text
stringlengths
150
592k
id
stringlengths
47
47
dump
stringclasses
1 value
url
stringlengths
14
846
file_path
stringlengths
138
138
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
35
159k
score
float64
2.52
5.06
int_score
int64
3
5
OPINION: Does Family Planning Have Environmental Effects? The following article was originally posted on the Worldwatch Institute blog. Worldwatch is an independent research organization based in Washington, D.C. that works on energy, resource, and environmental issues. Ask environmental leaders where voluntary family planning fits into their organizations’ missions and goals, and most will draw a blank. Their tasks are hard and often controversial enough without promoting expanded access to contraception, some might respond. Others might dismiss the importance of family planning with statements along the lines of “it’s not our numbers, but the way we consume, that matters.” This inaccurately equates family planning with population control, but it’s an understandable reaction. Even the progressive British newspaper The Guardian has endorsed such a statement editorially. Yet many environmentalists recognize that aspects of population—its size, its rate of growth, its resource demands—are a piece of the larger puzzle that is environmental sustainability. Yet many environmentalists recognize that aspects of population—its size, its rate of growth, its resource demands—are a piece of the larger puzzle that is environmental sustainability. Scientists are even more likely to support this connection. A 2015 survey of 1,627 working PhD scientists by the Pew Research Center found that 82 percent agreed with the statement that “a growing world population will be a major world problem because there won’t be enough food and resources.” No one seems ever to have polled scientists or environmentalists on whether better access to family planning and reproductive health might ease food or resource scarcity either through slower population growth or by empowering women to help address such problems. Given the importance of sound science to environmental work, might it make sense to see what science has to say about family planning in relation to environmental sustainability? At the Worldwatch Institute—where research on population, family planning, and women’s status has been the norm since our founding in 1974—we thought so. We wanted to engage others in the work, and we gathered a diverse project team and recruited a network of researchers and non-governmental experts from around the world to help us. After more than two years of work, we are releasing our report today (June 29, 2016). The idea that parents should be able to choose the frequency and timing of childbearing enjoys broad public support, at least in the United States. Yet U.S. government support for domestic and international family planning programs remains tepid at best. Funding for the reproductive health needs of those with low incomes is threatened by fierce political opposition to Planned Parenthood. Internationally, family planning is less politicized—but hardly a priority for most governments. UNFPA, the United Nations agency that helps developing-country governments with reproductive health services, is seeing its core funding cut this year by a projected $138 million from a budgeted $482 million. UNFPA, the United Nations agency that helps developing-country governments with reproductive health services, is seeing its core funding cut this year by a projected $138 million from a budgeted $482 million, according to the reproductive health advocacy group Population Action International. UNFPA’s funding for contraceptives and related supplies is down from a budgeted $120 million to $75 million. Several European governments that normally are generous to UNFPA say they are cutting back their contributions due in large part to the need to absorb the recent increase in refugees and migrants from the Middle East and sub-Saharan Africa. It’s a frustrating irony, given the likelihood that rapid population growth in both regions in recent decades has contributed to the conflict and joblessness that drives young people to seek safety and economic opportunities far from home. (Even The Guardian understands this argument.) Much of that population growth stems from poor access to the contraceptives and family planning services that UNFPA offers to countries that request the agency’s help. Some two out of five pregnancies that occur worldwide are unintended. Some two out of five pregnancies that occur worldwide are unintended—either happening too early or not wished for at all by the pregnant woman—according to data we reviewed in our search of scientific literature. And that fact buttresses the essential values principle that underlies the FPESA project. We are exploring the benefits of voluntary family planning, not population control. “The use of family planning must always be based on the fundamental human right of all individuals and couples to decide for themselves the timing and spacing of pregnancy,” as we noted in a recent blog on this topic. There’s no scientific consensus on this influence, in part because there’s not really a field or discipline that studies it. A rich diversity of evidence, however, from authors of both genders and from countries around the world, suggests that environmental benefits likely result from increasing access to and use of voluntary family planning. This article was originally posted on the Worldwatch Institute blog. Worldwatch is an independent research organization based in Washington, D.C. that works on energy, resource, and environmental issues.
<urn:uuid:7bd85d4f-435f-46d1-80ad-25b0a88c3b1e>
CC-MAIN-2024-10
https://rosslandtelegraph.com/2016/07/27/opinion-does-family-planning-have-environmental-effects-42139/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.951465
1,028
2.921875
3
Good Manufacturing Practices (GMP) are more than just industry regulations – they are the cornerstone of success for food and beverage companies. Their role in food industry success is critical—they help food and beverage companies maintain food safety and quality while increasing their productivity. All relevant food legislation, including the FDA’s Food Safety Modernization Act (FSMA), emphasizes these practices, including customer certification requirements. Good Manufacturing Practices Contextualized Establishing, implementing, and maintaining GMP in food industry plants is an ongoing process that requires an in-depth and comprehensive approach. Here’s a closer look at how principles of GMP in food industry establishments can help plant management in the food industry thrive. GMPs help manufacturers improve the production of their goods. When followed precisely, they promote consistency in procedures and products within a safe environment to reduce the risk of recalls, contamination, and profit loss. While GMPs are primarily used in the food industry, they also apply in the production of: GMPs are all-encompassing in manufacturing—they cover every aspect of each process to prevent risks that could develop anywhere in the supply chain or manufacturing environment. Their goal is to maintain the integrity of products with sound operating procedures, ensuring the highest standards are met through every step from testing and development to storage. By following GMPs, food industry professionals can expect to mitigate contamination, testing failures, problems caused by environmental factors, and potentially harmful deviations. GMPs can provide a number of benefits for food manufacturers, including: Preventing foodborne illness: GMPs can help to prevent foodborne illness by reducing the risk of contamination. Reducing product recalls: GMPs can help to reduce product recalls by identifying and addressing potential hazards before they cause problems. Improving customer satisfaction: GMPs can help to improve customer satisfaction by ensuring that food products are safe and high-quality. Increased profits: GMPs can help to increase profits by reducing the risk of lawsuits and fines. Because consumers can’t always tell whether food products are safe just by looking at them, manufacturers have a tremendous responsibility to provide safe, quality goods to the public. Following GMPs helps to promote quality, ensuring safe products for mass distribution. This increases the likelihood of products being free of dangerous substances or contaminants that could cause harm to consumers. GMPs can also help for compliance purposes, as regulatory bodies such as the FDA require the implementation of GMPs. For instance, GMPs are part of the FDA’s Current Good Manufacturing Practice, Hazard Analysis, and Risk-Based Preventive Controls for Human Food Rule, an aspect of FSMA that became final in 2015 which applies to nearly all food companies. There are many binding requirements of current GMPs (CGMPs), including: Qualification of employees who manufacture, process, pack, or hold food to perform their assigned duties Education, training, and/or necessary experience for employees to ensure the food they manufacture, process, pack, or hold is clean and safe, including training in the principles of food hygiene and food safety GMPs to address allergen cross-contact GMPs for holding and distributing human food by-products used for animal food GMPs are also a key component in Global Food Safety Initiative (GFSI) schemes, a program with credentials that can help food companies attract or maintain customers and ensure the quality of their products. GMP Development: A Timeline To fully understand the importance of GMPs, it’s helpful to look at why they were developed. Prior to their existence, several noteworthy safety incidents in the U.S. were caused by food and medicine issues. The history of GMPs dates back to 1906, with many key milestones that have led to the practices we know today. The Pure Food & Drug Act of 1906 According to The Mastery Institute, there were no federal regulations in place to protect consumers from dangerous products prior to the start of the 20th century. As industrialism accelerated, however, people were increasingly getting their food from remote sources instead of relying on local farmers. There was no control over preservatives or other toxic additives, and ice was the main method for the preservation of foods such as unpasteurized milk. To measure the amounts of preservatives in the food and determine whether they had an impact on health, Dr. Harvey W. Wiley of the Department of Agriculture established the Poison Squad in 1903. It quickly raised awareness of the need for consumer safety measures. Then, in 1906, Upton Sinclair’s The Jungle revealed a secret side of the meatpacking industry. The public’s response prompted Congress to establish the first Pure Food and Drug Act of 1906, which prevented interstate transport of unlawful food and drugs, implemented labeling requirements, and prohibited additives that would pose health hazards. While it was an important step for consumer safety, it also left room for risks. The Elixir Sulfanilamide Toxin In the 1930s, sulfanilamide was widely used to treat strep throat. While the drug was originally tested by manufacturer S.E. Massengill Company for flavor and appearance, it was shortly linked to death by kidney failure in more than 100 people, including many children. By 1938, the Federal Food, Drug, and Cosmetic Act were passed to require drug manufacturers to prove that a drug was safe before it could go to market. The FDA was given authority to inspect factories, and federal court injunctions became permissible when needed. The Thalidomide Incident Although thalidomide had been approved in Canada and Europe to treat morning sickness, DFA pharmacologist Frances Oldham Kelsey held off on approving an application from Richardson Merrill for the drug in the United States. After discovering that certain drugs could pass to babies through a mother’s placenta. She kept thalidomide off the market in the U.S., but many babies were born with deformities worldwide. In response to the incident, Congress passed the Drug Amendments of 1962 to tighten control over new drugs. While GMPs had been loosely in place since the FDA’s establishment, these amendments formalized them. Many more laws have been introduced since 1962. For instance, in 1983, anti-tampering regulations were established after several Chicago residents died from taking Tylenol that had been laced with cyanide. For this reason, it’s critical that food industry professionals stay up-to-date with new and developing GMPs to ensure public safety. Good Manufacturing Practices Guidelines While every food safety plan should be robust enough to include detailed steps for minimizing risks, there are a few basic GMP principles under which many of these tactics can be categorized. Here is a loose outline of operational conditions and procedures included in the FDA’s recommendations for current GMPs: Proper maintenance, layout, and operation of food processing facilities Proper maintenance of equipment and utensils Sanitation processes and controls necessary to ensure food is suitable for human consumption, which includes: Protection against physical, chemical, and microbial contaminants Monitoring of critical control points like humidity, pH, flow rate, time, and temperature Protection against natural defects, including a pest control program Avoidance of foreign materials such as glass, metal, and plastic in finished products In addition to these overarching guidelines, GMPs can also be broken down further, as outlined below. What Are the Five Main Components of Good Manufacturing Practices? GMPs in food industry establishments should focus on the five main categories below. The foundation of any strong GMP program is people. If the individuals on the plant floor (and those in managerial roles) aren’t properly trained, they can’t be expected to implement processes and procedures effectively. Therefore, food companies must invest in training, so employees know GMP quality control standards and how to carry them out. It cannot be a “one and done” activity. However, training methods should be assessed and reassessed regularly. Having a clean, safe environment is essential in food manufacturing, where products routinely come into contact with surfaces. The premises should be designed in a way that allows for effective cleaning and a reduced risk of cross-contamination. In the food industry, “premises” also refers to equipment. All machines should be validated and calibrated, and there should be procedures, schedules, and records in place for cleaning and maintenance. GMP processes refer to the documentation that proves that procedures are followed. Auditors will use this documentation to check facilities and ensure GMP procedures are being carried out effectively. Therefore, thorough documentation can benefit food manufacturers, though it certainly doesn’t have to mean keeping binders, notebooks, or other handwritten paperwork. In fact, digitizing your GMPs with plant management software can simplify your approach by ensuring all employees have access to pre-op and sanitation programs at their fingertips, record sign-offs can be completed easily in one convenient platform, and food safety checks can be carried out and reviewed for thorough recordkeeping. Products & Primary Materials Among the most important aspects of food manufacturing are products and primary materials. Products refer to the end goods sold to customers, such as retailers and restaurants, which will ultimately reach the consumer. Primary materials, on the other hand, are raw or semi-processed ingredients. If primary materials aren’t properly inspected prior to entering production, dangerous products could wind up on the market. GMPs must therefore incorporate quality tactics to monitor for and address deviations in incoming materials. Procedures themselves must be closely analyzed, updated routinely, and implemented effectively. They must also be well-documented so that if a problem occurs, it can be quickly and easily traced to the course through measures such as root cause analysis. What Are the 10 Principles of GMP? Principles of GMP in food industry establishments can be broken down into ten key components: 1. Write detailed, step-by-step procedures The first step of GMPs is to establish detailed, step-by-step standard operating procedures (SOPs) in writing. These will act as a roadmap for consistent performance. Written procedures also allow workplace standards to be established and ensure that tasks are performed the same way each time. 2. Follow established procedures Written SOPs are only as effective as the people who perform them. To that end, it’s important that employees know not to take any shortcuts, make modifications, or deviate from written instructions in any way. Again, the goal is to achieve a consistent, high-quality product. 3. Document everything Timely and accurate documentation promotes regulatory compliance and also ensures any issues can be traced to the source. Accurate recordkeeping also provides a way to evaluate issues to prevent them from happening again. Moreover, records are required for audits, so having an effective documentation system ensures that all of your necessary records will be easily accessible. 4. Validate the SOPs and specs To make sure SOPs work as they should, you must validate your processes. This is also achieved through routine documentation and precise following of written procedures. When performed consistently, these activities ensure a quality and consistent output is achieved. 5. Integrate quality and safety into equipment and facilities Productivity, quality, and safety should be incorporated into the design and construction of food manufacturing facilities and equipment. This prioritizes quality and consistency at every processing step. 6. Maintain equipment and facilities A number of maintenance activities must be performed on equipment and facilities consistently. Records should be kept to back up the work performed. This reduces safety concerns and mitigates quality control issues. 7. Establish, develop, and demonstrate job competence Job competency should be demonstrated by every team member. GMP requires employees to be thoroughly competent in their roles, but note that competency may mean different things to different people. For this reason, competency should be defined for every role so employees know exactly what’s expected of them. 8. Ensure cleanliness Protect products against contamination by making sanitization efforts routine tasks. Different products will call for specific degrees of cleanliness, so outline necessary steps and implement checks for each zone in the facility. 9. Build quality into the product Systematic quality control of components and processes should be implemented in every step of production, from packaging and labeling to any cooking or handling processes. Set clearly defined controls and keep clear records to ensure quality is consistent. You can even automate some aspects of your quality control program with tactics such as real-time statistical process control (SPC) that can help you identify and correct non-conformances quickly with real-time data capture and specification verification. 10. Conduct audits. While you can perform checks in your own facility to verify that GMPs are working effectively, having a fresh set of eyes can uncover inefficiencies or other areas of opportunities internal parties may have overlooked. Audits are therefore an essential aspect of both GMP success and regulatory compliance. What Are Examples of Good Manufacturing Practices? Implementing GMPs may look different for every company and perhaps for even different plant locations. With that in mind, here are some examples of GMPs in food industry facilities you might consider implementing in your own plant. A robust hygiene program that identifies and eliminates potential sources of contamination A thorough maintenance schedule for equipment and facilities, including preventive activities Detailed job descriptions that clearly define employees’ roles A system for investigating and addressing complaints and following through to resolution A clear documentation strategy which might include best practices such as: Documents should not be handwritten Documents must be routinely reviewed and updated Documents must be approved, signed, and dated by the appropriate party Any modifications or corrections to documents must be signed and dated Whenever possible, photographs should accompany documents indicating an observed issue Inspections that are performed routinely to monitor GMP effectiveness Audit checklists that can outline GMP guidelines Establishing, implementing, and routinely performing GMPs is an extensive undertaking. Yet, it’s among the most important things any food and beverage facility can do to ensure safe, consistent products and compliance. By adhering to the five components and ten principles of GMPs outlined above, you can ensure every aspect of your manufacturing process is designed to mitigate food safety events. SafetyChain is a digital plant management platform for process manufacturers trusted by more than 2,000 facilities to improve plant-wide performance. It unifies production and quality teams with data and insights, tools, and delivers real-time operational visibility and control by eliminating paper and point solutions.
