social engagement for seniors is an integral part of empowering them. Not only can the meaning and purpose it provides enrich the lives of this growing demographic, but it allows individuals to interact meaningfully with their peers and benefit from the support of their community. The right kind of social engagement can have physical and mental health benefits as well, such as improved mental understanding, a better sense of belonging, and interacting with one’s peers in ways that restore confidence and independence. For example, helping out on a gardening project or participating in a book club might be low-impact activities that seniors find enjoyable; both provide stimulation and companionship while calming the mind and body. It is, therefore, essential to open up such possibilities for our senior citizens to allow them to remain vibrant contributors to society. Encourage lifelong learning and personal growth. Promoting and encouraging lifelong learning and personal growth among seniors is essential in giving them a sense of significance, engagement, and empowerment. Education can take many forms, from attending lectures and classes to seeking interesting books or experimenting with new hobbies. All these activities offer seniors the chance to discover new skills, explore their creativity, connect with people their age, stay up-to-date on world news, expand their horizons, and challenge their minds. Ensuring seniors have access to quality education opportunities will help keep them physically active and boost them emotionally through increased self-esteem and confidence in themselves. Furthermore, experiencing success in life’s pursuits, regardless of age, may even help reduce feelings of sadness or worry by providing a platform for positive accomplishment. In this way, seniors can develop resilience, leading to more joyous living throughout their aging years. Help them stay up to date on technology advances Technology advances at a rapid pace, making it difficult for seniors to keep up. Empowering seniors with knowledge of new technology can help ensure a better quality of life. Reasons to stay up-to-date on technology include being able to communicate more easily with family and friends, staying connected to the world through news and entertainment, and utilizing resources like online banking or shopping. In addition, staying up-to-date on technology can reduce anxiety and provide feelings of independence. By helping seniors learn basic skills such as how to turn on a computer, use the internet for research, or send emails, it can go far in helping them feel confident about their use of technology. With the right resources, support and encouragement, seniors can stay connected, engaged and active in their communities. As a result, they can continue to contribute to society, maintain good physical and mental health, and live life to the fullest.
<urn:uuid:78722b44-3025-4da5-bf92-fff1d62588f2>
CC-MAIN-2023-14
https://www.reclaimingthemission.com/empower-seniors-meaningful-impact/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943484.34/warc/CC-MAIN-20230320144934-20230320174934-00567.warc.gz
en
0.951856
1,127
2.578125
3
Dogs need exercise, and one way for your dog to attain this goal is through swimming, but you need to take the proper steps to show your dog how to swim. You do not want the introduction to water to be a tough transition. Throwing your dog into water and hoping your dog knows what to do is a huge no-no in swim training. Your dog will become frightened, and never wish to enter the water again. Instead, use these tips to teach your dog to swim in an upbeat manner leaving a long lasting positive water impression. Introduction to Water Regardless of your dog’s age, find calm, shallow water for the introductions. Then slowly have your dog inch his/her way into the water. Be sure there is a long leash on your dog, and walk into the water alongside. Provide lots of praise so there is no panic on your dog’s part. Show your dog that it is okay and a positive experience. Once your dog is comfortable, your dog will begin to show swimming abilities. Just keep it light. If your dog appears to be mastering the art of swimming, and enjoying it, then go into deeper waters. What to Remember When Going Swimming with Your Dog Remember to always bring fresh water for your dog to drink. Your dog needs to stay hydrated as much as you do. If you are swimming in an ocean, do not let your dog swim into currents. In addition, do not let your dog to jump into deep water. You do not know what can be lurking in the waters without gradually entering it. Prevent any accidents by gradually entering the water of choice. These are actually good reminders for you, and your dog. To learn more swimming tips, talk to a Florida obedience training professional or a k9 obedience instructor today.
<urn:uuid:8caa1e2b-c3f0-4cb9-b80e-5bce916eef41>
CC-MAIN-2023-14
https://k9korralsrq.com/easy-steps-to-teach-your-dog-swimming/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943747.51/warc/CC-MAIN-20230321225117-20230322015117-00567.warc.gz
en
0.963843
367
2.53125
3
Balance The Following Chemical Equation Hgo Hg O2. 2hgo → 2hg + o2. Hgo = hg o2 | chemical equation balancer = oxygen. Balance the following chemical equation (if necessary): To balance h g h g, multiply h g h g from the right side by 2 2. In this case, you just need to observe to see if product. Check out a sample q&a here. The coefficients show the number of particles (atoms or molecules), and the indices show the number of atoms that. Here in the equation metal atom already balanced, so write 2 in. For instance equation c6h5c2h5 + o2 = c6h5oh + co2 + h2o will not be balanced, but phc2h5 + o2 = phoh + co2 + h2o will; Hgo (s) → heat hg (l) + o 2 (g) step 2: Phenomenon after hg (mercury) reacts with o2 (oxygen) this equation does not have any specific information about phenomenon. O o is a balanced element because there is the same number of atoms of o o in each. Balance each of the following chemical equations: News only 5% of population would know. While balancing the the chemical equation , balance the metal atom first and then in the last balance oxygen atoms. Hgo(s) → hg(1) + o2(g) expert solution. Compound states [like (s) (aq) or (g)] are not required. Mercury + oxygen gas → mercury (ii) oxide.
<urn:uuid:8e1d7cdc-984f-4dba-89c1-6b8964859368>
CC-MAIN-2023-14
https://traditioinvicta.org/Balance-The-Following-Chemical-Equation-Hgo-Hg-O2.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943747.51/warc/CC-MAIN-20230321225117-20230322015117-00567.warc.gz
en
0.808834
345
3.78125
4
A creditor is a party (e.g. person, organization, company, or government) that has a claim on the services of a second party. It is a person or institution to whom money is owed. The first party, in general, has provided some property or service to the second party under the assumption (usually enforced by contract) that the second party will return an equivalent property and service. The second party is frequently called a debtor or borrower. The first party is the creditor, which is the lender of property, service or money. The term creditor is frequently used in the financial world, especially in reference to short-term loans, long-term bonds, and mortgage loans. In law, a person who has a money judgment entered in their favor by a court is called a judgment creditor. The term creditor derives from the notion of credit. Also, in modern America, credit refers to a rating which indicates the likelihood a borrower will pay back his or her loan. In earlier times, credit also referred to reputation or trustworthiness.
<urn:uuid:0a39c338-eaaa-44cd-a9f8-ef240c19fcd3>
CC-MAIN-2023-14
https://worldfintechnews.com/vocabulary/creditors/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943747.51/warc/CC-MAIN-20230321225117-20230322015117-00567.warc.gz
en
0.974532
214
3.625
4
33 bones – called vertebrae – carries the whole load of human body. The main frame formed by these vertebrae is called “spine.” In healthy humans, the vertebrae are arranged in a line and in an alignment with the head and feet. Depending on a person’s posture the spine is slightly inclined to inwards around the waist and head areas, while it is slightly inclined to outwards around the tail line and back areas. Thus, a healthy individual’s spine should not be inclined to right or left. However, the spine health may be affected during the transformation phase between childhood and adolescence. If a person has wrong posture, the spine may develop a curve. During the childhood, the structure of the spine changes and develops each year. Thus, the childhood phase is very important in terms of taking protective measures against spinal diseases. What Is Childhood Spinal Illness? The most common type of childhood spinal illness developed due to posture disorders that cause the spine to look like a “C” or “S” is the condition called “scoliosis.” Normal and healthy spines look in a straight alignment from top to bottom. However, in the case of scoliosis, the vertebrae are displaced towards right or left and whirl around their own axis. This spine disease, which is observed in men and women in the equal rate, advances faster in women. Moreover, the fastest rate of development of scoliosis occurs during the patient’s transformation into adolescence. During this phase, the degree of the curvature grows faster until it stops in the post-adolescence. Spinal infections are also considered among the childhood spinal diseases. Spinal infections are less prevalent among children compared to adults. The infection may affect the bone structure of the spine, the surrounding area of the spinal cord, and the cushions – called disks. However, among children, it can be argued that this condition is more commonly occurs on the disks. Antibiotics are prescribed for treatment of the spinal infections among children, which allows taking the condition under control in a short span of time. Besides all above, spinal tumors may develop during the childhood. Revealing itself by causing pain in the neck and waist areas, the tumor may also cause numbness in the arms and legs. Benign tumors are treated by close monitoring while malign tumors are treated by chemotherapy or radiotherapy. However, in the cases of malign tumors, surgical intervention is usually the preferred option.