<urn:uuid:422ad1e0-1483-4278-add2-32fbf88fe46a>
CC-MAIN-2024-10
https://safetychain.com/blog/role-gmp-food-industry
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.9515
3,005
3.234375
3
These small hopping insects are a common problem in gardens around southern Manitoba, and they can cause big trouble for crops such as radish, kale, broccoli, mustards, horseradish, arugula, hosta and other popular plants. While very frustrating, there are a number of ways to reduce the damage caused by this pest. Flea Beetles can easily be identified as they converge on specific plants, and look like dark brown or black hopping fleas. They cause most of their damage by munching on plant foliage, and almost always occur en mass. In Manitoba, Flea Beetles are strongly associated with canola, and swarms of the bugs often arrive in Winnipeg after crops are harvested from surrounding farm land. The insects overwinter in plant debris, and larvae emerge in late spring where they feed on plant roots. Once the young beetles have matured to adult stage, they become highly mobile and start to feed on the plant leaves. The adults go on to reproduce, giving rise to up to 2 generations per season. There are five proven strategies for dealing with flea beetles without using heavy duty chemicals (which do not work well anyways!): 1) Crop rotation. If possible, avoid replanting susceptible varieties in the same location each season. The life cycle of the beetles is severely disrupted if the emerging larvae have nothing to feed on, and they will die off before they can mature to reproductive age. 2) Beneficial Nematodes. Native species of nematodes can be watered into the garden where they eat up the larvae. This is highly effective at stopping the emerging (first generation) of the beetles. Beneficial nematodes can be applied once soil reaches 10 degrees Celsius. 3) Row Covers. Floating row covers are light weight fabric blankets that are placed over crops to create a physical barrier against pests. Row covers are left over top of plants 24/7 as young plants get established; once plants are well established the row covers can be removed. Row covers allow light and water to get through so plants develop normally under cover. The fabric can literally be "floated" over plants and secured on the edges and ends, or may be draped over hoops to create a more spacious growing space. Row covers are one of the most effective tools for preventing damage from Flea Beetles. This solution is ideally paired with the first two, to ensure that beetles do not emerge under the row cover. 4) Mulching. Mulches such as straw or shredded newspaper are know to reduce Flea Beetle occurrence by making it difficult for the larvae to emerge from the soil. Planting non-susceptible crops among susceptible ones as a "living mulch" is another variation on this theme. The living mulch concept is thought to confuse the beetles who normally identify their target plants based on the contrast between the leaves and surrounding soil. 5) Safe Insecticides. In situations where many adult Flea Beetles are present, Safer's End-All can be applied. This is a pyrethrum based insecticide and is approved for use on edible crops and organic production (but should not be sprayed where fish or birds are in close proximity). To be effective the spray must come into direct contact with the insects; there is no residual effectiveness. Another insecticide that is used against Flea Beetles is diatomaceous earth (crushed fossilized diatoms); it is applied by sprinkling onto afflicted plants. This is a completely non-toxic solution that works by physically "scuffing" the joints of the insects, leading to desiccation and thus the demise of the bugs! It must be emphasized that trying to kill off a flea beetle infestation is not a long term solution, particularly for later season occurrence, as more beetles are likely to fly into your garden to pick-up where the dead ones left off. The main benefit of using Safer's End-All or diatomaceous earth is short term reprieve for your plants. As a final thought on managing Flea Beetles, end of season clean up is considered particularly helpful. If there is little plant debris left in the soil, the beetles have a hard time surviving the winter or feeding if eggs do hatch come the spring. Some experts recommend tilling under gardens where susceptible plants are grown, but this is at odds with good organic soil management (zero till is healthier for the soil micro organisms and structure) - so pulling up of finished plants is a better strategy.
<urn:uuid:a7a2360d-10a1-4f21-80cc-90f8fed930b4>
CC-MAIN-2024-10
https://sagegarden.ca/blogs/the-sage-garden-lab/34633540-flea-beetles-getting-you-down
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.946876
916
3.5
4
The discovery of quantum Hall effects during the 1980s unveiled new forms of matter termed “Laughlin states,” named after the American Nobel laureate who successfully characterized them theoretically. These exotic states uniquely appear in two-dimensional materials, under extremely cold conditions, and when subjected to a profoundly strong magnetic field. In a Laughlin state, electrons constitute an unusual liquid, where each electron dances around its congeners while avoiding them as much as possible. Exciting such a quantum liquid generates collective states that physicists associate with fictitious particles, whose properties drastically differ from electrons: these “anyons” carry a fractional charge (a fraction of the elementary charge) and they surprisingly defy the standard classification of particles in terms of bosons or fermions. For many years, physicists have explored the possibility of realizing Laughlin states in other types of systems than those offered by solid-state materials, in view of further analyzing their peculiar properties. However, the required ingredients (the 2D nature of the system, the intense magnetic field, the strong correlations among the particles) proved extremely challenging. Writing in Nature, an international team gathered around the experimental group of Markus Greiner in Harvard report on the first realization of a Laughlin state using ultracold neutral atoms manipulated by lasers. The experiment consists in trapping a few atoms in an optical box, and in implementing the ingredients required for the creation of this exotic state: a strong synthetic magnetic field and strong repulsive interactions among the atoms. In their Article, the authors reveal characteristic properties of the Laughlin state by imaging the atoms one by one through a powerful quantum-gas microscope. They demonstrate the peculiar “dance” of the particles, which orbit around each other, as well as the fractional nature of the realized atomic Laughlin state. This milestone opens the door to a wide new field of exploration of Laughlin states and their cousins (e.g. the so-called Moore-Read state) in quantum simulators. The possibility of creating, imaging, and manipulating anyons under a quantum-gas microscope is particularly appealing, in view of exploiting their unique properties in the lab. Reference: “Realization of a fractional quantum Hall state with ultracold atoms” by Julian Léonard, Sooshin Kim, Joyce Kwan, Perrin Segura, Fabian Grusdt, Cécile Repellin, Nathan Goldman, and Markus Greiner, 21 June 2023, Nature.
<urn:uuid:9a99e103-97dc-4a3c-a0f2-b8f2311bfd0e>
CC-MAIN-2024-10
https://scitechdaily.com/quantum-breakthrough-the-first-ever-realization-of-a-laughlin-state/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.914831
510
2.96875
3
Research is essential to the development of evidence-based government policy — as well as evidence-based policies and practices among service providers. Research is critical to the improvement of sexual and reproductive health and rights in Aotearoa. Research provides information about inequity and causes of inequity. There is a large body of research produced overseas about sexual and reproductive health issues. For example, this study — conducted in the United States — examines the safety and effectiveness of self-managed early medical abortion. There is some research about sexual and reproductive health issues in Aotearoa. This article is an example of quality local research on the disparities in use of combined oral contraceptives by ethnicity. There has been some good research done about sexual and reproductive health and rights in Aotearoa — but extensive research has never been prioritised. We still have big gaps in our understanding of sexual and reproductive health and rights in Aotearoa. We have filled some research gaps with our own research and annual surveys. One research project by Sexual Wellbeing Aotearoa (formerly Family Planning) explored changes in clients’ contraceptive use over a decade. Another project, with the University of Canterbury and the New Zealand Health Education Association, investigated teachers’ experiences of relationships and sexuality education. Our annual surveys aren’t formal research, but they do provide useful information about certain sexual health and wellbeing issues. These are examples of our research and analysis:
<urn:uuid:02e94937-eb8b-4291-a771-7fafe427b40e>
CC-MAIN-2024-10
https://sexualwellbeing.org.nz/about/equity-in-aotearoa/research/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.941132
293
2.890625
3
The 1918–19 influenza epidemic killed more than 50 million people, and infected between one fifth and half of the world's population. It is the world's greatest killing influenza pandemic, and is used as a worst case scenario for emerging infectious disease epidemics like the corona virus COVID-19. It decimated families, silenced cities and towns as it passed through, stilled commerce, closed schools and public buildings and put normal life on hold. Sometimes it killed several members of the same family. Like COVID-19 there was no preventative vaccine for the virus, and many died from secondary bacterial pneumonia in this pre-antibiotic era. In this work, Ida Milne tells how it impacted on Ireland, during a time of war and revolution. But the stories she tells of the harrowing impact on families, and of medicine's desperate search to heal the ill, could apply to any other place in the world at the time.