<urn:uuid:90bcbb04-5cf4-412a-822a-60fbe9de53e3>
CC-MAIN-2023-14
https://www.hayatiaygun.com/en/childhood-spinal-illnesses/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943747.51/warc/CC-MAIN-20230321225117-20230322015117-00567.warc.gz
en
0.959414
518
4.03125
4
Poetry moves. Successful poems contain a movement of some sort from one point to another, and this movement can be regulated by any number of devices to create a “logic” for the poem. Whether this logic offers clarity or obscurity is dependent on the poet, but the poet makes this decision. One of the most clarifying devices for movement is that based on the narrative structure, and it is also one of the oldest. The narrative traces its roots back to the oral tradition, in which a people’s history was translated from generation to generation by vocal memorization, often set to a language’s natural qualities. From “The Epic of Gilgamesh” through “The Odyssey,” “Beowulf,” and into contemporary poetics, the narrative structure has served to tell stories. Moving from A to B to C, a narrative structure often controls the movement of a poem in a logical and straightforward manner. Even in narratives in which the progression cannot necessarily be called logical, as in Mark Strand’s “The King” or Mary Ruefle’s “Full Moon,” the poet uses narrative to create an internal logic. Another common device for controlling the movement from beginning to end of a poem can be seen in the language the poet applies. In utilizing techniques such as rhythm, rhyme, syntax, and line breaks, the poet can control movement even without the imposition of a narrative structure. William Carlos William’s “This is Just to Say” presents a good example of this type of “logic,” or movement, with little imposition of narrative. ee cummings’ poem “loneliness” also exhibits this kind of control, primarily utilizing manipulation of syntax and semantics to effect movement in the poem through extreme deconstruction of the language. Poems which offer neither a primarily narrative structure nor a language-based structure can still present a movement from one point to another. These poems often present a method of controlling the progression of movement, or “logic,” through image to invoke intuitive comprehension in the reader. Even if the reader does not clearly become aware of points A and B, or the transition between the two, the movement still occurs. It is this method of using image to control movement which this essay investigates. Investigating several poems will offer the chance to understand more clearly how image can be used to control movement and logic, as opposed to the more traditional methods of narrative and language. Understanding these intuitive, a-logical, movements will create a space in which to utilize these methods in concert with narrative and language. In order to proceed with the investigation, shorter, less complex poems will be evaluated in order to establish basic qualities of this method of control. These shorter poems will be closely analyzed to prize out answers to questions about how images move from one to the next, what kinds of connections are drawn between images to drive the movement, and how the poet makes choices about these connections and the movement. The shorter poems include Ezra Pound’s “In a Station at the Metro,” and three translations each of Basho’s “Summer Grasses” and “Moon and Clouds.” Once these basic principles are established, a longer poem will be evaluated to see how the principles stand up to incorporation with the other methods for controlling movement, as well as whether the a-logical control can be successful for poetics. This longer poem is John Ashbery’s “Self Portrait in a Convex Mirror,” which stands out for this kind of analysis. Although Pound’s poem “In a Station of the Metro” is one of the most commonly used examples to interrogate the imagist movement, there are significant reasons behind this. The poem reads for only two lines, or three if the title is included, and is composed of only two images. The apparent simplicity belies the poem’s complexity, however. Evaluating the connections between the first and second lines, and the recursive resonating connections between the second and first lines, requires many more words than the fourteen the poem is composed of. The argument for using a poem this compressed in this kind of investigation is the ability to ignore extraneous information because there is not any. The two images in two lines allow the analysis to focus entirely on the interplay between them. A similar argument applies to examining the short form of haiku, which often places two images in comparison and contrast to each other. Pound’s poem and Basho’s haiku offer excellent entry points for evaluation of image as a control for the movement or logic in a poem. As the source provided no titles for these haiku, I have assigned these titles as the first lines differ between translations, and in order to provide a clear referent for them. One Reply to “On the Control of Movement through Image, pt. 1” Excellent post thanks for sharing this. I enjoy reading your blog very much. Reading poems is something I truly enjoy. It’s very relaxing and soothing. Raining Purple Rain – Haiku Poem Comments are closed.
<urn:uuid:59e27d23-ffc9-4b4f-933f-ac0407bbc2a3>
CC-MAIN-2023-14
https://ericmrwebb.com/2011/04/on-the-control-of-movement-through-image-pt-1/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945030.59/warc/CC-MAIN-20230323065609-20230323095609-00567.warc.gz
en
0.954797
1,080
3.46875
3
Hawks are a group of medium-sized diurnal birds of prey of the family Accipitridae. Hawks are widely distributed and vary greatly in size. The subfamily Accipitrinae includes goshawks, sparrowhawks, sharp-shinned hawks and others. This subfamily are mainly woodland birds with long tails and high visual acuity. They hunt by dashing suddenly from a concealed perche In America, members of the Buteo group are also called hawks; this group is called buzzards in other parts of the world. Generally, buteos have broad wings and sturdy builds. They are relatively larger-winged, shorter-tailed and fly further distances in open areas than accipiters. Buteos descend or pounce on their prey rather than hunting in a fast horizontal pursuit.
<urn:uuid:c5f39470-cd4f-4cfa-af7a-80554b54a96d>
CC-MAIN-2023-14
https://studymateriall.com/h/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945030.59/warc/CC-MAIN-20230323065609-20230323095609-00567.warc.gz
en
0.961536
173
3.515625
4
Canada Geese (Branta Canadensis) are a highly social species who are abundant throughout urban and suburban regions of the United States. Many people are thrilled by their fascinating social interactions and ardent devotion between parents and goslings. Particularly because of their presence in urban environments, many feel that interacting with geese helps them to reconnect with the amazing diversity of a life in a rapidly vanishing world of nature. Yet Canada geese are currently under a massive attack by the US Department of Agriculture’s program of roundup and gassing geese, which has killed tens of thousands of geese and threatens to kill many thousands more. Geese have been vilified and unfairly blamed for causing a range of problems from water fouling due to droppings and posing a danger to air plane travel. Any conflicts between humans and geese problems arising from geese can be handled peacefully and without causing harm. We demand an end to the USDA’s annihilation program and demand a harmonious co-existence between humans and Canada geese. Canada geese include a range of sub-species native to North America, all of whom suffered near extinction in the early 20th century. Hunting and habitat loss were the main causes of their decline and eventually led to the enactment of the Migratory Bird Treaty Act of 1918. The Act substantially regulated hunting of Canada geese and sought to preserve critical habitat. With federal protections in place, Canada geese were afforded the opportunity to recover, making geese an appealing target to hunters. To cater to hunting interests, many state-run wildlife agencies actively bred and released resident Canada geese to increase the stock of available birds to kill. Experts believe that overly plentiful resident flocks of Canada geese today are attributed to the stocking efforts by these agencies in the past. Resident Canada geese find ideal habitats in which to thrive in urban and suburban environments. City parks, recreational areas, and golf courses offer large expanses of grass for foraging and ponds for swimming. The absence of natural predators in these human-made environments also contributes to the success of resident populations. Canada geese are classified as migratory and resident (non-migratory) species. Those classified as migratory nest exclusively in Canada and winter in the United States, while resident Canada geese nest and reside in the United States.
<urn:uuid:76f8cd6b-2bd3-4b6c-918f-0f488d21beaa>
CC-MAIN-2023-14
https://www.idausa.org/campaign/wild-animals-and-habitats/canada-geese/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945030.59/warc/CC-MAIN-20230323065609-20230323095609-00567.warc.gz
en
0.952952
473
3.578125
4
Modified Dark Matter 11 September 2014 Dark matter is an aspect of the universe we still don’t fully understand. We have lots of evidence pointing to its existence (as I outlined in a series of posts a while back), and the best evidence we have points toward a specific type of matter known as cold dark matter (CDM). One big downside is that we have yet to find any direct detection of dark matter particles. In fact, many of the likely candidates for dark matter have been all but eliminated. Another is that cold dark matter doesn’t agree with our observations of dwarf galaxies. Now a new paper presents a solution to the second problem that might even help with the first.1 The main problem with dwarf galaxies is that there are fewer of them around spiral galaxies than dark matter predicts. When we do dark matter computer simulations, the results always have more dwarf galaxies than we observe. This has been taken to mean that either the simulations are somehow flawed, or dark matter isn’t the complete solution we’ve thought. This new work looks at a modified version of dark matter, and how it effects these kinds of computer simulations. Normally, it is assumed that dark matter doesn’t interact with light directly at all. This means we can see its gravitational effects, but we don’t see anything such as absorption lines and the like, which we observe with regular matter. The reason for this is that dark matter makes up the majority of matter in the universe. About 90% of the mass in our own Milky Way consists of dark matter. If it interacted much with light, then we would have seen its effects on light by now. This new work proposes that dark matter does interact with light, but only very, very slightly. Now you might think that if dark matter interacts so slightly with light that we don’t see its effect, then it certainly can’t differ that much from standard dark matter, but the team showed that this very small effect can build up over time, so that modern galaxies have fewer dwarf satellites, just as we observe. You can see this in the image above. The top left image is standard dark matter model, with too many satellite dwarf galaxies. The top right is a warm dark matter model that solves the dwarf galaxy problem but doesn’t agree with other observations. The bottom left is this new, light interacting dark matter model, and the bottom right is what happens when you make the light interaction too strong and get no dwarf galaxies. So by modifying dark matter to include slight interactions with light, the predictions match dwarf galaxy observations. It should be noted that just because this modification works, that doesn’t mean it is the solution. Tweak theories are weak theories, as I’ve said before. This type of dark matter could also affect other things such as large scale structure, and this would need to be studied before we could be confident about this particular model. But the work does show that dark matter models can address some of the known problems with dark matter. Boehm, C., et al. “Using the Milky Way satellites to study interactions between cold dark matter and radiation.” Monthly Notices of the Royal Astronomical Society: Letters 445.1 (2014): L31-L35. ↩︎
<urn:uuid:65c36c19-e380-4717-a6ca-242ba2ddd35e>
CC-MAIN-2023-14
https://briankoberlein.com/blog/modified-dark-matter/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945376.29/warc/CC-MAIN-20230325222822-20230326012822-00567.warc.gz
en
0.959343
681
3.625
4
This morning, I stumbled upon a video clip of two students double counting. These students were immersed in an authentic problem – how do we read two counts? I loved hearing their two voices and watching their gestures as they navigated two counts, uninterrupted by adult conversation. This video reminded me of a question that I have been mulling over for months now: How do students construct a mathematical identity that is rooted in the context of who they are and who they want to become outside the classroom? In particular, I wonder, how does the way we teach students to construct viable arguments and critique the reasoning of others nurture or neglect their identity as a whole person? The predominant ways that I have seen students taught to engage in this math practice have been: - sentence stems like “I disagree because…”. - hand raising - orchestrated turn taking I think these structures and norms are used with the intention of giving students equal opportunity to participate and feel like their ideas were heard. But do they work? Does each student feel like the opportunity to argue for something they believe to be true has been genuinely presented to them? Does each student feel like their true voice is heard? When I think about the word “argue”, I think about passion, frustration, and joy. I also think about family and community. What does a productive argument look like in the lived experiences of each of our students? Are there sentence stems, raised hands, and orchestrated turns taken? I am not saying that we should abandon structures and norms in our classrooms. Structures and norms are intended to ensure that arguments are productive. I wonder if we need to reconsider how the structure and norms come to be. Who benefits from the structures and norms? When I watched the video of these students double counting, I think I saw passion, frustration, and joy, but I don’t want to project my thoughts and feelings onto the students. I saw back and forth conversation, ideas being exchanged, and thinking being revised, all while an adult observed. This video clip was a spring board -a push- for me to re-examine classroom norms and routines that I always used and accepted as “good practice” for all students. I am going to sit with the questions: - Where did our classroom norms and routines come from and who do they really serve? - Whose culture have I preserved when I cultivated and enacted classroom norms and routines?
<urn:uuid:93b35b4d-1a51-4777-9420-f91509ed325e>
CC-MAIN-2023-14
https://mathontheedge.com/2020/10/05/whose-math-practices/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945376.29/warc/CC-MAIN-20230325222822-20230326012822-00567.warc.gz
en
0.975091
501
3.234375
3
Ophiolites and high‐pressure (HP) metamorphic rocks are studied to test continuation of Paleozoic and early Mesozoic geological units from Japan to Primorye over the Japan Sea. The early Paleozoic ophiolites are present on both sides, and the late Paleozoic ophiolite of south‐western Japan may also have its counterpart in Primorye. The Shaiginskiy HP schist and the associated Avdakimov gneiss in Primorye, both tectonically underlying the early Paleozoic ophiolitic complex, yield a 250‐Ma phengite and hornblende K–Ar age, which is intermediate between those of the Renge (280–330 Ma) and Suo (170–220 Ma) blueschists in south‐western Japan. This age also coincides with that of the coesite‐bearing eclogites in the Sulu–Dabie suture in China and several medium‐pressure metamorphic rocks in East Asia. On the basis of these results and other geological data, the authors propose the ‘Yaeyama promontory’ model for an eastward extension of the Sulu–Dabie suture. The collision suture warps southward into the Yellow Sea and detours around Korea, turns to the north at Ishigaki Island in the Yaeyama Archipelago of Ryukyu, where it changes into a subduction zone and further continues toward south‐western Japan and Primorye. Most ophiolites from this area represent crust–mantle fragments of an island arc–back‐arc basin system, and the repeated formation of ophiolite–blueschist associations may be due to the repetition of the Mariana‐type non‐accreting subduction and Nankai‐type accreting subduction.
<urn:uuid:d0c96d16-93bd-482d-8c01-4bc26a4e5a83>
CC-MAIN-2023-14
https://tatsukix.netlify.app/publication/2003_ishiwatari/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945376.29/warc/CC-MAIN-20230325222822-20230326012822-00567.warc.gz
en
0.90664
389
2.71875
3
Prof. Magdy Hussein October 27, 2014 Conflict Resolution in a Virtual Environment The human mind is a unique filter and for this reason, every one of us thinks and perceives situations in our own way. One crisis that might be diminutive in nature for one person can be colossal in nature to another person. This dichotomy gives rise to differences of opinions, and different opinions can lead to arguments. If arguments are weighed purposefully and fairly in conflict, then resolutions can lead to a meaningful outcome. However, if arguments are just for the sake of arguments, this might lead to an undesired situation leading to conflicts among people. Conflicts among people, especially when you are working in a team, can become very problematic in an organization. Unaddressed Conflict results in negative mental and physiological states in working teams by lowering their performance levels and by affecting overall organizational goals. According to research, “conflict may be defined as a circumstance in which one party negatively affects or seeks to negatively affect another party” (Baack, 2012, p. 7.3). In this paper, I will describe a conflict that occurred within a virtual team. A virtual team is a group of individuals who work via the web using information technology in an organizational setting. In addition, I will identify and describe the source and level of the conflict with the virtual team and support it with evidence. Furthermore, I will describe the steps taken to resolve the conflict and, if it is an ongoing conflict, propose steps to resolve the conflict. Lastly, I will provide a minimum of three conflict outcomes that could reasonably occur because of the conflict resolution, and support my reasoning for each possible outcome. IBM, where I work, is a large corporation with many departments. In my department, I work as a client representative. My duties consist of providing References: Baack, D. (2012). Organizational behavior. San Diego, CA: Bridgepoint Education, IncThis text is a Constellation™ course digital materials (CDM) title Chun, J. S., & Choi, J. (2014).Members’ needs, intragroup conflict, and group performance.Journal Of Applied Psychology, 99(3), 437-450. doi:10.1037/a0036363, Retrieved from: http://eds.a.ebscohost.com.proxy-library.ashford.edu Dickson, P. H. (1996). ROLE CONFLICT, TASK CONFLICT, AND LEADER RESPONSE: AN EXPLORATION OF A ROLE-TASK FIT MODEL.Academy Of Management Best Papers Proceedings, 86-90. doi:10.5465/AMBPP.1996.4978587, Retrieved from: http://eds.a.ebscohost.com.proxy-library.ashford.eduHarvard Business Publishing, (2012), Retrieved from:.hbr.org/2012/11/how-to-manage-conflict-in-virt/ Medpartner, (2013). Retrieved from: http://www.medpartnershim.com/2013/06/managing-conflict-in-a-virtualremote-working-environment/ Together: Five Steps to Conflict Resolution. (2001). Association Management, (9). Retrieved from: http://eds.a.ebscohost.com.proxy-library.ashford.ed Wakefield, R. L., Leidner, D. E., & Garrison, G. (2008). A Model of Conflict, Leadership, and Performance in Virtual Teams.Information Systems Research, 19(4), 434-455. Retrieved from: http://eds.a.ebscohost.com.proxy-library.ashford.eduWorkplace conflict erodes productivity. (2014). New Zealand Management, 61(3), 8. Retrieved from: http://eds.a.ebscohost.com.proxy-library.ashford.edu Conflict management and effectiveness in virtual teams Pazos, Pilar. Team Performance Management18.7/8 (2012): 401-417.
<urn:uuid:1feafff5-209e-41db-ac66-954f0dac0bbf>
CC-MAIN-2023-14
https://www.studymode.com/essays/Conflict-Resolution-62113111.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948609.41/warc/CC-MAIN-20230327060940-20230327090940-00567.warc.gz
en
0.839101
863
3.015625
3
Use augmented reality to show a new sustainable product or initiative in context. This is one of a series of posts on the Sustainability Cross Curriculum Project. Other posts in the series include: Sustainability Cross Curriculum Project (CCP) - Intro Sustainability Cross Curriculum Project - Research Techniques Sustainability Cross Curriculum Project - Evaluation Sustainability Cross Curriculum Project - Use augmented reality Sustainability Cross Curriculum Project - Create a multi-level game Sustainability Cross Curriculum Project - Create a sustainability video Sustainability Cross Curriculum Project - Build a sustainability app Sustainability Cross Curriculum Project - Design a sustainability city or town Sustainability Cross Curriculum Project - Overview For a more student-friendly layout visit the Sustainability Cross Curriculum Project website. Review existing sustainable products or initiatives Research and review sustainable products and initiatives that already exist. How have the products or strategies improved sustainability? Are these products or initiatives effective? Do they need improvement? What lessons could you learn from these products or initiatives? What are some aspects of sustainability that haven't yet been addressed? Brainstorm new products or initiatives As a group, write down all of your ideas for creating your new sustainable product or initiative. Try to be original and innovative. Include all of your ideas, even the ones that might seem silly. Brainstorming allows you to get a whole range of ideas down on paper before narrowing your ideas down to the best and most practical options. Consider the weaknesses of existing sustainable products and initiatives and try to come up with original solutions to these problems. Use the scaffold to plan your product or initiative Once you have developed your idea you can start to plan your design and how it will be augmented. What will be the purpose and design of your product or initiative? What places will you use is the "context" (keep in mind that the teachers marking your product will need to see your augmented reality working)? Consider how you will integrate information about sustainability and/or your specific topic. Use the augmented reality scaffold to help you plan your city. Create a graphic of your product or initiative Develop a visual representation of your sustainable product or initiative. You might like to use Photoshop, Fireworks or another graphics program to create the image of your product or initiative. Upload your graphic into an augmented reality program Import your graphic of your sustainable product or initiative into an augmented reality program. Set up the program so that it shows your graphic in a number of contexts (or places) where it would be found if it really existed. Augmented reality tutorial Your comment will be posted after it is approved. Leave a Reply. Deputy Principal at a Sydney high school. Coordinating author of the Geoactive text book series.
<urn:uuid:b281276c-48c7-4724-8343-cae6728467d1>
CC-MAIN-2023-14
http://www.hsieteachers.com/home/use-augmented-reality-to-show-a-new-sustainable-product-or-initiative-in-context
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948867.32/warc/CC-MAIN-20230328135732-20230328165732-00567.warc.gz
en
0.872422
638
3.640625
4
Shirley Chisholm (1924–2005), the daughter of Caribbean immigrants to the United States, planted the seeds for her historic career in politics as an educator in Brooklyn, New York, in the 1950s. After years of bridging the community and the Democratic Party with her energetic organizing, she was elected to the New York State Assembly in 1964—then the U.S. Congress in 1968, where she was the first Black woman ever to serve in that body. In 1972, with the slogan “Unbought and Unbossed” (also the title of her autobiography), she ran for president on the Democratic Party ticket; that candidacy made history too, as Chisholm was the first Black major-party presidential candidate and the first woman to run on the Democratic ticket. Chisholm didn’t just inspire Black and women voters, she also helped push feminists of all backgrounds to examine intersectionality and privilege as these concepts were taking shape in the 1970s. In a 1974 interview in the feminist magazine off our backs, Chisholm “went there,” discussing conflicts among white women and women of color in the feminist movement. So you know, when some of my white sisters complain about the fact, “Oh! My goodness, I can’t be myself. I can’t express myself. I don’t want to find myself living in the house with all these appliances. I have to go out, and find myself,” many minority women wish that they could find themselves in that position…. I think sometimes it is very difficult for white women to understand this. But Chisholm also believed in the possibilities for change within democratic institutions. I happen to believe that institutions basically are not contradictory to many, many human rights. It’s the men and women who live within these institutions or carry out the laws, or implement the laws[.] Read mae dell’s full interview with Shirley Chisholm at the link below.