<urn:uuid:21eb8d47-141d-4023-85f1-5bb415a9c0eb>
CC-MAIN-2024-10
https://shop.redflag.org.au/products/stacking-the-coffins-influenza-war-and-revolution-in-ireland-1918-19
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.965922
191
3.171875
3
Who were the First Americans? Where did they come from? When did they get here? Are they the ancestors of modern Native Americans? These questions might seem straightforward, but scientists in competing fields have failed to convince one another with their theories and evidence, much less Native American peoples. The practice of science in its search for the First Americans is a flawed endeavor, Robert V. Davis tells us. His book is an effort to explain why. Most American history textbooks today teach that the First Americans migrated to North America on foot from East Asia over a land bridge during the last ice age, 12,000 to 13,000 years ago. In fact, that theory hardly represents the scientific consensus, and it has never won many Native adherents. In many ways, attempts to identify the first Americans embody the conflicts in American society between accepting the practical usefulness of science and honoring cultural values. Davis explores how the contested definition of “First Americans” reflects the unsettled status of Native traditional knowledge, scientific theories, research methodologies, and public policy as they vie with one another for legitimacy in modern America. In this light he considers the traditional beliefs of Native Americans about their origins; the struggle for primacy—or even recognition as science—between the disciplines of anthropology and archaeology; and the mediating, interacting, and sometimes opposing influences of external authorities such as government agencies, universities, museums, and the press. Fossil remains from Mesa Verde, Clovis, and other sites testify to the presence of First Americans. What remains unsettled, as The Search for the First Americansmakes clear, is not only who these people were, where they came from, and when, but also the very nature and practice of the science searching for answers.
<urn:uuid:ef4ea10d-532f-46d9-aec7-95263726306e>
CC-MAIN-2024-10
https://shopmuseum.org/products/the-search-for-the-first-americans
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.959984
355
3.625
4
Skamania is a small school with a big vision: to integrate STEM—science, technology, engineering and math—studies throughout its curriculum and to share strategies to support other small, rural schools statewide. The Office of Superintendent of Public Instruction (OSPI) has recognized Skamania School’s innovative practices and ability to inspire students to study STEM, and awarded the district a $20,000 STEM Lighthouse grant for the 2018-19 school year, one of only six awarded in the state. The Lighthouse award will be presented Friday by OSPI STEM program supervisor Dan Tedor at a 2:45 p.m. ceremony preceded by STEM activities—led by Skamania students—from 1 to 2:15 p.m. All events will be at Skamania School, 122 Butler Loop Rd., Skamania, Washington. Student-led presentations include: S—Science, grades 7-8: Circulation and the heart T—Technology, grades 5-6: Air pressure E—Engineering, grades 3-4: Wind and making an anemometer M—Math, grades K-2: Weather and climate Why STEM at Skamania? Located in the unique setting of the Columbia River Gorge, Skamania School is surrounded by educational opportunities for staff and students to explore, enabling the study of natural resources and their interrelationships with Gorge residents. Skamania’s dedicated, ambitious staff have completed many hours of STEM training and are now creating a sustainable and integrated STEM program that gives students opportunities to work on real-world problems in their own back yards. These classroom and schoolwide project-based learning activities are integrated, career-connected, locally relevant and field-focused. They develop students’ skills as they collaborate, communicate, and think creatively and critically. Future plans include transforming a 38-acre tract of undeveloped land owned by the school district into an outdoor learning lab and possible outdoor school for use by students in Skamania and other districts, reflecting the school’s motto, “The Gorge is our classroom—Ambassadors to the Gorge.” The commitment of partner agencies, including U.S. Fish & Wildlife, Southwest Washington STEM Network, Pacific Education Institute and the Department of Natural Resources, has been key, and their active participation and dedicated resources will ensure the future sustainability of this work.
<urn:uuid:ae88ec87-93a9-4e5c-b9f3-430503287112>
CC-MAIN-2024-10
https://skamaniaschooldistrict.org/skamania-school-celebrates-state-award-presents-student-stem-activities-feb-22-2019/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.944347
495
2.84375
3
ECONOMICS ANALYSIS ESSAY For this assignment, you will write a 2–3-page paper providing at least 1 example of how government has overstepped biblical principles in some form of economic policy.Options include the following topics: • A specific piece of legislation relating to business regulation or taxation. • The “party platform” of either the Republican Party or the Democratic Party (or both). • The role of the Federal Reserve. • The budget process. How government has overstepped biblical principles in some form of economic policy Christians in every corner of the world are known to observe strict rules in their based on the laws, rules, and regulations on the Bible. Through some biblical principles, God can convey to humankind how they should live and to Christians, these principles present a progressive maturity in faith. These biblical principles are usually integrated into the fabric of human beings and nature so that all individuals can understand the plans that God has for us. However, more often humankind overstep the biblical principles in their daily lives as they struggle and strive to fulfill their dreams and satisfy their ever-growing desires and needs. On the other hand, the budget process is the procedure by which governments, organizations, and individuals create and approve an estimate of income and expenditure for a set period of time (Ott, 2010). In one way or another, through the process individuals violates biblical principles. This paper seeks to show how budget process oversteps some of the biblical principles. Biblical principles are drawn from both old and new testaments that present guidelines that should oversee that humankind live in the ways of righteousness as the Bible says. One of the biblical principles that are widely violated during the budgeting process is the principle of poverty. According to the Bible, Jesus was not a fun of wealth and in more than one instant he tried to show how the rich will not see the heavenly kingdom due to their crooked ways. According to the Bible, there is one instance that he said that it is easier for a camel to pass through the eye of the needle than for a rich person to enter the kingdom of God. Moreover, he also encouraged a rich ruler to sell everything and give it to the poor (Ott, 2010). These events clearly show that Jesus was against the human behavior of piling a mountain of wealth while others live poverty-stricken lives. He went ahead to declare that it is prudent not to store treasures for ourselves on earth. On the other hand, the budget process helps organizations and individuals create and manage a financial plan that is meant to last for some time. During the personal budget process, an individual is supposed to gather all the amount of money he has and create a plan that is meant to ensure that the cash and income he has satisfies all his needs (Wehner, 2010). At times, the income is not enough and individuals go ahead to borrow funds from other individuals and financial institutions to fulfill their desires. At the end of the day, the budget process involves storage of cash and other monetary materials to be used in foreseeable future. From the discussion above, it is easy to identify overstepping and violation of the poverty principle. According to the biblical teachings, it is wrong for an individual to think solely of themselves while forgetting the wellbeing of other people. As a result, they should not store their wealth and money, but they should share it with the less fortunate in the society. Thus, instead of making a budget, these individuals should share what they have with the poor and wait upon the Lord to take care of their wellbeing in the future. However, considering the unfaithful of human nature, they have to store for the future in the fear that the future is predictable, and anything can happen. This fear leads to overstepping of some of the biblical principles. Ott, C. &. (2010). Global church planting: Biblical principles and best practices for multiplication. . Baker Books. Wehner, J. (2010). Legislatures and the budget process: the myth of fiscal control. Palgrave Macmillan.
<urn:uuid:7b0b102c-daa1-43e1-a6bf-7ae95af17d3e>
CC-MAIN-2024-10
https://speedywriters.us/biblical-principles-and-economic-policy/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.9544
828
2.890625
3
One of the celestial bodies that has always remained elusive and quite enigmatic in our Solar System for many years is Pluto. Nestled way beyond Neptune, Pluto has been a major subject of intrigue, fascination, and controversy among astronomers, experienced and amateurs alike. Its demotion from its fully-fledged planetary status in 2006 by the IAU (International Astronomical Union) only fueled the controversy and intensified all the mystery surrounding it. More and more amateur astronomers have since wanted to have a glimpse of the dwarf planet. While Pluto is quite elusive and difficult to spot in the sky, you can still observe it with a decent telescope. In this article, I will be telling you how to see Pluto with a telescope, the best way to find it in the night sky, and factors you need to consider when setting up your vantage point on Earth to view it. Peering through our Solar System to observe this distant celestial object is quite a thrilling undertaking that most definitely deepens our appreciation of our mysterious universe. Facts about Pluto Pluto, a rocky world that is about 2390 kilometers in diameter, is one of the five dwarf planets in our Solar System. Before 2006, Pluto was considered one of the nine planets of the Solar System. But in August 2006, it was demoted from its fully-fledged planetary status and considered a dwarf planet by the International Astronomical Union. Now, what is a dwarf planet? You may wonder. In simple terms, a dwarf planet is a planet that failed to entirely clear its own orbit of any debris. You see, when planets were forming, they got bigger by attracting rocks and any other debris around them, especially those in their orbit. Pluto failed to do that. Scientists discovered that the orbit of Pluto is littered with a lot of rocks, some of which are almost as big as itself. This is the reason the IAU demoted Pluto to dwarf planet status in 2006 when the discovery was made. According to the IUA, for any celestial body to be considered to be a planet, it must satisfy the following three conditions: - The object must be orbiting a host star, and in this case, we are talking about the Sun. - The body’s gravity must be massive enough to pull debris into a spherical shape. - It must be the dominant object in its orbit. This simply means that the object must clear any objects such as rocks in its orbit. We see that Pluto meets the first two conditions, but it hasn’t cleared its orbit of debris and rocks. It is, therefore, not considered a planet. Pluto has five moons, the largest of them called Charon. Charon itself is more than three-quarters the size of Pluto. The dwarf planet is more than 5.9 billion kilometers from the Sun but ventures closer to the Sun than Neptune does. Its distance from our planet Earth is over 5.09 billion kilometers. How to Find Pluto in the Night Sky Before you start observing Pluto from Earth, you first need to find its position in the night sky. Note that because the atmospheric conditions keep changing and the fact that Pluto comes to the opposition every 367 days, the dwarf planet is not always up in the sky. You, therefore, need to be sure it is up before setting up your equipment to view it. One of the ways to do that is to use constellations, but if you are not good with that, there is a better and easier way. There are many astronomy applications and software available today that you can use to get the position of any celestial objects in the sky at any one given time. Examples of these applications and software include Stellarium, Saky Safari, and Star Walk 2. Most of these applications will give you a sky plan, depending on your location. They will also give the time and altitude of the planet so it is easy for you to trace and spot it. You can also use various star charts available online to track and locate the dwarf planet. Can You See Pluto without a Telescope? It is impossible to see Pluto from Earth without a telescope for various reasons. One of the major reasons this is the case is the massive distance between Pluto and the Sun. With more than 5.9 billion kilometers between the two, Pluto doesn’t have much light to reflect, so we can clearly see it from Earth. Planets like Venus, Jupiter, and Saturn are easily visible from Earth because of their close proximity to the Sun, so they shine bright and are easy to spot. The second factor that makes it difficult for us to see Pluto from Earth is the distance between us and the dwarf planet. There are more than 5 billion kilometers between us. While Pluto still reflects some light from the Sun, the distance is just too huge for us to see it without any decent equipment. Another factor is its size. At just 2390 kilometers in diameter, Pluto is smaller than our Moon. This, coupled with its distance from the Sun, means it is just not going to reflect enough light for us to see it with the naked eye from Earth. In general, Pluto lies at the very edge of our Solar System. It is small and shines at a small magnitude of just 14.4. You are, therefore, not going to see it without a telescope. To get the best shot of the dwarf planet, you will need a telescope with a decent aperture, dark skies, and some patience. How to See Pluto with a Telescope Before we dive deeper into this section, I must mention that you need at least a 5-inch telescope to see Pluto. You stand a better chance if you have an 8-inch or bigger telescope. If you have one of these, it is time to observe the dwarf planet. But how? As discussed above, you first need to locate the position of the planet in the sky. Download and install any astronomy application on your phone. There are so many of them out there for both Android and iPhone. Once you have this ready, run then and search for the location of Pluto. If it is up in the sky, most of these applications will give you a sky map and the altitude of Pluto. For example, the software can tell you the dwarf planet is 43 degrees west of the Eastern horizon. This, of course, will depend on your location. Now, you need to use this information to get the exact location of Pluto in the sky. However, you are going to need a star chart including stars with a magnitude of between 14 and 15. Note that the horizon itself will be the baseline, meaning it will be at 0 degrees. The zenith, directly overhead the horizon, is at 90 degrees. This tells you that midway through the zenith and the horizon is at 45 degrees. You can, therefore, locate Pluto at 2 degrees below this midway line. When you know where to point your scope, set it and make sure the finderscope is correctly aligned. Point it to the direction established and look through the eyepiece to try and find Pluto. You are going to need a lot of patience. One of the good things about dwarf planets and fully-fledged planets is that, unlike stars, they move. This fact is going to come in handy later. When you look through the eyepiece, you are going to see stars, some of which are faint. Pluto should be among the faint ones, probably the faintest one. Now, all you need to do is plot the position of this faint ‘star’ for two to three consecutive nights. Pluto moves about 1.5 arc minutes per day. With a magnification of between 200X and 250X, you should be able to see the faint ‘star’ change its position daily. This is how you know you have Pluto in your view. When Can I Observe Pluto with a Telescope? As I pointed out earlier in the article, Pluto is best seen when it is in opposition. This is when it is directly opposite the Sun. Pluto reaches opposition every 367 days, and for the foreseeable future, this is going to be in late July of every year. However, this is not to say that you cannot see Pluto during other times. While it is trickier than when it is in opposition, you can see Pluto from March through October when it is far enough from the Sun. Most stargazers with a good telescope are able to spot the dwarf planet during this period. If you are far away in the North, it is even harder to see Pluto when it is not in opposition. Your best time to see it will be during the summer months when it barely appears above the horizon, much like the Sun does during winter. What Size of Telescope Do I Need to View Pluto? This dwarf planet is gradually drifting farther and farther away from the Sun, and, as a result, it is getting dimmer and dimmer, making it more difficult to see from Earth. At its perihelion in 1989 (29.6 AU), Pluto shone at a magnitude of 13.7. During this time, Pluto was as bright as the moons of Uranus and Neptune. It was visible with any telescope with apertures as small as 4 inches. The dwarf planet has since drifted farther away from the Sun. At present, its brightness hovers around a magnitude of between 14.3 and 14.4. That said, today, you can only observe Pluto if you have a telescope with an aperture of at least 5 inches. However, you will have the best shot at seeing Pluto if you have a telescope with an aperture of 8 inches or bigger. You will still need dark skies to get the best images, and as we will see later, there are other factors that play a significant role in the quality of images you get. With a 10-inch telescope, you can conspicuously see Pluto under darker skies. You will need a larger telescope if you live in an area with a lot of light pollution. A 12-inch scope offers better images with less struggle, and a scope with a 14-inch to 16-inch aperture will do a great job and give you clearer glimpses at Pluto. What Pluto Looks Like in a Telescope Through most telescopes, Pluto appears as a star-like spot. Its disk is below 0.1 arc seconds wide, and no telescope is able to resolve it. This begs the question: How am I going to know I am looking at Pluto? I explained earlier that the best way to know you are looking at Pluto is by sketching its position in the sky against the background stars. The dwarf planet moves about 1.5 arc minutes per day, so if you notice the star-like point changing its position over 2-3 nights, then you can confirm you are actually looking at Pluto. You can also familiarize yourself with the star field immediately around Pluto and use high magnification to make sure you are looking at Pluto at any given time. Factors to Consider when Viewing Pluto with a Telescope There are a few factors you need to consider when choosing your vantage point to view Pluto from Earth. You want to make sure you have the right ‘seeing’ conditions. You probably already know that the atmosphere is filled with a lot of gases that keep moving and swirling around. This and other things, such as air turbulence, can affect the seeing conditions. There are many resources and astronomy communities online you can use to know if the conditions are right to see Pluto. Air turbulence also affects the quality of images you get. Be sure to avoid setting your observation point in areas that could potentially emit heat into the atmosphere in the evening. Examples include areas with concrete floors and close to chimneys or rooftops. Also, choose places with the least amount of light pollution. Again, you can use online communities, forums, and astronomy applications to find out which places have the least amount of light pollution around your location. While Pluto is very far away from us and one of the dimmest celestial objects, we can still see it from Earth with a telescope. You will need at least a –inch telescope to see Pluto. Follow the tips provided in this guide and enjoy the sight of Pluto.