<urn:uuid:7b0b022a-690b-453f-980c-9b4b88939a17>
CC-MAIN-2023-14
https://daily.jstor.org/shirley-chisholm-sisterhood-is-complicated/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948867.32/warc/CC-MAIN-20230328135732-20230328165732-00567.warc.gz
en
0.967444
421
2.890625
3
Despite the Realist movement’s attempt to portray art in a more realistic “true” form from the Romantic period’s often exaggerated emotional depiction of art. The Realist movement may have depicted art from a more true to life point of view than Romantic artist’s, but in fact was heavily influenced by the artistic motives and styles of the Romantic period.The art period known as Romanticism began in the late 18th early 19th centuries people were tired with the norms of society. Artists of the era were preceded by the Renaissance thinkers and artists who had a very empirical and analytical approach (Galitz, 2004). Romanticism was a revolt against the straightforward heavily analyzed thinking of the Renaissance and the ideas that human actions are guides by inevitable laws of nature. Romantic artist encouraged imagination, exploration of individual thinking, and all forms of inspiration. Artists were not bound by any one particular style being encouraged to explore feeling and surrounding inspirations, often portraying a glorification of nature while incorporating a chivalric and nationalist feel (Galitz, 2004). Romantics create a clear good versus evil portrayal by painting with a clear vision of what is evil and what is good.During the French Revolution Romantics showed their strong resistance to the rational thinking of the enlightened period. Using nostalgia and exotic influences to glorify heroes, romantics were able use exaggerated depictions of nature to portray the hero as overcoming insurmountable odds against not only the “enemy” but also Mother Nature simultaneously. Romantics were able to expressed emotion with different forms of exaggeration but still kept a very realistic approach so viewers we able view themselves in the art and relate to it. Realism which began in the 1850’s and continued into the 1900’s attempted to use art to depict life as it really was (Fino…
<urn:uuid:70b43c5f-ea07-4bd0-8b03-cf0bb30f3ec2>
CC-MAIN-2023-14
https://paperap.com/paper-on-realism-and-romanticism/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948867.32/warc/CC-MAIN-20230328135732-20230328165732-00567.warc.gz
en
0.972796
371
4.21875
4
Modernity and Enlightenment EUR1100 European Studies Catherine Wyatt 19453175 Natalie Doyle Modernity and Enlightenment /4/04 The Persian Letters (1721), a fictional piece by Charles Montesquieu, is representative of 'the Enlightenment,' both supporting and showing conflict with its ideas. The initial perception of European people, in particular the French, is of a busy people with goals and ambition whose focus is progress; in this way they are able to gain knowledge - a core foundation to Enlightenment. One particular section of the Persian Letters states that the revolt against the authorities was lead by women, who through reason, saw the inequity of their treatment and formed a voice. In Montesquieu's story, their decision to change tradition was part of a powerful movement towards this new found 'light'. The pressure for people to conform was greatly impressed by the King. With the Enlightenment movement, came recognition of this and a rebellion of what Montesquieu calls, the King's "invisible enemies" formed. These were people trying to break the mold and think for themselves, using reason and searching for answers outside what they had been told to believe. However the ignorant authority described in the letters is opposing to this new movement. The King colluded with the Pope and Gaelic church over ways to retain control and openly practice the way of life that the new ideology Siddhartha as a Hero's Journey. Siddhartha as a Hero's Journey Herman Hesse's book, Siddhartha lends itself perfectly to a hero's journey. His journey is long, painful, and dangerous, but Siddhartha comes out better because of it. The book was written by Hesse in 1922 and based on a character set in the 500 BCs. It is odd that the book applies to modern India just as it applied to the India of 2 millennium ago (when Siddhartha supposedly lived). This, coupled with a captivating story line makes this a fun book to read, as well as an interesting point of view into early Indian culture. Siddhartha searches for "why" we are on the Earth, and finally finds his answer after many long years. The book begins with Siddhartha as a young boy living with his Brahmin parents in a moderately wealthy city in India. His father is a rich and powerful Brahmin priest, and Siddhartha is expected to follow in his footsteps as a Brahmin. He learns the ways of his people quickly, and at a tender age, his is participating in conversations with his elders. This is the time when Siddhartha starts to here things preached to him. He may have already decided that he must find his own way of doing things instead of falling under the spell of his teachers and elders. He has a thirst for knowledge-- the author puts it well by saying that he is a "vessel that in not full". He discovers that the elders and teachers have only placed a The day the Buddha left. One day, Siddhartha Gautama awoke Minister Channa and ordered him to get his horse Kandaka saddled. Then he went to the son and wife's rooms to see them before he went to the forest. He saw that his wife (Yasodara) and his son by her side were both sleeping. Siddhartha wanted to kiss his son for the last time but he realized that his wife would wake up and his journey to finding truth would be disturbed. He then left the castle and set off with his Horse and his friend Channa. He then got to the river Anoma. Once he crossed the river, Siddhartha took his hair-knot by one hand, and with a sword in the other, cut it off. He then threw up the hair-knot into the sky and it is said that it stayed in the sky. Next Siddhartha took an alms-bowl and yellow robes. And gave Channa his very expensive clothes and ordered him to return to the castle. Channa took the Horse Kandaka and the clothes to the castle. Half way through the journey the Horse Kandaka missed his master Siddhartha and died. So Channa continued the journey all by his own to the Castle. When the Sakya Tribe knew about Siddhartha they all cried out in tears. After leaving Channa, Siddhartha stayed in the mango grove called Anuppiya near the Anoma river for seven days and then he went to Rajagaha (a town). When he went into the town for food, the citizens looked admiringly at the splendid and graceful appearance of Accounts of the life of the Buddha are just fiction Historically we know very little about the Buddha. Even to this very day, debates still occur as to the dates of his life and death, Robert Hicks 09/09/05 Homework 3 (AO2) Accounts of the life of the Buddha are just fiction Historically we know very little about the Buddha. Even to this very day, debates still occur as to the dates of his life and death, although most scholars tend to agree that the Buddha lived for around eighty years. There is archaeological evidence such as, monuments, inscriptions and there are the Sanskrits; this leads me to believe that there is a very distinct possibility of his existence. Most of the accounts of his life are very similar and only alter in certain aspects of the tale and not in the main structure of the story. There are many many accounts from many parts of the world; I would have thought that there would have been a lot more discrepancies between the differing versions, considering how far apart they may have originated from. Like all accounts of history, we depend on information being passed down, mainly through written evidence and tales of myth and legend. The problem with this is that legends are altered through time, key aspects and facts are changed slightly or sometimes significantly altered (Chinese whisper syndrome). The myths probably do more damage to the credibility, some of the reports of Siddhattha being born at six months old or his mother becoming pregnant by a six tusked elephant are very hard to stomach. Although there is Buddhism In China Shannon Scott Jessica Johnson Ms. Reagan English 2H 29 August 2002 With Peace Comes Life, With Life Comes Peace "Religion is as healthy and normal as life itself" (Dole 34). The world today is overflowing with beliefs and religions. Asia, one of the most influential continents in the world, is a place filled with a society rich in culture and religion. The most prominent religion that shapes Asia is Buddhism, a religion solely based on a necessity for peace, nirvana. In China, Buddhism is much more than trite; it is the thriving, chief religion. Within the faith, there is a deep history and a well-rooted integration into the Chinese culture, great beliefs, a vast geography, and many considerable contributions. The immense history of Buddhism is a profound legacy that enriched China spiritually and relates well to the rest of the Chinese culture. The scripture was first introduced into China around A.D. 64 during the Han Dynasty. Unfortunately, the religion was not very popular among the Chinese community (Buddhism In China). The fact that Buddhism was hard to understand and that it was foreign, led to the teachings' unpopularity. After the fall of the Han Dynasty, the Tang Dynasty brought on more hope to the religion. There were three Chinese Buddhists who started to establish different types of Buddhism. A man named Hui Yuan started the pure Land Buddhists; he Religion without science is blind "Religion without science is blind, science without religion is lame" Nowadays, people believe that science and religion don't have anything in common at all. Science permits you to see what is proven day to day. Religion is based upon belief, belief in things that cannot be seen, but experienced. This belief is only accepted by faith and it spreads out because someone says it's true. Throughout many years science and religion were thought to be two rival forms of knowledge. Time has passed and people are starting to realize that, the statement mentioned before may not be true, that science and religion may be more united than we had thought previously. In fact, we can describe them as different ways of looking at the world that complement each other instead of contradicting each other. This idea is recent, since we all know that science and religion have been in "war" during a long time. In the following points I am going to explain briefly two examples of conflict between science and religion: * Galileo Galilei (1564-1642) was an Italian astronomer. He studied the planets and stars. One of his most important discoveries was that he found out that our earth orbited the sun. This was good news until people swapped the idea that our earth was the center of the universe, something that they were taught until then. The Catholic Church reacted since they taught what the Bible Buddhism - the Folk traditions Buddhism The Folk Traditions. The Buddha was brought up in the rich, privileged, ruling class. People who have studied Buddha's life presume that he followed the Classical Vedic or early Hindu education. The Religious background of the Buddha can be divided in to three groups. The Vedic religion of the Aryan culture, the Shramana movement of non-conformist religious teachers. Lastly there is the Ancient folk beliefs, which we will go in to more detail about. The Ancient folk Tradition in the sixth century came before the Vedic age, it was not influenced by the religion of the Brahmins. The ordinary people, Kshatriyas who followed the folk tradition had their own beliefs and practices, many of which were very ancient and pre-Aryan. These included beliefs about spirits, devils, omens, spells and divination. Some of these teachings were noted in the scriptures 'Upanishads'. It is also believed that the Ordinary people focused on the god Brahma, not as one of many gods but as the creator god. Groups of Kshatriyas decided to set out alone into the mountains and turned their backs against the world. In the Mountains they exercised yoga and mediation which lead them to experience different stages of spirituality which then became known as the 'Brahman' which would prove they had experienced the Absolute Reality. The Buddha was critical of many folk ideas, and beliefs. Although Book report: Siddhartha from Herman Hesse Book report: Siddhartha from Herman Hesse Resume Siddhartha is the son of a respected Brahmin. Handsome, intelligent, and well educated, everybody thought he was destined to become like his father, a talented priest. Yet Siddhartha was not happy of his fate. Tormented by doubt with regard to the practice of his father's religion, he finally decided to leave everything behind and to become a Samana. Followed by his friend Govinda, Siddhartha learned how to practice self-denial. Voluntarily retired from civilization, Samanas devoted their life to kill the sensuous self through severe bodily restriction. The killing of desire would lead to a state of expurgated self through which the divine soul would be reached. Yet after meditation, Siddhartha inevitably returned to the torment of the human life cycle. Distrustful of the Samanas, he and Govinda left the community for the Buddha whose rumor of saintliness was spreading around. After meeting the Buddha, Govinda decided to become one of his disciples, while Siddhartha realized that no more teaching could bring him the knowledge for salvation but his own experience through which self-enlightenment would occur. Thus Siddhartha left to meet whom he felt to be Siddhartha. Convinced of having lost his time trying to flee from himself, he began to open his sense to the diversity of the world and reflected that meaning and reality were Compare the Buddhist understandings of life after death with on other view Compare the Buddhist understandings of life after death with on other view We are all aware that, at least in a physical sense, we will one day inevitably cease to exist, yet this universally known fact has produced many different conclusions about what may happen after and Buddhist thought differs extremely from that of Christianity. The issue is inexorably linked to eastern and western views of causation and what constitutes personal identity as these play a major role in influencing beliefs about the afterlife. Indeed to even talk of 'life after death' seems linguistically problematic; we are trying to approach two contradictory phrases 'life' and 'death' and to reconcile them. The way in which to do this largely depends on whether one's personal view is that of a cyclical universe or a linear one, for example it may seem easier from a Buddhist viewpoint to literally talk of 'life after death' as the belief in rebirth means that to a Buddhist there is literally a life, another living existence, after one's earthly body has died. From a Christian perspective however the phrase has an entirely different meaning, through resurrection and the intervention of God one continues to the afterlife although in a very different way than reincarnation. The most obvious point that should be made in reference to Buddhist understanding of life after death are the doctrines of karma, Outline the inward journey and the outward journey experienced by Buddha, Nicky Cruz and Lord Fenner Brockway - Explain what spirituality means to you after studying the 3 case studies. Outline the inward journey and the outward journey experienced by Buddha, Nicky Cruz and Lord Fenner Brockway. Explain what spirituality means to you after studying the 3 case studies. To me, spirituality is being in harmony with yourself and others around you. It's having the feeling that there are other people to care for and that we (as individuals) are small creatures in a big world. I ask myself 'Is that it? What is there more to life?' In this essay I am going cover the various issues that appear in the paths of the Buddha, Nicky Cruz and Lord Fenner Brockway when they experienced their inward and outward journeys. Prince Sidhartha Gautama was kept away from the outside world by his father so he never saw any of the bad things that happen in life. The one time that he ventured out of the grounds he saw death, old age and illness he was confused and puzzled. Having been brought up in the lap of luxury he had never experienced these things before. He asked himself, 'Why are there these things? What causes this?' To help answer his questions he tried many different things. He first tried the Ascetic lifestyle, which was a very simple life, but after seven years of no luck he tried another method. He sat under a tree to meditate. Suddenly it came to him; it was that everything in life changes even if we don't want it to. You have to accept these things and in result of
<urn:uuid:8e57820e-c2a8-4b4a-b5fb-275e4deb64d9>
CC-MAIN-2023-14
https://www.markedbyteachers.com/as-and-a-level/religious-studies-and-philosophy/buddhism
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948867.32/warc/CC-MAIN-20230328135732-20230328165732-00567.warc.gz
en
0.982641
3,034
3.375
3
Wolf’s bane (also known as monkshood or aconite) can refer to many different species, but in particular those in the genus Aconitum. These perennial plants in the Buttercup family (Ranunculaceae) are native to the mountains across the Northern Hemisphere. Why is it called women’s bane? Early 17th century; earliest use found in Philemon Holland (1552–1637), translator. After classical Latin thēlyphonon or its etymon Hellenistic Greek θηλυϕόνον, the name of a poisonous plant, lit. ‘a thing deadly to females‘. What is monkshood Harry Potter? Aconite (also known as monkshood or wolfsbane) is a plant with magical proprieties. Once widespread, this plant is now only found in wild places. Its flowers are useful in potion-making, but its leaves are very toxic. Aconite is most commonly known as an ingredient of Wolfsbane Potion. What is the difference between monkshood and wolfsbane Harry Potter? Snape also asks Harry what the difference is between monkshood and wolfsbane. It is perhaps a more poignant sentence when looked at through the language of flowers. Monkshood is associated with ‘chivalry’ while wolfsbane can mean ‘misanthropy‘ or a dislike of others. What is another name for aconite? Aconitum (/ˌækəˈnaɪtəm/), also known as aconite, monkshood, wolf’s-bane, leopard’s bane, mousebane, women’s bane, devil’s helmet, queen of poisons, or blue rocket, is a genus of over 250 species of flowering plants belonging to the family Ranunculaceae. What happens if you touch wolfsbane? “The roots are where the highest level of poison is found, although it is still found in the flower,” he said. “If there were cuts on his hand, it would enter his bloodstream and affect his heart very quickly.” In severe cases the poisoning causes heart arrhythmia, paralysis of the heart and respiratory problems. Is aconite detectable in an autopsy? Aconitine was detected in all analyzed samples (blood, urine, gastric content and kidney) and quantified in femoral blood with 86.2 μg/L (case 1) and 2.3 μg/L (case 2), respectively. In both forensic cases, the scenery suggested a suicidal ingestion of Aconitum plant material. What happens if you eat wolfsbane? One of the most toxic plants that can be found in the UK, the toxins in Wolfsbane can cause a slowing of heart rate which could be fatal, and even eating a very small amount can lead to an upset stomach. Its poison can also act through contact with the skin, particularly through open wounds. What are the ingredients for wolfsbane? The main ingredient was wolfsbane (also referred to as aconite or monkshood). As such, this Potion was very dangerous when incorrectly concocted, since Aconite was a very poisonous plant. Which plant is not poisonous? - Christmas Cactus (or Easter or Thanksgiving Cactus) Holiday cactuses are popular houseplants in Iowa, with colorful and unusual shaped blooms. … - Boston Fern (also called Sword Fern) … - African Violet. … - Peperomia. … - Baby’s Tears. … - Prayer Plant. … - Parlor Palm. … - Spider Plants. Where is wolfsbane in real life? Aconitum napellus can be found in mountains to temperate regions throughout western and central Europe. This plant has leaves that are rounded and it is palmately divided into 5-7 well lobed segments. What is a group of Bowtruckles called? A group of Bowtruckles was called a branch. … In order to take leaves or wood from a Bowtruckle’s tree one would have to offer it wood lice or fairy eggs as a distraction. Which spell clears your airway? Anapneo was the incantation of a healing spell that cleared the target’s airway by vanishing whatever the target was choking on. Does Wolfsbane have a smell? Wolfsbane is my most favorite scent ever. It starts off very woodsy–like a damp forest. It lightens up a bit, and the herbs come out more. It remains a dark, wet scent. How do I get aconite? Aconite products are widely available online and in brick-and-mortar stores. You can purchase aconite root that’s been dried and ground as a powder. You can also find it in pellets, tablets, capsules, and liquid formulas. Many aconite products provide dosage instructions for adults and children. What does aconite taste like? The taste is bitterish and acrid, and gives the well-known characteristic tingling sensation of aconite. They have but little, if any, odor. Can you grow wolfsbane? Wolfsbane prefers partly shady conditions, but can be grown in full sunlight as long as it is kept moist. The soil should be cool and moist with a pH of 5 to 6. Aconitum plants require between 5 days and 250 days to germinate, it is best to start seeds off in a flat against a north facing wall before transplanting. What part of monkshood is toxic? All parts of monkshood are poisonous, especially the roots and seeds, and the flowers if eaten. In the past, wolves and criminals were poisoned with an extract from the European wolfsbane Acontium lycoctonum. What is the source of aconite? Aconite is a crude extract of dried leaves and roots from various species of Aconitum plants (or monkshood) that contain aconitine and other diterpenoid ester alkaloids (aconitine, mesaconitine, jesaconitine, hypaconitine). Aconite was a medicinal drug as well as a homicidal agent and arrow poison in Asia. What is the synonym of ephedra? Common names in English include joint-pine, jointfir, Mormon-tea or Brigham tea. The Chinese name for Ephedra species is mahuang (simplified Chinese: 麻黄; traditional Chinese: 麻黃; pinyin: máhuáng; Wade–Giles: ma-huang; lit.