<urn:uuid:0aa6cf6e-19a8-4dc8-90d9-89db10309dee>
CC-MAIN-2024-10
https://starrynova.com/how-to-see-pluto-with-a-telescope/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.953721
2,530
3.53125
4
Tradition and technology intermingled this spring as EY3 students learned about the traditions of Passover in a rather non-traditional way. As part of the Primary Years Programme (PYP) of the International Baccalaureate curriculum, there are six transdisciplinary themes: - Who we are - Where we are in place and time - How we express ourselves - How the world works - How we organize ourselves - Sharing the planet At the beginning of April, our EY3 teachers began introducing the “How the world works” theme through virtual learning sessions. The central idea of the theme is the concept that various cycles occur in nature and throughout the world. With that in mind, our EY3 classes began with a line of inquiry about cycles in our everyday lives. Our teachers chose a very relatable way of introducing this idea in that cycles are continuously happening all around us every day. Some thoughts included our daily routines of waking up every day, having breakfast, going to school, and more. As Passover approached, our teachers easily segued into the idea of other cycles in our lives, including the yearly cycle of our Jewish holidays. This led to learning that Passover occurs in the spring, which is a part of the cycle of seasons. In context, Passover was a spring festival that was connected to the offering of the “first-fruits of the barley,” as barley was the first grain to be ripened and harvested in the Land of Israel. It’s actually pretty heady material if you think about it. But through engagement, association, and involvement, our students were able to digest the subject matter and relate to it in a way that made sense in their young minds. And in a manner that will help them better understand future concepts as they are discussed. This is the very foundation of what the Strelitz International Academy is trying to achieve in creating students who are well-rounded and encouraging them to develop independence and take responsibility for their own learning. We focus on the development of the whole child as a thinker and inquirer in both the classroom and in the world outside—even if that means we need to use new models of teaching, such as using distance learning, to continue education in the face of adversity.
<urn:uuid:4f1e0ed4-73da-435c-a553-f9afaa79b67d>
CC-MAIN-2024-10
https://strelitzinternationalacademy.org/ey3-learning-about-passover-via-distance-learning/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.972787
472
3.46875
3
In the heat of the moment = without thinking because they are angry or excited. - Don’t say anything in the heat of the moment. - He didn’t mean it ; he said it in the heat of the moment. - We all do things in the heat of the moment which we then regret. Set the world on fire = to do something wonderful or exciting things ; to be extremely popular/famous. - As a girl, Janet dreamed of setting the world on fire as a famous actress. - A: I am not very ambitious . I don’t want to set the world on fire. - B: You don’t have to set the world on fire. Just do a good job. Make waves = (1) create significant impression. - He has already made waves as a sculptor. - She has a history of making waves. She is the first woman in India to get the first place in IAS exams.
<urn:uuid:cef1d806-c137-4ce8-8b76-1343d875b2cb>
CC-MAIN-2024-10
https://sunnyvarkeyk.com/useful-idioms-part-23/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.923963
205
2.65625
3
UN INT Intro Text w/ Responsive Image - *Important Note* You must UNLINK this shared library component before making page-specific customizations. An eight-month PETA undercover investigation at the University of Utah documented the daily suffering of dogs, cats, monkeys, rats, mice, rabbits, and other animals in the school's laboratories. Dogs and cats were used in cruel, invasive experiments. In one study, a litter of kittens died after a chemical that causes fluid to build up was injected into their brains. In other experiments, mice whose back legs were paralyzed, rats who suffered epileptic seizures, and mice with huge, ulcerated tumors covering their bodies were left to suffer without adequate veterinary care. Many animals died and were left for days before anyone noticed. After breaking the news of our shocking investigation, we received confirmation from the University of Utah that Robert—the cat pictured above—would be removed from the laboratory and adopted into a new home. Immediately after, two more important developments in this case occurred: Utah legislators amended state law so that government-run animal shelters will no longer be forced to sell dogs and cats to laboratories upon request for use in cruel and deadly experiments, and the U.S. Department of Agriculture (USDA) cited the University of Utah for nine violations of federal animal protection laws. After a vigorous PETA campaign, the school halted its practice of experimenting on dogs and cats from animal shelters in 2011, which prompted the end of many cruel experiments and drastically reduced the number of cats and dogs imprisoned in the school's laboratories. After finding more problems following PETA's investigation, the USDA also issued an Official Warning to the University of Utah stating, "Any further violation of these regulations may result in the assessment of a civil penalty or criminal prosecution." While this is great news for animals who live in animal shelters like Robert did, the University of Utah continues to perform cruel experiments on animals inside its laboratories. Please be a voice for the animals who are suffering in labs at the University of Utah. Urge the university to release to the public complete records on all taxpayer-funded animal experiments at the University of Utah. Putting your subject line and letter into your own words will help draw attention to your e-mail.
<urn:uuid:57d037ba-c1a2-4e09-b6cb-583668611266>
CC-MAIN-2024-10
https://support.peta.org/page/1317/action/1?locale=en-US
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.946818
460
2.71875
3
Ramadan is the ninth month of the Islamic calendar, during which Muslims around the world fast from dawn until sunset. The fast is one of the Five Pillars of Islam and is considered an act of worship and submission to God. During Ramadan, Muslims also engage in increased prayer and spiritual reflection, seeking to strengthen their connection with God and purify their hearts and souls. it is a holy month for Muslims, and it is a time for spiritual reflection, self-improvement, and increased devotion to God. Here are some ways you can spend your Ramadan: Fasting:– Fasting is one of the five pillars of Islam, and during Ramadan, Muslims fast from sunrise to sunset. Fasting is an act of worship that helps to purify the body and soul, and it also teaches self-discipline, self-control, and empathy toward the less fortunate. Prayer:– Muslims are encouraged to increase their prayer during Ramadan. Muslims should perform the five daily prayers, and it is also recommended to perform additional voluntary prayers, such as Taraweeh prayers, which are performed after the Isha prayer. Quran:– Ramadan is the month of the Quran. Muslims are encouraged to read the Quran during Ramadan, and some Muslims choose to read the entire Quran during the month. Charity:– Muslims are encouraged to give charity during Ramadan. This can be done in the form of Zakat, which is an obligatory charity given to the poor and needy, or Sadaqah, which is a voluntary charity given to anyone in need. Family and community:– Ramadan is a time to strengthen family and community bonds. Muslims should spend time with their families and friends, and they should also participate in community activities, such as breaking fast together, volunteering, and helping those in need. Self-improvement:– Ramadan is a time for self-improvement. Muslims should reflect on their behavior and try to improve themselves in all aspects of their lives, including their character, habits, and relationships. How to Spend More Time with Your Family During Ramadan? Ramadan is a time of spiritual reflection and contemplation and a time to connect with family and loved ones. Here are some ways to spend more time with your family during Ramadan: Have iftar together:- Iftar is the meal that breaks the fast at sunset. Make it a point to have iftar together as a family. This is a great way to share in the spiritual experience of Ramadan and catch up with each other’s day. Pray together:- Make an effort to pray together as a family, whether it’s at home or at the mosque. This will help strengthen your bonds as a family and create a sense of unity. Volunteer together:- Ramadan is a time for giving and helping those in need. Volunteer together as a family at a local soup kitchen or food bank, or participate in a community service project. This is a great way to instill values of generosity and kindness in your children. Read Quran together:- Set aside time to read Quran together as a family. This is a great way to connect with your spirituality and also bond with your family. Plan family outings:- Plan family outings during Ramadan, such as going to the mosque together, visiting relatives or friends, or taking a day trip to a local attraction. This will give you the opportunity to spend quality time together and create new memories. Cook and eat together:- Cooking and eating together is a great way to bond as a family. Overall, Ramadan is a time for Muslims to focus on their relationship with God and strive to become better individuals through spiritual practice and acts of service to others. In addition to fasting and prayer, many Muslims also give to charity during Ramadan, as acts of generosity and kindness are highly valued in Islam.
<urn:uuid:f1b55452-1ba1-4d67-97ce-b92715c0d722>
CC-MAIN-2024-10
https://tahfeezquran.com/how-to-spend-your-ramadan/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.971395
780
3
3
To protect the environment, Bangladesh is building the country’s first waste-to-energy generating plant The country’s first waste-to-energy power plant project is underway at Amin Bazar landfill expansion zone under the Dhaka North City Corporation’s (DNCC) aim for environmental protection. If all goes well, the project will see the light of day in the next two years. However, there is a fear that the combustible waste crisis will disrupt the target of power generation. The city corporation and those involved in the project will face losses due to the scarcity of combustible waste. According to the DNCC’s waste management department, two projects are currently underway for waste management in its 54 wards. The two projects are in the Amin Bazar Landfill Expansion area. Out of these two projects, the Modernization Project at the cost of Taka 7.86 billion and the other is Roads Cleaning and Waste Management Development Project at the cost of Taka 490 million through procurement of modern vehicles and equipment. For the waste management of 54 wards of DNCC, waste removal activities were started in 2009 on 22.20 hectares of land at Amin Bazar Landfill. According to the projection of the donor agency Japan International Cooperation Agency (JICA), the waste disposal program was expected to be completed in 2017. Still, the vertical extension (80 meters wide on the mainland) removes the waste. In the next one-and-a-half years, it will no longer be possible to remove waste from here. The DNCC has completed the acquisition of 32.37 hectares of land at the cost of Tk 5500 million which is in preparation for removing waste. Construction of a power plant from waste is underway on 12.14 hectares of 32.37 hectares of land. The Chinese company China Machinery Engineering (CMEC) is working to generate electricity from waste. The 42.5 MW power plant will cost Tk.15,325 crore (100 crores =1 billion). The price of electricity per kilowatt will be Tk 18.75. The DNCC will compensate the Chinese company if it fails to supply the required waste. Officials at the DNCC’s waste management department say an agreement has been reached with the CMEC to provide them with 3,000 tonnes of waste per day for power generation. However, they will not take construction waste. At present, about 3,500 tons of waste are which is in DNCC. Of this, about 400 tons is construction waste. However, experts say that the country’s first waste power plant will face a waste crisis if the construction waste is left out. An official of the city corporation related to waste management explained the matter, saying that several types of waste got collected from the capital. Meanwhile, CMEC has announced not to take construction waste. Of all the other wastes, only combustible waste is suitable for power generation. Only 10 percent of the waste collected by the city corporation, i.e., 700 tons of waste, is combustible. If the waste power plant starts operating after two years, the maximum combustible waste will be 1000 tons. The official also raised questions about the collected combustible waste. He said that every kg of waste in Dhaka has a calorific value of 600 kcal. But it is not possible to generate electricity without one thousand kilocalories. Most of the waste on it is wet. All in all, this decision does not seem to be correct. Commodore M Saidur Rahman, Chief Waste Management Officer, DNCC, said, “We hope the DNCC will not fall into the waste crisis.” Asked about the benefits of waste power plants, he said, “First of all, the environment will be protected, and the demand for landfills will be reduced.” Mahbubuhar Rahman, secretary of Bangladesh Power Development Board (BPDB), regarding the project’s progress, said that “The Prime Minister has given moral approval to the project. Currently, i t is under the review of the Ministry of Law. Once signed from there, the DNCC, the country’s first waste-to-energy power plant, will see the light of day.
<urn:uuid:47598511-285a-4be9-ab8f-ea63bd6d9e34>
CC-MAIN-2024-10
https://thegreenpagebd.com/bangladesh-is-building-the-countrys-first-waste-to-energy-generating-plant/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.932926
881
2.734375
3
Have you ever thought about the process that goes into making those sleek, tech-loaded running shoes you strap on every day? It’s not something we need to know in order to make the most of our shoes, but it’s an interesting process and can help you appreciate your gear a little more! So how are running shoes made? Here’s a brief overview of how those comfy, designer running shoes come to be. How Are Running Shoes Made? The process of making running shoes is something called a cold cement construction process. It’s a way of creating high-quality products out of top materials, by using a low temperature to bond the shoes together. In order to really understand the process, we should learn a little about the anatomy of the running shoe. What Are the Parts of a Running Shoe? There are really only two parts of a running shoe: the upper and the sole. Let’s dig deeper into each one! What is the Sole Made Out Of? The sole of a running shoe consists of three layers: the insole, the outsole, and the midsole. Different manufacturers use different materials to make the parts of their soles. EVA, polyurethane, gel, other foams, and even liquid components are common in midsoles. Insoles are usually made of foam with a fabric covering. Outsoles usually consist of some kind of rubber, although there are those that are made of polyurethane. The outsole and midsole are usually fused together. Insoles are often removable, to make space for custom orthotics if needed. What Is the Upper Made Out Of? Most running shoe brands use mesh on their upper. It’s light and breathable, perfect for exercise. Some use leather, which is more supportive but less ventilated, even with perforations. Others use knit polyester, which contours nicely to the foot. Many pairs of running shoes have synthetic overlays on their uppers. These are usually made from polyurethane or leather, depending on the shoe. The Manufacturing Process: There’s a very similar process that goes on in every factory. Whichever manufacturer creates your shoes, chances are they’re being made practically the same way. Getting the Fabric The fabric is usually bought ready-prepared. They come in large rolls or synthetic mesh, other textiles, or leather. The shoe factory will order these in bulk, and they’re shipped to the factory already dyed in their specific colors. Shoe Shapes Die-Cut Once the factory has received their fabric, they’ll cut the shoe shapes out of the rolls of fabric using a die-cutter. These are done cookie-cutter style, so there’s very little chance of anything going wrong. Assembling the Upper and Insole In the factory, the various cutouts that will form the upper of the shoe are bonded together. These include the vamp, the tongue, the throat (the part with the lacing holes), any reinforcements or overlays, the heel collar, and any logos that need to be added. This bonding process may be by stitching, or by “cementing”, which is just a fancy way of saying they’re glued together. It’s during this step that the lace holes will be punched out of the upper. The upper doesn’t really look like a shoe at this point. Although the pieces are connected, there’s nothing keeping the shoe together in a foot-like structure. Now, the insole is attached to the sides of the upper if (and only if) it’s a non-removable insole. This gets integrated into the entire upper and can’t be taken out later. After this, there may be stiffer sections added to the toe and heel for reinforcement. Fitting It to a Last Once the upper reaches that point, it needs to be fitted to a shoe last. A last is a mold that will create the final shape of the shoe. This is what gives it an actual shoe-like shape, rather than just floppy material. The shoe last is the deciding factor when it comes to things like the shape of toe boxes, the width of the heel, or and the heel-to-toe drop. It plays a huge role in the final ergonomic design of the footwear. The upper is heated to make it easier to stretch over this mold, which is done by an automatic lasting machine. Once stretched and in place, the molded upper is glued (or cemented) to an insole board. The Midsole & Outsole Are Added With the plastic lasting mold still inside the shoe, the midsole and outsole are added to the footwear. These are also pre-cut for the shape and size of the shoe. Outsole wedges or rubber layers and midsole chunks come separately. The first step here is to cement the outsole and midsole together in perfect alignment. Once this has been done and is dry, the completed outsole/midsole unit is then aligned with the upper, which is still on the last. In most cases, these are then heated so the existing cement (or glue) melts and can be reused to attach the two. That way, the manufacturing process isn’t adding any extra glue to the shoe, but rather using a single application where possible to save weight. Often, the shoe will then be put through some form of rapid cooling. This will cause the upper to contract around the last and settle into its proper, final shape. Now it’s time to remove the last. Because the upper has been placed tightly around it, this isn’t really something that can happen by hand, so an automatic de-lasting machine is usually how it’s done. These machines start by securing the last upside-down on a spike. The outsole of the shoe is facing upwards at this stage. An arm of the machine grabs the shoe by the heel, and simply flicks it off the last, with power that we can’t quite get with just our hands. It leaves no damage, and you’re left with a beautiful, well-shaped running shoe! Adding An Insert If the insole hasn’t already been added at this stage, it’s the only thing now missing from the shoe. This is the point at which it will be added. Most manufacturers purposefully add it later on and not in the midst of the shoe creation process, so that it can be easily removed to make way for custom insoles. Quality Control Inspection At this stage, the shoe is ready for a quality control inspection. Here it will be closely checked for any sign of manufacturing defects. These could be things like loose threads from the material on the upper, places where parts may not have bonded together properly, or any damage to the materials that wasn’t noticed earlier. Shoes that don’t pass the QC inspection may end up going to factory shops and sold for cheaper prices, or in some cases they may be recycled and their materials used again in the full shoe-making process. Those that do pass the quality control inspection are then sent to be cleaned. During the manufacturing process, dust and grime can settle on the various parts of the shoe, leaving it looking like a pair of old, used footwear! The cleaning process gets rid of all that dirt and the shoes come out looking like a squeaky clean, brand new pair of running shoes. This cleaning process is safe and doesn’t do any damage to the newly-constructed shoe The last step of the entire process is packaging the shoes in their relevant pairs. These then get sent off to various stores and warehouses so they can be sold to runners like ourselves!
<urn:uuid:ec19350c-bab2-4f3c-ac00-f8572b5544ad>
CC-MAIN-2024-10
https://thewiredrunner.com/how-are-running-shoes-made/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.940903
1,651
2.578125
3
The Korean War is commemorated on June 25th, and it is possibly the least well-known combat in modern history. As a result, everyone save those who fought in it refers to it as the “Forgotten War” or the “Unknown War.” Because of this, the war’s facts, including why it happened and what happened afterwards, are treated as a Cold War footnote in Western world history classes. Why War Broke Out in Korea? The United States and the Soviet Union liberated annexed Korea, then one country, from the Japanese at the close of World War II. The United States and the Soviet Union then divided the country into two occupation zones: North and South, with the United States, advising the south as it transitioned to a republic and the Soviets taking the north and installing communist leader Kim Il Sung, grandfather of current Supreme Leader Kim Jong Un. In 1948, as the Cold War began, two sovereign republics were established: the south as a republican state, and the north as a communist state. The 38th parallel is the line that separates the two. North Korean forces, the Korean People’s Army, crossed the 38th parallel into South Korea on June 25, 1950, backed by China and the Soviet Union. Their strategy was simple: reunify the Korean Peninsula under Kim’s leadership. Korea would become the Cold War’s first battleground. As a result, the newly founded United Nations and its Security Council authorised the deployment of troops to end the conflict. It was a violent battle between two opposing ideologies: communism and capitalism. As a result, the newly founded United Nations and its Security Council authorised the deployment of troops to end the conflict. It was a violent battle between two opposing ideologies: communism and capitalism. Despite the fact that the United States provided the majority of the fighting force during the Korean War, with almost 5.3 million troops deployed globally by the end of the conflict, more than 55 countries supplied troops, supplies, or other forms of aid to the South Korean cause. Military participation was provided by twenty-one countries. In August 1948, Syngman Rhee, the head of the Republic of Korea Army, organised the South Korean forces that would become the Republic of Korea Army. 30,000 ROKA had died for the cause by the end of the conflict. More than three million North Korean, Chinese, and Russian troops took part in the three-year border battle, which turned into a horrific border war. According to CNN, “the war cost around 1.2 million lives in South Korea, 1 million lives in North Korea, 36,500 lives for US troops, and 600,000 lives for Chinese soldiers.” At initially, the North Koreans made quick headway, seizing Seoul and driving South Korean and American troops back to Busan, South Korea’s southern port. After the Waegwan bridge over the Nakdong River was blown up on August 3, General Douglas MacArthur was able to hold them off. After that, UN forces continued to replenish and reinforce their position with a defensive perimeter. Soon after, the first British troops arrived in Busan. They were quickly dispatched to the western part of the Busan defences, the Nakdong. They and the UN forces counter-attacked after being reinforced. Despite being “forgotten,” the border dispute that escalated into a full-fledged war set the stage for some of the most famous and terrible conflicts in contemporary military history. The Battle of Bloody Ridge, the Battle of Chosin Reservoir, and the Battle of Incheon all took place there. The first, in the midst of the war’s stalemate in 1951, Bloody Ridge, lasted three weeks and resulted in 2,700 UN casualties but 15,000 for the opposing side. The battle of the Chosin Reservoir is widely regarded as the most agonising of the Korean War’s conflicts, and it redefined heroism as demonstrated by US Marines fighting in the harshest terrain Korea had to offer, enduring severe weather and fighting in the harshest terrain Korea had to offer. According to Encyclopaedia Britannica, the amphibious operation at Inchon, which “reversed the tide of the war, forcing the invading North Korean army to flee in chaos along the Korean peninsula,” was a bright moment for U.S. General Douglas MacArthur. In April 1951, the Chinese launched a counter-offensive, intending to retake the South Korean capital. On the 22nd and 25th of April, they were held up by UN forces near Kapyong (now Gapyeong) and on the Imjin River (22-25 April). The British 29th Brigade was in charge of defending the line at Imjin. Despite the fact that the enemy had a numerical advantage, the brigade held its position for three days until being forced to retreat. Imjin River was the British Army’s heaviest fight since WWII, as well as one of the most decisive defensive battles the army has ever fought. The measures slowed the Chinese attack, allowing UN forces to retreat to a safer defensive position north of Seoul, where they were eventually able to stop the enemy. The battle at Imjin signalled the end of the war’s mobile phase. The strategic bombing of North Korea and the imposition of a naval blockade on the country resulted in a stalemate. The Soviets signalled in June that they were inclined to pursue an arbitration settlement. In July 1951, armistice talks began at Kaesong. However, because of differences over the topic of prisoner-of-war exchanges, a settlement could not be achieved. Two years of static fighting followed, with many of the battles taking place in terrible cold and heat. Commonwealth troops were rotated in and out of hill positions, patrolling and defending them. Although the fighting fronts were now static, set-piece actions were nevertheless carried out from time to time as both sides tried to gain control of critical regions of territory and gain a victory that would enhance their negotiation position. From July 1951, British forces were assigned to Major-General James Cassels’ 1st Commonwealth Division. A truce was struck after three arduous years of fighting many battles and losing troops to countries all over the world. Lt. Gen. William K. Harrison, Jr. of the United States Army and North Korean Gen. Nam Il signed 18 copies of the formal Korean Armistice Agreement in three languages on July 27, 1953. The war had a devastating human cost. The Strategic Air Command groups dropped 4,000 tonnes of bombs in the first month of their operation alone. The bombers employed napalm in addition to high explosives. Curtis LeMay now retired, characterised the carnage as follows: “We eventually set fire to every town in North Korea, as well as several in South Korea. We also set fire to [the South Korean city of] Busan, which was an accident, but we set fire to it nonetheless.” Estimates of losses vary significantly, but there is evidence to assume that more than two million people died in North Korea, in addition to the three and a half million military killed, wounded, and missing on both sides. In the end, the border between the two countries remained unchanged from before the invasion by North Korea. At Panmunjom on July 27, 1953, an Armistice was ultimately signed. Korea, however, remained a divided country. The 1st Commonwealth Division was reduced to a brigade-level in 1954 before being phased out in 1957. Since 1953, North and South Korea have taken drastically distinct courses. South Korea has grown into an important Asian economic and industrial force, absorbing global culture and ideas. It is a prosperous capitalist nation, with massive firms exporting goods all over the globe. North Korea is still a communist state. Its economy revolves around the maintenance of one of the world’s largest standing armies. The United Nations has expressed concern about North Korea’s nuclear weapons programme. The Armistice, on the other hand, was not a long-term peace deal between the two countries. While the Armistice stopped all military forces combat in Korea, no peace treaty between the North and South Korean governments has ever been signed to re-establish relations. In essence, the battle never came to a close. A demilitarised zone, or DMZ, was established by extending 1.2 miles on each side of the 38th parallel, but both sides maintain a significant military presence there. Over the last 70 years, the countries have alternated between periods of rapprochement and outright enmity. Some family members are still separated from each other on opposite sides of the border. While North Korea’s sabre-rattling has increased in response to its nuclear-weapons development, the United States maintains a large military presence in South Korea – roughly 28,500 troops. Tensions have risen since the beginning of COVID-19, as the worldwide blockade of commodities and services has wreaked more havoc on North Korea’s economy than any sanctions system. South Korea has fared exceptionally well in the face of the pandemic. North Korea, on the other hand, claims that it has no cases. We know this isn’t true because officials were executed for not following protocol at the start of the pandemic. It’s improbable that peace will be achieved. There can be no tractionable change without a peace treaty to end the Korean War. I just don’t know if there’s enough motivation to make it happen.