<urn:uuid:00bd400b-d017-44f0-83d9-7b59a0071307>
CC-MAIN-2023-14
https://www.newsshare.in/what-is-not-an-alternate-name-for-wolfsbane-137845.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948867.32/warc/CC-MAIN-20230328135732-20230328165732-00567.warc.gz
en
0.938947
1,446
3.15625
3
Larval Glossosoma intermedium are dominant benthic grazers that often deplete their food resources (periphyton). We observed G. Intermedium grazing periphyton from conspecific cases, a possible result of limited resources on stream cobbles, and we hypothesized that case grazing increases when periphyton resources become scarce. This hypothesis was tested by monitoring frequency of case grazing among G. Intermedium in 3 streams in southwest Wisconsin for 1 y, and also in the laboratory using time-lapse video of larvae on tiles with and without periphyton. In situ periphyton biomass was higher on larval cases than on the stream cobbles to which larvae had access, irrespective of density, age, or size structure of G. Intermedium. Case grazing was positively related to larval densities at 2 of the 3 streams. In laboratory experiments, larval encounter rates were similar in both tile treatments, although frequency and duration of case grazing increased on tiles lacking periphyton. These results suggest that periphyton on G. Intermedium cases can provide an important resource patch for this species, especially when periphyton biomass is low in the ambient environment. |Title||Conspecific cases as alternative grazing surfaces for larval Glossosoma intermedium (Trichoptera:Glossosomatidae)| |Authors||Jennifer C. Cavanaugh, Roger J. Haro, Shane N. Jones| |Publication Subtype||Journal Article| |Series Title||Journal of the North American Benthological Society| |Record Source||USGS Publications Warehouse| |USGS Organization||Upper Midwest Environmental Sciences Center|
<urn:uuid:f212498e-2283-41b3-8007-dd4d9d68cbbb>
CC-MAIN-2023-14
https://www.usgs.gov/publications/conspecific-cases-alternative-grazing-surfaces-larval-glossosoma-intermedium
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948867.32/warc/CC-MAIN-20230328135732-20230328165732-00567.warc.gz
en
0.859172
413
2.703125
3
filename: design memo #4: NBPTS This working paper is about the National Board for Professional Teaching Standards (NBPTS--hereafter "the Board") and its implications for our teacher education programs. The web site home page for the Board is http://www.nbpts.org/. You will need Adobe Acrobat to read some of the forms and tables. In the following sections, I include a series of quotes from the Board's web site. They are set off in a different font, and their web address is cited. At the end of this working paper, I mention possible implications of the Board's work for teacher education program design. The purpose of the Board is to (1) establish high standards that define what a master teacher should know and be able to do, (2) operate a system to assess and certify teachers who meet these standards, and (3) support reforms that improve student learning. (see <nbpts.org/about/index.html>) The standards are built around five propositions (www.nbpts.org/standards/five-props.html): 1. Teachers are committed to students and their learning. 2. Teachers know the subjects they teach and how to teach those subjects to students. 3. Teachers are responsible for managing and monitoring student learning. 4. Teachers think systematically about their practice and learn from experience. 5. Teachers are members of learning communities. A total of 16 Oregon teachers have earned a Board certificate (www.nbpts.org/state_by_state.pdf) or click on "State by State Listing" on the home page.) The Board has created, or is in the process of creating, a set of certificates. Each certificate has a developmental level and subject area associated with it. For example, a teacher can earn a math certificate at the early adolescence level (ages 11-15). The full list of certificate options can be found at www.nbpts.org/standards/summaries.html. Each certificate has a set of standards associate with it. For example, the language-arts certificate at the adolescence/young adulthood level has the following fifteen standards associated with it (see www.nbpts.org/standards/aya-ela.html). Standards Overview: ADOLESCENCE AND YOUNG ADULTHOOD/ENGLISH LANGUAGE ARTS The requirements for the Adolescence and Young Adulthood/English Language Arts certificate are organized into the following fifteen standards. These standards have been ordered to facilitate understanding, not to assign priorities. They are each important facets of the art and science of teaching English language arts to adolescents and young adults. They regularly occur in conjunction with one another given the seamless quality of exemplary practice. Preparing the Way for Productive Student Learning I. Knowledge of Students Accomplished AYA/ELA teachers systematically acquire a sense of their students as individual language learners. II. Knowledge of English Language Arts Accomplished AYA/ELA teachers know their field and draw upon this knowledge to set attainable and worthwhile learning goals for Accomplished AYA/ELA teachers actively involve each of their students in language learning. Accomplished AYA/ELA teachers demonstrate through their practices toward all students their commitment to the principles of equity, strength through diversity, and fairness. V. Learning Environment Accomplished AYA/ELA teachers create an inclusive, caring and challenging classroom environment in which students actively learn. VI. Instructional Resources Accomplished AYA/ELA teachers select, adapt and create curricular resources that support active student exploration of language processes and of a wide range of literature. Advancing Student Learning in the Classroom VII. Integrated Instruction Accomplished AYA/ELA teachers frequently integrate reading, writing, speaking and listening opportunities in English studies and across the other disciplines. Accomplished AYA/ELA teachers engage their students in reading and responding to literature, as well as interpreting and thinking deeply about literature and other sources. Accomplished AYA/ELA teachers immerse their students in the art of writing for a variety of purposes. Accomplished AYA/ELA teachers foster thoughtful classroom discourse that provides opportunities for students to listen and speak in many ways and for many purposes. XI. Language Study Accomplished AYA/ELA teachers strengthen student sensitivity to and proficiency in the appropriate uses of language. Accomplished AYA/ELA teachers use a range of formal and informal assessment methods to monitor student progress, encourage student self-assessment, plan instruction and report to various audiences. Accomplished AYA/ELA teachers constantly analyze and strengthen the effectiveness and quality of their teaching. XIV. Professional Community Accomplished AYA/ELA teachers contribute to the improvement of instructional programs, advancement of knowledge, and practice of colleagues in the field. XV. Family Outreach Accomplished AYA/ELA teachers work with families to serve the best interests of their children. The certification process is described by the Board as follows (http://dynsa.tpcweb.com/nisinq/faq/geninfo.htm#Question 1): Assessments are based on the NBPTS Standards in each of the certificate areas. All NBPTS assessments consist of two major parts, the portfolio entries and the assessment center exercises. While the specific directions to candidates vary from one assessment to another, the major parts of the assessments are stable over all certificate areas currently offered. Candidates assemble a portfolio according to specifications given in the directions and materials sent to them. The portfolio consists of several different entries, each of which asks for direct evidence of some aspect of the teacher's work and an analytical commentary on that evidence. There are four different classroom-based entries, two of which ask candidates to videotape classroom interactions, and two of which ask candidates to collect student work of particular kinds. In all four classroom-based entries, candidates are required to write a detailed analysis of the teaching reflected in the videotape or student work. In addition to completing the classroom-based entries, candidates are required to document their work outside the classroom with families and the larger community and with colleagues and the profession. In these entries, which emphasize the quality of the contributions rather than the quantity, candidates are asked to show evidence of their accomplishments and then comment on the impact and importance of those accomplishments. The assessment center exercises For certificates 1-17, the assessment center portion of the process consists of a full day of assessment exercises that are focused on pedagogical content knowledge. Assessment center exercises ask candidates to respond to specific prompts, some of which may be based on stimulus materials that are sent out to candidates well in advance of the assessment center date. The exercises may be simulations of situations to which teachers must respond or explorations of particular questions on pedagogical content topics and issues. The following is additional information about portfolios ( see www.nbpts.org/seeking/portfolio.html). Portfolio requirements vary from assessment to assessment, but they are all based on the National Board standards for that particular certificate area. Carefully reading and understanding the standards is a crucial first step for candidates. The Guide to National Board Certification -- the application package for National Board Certification -- contains suggestions on how to study and analyze the standards in preparation for the assessment. Click here to request for an application package. Each candidate receives detailed instructions and materials on how to put together his or her portfolio, using current classes and students to provide evidence of accomplished teaching practice. The goal of all these exercises is to document that teachers meet National Board standards. The following example of a portfolio exercise (for the early childhood/generalist certificate) can be found at www.nbpts.org/seeking/sample.html. The Portfolio: Early Childhood/Generalist The portfolio of the Early Childhood/Generalist assessment gives teachers the opportunity to present a sample of their actual classroom practice over a specified time period. The portfolio consists of five entries: Introduction to Your Classroom Community -- Teachers are asked to show how they structure their time, establish rules and routines and organize space and materials in ways that promote children's social development, mutual respect and emerging independence. Teachers submit a written commentary and an accompanying videotape that highlights their interaction with children. Reflecting on a Teaching and Learning Sequence -- Teachers submit a written commentary and supporting artifacts which show how they nurture children's growth and learning as they explore an extended theme or topic drawn from at least two content areas -- social studies and the arts. Click here for specific examples of this entry. Engaging Children in Science Learning -- Teachers are asked to feature a learning experience that engages children in the investigation of a science concept. Central to teachers' written responses is a detailed examination of a learning experience they videotape. They are also asked to describe how this learning experience is embedded within an ongoing series of activities designed to promote children's understanding of science concepts and processes. Teachers submit a videotape and a written commentary. Examining a Child's Literacy Development -- Teachers are asked to present the ways in which they foster literacy development in their classroom. They are also asked to analyze selected work samples from one child, and discuss the steps they would take to support the featured child's literacy development. Teachers submit a written commentary and the work samples from the selected child. Documented Accomplishments -- Candidates document their work outside the classroom, with families and in the profession. They submit descriptions and documentation of those activities and accomplishments that illustrate their commitments to families and communities of their students and their contributions to the teaching profession. In addition, candidates compose two brief interpretative summaries of their accomplishments, one for accomplishments with families and the community and the other for accomplishments in the profession. The following example of an assessment-center exercise (for the certificate for mathematics at the early-adolescence level) can be found at www.nbpts.org/seeking/ov-eam.htm. The EA/Mathematics assessment center exercises examine content knowledge and pedagogical content knowledge specified in the NBPTS standards. Candidates will be asked to demonstrate how they develop student understanding using manipulatives and technology. There are four written exercises: * Content Knowledge &emdash; Teachers' content knowledge is assessed through a series of prompts across 6 content strands and the mathematical thinking processes including problem solving, mathematical thinking and reasoning, making connections, and flexibility with different representations. Emphasis will be on number sense (patterns) and algebra. Many prompts will cross strands. Analysis of Student Work &emdash; Using student artifacts from an instructional strand involving number/operation sense and algebra/functions, teachers will be asked a content knowledge question that focuses on this content strand(s) to be followed by pedagogical content knowledge questions that require teachers to demonstrate their ability to identify individual and group misconceptions from student work, design instruction to fix misconceptions, and plan to deepen/extend student understanding of the topic under study. Using Manipulatives to Develop Understanding &emdash; Teachers will be required to respond to a content knowledge prompt within the geometry/measurement content strand. They will be given a description of a class and an instructional goal and be required to design instruction using manipulative(s) that will develop student understanding. Teachers will provide instructional design that will extend understanding of the same or related topic. Using Technology to Develop Understanding &emdash; Teachers will be asked to respond to a content knowledge prompt within the content strand of statistics and data analysis. Given a description of a class and an instructional goal, teachers will be asked to design instruction using technology to develop student understanding. Teachers will provide instructional design that will extend understanding of the same or related topic. Teachers are given 90 minutes to complete each of the exercises. Four scores are reported, one for each of the exercises. The following are several implications of the Board's work for teacher education program design: 1. The Board's lists of standards are consistent with, but more detailed than, TSPC's standards. We might consider taking the Board's lists as the foundation of our teacher education programs, and then crosswalk them to TSPC's standards and our program curriculum. 2. The Board's assessments are consistent with a view of teaching-as-performance and the theory of action proposed by Argyris and Schon. The assessments emphasize teachers' ability to engage in professional practice rather than their knowledge of basic theory and research. This is not to say that theory or research is irrelevant to the assessments. Rather, teachers' knowledge of theory and research is assessed to the extent that it informs analysis of and reflection on professional practice. 3. The Board's assessments can be used to guide the design of our instructional delivery system. For example: It seems to me that our current programs are not well-aligned with the views of teacher performance and teacher evaluation espoused by the Board.