<urn:uuid:34cb94a2-67bb-4d62-9944-fadee30e57b7>
CC-MAIN-2024-10
https://thewonk.in/the-korean-war-an-altercation-lost-in-history/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.969555
1,972
4.09375
4
Oil and gas companies are required to take precautions to prevent blowouts in their wells. A blowout is the most dangerous thing that could happen and even with the right preventive measures in place, accidents do still occur. Well control refers to specific measures these companies are supposed to take to prevent blowouts. Because of the extreme measures taken to prevent a well control event from occurring, they usually only happen as the result of human error. An engineer might make a mistake in their calculations that can cause pressure to form in the well. This pressure may cause pipes to burst or an explosion in the well to occur. What is Control of Well Insurance? Control of well insurance helps cover some of the costs associated with well blowouts. This usually includes regaining control of the well, cleaning up any pollution, and even redrilling the well if necessary. A blowout occurs when either crude oil or natural gas is accidentally—or uncontrollably—released from a well. Why Oil and Gas Companies Need Control of Well Insurance If you own or operate an oil drilling business, you face a lot of risks. You’re likely drilling in remote areas or even on the ocean. Oil and gas are highly combustible natural resources, so drilling for them can lead to fires or explosions. This doesn’t just mean an oil spill or loss of equipment—it can also mean loss of life. Not to mention you could be responsible for increased pollution and the associated cleanup, which could cost hundreds of thousands of dollars. If you're drilling offshore wells, an oil spill can be catastrophic. Because of the extreme risks oil and gas companies face, the small cost of insurance is necessary to protect you and your business. What Does Well Control Insurance Cover? Control of well insurance helps cover costs associated with five areas: - Regaining control of the well: Most wells are drilled far underground, in the ocean, and in remote areas. Getting something like this back under control can be costly—especially if extensive damage occurs from an explosion. - Cleaning up the spill: Natural gas and crude oil can be highly toxic when spilled in the wrong area. These spills need to be cleaned up immediately to keep from spreading. This insurance policy can help reimburse you for the cleanup efforts (some even provide specific specialists to aid in the cleanup). This is sometimes referred to as the pollution liability portion of the policy. - Restoring/redrilling the well: Even after you’ve gotten your well back under control, you’ll likely need to restore it to as close to original condition as possible to continue use. If you’re unable to restore it, you have to factor in the cost to completely redrill the well. - Bodily injury: Some control of well insurance policies protect businesses from legal liability for any injuries that arise from the loss of control of a well. - Care, Custody, and Control: This portion of a well control policy covers third-party property damage. This can include things like contractors' equipment, and rental tools, supplies, pipes, or anything else that may have been damaged. When to Submit an Insurance Claim You can submit an insurance claim for a loss of well control event when you’re experiencing an unintended and uncontrollable flow of natural gas or oil that requires cleanup (especially if the exploding or emergence isn’t controlled by blowout preventers). How to Prevent a Well Blowout There are a few preventative measures companies can take to prevent well blowouts and spills. - Utilize a Blowout Preventer (BOP): This is a large valve on a well that controls the flow of oil. It is used to cap a well if a blowout occurs. - Conduct Pressure Tests: If a well is weakened or susceptible to blowouts, the increased pressure can lead to blowouts. The pressure under the earth’s surface should be monitored frequently to prevent blowouts. - Performance Routine Maintenance: Aside from conducting pressure tests, make sure you routinely clear any debris from the well and keep it from clogging. Well control expenses can be costly, but the cost of cleanup is far greater. How Much Does Control of Well Insurance Cost? AmWINS offers premiums for well control insurance starting at $5,500. For small well-drilling companies, policies can start as low as $97 to $159 a month. However, the larger your operation, the more risk you face, and the higher your premiums will be to adequately protect your business. Some companies cover $35,000,000 for well blowouts. The cost of your premium will be impacted by: - The specific details of your business - Where your wells are located (i.e. offshore) - If you’re repairing or redrilling a well - The size of your business We recommend speaking with a specialist to determine the cost your company may be looking at. Get a Free Quote for Your Well Drilling Business As someone working in the oil and gas industry, you know how costly it can be to deal with the aftermath of a well blowout. When a loss of control event occurs, you need to be prepared with the right insurance coverage. Where do you start? Let us help you! You can complete the form at the top of the page or call us at 877-907-5267.
<urn:uuid:ec7731db-720e-4f06-9f94-511bbeeff8a4>
CC-MAIN-2024-10
https://tivly.com/control-of-well-insurance
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.946117
1,109
2.765625
3
29 Mar 2004 For example, a $2,000 increase in assets will also result in either: an offsetting What do these balance sheet items (or accounts) represent? 9 Nov 2018 The Balance Sheet also has two sides(In horizontal form), on the left side, all Liabilities and Capital are posted and on the right side, all accounts (i) Account Form: The distinguishing characteristic of this arrangement of the Balance Sheet data is that assets are listed on the left side and liabilities are listed on 27 Jul 2018 Here, Lee Murphy of Pandle explains how to create a balance sheet and shares a template that you can use to get started. Alternative finance · Banking · Grants · Business Loans · Home » Financing » Accounts & tax Non Profit Balance Sheet Template template that can easily be saved to your Google Drive account. Just create an account and sign in. Examples of a horizontal and vertical balance sheet are shown in Figures 4 and 5 below – again for Mr Schmidt, the This balance sheet sample shows different accounts reported and the layout of the document. Read below for explanations of each category on the example Examples include cash, accounts receivable, inventory, and raw materials your company uses to make a product. On the balance sheet, they should be ranked A balance sheet (aka statement of condition, statement of financial position) is a financial However, it should not be excessive, since capital in the form of long- term When a banks receives a check, it must present the check to the bank on 3 Jan 2019 Liabilities are your business' debts, including accounts payable, mortgages and loans. Shareholders' equity is the amount of money that 13 Nov 2019 Current assets include: Money in a checking account; Money in transit (money being transferred from another account); Accounts receivable ( 9 Mar 2020 Balance Sheet is part of any financial statement which provides a profit and loss account and balance sheet as per the format prescribed in A balance sheet is a financial statement showing a business's worth at a given point that it owes to lenders or banks, for example, as well as the amount of equity. sheet must be filed once a year as part of the company's statutory accounts. 3 Feb 2020 In addition to the cash you have in your bank account, current assets also include : Cash equivalents; Accounts receivable; Inventory; Investments. 26 Jan 2020 Learning and making a balance sheet is not more boring! Check out balance sheet examples at Accounting play, the leading platform for online 29 Oct 2018 Balance Sheet Tips Short Term Assets Trade Account Receivable This could be in the form of loans, accounts payable, wages, taxes, Example balance sheet. Company name and current Note bank accounts can be assets (positive bank balance) or liabilities (bank overdraft/loan). Indeed one With an example, learn about the balance sheet template, equation & more! Following is a sample balance sheet, which shows all the basic accounts Download a balance sheet template to help budget an individual (personal) or Template that is designed to track and monitor financial account information. QuickBooks automatically generates the balance sheet for you, saving you time. You can also download our free excel balance sheet template and example. We discuss balance sheet structure, Assets = Liabilities + Equity, Its Analysis with For example, for Accounts Receivables, we calculate as Receivables / Total Download a balance sheet template to help budget an individual (personal) or Template that is designed to track and monitor financial account information. For example, consider the balance sheet above. Suppose that a bank customer, Cary, withdraws $1,000 in cash from his checking account at the bank. Assets. 10 Jan 2019 For example, an accounting period is typically 12 months long. The line items or accounts on the balance sheet would reflect the number of The balance sheet provides a good picture of the financial health of a business and is For example, the sum of all the listed assets is total assets (Stickney et al ., 2009). Accounts Demystified: The Astonishingly Simple Guide to Accounting. Non Profit Balance Sheet Template template that can easily be saved to your Google Drive account. 3 Jan 2019 Liabilities are your business' debts, including accounts payable, mortgages and loans. Shareholders' equity is the amount of money that
<urn:uuid:397dd240-d450-4f33-b59c-c26d2cbaa967>
CC-MAIN-2024-10
https://topoptionskuou.netlify.app/bonett34340zug/account-balance-sheet-example-100.html
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.900269
868
3.234375
3
Amid a debate over economic growth verses environment, the government has decided to conduct an assessment of the impact of GDP growth on ecology using Green Accounting System and the process will be completed by 2015. The government will soon set up of an expert group headed by environmental economist Partha Dasgupta to provide a road map for Green National Accounting (GNA) system to evaluate impact of economic growth on environment by 2015, Environment Minister Jairam Ramesh told reporters here on Monday. The expert group would be set up jointly by the Planning Commission and Environment Ministry. The GNA would help government bringing out gross domestic product (GDP) growth data co-relating it with impact on the environment. “This expert group will provide a road map for ‘Green’ National Accounts… By 2015, we would report Gross Domestic Product (GDP) after taking into account environmental costs,” he said after releasing an interim report on low carbon strategies for inclusive growth. The panel will also include distinguished economists Nitin Desai, Vijay Kelkar and Kirit Parikh, he said. Planning Commission Deputy Chairman Montek Singh Ahluwalia, who was also present on the occasion, said, “I fully endorse the view of Jairam Ramesh that growth should be sustainable and it is desirable that we should reduce emission intensity.” The decision to conduct the assessment study comes in the backdrop of questions whether fast economic growth was coming at the cost of environment. Mr. Ramesh had recently questioned the country’s nine per cent growth reports, contending that if the impact on ecology had been taken into consideration, the growth would have been only around six per cent. He had said from 2015 onwards, the impact of ecology would be part of calculations to judge the economic growth. Article Courtesy of: http://www.thehindu.com
<urn:uuid:e4a00055-d400-4750-a6d9-b867aa6e75eb>
CC-MAIN-2024-10
https://treeliving.com/govt-assess-whether-economic-growth-hurting-environment/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.963995
390
2.734375
3
The Covid-19 pandemic will not end anytime soon, and people should now adapt to the new way of life, says a public health expert. Schools should be open depending on the community COVID-19 cases and how safety measures the school takes. In an area where the virus is not properly managed, public health expert says it is risky for in-person learning. But in an area where the virus is under control, experts say school still needs to adapt to online learning platforms and minimize the risk when reopening. There is an increase in internet data charges, and this has affected many consumers on using the data. Dr. Soka Moses, an epidemiologist says if online learning should be used there is a need to train teachers and ensure that mobile services reduce its tariff on data in making sure that it is affordable for people. Currently, 395,063 people have access to data according to the Internet live stats. Evidence suggests young children don’t spread the disease very easily, while kids aged 10 and up may transmit as easily as adults. But Dr. Moses experts say the more- conclusive proof is needed. And even though children appear less probably to get infected than adults, and less likely to become seriously ill when they do, severe cases and deaths have occurred. According to the Centers for Disease Control and Prevention, children and teens often have only mild illness or no symptoms when infected. That means they could unknowingly pose a risk to other students — who may pass the virus on to their parents and grandparents — or to teachers and other adults who might be vulnerable to severe illness if infected. Recommended safety measures include wearing face coverings in schools washing hand bucket places at the entrance of schools. The Ministry of Education has emphasized that while the enforcement of hygiene rules and practices for a safe school environment is the school administrator’s responsibility, students, families, and communities also have an important role to play in ensuring compliance. Parents are required to continuously observe their children and if the child shows any symptoms of COVID-19, parents should restrict the child from attending classes as well as contact the health team immediately. It is not known if it is also advised. Cancelling cafeteria and other school gatherings also help, says the U.S. Centers for Disease Control and Prevention. Sierra Leone with far higher cases than in Liberia reopened schools with adjustments and have had no outbreaks tied to schools.
<urn:uuid:0d8d7d48-8d90-47a7-a40b-c5ef5da3fb5c>
CC-MAIN-2024-10
https://tsmliberia.com/is-it-safe-to-reopen-schools-during-the-pandemic/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.967977
498
2.953125
3
Blog > How is solar a solution to climate change? May 30, 2023 by VCT Group Climate change and global warming are the most pressing challenges of our time, with far reaching implications for the environment and human well-being. In response to this, solar power has emerged as a potent and sustainable solution to reduce greenhouse gases. Solar energy is one of the renewable energy sources that provide a multitude of benefits, ranging from reducing carbon emissions, to fostering energy independence, and creating jobs. Let us explore how solar energy plays a crucial role in mitigating climate change by reducing our carbon footprint while simultaneously forging a path towards a better and sustainable future. The sun’s energy is constantly replenished, which means that solar energy is an inexhaustible source of clean and renewable power. As opposed to fossil fuels which release harmful gasses such as carbon dioxide during energy production, the generation of solar power doesn’t lead to any drastic environmental impacts as it releases minimal pollutants. By utilizing photovoltaic technology in the form of solar panels sunlight can be converted into electricity in an effective and efficient way. This reduces our dependence on fossil fuels, further helping us lower greenhouse gas emissions. Once solar energy gets adopted on a larger scale it has the potential to reduce global carbon emissions, which is the primary driver of climate change. Using solar energy to generate electricity provides a path for countries to have greater energy independence and security. Nations can protect themselves from price fluctuations – and geopolitical tension – by expanding and diversifying their energy sources to reduce their reliance on imported fossil fuels. Installing solar panels on commercial and residential buildings, as well as remote/unused land, enables decentralized energy generation and helps reduce the heavy reliance on electric grid. This distributed energy model positively impacts communities and economies worldwide by prioritizing resilience over disruption, balancing energy consumption, and enhancing access to electricity in isolated areas. Burning fossil fuels for electricity generation, industrial processes and transportation contributes primarily to greenhouse gas emissions. Adoption of solar energy can play a transformative role in the attenuation of these emissions. Research conducted by the International Renewable Energy Agency (IRENA) states “About 125 GW of new solar PV capacity was added in 2020, the largest capacity addition of any renewable energy source.” In addition to this, “The global renewable energy share can reach and exceed 30% by 2030.” (IRENA) This reflects the fact that by increasing the global share of solar energy, we can increase the overall share of renewable energy in the global mix, resulting in a massive decrease in greenhouse gas emissions. The solar energy sector has the potential to drive economic growth and create employment opportunities. As the industry expands a wide range of jobs will be created through solar development – from manufacturing and installation, to maintenance and research. According to the International Renewable Energy Agency (IRENA), in 2021 almost 4.3 million people worldwide were employed in the solar sector alone. Investing in solar energy infrastructure or solar projects can drive innovation, encourage local entrepreneurship, and contribute to a sustainable and inclusive economy. Advances in photovoltaic technology have made solar power increasingly affordable and efficient. Over the years the cost of solar panels has dropped significantly, making solar energy more accessible to homes, businesses, and governments. “Solar Module prices fell by up to 93% between 2010 and 2020.” (IRENA) In addition, research and development efforts are continuing to improve the efficiency and storage capacity of solar power systems. Integrating solar energy with energy storage technologies, such as batteries, enables reliable power supply even during periods of low solar irradiation. These advances in renewable energy technologies are paving the way for an economically and environmentally sustainable clean energy future. Climate change is disproportionately impacting vulnerable communities and exacerbating existing social inequalities. Solar energy – especially in the form of solar farms – offers an opportunity to address climate injustice by providing clean, affordable energy to underserved populations. Off-grid solar power solutions can power remote homes, schools and health centers, improving quality of life and enabling economic development. Harnessing solar energy ensures a just and inclusive transition to a sustainable future, ensuring that no one is left behind. Solar power is an optimal and compelling solution to the problem of climate change. Along with being a clean and renewable energy source, solar power fosters energy independence, job creation, and economic opportunities – all while addressing climate injustice. It is time we harness the power of the sun to contribute to the well-being of our planet and its inhabitants. The time for solar is now.
<urn:uuid:c27afe40-afb5-4530-b98d-bf64203b7bbb>
CC-MAIN-2024-10
https://vctgroup.com/how-is-solar-a-solution-to-climate-change/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.930022
926
3.46875
3
User Generated Content (UGC) User Generated Content (UGC), often termed as the voice of the masses in the digital domain, encompasses a wide range of content types created and shared by individuals rather than official content creators or brands. It’s an organic form of expression that reflects the diversity and creativity inherent in the online community. Here’s a more in-depth look into what UGC entails: Definition: UGC is any content – text, videos, images, reviews, podcasts, and more, created and published by unpaid contributors, who are essentially the everyday users of a platform. It’s the digital populace’s way of engaging, interacting, and expressing themselves on various online platforms. Product Reviews: Customers sharing their experiences and opinions about products or services. Social Media Posts: Individuals posting images, videos, or text on social media platforms showcasing their daily lives, opinions, or special moments. Community Forums: Users participating in discussions, sharing advice, or providing solutions to problems within community forums. Blog Comments: Readers sharing their thoughts or additional information in the comment sections of blogs. User-submitted Videos: Individuals sharing videos on platforms like YouTube or TikTok based on their interests and experiences. Now, contrasting UGC with traditional content unveils a spectrum of differences that highlight the evolving nature of content creation and consumption: |User Generated Content (UGC) |Created by professional writers, artists, or designated creators affiliated with established entities or brands. |Created by anyone without professional allegiance, reflecting a more organic and diverse range of perspectives. |Control and Oversight |Goes through a structured editorial process ensuring adherence to specific guidelines and standards. |More spontaneous with minimal to no editorial oversight prior to publication. |Aligns with the goals or agendas of the entities it represents, e.g., marketing, education, or information dissemination. |Driven by individual motives which could range from personal expression, community engagement, to social advocacy. |Authenticity and Relatability |May have a polished and formal tone. |Often resonates for its authenticity and relatability, mirroring the varied voices and experiences of the general populace. Understanding the dynamics of User Generated Content is a stepping stone towards harnessing its potential to build vibrant and engaged online communities. As UGC continues to burgeon, it’s imperative for platforms and businesses to explore effective strategies for managing and leveraging this modern form of digital expression. Through the lens of Visuals API, we delve deeper into the realm of UGC, unveiling its potential to foster authentic connections and vibrant digital dialogues. User Generated Content (UGC) is not just a form of digital expression; it’s a reflection of the evolving landscape of online interaction and community building. As UGC becomes increasingly prominent, it’s crucial for platforms and businesses to not only manage but also leverage this content to foster a more connected and dynamic online environment. Harnessing the power of UGC with Visuals API Visuals API plays a pivotal role in this paradigm shift. By providing advanced tools for analyzing and categorizing UGC, it empowers platforms to effectively manage and utilize this content. Here’s how Visuals API enhances the value of UGC: - Content Moderation: With the influx of UGC, maintaining a safe and respectful online environment becomes a challenge. Visuals API offers robust moderation tools that help filter and manage content, ensuring it adheres to community standards and guidelines. - Enhanced Engagement: UGC is a goldmine for engagement. Visuals API’s tools help platforms identify trends and popular content, enabling them to amplify voices that resonate most with their audience. - Insightful Analytics: Understanding UGC is key to leveraging its full potential. Visuals API provides analytics that delve into user behavior, preferences, and engagement patterns, offering valuable insights for content strategy and decision-making. - Improved User Experience: By categorizing and tagging UGC, Visuals API helps platforms organize content more effectively, making it easier for users to find relevant and interesting content. The future of UGC and Visuals API The future of UGC is intertwined with technological advancements. Visuals API is at the forefront, continually evolving its tools to meet the dynamic needs of digital platforms. The integration of AI and machine learning in UGC management not only streamlines processes but also opens up new avenues for creativity and innovation. In conclusion, UGC represents a shift towards a more inclusive and expressive digital world. Visuals API stands as a crucial ally in this journey, providing the tools and insights needed to harness the full potential of UGC. As we move forward, the collaboration between technology and human creativity promises to unfold new chapters in the story of digital content and community engagement.
<urn:uuid:f92183c8-990e-4af8-ad55-a540d23657c7>
CC-MAIN-2024-10
https://visualsapi.com/what-is-user-generated-content-ugc/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.887319
990
2.65625
3
La Famille De L Eglise Dieu (Former Second Congregational Church) circa 1844 63 Church Street Norwich, CT Norwich’s Second Congregational Church, founded in 1760, played a key role in providing educational opportunities for local African Americans. The present stone building, built in 1844, is a replacement of an earlier wood frame church. A church member, Charles Harrington, established the Sabbath School for African Americans in 1815 to provide instruction in subjects such as reading and religion. By 1817, enrollment had grown to forty-one adults and children. Many of Norwich’s African-Americans joined the congregation, including members of the Williams and Harris families, among the first residents of Jail Hill and leaders in the local anti-slavery movement. In July 1834, a mob disrupted a meeting of the Norwich Anti-Slavery Society at the church; the incident was one of a number of similar attacks throughout Connecticut in the 1830s.