<urn:uuid:3666909b-b327-46ac-afb1-5514ed60c3fb>
CC-MAIN-2023-14
https://darkwing.uoregon.edu/~mgall/nbpts_memo%231.htm
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949035.66/warc/CC-MAIN-20230329213541-20230330003541-00567.warc.gz
en
0.937388
2,760
2.71875
3
Corporate Social Responsibility in International Marketing The term corporate social responsibility (CSR) first appeared in the late 1960s in reaction to the global challenges, such as climate change, financial crises, multiplying trade and investments, that started to evolve in the international sphere. Companies today are increasingly recognizing the responsibility of international business to society, according to a June 26, 2020 article in Business News Daily. Companies better understand that along with gaining economic profit they must take responsibility and incorporate actions into their business models to meet customer expectations of environmental stewardship. Many corporate leaders have spearheaded efforts to solve local or even global problems and improve social well-being. Responsibility of International Business An international business by definition is a company that transacts on the global stage. Corporate social responsibility is self-regulation by a global company with the objective of embracing responsibility for the company's actions and creating a positive impact through its activities on its customers, employees, communities and the environment. A transnational company may build into its mission, strategy and everyday operations elements that serve to promote specific goals, for example, using recycled paper or organic hand soap in the offices to help save the environment. Benefits for the Company Although direct effects haven't been proved and much criticism has risen around CSR, companies identify some obvious benefits. Implementing the values and goals of CSR improve the judgment and reputation of the business among customers. In a strong, competitive market it also makes the business stand out from its rivals. CSR may also prompt current and potential employees to commit themselves to the company and promote its values in their private lives. Social Issues and Fair Trade The Body Shop is a frequently cited example of establishing CSR early in an exceptional way. The natural-cosmetics company promotes social and environmental issues. It implemented a shared campaign with Greenpeace to save the whales; a campaign against overly skinny models to avoid perpetuating bulimia and anorexia; and an initiative called Community Fair Trade to help people sell their products in developing countries. It also regularly sponsors local charity and community events. Patagonia has been making popular, fashionable and functional outerwear from recycled plastic bottles since 1993. Recycling reduces wasted in landfills and helps protect the environment by reducing greenhouse gas emissions. Patagonia's also donates 1 percent of sales to environmental protection and has partnered with other socially responsible business committed to doing the same.
<urn:uuid:05b302ff-4e27-47df-a6f6-3bb8d45dcad9>
CC-MAIN-2023-14
https://smallbusiness.chron.com/corporate-social-responsibility-international-marketing-55963.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949573.84/warc/CC-MAIN-20230331051439-20230331081439-00567.warc.gz
en
0.959011
494
2.84375
3
Poverty has been rapidly decreasing over the last three decades; still, more than 1 billion people worldwide live in destitution despite the amalgam of advanced technology and resources of today’s world. Rising inequality and social exclusion further enhance the grievances significantly. In such a setup, the World Bank has adopted the mission to create a world free of poverty via certain ambitious but achievable goals. They strive to reduce extreme global poverty, that is, people surviving on less than 1.25 dollar per day, to no more than 3 per cent by 2030. The second overarching goal is to promote shared prosperity, which indicates to the establishment of a sustainable increase of well-being and living standards of the poorer segments of society of every country. They plan to achieve these targets by promoting environmental, social and fiscal sustainability along with developing sustained social inclusion and limiting the amount of financial debt inherited by future generations. These goals also hold a promise of progress in non-monetary fields of welfare like nutrition, health, education, ensuring participation in socio-political spheres and availability of essential infrastructures to all segments of society. However, reducing poverty in the low-income countries of Sub-Saharan Africa and South Asia will serve to be a challenge. In countries like Burundi, Liberia, Madagascar and the Democratic Republic of Congo, the extreme poverty rate is over 80 per cent. Even after reaching the desired 3 per cent rate of extreme global poverty, destitution could still exist in some of the poorest countries or Fragile and Conflict-Affected Situations (FCS). Severe institutional and policy challenges would force the countries to bear extreme poverty for a more extended period. The lowermost 40 per cent of the social hierarchy pyramid of every nation would undergo an income growth to achieve shared prosperity. The most effective way of reducing poverty, lies in a better labour market engagement in the form of easy access to multiple better-paying jobs. Nonetheless, the advent of the COVID-19 pandemic has delved a significant blow on the World Bank’s aspirations of eradicating extreme poverty by 2030. About 250 million people are now standing on the threshold of starvation, according to the UN. The report of UN Special Rapporteur Mr Olivier De Schutter states that the governments have banked on economic growth to lift people out of poverty through Sustainable Development Goals (SDGs) and they can claim progress despite having none, as the World Bank has set the poverty line considerably low. According to the report, around 176 million people would be pushed into extreme poverty which would further lead to continuous neglect of low-income people, including women, migrant workers and refugees. De Schutter said, “Growth alone, without far more robust redistribution of wealth, would fail to tackle poverty effectively. Based on historical growth rates, it would take 200 years to eradicate poverty under a 5 dollar a day line and would require a 173-fold increase in global GDP. It is an entirely unrealistic prospect, not least since it does not take into account the environmental degradation associated with the economic growth, or the impacts of climate change on poverty itself.” He believes that extreme poverty is not only a result of low income, but a collective evil formed out of disempowerment, institutional and social abuse and discrimination. Until an inclusive society is built depending on a rights-based empowering approach, poverty won’t be eradicated. The World Bank has observed the extreme global poverty is expected to rise for the first time in over 20 years as the result of the pandemic. It is estimated that an additional 150 million people would face extreme poverty by 2021, based on the severity of economic contraction. According to the Poverty and Shared Prosperity Report, the global poverty rate, which was expected to drop to 7.9 per cent in 2020, would likely hit 9.1 per cent to 9.4 per cent of world population. The pandemic, along with the problems of conflict and climate change, is seemingly taking the World Bank’s goals beyond reach. Without swift, significant and substantial policy action, the global poverty rate would be at about only 7 per cent by 2030. Unless collective action is taken by the nations and leaders all over the world, and develop an alternate economy post-COVID to find new ways of accommodating labour, capital, skills and innovative ideas, eradicating extreme poverty will be a distant dream. The World Bank calls upon the countries to engage in collective action, which would be supported by the World Bank Group to help the developing countries to work towards a sustainable and inclusive health, social and economic recovery.
<urn:uuid:b8f4eb92-66f3-4532-9b8d-c520d5db037b>
CC-MAIN-2023-14
https://newsaurchai.com/world-bank-on-eradicating-extreme-poverty-by-2030/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950030.57/warc/CC-MAIN-20230401125552-20230401155552-00567.warc.gz
en
0.930712
940
3.53125
4
A Snapshot of the Red Wolf From the moment I conducted an Internet search on endangered species of North Carolina and came across Canis rufus, I knew I had to share the red wolf’s story through Britt Steele’s eyes. In Loving Deep, Randi and Evie presented Britt with a beautifully rendered mural showing the history of red wolves. Below, I've painted a brief picture of this incredible animal's fight for survival. Fair warning—the red wolf’s story is equal parts compelling and tragic, and highly debated among scientists. A Troubling Past Wolves have spiked fear and triggered man's competitive nature, in the form of hunting, for hundreds of years. At one point in our history, researchers believed red wolves roamed from southeastern Texas to central Pennsylvania. However, European settlers did their best to eradicate red wolves from America's landscape since their earliest days of sleeping beneath the New World's stars. "in the Begining of the Night, we were awaken'd with the dismall'st and most hideous Noise that ever pierc'd my ears" ~John Lawson, early 1700s The United States government actively aided in the red wolves' destruction. "the government pays a bounty of ten shillings for each one killed" ~ August Gottlieb Spangenberg, early 1700s During the span of a few years in the mid-twentieth century, the red wolf went from being noted as numerous to being listed as an endangered species. Trappers wanted them for their pelts, farmers shot them to protect their domestic animals, disease attacked their packs, and coyotes wooed their lone members away. However, in the mid-1970s, U.S. Fish & Wildlife Service agents began taking steps to disrupt the red wolves' plummet into extinction when they brought in Curtis J. Carley to identify and select wild red wolves for placement in the Service's new captive breeding program. Of the seventeen remaining wild red wolves, fourteen became the founders of the captive breeding program. Point Defiance Zoo (Tacoma, WA) provided a captive breeding facility and, in 1984, The Nature Conservancy brokered a land donation of 118,000 acres (for Prudential Insurance Company) on the Albemarle Peninsula in northeastern North Carolina. This enormous parcel of land became the Alligator River National Wildlife Refuge. By 1986, the Alligator River National Wildlife Refuge became home to the reintroduced wolves--a place where they could be reborn in the wild. Much to the locals dismay. After a bumpy start, the red wolf reintroduction program began to see serious progress. The captive-bred breeding pairs had pups and those pups matured to have pups of their own. Wild-born wolves slowly exceeded the captive-bred. The wolves' territory reached 250,000 acres and, eventually, expanded to 1.7 million acres. In 1992, the program added a second reintroduction site--the Great Smoky Mountains. The Smokies seemed a great place--endless forests, few roads, fewer people, only one farmer nearby, and solid support from the community. But the GSM site turned out to be a dismal failure due to lack of prey, devastating disease, and pressure from other predators. "Out of thirty-three pups born in eight different litters, only four survived past six months of age." ~ T. Delene Beeland The site closed in 1998, though thirty wolves were never found. This element became the basis of my Steele-Shepherd pack in Loving DEEP. In 1999, the Service finally, formally recognized hybridization with coyotes as a serious threat to wild red wolf recovery. A shaky Future It took a long time for me to find the right words for this section. Even now, I'm still struggling with how to articulate the uncertain plight the red wolves face. Thirty years after the wolves' introduction to Alligator River National Wildlife Refuge and these beautiful animals are still at risk. At the reintroduction program's zenith, nearly 200 wild wolves roamed North Carolina. Now, the wild population is down to less than 50. The same forces that took the wolves to the brink of extinction a half century ago are still paralyzing their recovery today. Illegal shooting, habitat destruction, breeding with coyotes, and politics. The U.S. Fish & Wildlife Service's leadership has all but abandoned the reintroduction program and the North Carolina Wildlife Resources Commission has taken a stance against the program--both agencies apparently buckling under political pressure fueled by wealthy landowners. But all is not lost. A powerful movement, involving Defenders of Wildlife, Animal Welfare Institute, and Red Wolf Coalition, is fighting to save this critically endangered species. Plus, many other environmental organizations are following the process closely. Seventy-three percent of North Carolinians support the red wolf recovery. The fate of the red wolf will now be played out in the court system. If, after reading about their courageous story, you would like to help protect the red wolf recovery effort, send a letter to the U.S. Fish & Wildlife Service Director Dan Ashe and ask him to do everything possible to protect this beautiful and important animal. Also, there are many lawmakers in Congress who view "Earth" issues as low priority--or no priority. When at the ballot box next time, vote for candidates who are passionate about preserving nature and taking action now to reduce the effects of climate change. Every vote matters. This is one sure-fire way we can secure our children's future--and the Earth's. Update Nov 2021: From the Wolf Conservation Center: USFWS Takes a Positive Step Forward for Red Wolves - U.S. Fish and Wildlife Service announced Wednesday that they are withdrawing their 2018 plan for managing the last wild red wolves a single population in eastern North Carolina consisting of just eight known (radio-collared) individuals. The rule, proposed by USFWS three years ago, aimed to reduce the existing five-county 1.7 million-acre Red Wolf Recovery Area by nearly 90 percent while limiting the wild population to just 10-15 individuals. It also sought to allow the immediate killing of any wolves wandering onto non-federal lands. Naturally, the controversial proposal was met with nearly unanimous opposition from the American public, and then in November of 2018, a federal court decision declaring that the agency violated the Endangered Species Act in gutting red wolf protections and ending proven conservation measures to recover them. USFWS responded to the court ruling by announcing its decision to delay all actions regarding its proposed rule, putting all recovery strategies on pause until now. Despite today’s announcement being long overdue, USFWS’s decision to finally withdraw its deadly proposal is excellent news for red wolves. It represents a positive step for USFWS towards bringing its efforts back in line with the conservation mandate of the ESA. The 2018 proposed rule will be officially withdrawn on November 15, 2021, upon publication in the Federal Register. Update Jan 2021: From the Red Wolf Coalition: U.S. District Court has ruled that the U.S. Fish and Wildlife Service (USFWS) must resume releases of captive red wolves into the Red Wolf Recovery Area in North Carolina. The USFWS halted these releases despite the fact that they are a proven tool for strengthening the red wolf population. The decision to terminate the release program, not surprisingly, put significant stress on wild red wolves—to the point where there may be as few as seven remaining. Now, with new wolves again joining the wild population, we expect to see increased overall numbers of wolves in the recovery area, as well as increased genetic diversity and improved opportunities for breeding. All of this means a stronger wild population and a much better chance against red wolves eventually being declared extinct in the wild. The Court's decision requires USFWS to develop a release plan by March 1, 2021. Get the latest UPDATE from the USFW on the plight of this amazing animal. The Secret World of Red Wolves by T. Delene Beeland U.S. Fish & Wildlife Service - Red Wolf Recovery Program - Updated Program Review 9/12/2016 Red Wolf Species Survival Plan Point Defiance Zoo & Aquarium (partner in captive breeding program) IUCN Red List of Threatened Species International Wolf Center (pup development) Wolf Conservation Center (eye-opening timeline graphic of the red wolf's population rise and decline) Return to Loving DEEP
<urn:uuid:6efc3c41-1571-460d-bad1-a9ac000076e8>
CC-MAIN-2023-14
https://traceydevlyn.com/RedWolf
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950030.57/warc/CC-MAIN-20230401125552-20230401155552-00567.warc.gz
en
0.941465
1,748
2.828125
3
Did you know that families are exposed to potential health and safety risks inside their own homes? Let’s take a look at some ways you can make your home healthy and safe. Protect Against Scalding Water Scalding water causes serious burns on the skin. Adjust your water heater to 120 degrees Fahrenheit. Water heated to 140 degrees can scald sensitive skin in five seconds or less. Always test the water yourself before bathing infants and children. Inspect Your Windows Over 4,000 children go to the emergency room every year after falling out of windows. Install window guards to keep this from happening. Window guards are rows of bars that screw into the window frame. They keep kids from falling out of the window but also are easily removed in case of a fire. Check for low-hanging window shade or blind cords. Toddlers and babies can become easily entangled in cords and injure themselves in the process. Cordless window coverings are better choices for homes with children. Protect Against Dangerous Falls Falling off furniture or down the stairs is one of the leading causes of accidents for children under 14. Toddlers are especially at risk. Use wall-mounted baby gates on your stairs. Tape down or cover electrical cords that could cause people to trip and fall. Keep Your Home Healthy and Safe During Renovations Homes built before 1978 may have lead paint on the walls, window frames, and flooring. This can all get stirred up in the form of lead dust when you do any renovation work or if the paint is chipped. Those toxic particles cause serious health issues in people, especially children. Hire a contractor who specializes in testing for and removing lead paint. Keep Your Home Safe With Smoke Alarms Smoke alarms are an important part of keeping your home healthy and safe. It’s twice as likely that children under the age of five will die in a fire as opposed to adults or older kids because young children can’t escape as well on their own. Install smoke alarms on all floors and even in the basement. They should be positioned inside and outside of every bedroom. Test the alarms every month. Keep fire extinguishers in the house and make sure your family members know how to use one: - Pull the pin - Aim at the bottom of a fire - Squeeze or press the handle - Sweep the extinguisher side to side until the fire is out Use the above tips to keep your home healthy and safe. Morgan & Associates Inspection Services provides home inspections to homebuyers, home sellers, and homeowners. Contact us to schedule an appointment.
<urn:uuid:d0f4d2d6-196c-4b3f-ad01-e65486c5f6f9>
CC-MAIN-2023-14
https://morganinspections.com/home-healthy-and-safe/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943555.25/warc/CC-MAIN-20230320175948-20230320205948-00767.warc.gz
en
0.938446
537
2.75
3
tlhIngan-Hol Archive: Mon Jul 22 14:15:50 2002 [Date Prev][Date Next][Thread Prev][Thread Next] Now that we have a word for "angle," I am wondering how to use it correctly. How do I say "X degrees of angle"? Perhaps there will be discussion at the qep'a' that will help me understand how to express concepts such as "That warrior is shorter than Martok by 1¼ 'ujmey." "This bottle contain 6 fewer ounces of bloodwine than that metal goblet." How do Klingons express degrees of difference? peHruS (unfortunately not attending)
<urn:uuid:27e81b8e-4b7c-4510-ada3-4332b3f0fa2f>
CC-MAIN-2023-14
https://www.kli.org/tlhIngan-Hol/2002/July/msg00663.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943555.25/warc/CC-MAIN-20230320175948-20230320205948-00767.warc.gz
en
0.885381
147
2.53125
3