<urn:uuid:975e88a7-29b4-4f8a-8dac-1a5e351ca9c2>
CC-MAIN-2024-10
https://walknorwich.org/freedom-trail/stop-5/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.960821
202
2.921875
3
Harding, Kelley, and Thoreau Walter Harding (1917-1996) was born in Bridgewater, Massachusetts. In addition to being an internationally recognized scholor of Thoreau, he was a distinguished professor at SUNY Geneseo. Although he spent most of his career at Geneseo, Harding previously taught at the University of Virginia, Rutgers University, and the University of North Carolina. He worked at Geneseo from 1956-1982. At the college, Harding served as chair of the English Department for six years and was awarded several of SUNY’s highest honors. In fact, in 1983 (one year after his retirement), Harding became the first SUNY faculty member to be granted an honorary doctorate from SUNY itself. Harding was devoted to studying the life and works of Thoreau. He wrote more than 25 books and articles on Thoreau; this includes biography of Thoreau, The Days of Henry David Thoreau, is considered the ultimate study of Thoreau’s life. Harding edited an edition of Thoreau's Walden that restores Thoreau's sketches to the text and includes abundant footnotes. He also founded the Thoreau Society, serving as the first secretary and at one point the president. Harding’s impact at Geneseo continues to be acknowledged in several ways. His wife, Marjorie Brook Harding, endowed an annual lecture at SUNY Geneseo that bears his name. Each fall, the Walter Harding Lecture brings a distinguished scholar of American literature related to Thoreau to campus. Perhaps most notably, Geneseo's English Department holds meetings, special events, and lectures in the Walter Harding Room of Welles Hall. Walter Harding's interest in civil rights is reflective of the time period he lived throughout which also sparked his interest in Kelley. Another exhibit in this site that portrays this more in depth is the The Days of Walter Harding, Thoreau Scholar. Harding's stance on civil disobedience is relevant to the time period he was apart of. The mid 20th century was a time of civil disobedience as segregation, civil unrest, womens rights, and vietnam war protests were occuring. A Different Drummer was written in the civil rights era, at a time where all that he stood for and supports was evident in society. Kelley's empowerment of the political vision he depicts in the novel suggests how the civil rights era racial hostility, oppression and reparation. The book is essentially a response to many years of injustice that people experience. A Different Drummer's title was influenced and derived from a quote by Henry David Thoreau : “If a man does not keep pace with his companions, perhaps it is because he hears a different drummer. Let him step to the music which he hears, however measured or far away.” The connection between Kelley and Harding is evident through many of Hardings reviews of Kelleys works. They both valued advocating for civil rights and found themselves interesting in the civil rights movement of the 1960's.
<urn:uuid:e8e0b55e-d4aa-4c33-86a9-34f1edfbe840>
CC-MAIN-2024-10
https://walterharding.org/exhibits/show/hardingkelley/placeholder
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.978719
629
2.984375
3
Table of Contents Do mammals have an internal skeletal system? All vertebrate animals (fish, amphibians, reptiles, birds and mammals) have internal skeletons. Which protects the soft inner body parts of animals like turtle and snail? The shells you find littered along the beach are actually the ‘skeletons’ of invertebrate animals called mollusks. Unlike the internal skeleton of humans, mollusks actually have an external skeleton. This exoskeleton protects the animal’s soft inner body parts and acts as a sight for muscle attachment. What are the 2 types of skeleton? The adult human skeleton usually consists of 206 named bones. These bones can be grouped in two divisions: axial skeleton and appendicular skeleton. What is human endoskeleton? The human skeleton is an endoskeleton that consists of 206 bones in the adult. It has five main functions: providing support to the body, storing minerals and lipids, producing blood cells, protecting internal organs, and allowing for movement. What are the external structures of mammals? Mammals in general are vertebrates that possess hair and mammary glands. The mammalian integument includes various secretory glands, including sebaceous glands, eccrine glands, apocrine glands, and mammary glands. Mammals are synapsids, meaning that they have a single opening in the skull. What kind of skeleton do mammals have? By definition, mammals are vertebrates, which means that all mammals have an internal skeleton that supports the body. This structure is characteristically made up of over 200 bones and supports muscles and ligaments throughout the body. Do all mammals have a backbone? The backbone is the observable feature that defines whether the animal is a vertebrate or an invertebrate. Fish, reptiles, birds, amphibians and mammals are different sub-groups of vertebrates – they all have internal skeletons and backbones. What are mammal skeletons? Mammals are highly advanced vertebrate animals and have complex skeletons. The mammalian skeleton is split into the axial and appendicular skeletons. The axial skeleton consists of the skull, spinal column and rib cage and the appendicular includes the bones of the arms, legs, hands, feet, pelvis and shoulder. What is skeleton of a mammal? Mammalian Skeleton The axial skeleton is made up of the braincase, or cranium, which encloses the brain, and the backbone and ribs. The axial skeleton’s main function is to protect the nervous system. The bones in the limbs and the girdles, which support the limb bones, make up the appendicular skeleton. What is the 206 bones? The adult human skeleton is made up of 206 bones. These include the bones of the skull, spine (vertebrae), ribs, arms and legs. Bones are made of connective tissue reinforced with calcium and specialised bone cells. Most bones also contain bone marrow, where blood cells are made. What is mammalian skeleton? Is teeth exoskeleton or endoskeleton? Teeth are considered part of the skeleton system even though they are not bone. Teeth are the strongest substance in your body being made up of enamel and dentin.
<urn:uuid:0dfd4039-a4d6-4456-88cb-6d6b30cfd995>
CC-MAIN-2024-10
https://wisdom-advices.com/do-mammals-have-an-internal-skeletal-system/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.897942
673
3.71875
4
In Anarchical Fallacies (1796), the English utilitarian philosopher Jeremy Bentham said that the concept of natural rights was nonsense and that to claim rights not prescribed in the laws of the state was ‘nonsense on stilts.’ He argued that to confuse wishing that we possessed a right with the existence of the right itself was a fallacy. Moreover, the rights recognized by state law are granted by the government, guaranteed by the judiciary, and enforced by its control of the armed forces and police. There would, said Bentham, be anarchy if the advocates of natural rights were to succeed in challenging those conferred legally by the state. There is also the Marxist view of law as part of an ideological superstructure derived from a class-based economy. On 10 December 1948, the United Nations General Assembly, meeting in Paris, adopted a Universal Declaration of Human Rights. It considered this an historic act in the mission of the United Nations to maintain world peace and liberate individuals from unjustified oppression. The Declaration enshrined rights ranging from everyone being born free and equal in dignity and rights (article 1) to no state, group or person having any right to destroy any of the rights and freedoms set out in the document (article 30). Among other well-meaning platitudes, the Preamble states: Whereas recognition of the inherent dignity and of the equal and inalienable rights of all members of the human family is the foundation of freedom, justice and peace in the world, Whereas the peoples of the United Nations have in the Charter reaffirmed their faith in fundamental human rights, in the dignity and worth of the human person and in the equal rights of men and women and have determined to promote social progress and better standards of life in larger freedom, Whereas Member States have pledged themselves to achieve, in co-operation with the United Nations, the promotion of universal respect for and observance of human rights and fundamental freedoms, The Preamble, supported by thirty articles, set out what the General Assembly regarded as fundamental human rights to be recognized and protected universally. The Declaration was a statement of utopian internationalism and the ideal of common humanity. This was in the aftermath of a destructive world war, with international politics divided ideologically and experiencing the traumas of post-colonialism. The General Assembly urged the United Nations Economic and Social Council (ECOSOC) and Specialized Agencies, such as the United Nations Educational, Scientific, and Cultural Organization (UNESCO), the International Labour Organization (ILO), and the World Health Organization (WHO), and non-governmental organizations generally to promote the Declaration. Member states were asked to show commitment by disseminating it as widely as possible, especially through formal education. It was certainly much translated and printed but typically of such documents not necessarily read. The 10 December was designated Human Rights Day. Crucially, the Declaration was not a treaty signed or ratified by the member states. It was not binding formally. However, the rights and freedoms it declared were used to create binding instruments such as the European Convention on Human Rights agreed in 1950. It has also been followed by many other human rights statements, including some formalized as treaties. On the 75th anniversary, the United Nations Office of the High Commissioner for Human Rights called on member states to “rejuvenate the Universal Declaration of Human Rights, demonstrate how it can meet the needs of our time and advance its promise of freedom, equality and justice for all.” A mechanism is the United Nations Universal Periodic Review (UPR) which considers the human rights records of member states. The issues covered include human rights protection concerning immigration and asylum, the many forms of potential discrimination, hate crimes, and the ratification of UN human rights treaties. This provides valuable information although of varied reliability, while there is often a considerable gap between formal statements and practice. So, what is the reality seventy-five years on? The law of states remains fundamental. But states are by their political nature protective of sovereignty and power. The United Nations, aggravated by the Security Council system, cannot enforce an alternative. The result is seen in the repressive records of states described euphemistically by the UN Human Rights Council, which replaced the United Nations Commission on Human Rights in 2006, as ‘’… moving at different speeds, as being faced by unique challenges.” This includes elected members of the Human Rights Council itself. Russia, also a Security Council member, was suspended in 2022 for gross and systematic violations of human rights committed during its invasion of Ukraine. However, the International Criminal Court’s Arrest Warrant for Vladimir Putin, President of Russia, and Maria Lvova-Belova, Russian Commissioner for Children’s Rights, alleging responsibility for the war crime of unlawful deportation and transfer of children during the current Russo-Ukrainian War remains unenforced. The Organization for Security and Cooperation in Europe, the Commission of Inquiry on Ukraine, and the Special Rapporteur for Human Rights in Russia have fared no better. Unfortunately, there are many other examples, too many to list here, in which we see historical hatreds and enormities renewing themselves, taking or damaging human life and its prospects. There are also new forms of human exploitation, including victims of criminality. We should reflect on this as the British Government struggles to find a policy for immigration and asylum. Identifying, protecting, and strengthening human rights are best done through legal principles and commitments that are accepted and shared internationally as solutions to common problems. Despite continuing good intentions on the part of many, anything less is ‘nonsense on stilts.’
<urn:uuid:eb38a89b-0dcc-4b51-b8d4-df181416cbfa>
CC-MAIN-2024-10
https://wiserd.ac.uk/blog/nonsense-on-stilts-75-years-of-the-universal-declaration-of-human-rights/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.959848
1,137
3.078125
3
Ambulatory care is a crucial component that has gained relevance in the constantly changing healthcare landscape. This cutting-edge method of delivering healthcare focuses on offering medical treatments outside of conventional hospital settings. Without the requirement for overnight hospital stays, ambulatory care provides a variety of outpatient treatments that enable people to receive prompt diagnosis, treatment, and follow-up care. Ambulatory care, which places a strong emphasis on convenience and accessibility, is essential in addressing patients’ changing requirements. What is Ambulatory Care? The term “ambulatory care” describes medical treatments given to patients on an outpatient basis without the necessity for an overnight stay in the hospital. What is a CNA? It includes a range of healthcare services, such as prevention, follow-up care, diagnosis, and treatment. Clinics, urgent care facilities, ambulatory surgery centers, diagnostic facilities, and even virtual platforms through telehealth can be considered ambulatory care settings. Ambulatory care’s major goal is to provide prompt, patient-centered treatment that is accessible to all, enabling people to receive the essential medical care without having to disrupt their everyday routines. This method seeks to increase comfort, lower healthcare expenses, and encourage proactive patient involvement in healthcare decisions. Also Read: Cheapest Medical Schools in Florida Advantages of Ambulatory Care These are a few of the main benefits of ambulatory care: 1. Practicality and Accessibility Individuals can obtain medical care through ambulatory care, which brings healthcare services closer to them and eliminates the need for overnight hospital stays. In order to give patients flexibility and convenience in scheduling appointments and to minimize disturbances to their daily life, services can be accessed by patients in clinics, urgent care facilities, or through telehealth platforms. 2. Less Cost In general, ambulatory care is less expensive than hospital-based treatment. Patients can save money by avoiding hospital stays and related costs like room and board and perhaps unnecessary specialized services. By maximizing resource usage and avoiding needless hospital stays, ambulatory care also contributes to lower healthcare system costs. 3. Prompt Diagnosis and Care Ambulatory care places a strong emphasis on quick access to medical treatments. Patients can get an accurate diagnosis, early intervention, and suitable care. Consequently, enhancing health outcomes and maybe stopping the development of illnesses or difficulties. 4. Care That Is Patient-Centered Patient-centeredness is emphasized in ambulatory care, giving special attention to each patient’s needs, preferences, and participation in decision-making. Patients and healthcare professionals can build enduring bonds that promote continuity of care and individualized treatment regimens. 5. Improved Health Management In controlling chronic illnesses including diabetes, hypertension, and asthma, ambulatory care is essential. Patients who receive ambulatory care are better able to control their diseases and avoid exacerbations or consequences thanks to routine check-ups, medication management, and lifestyle modifications. 6. A Decrease in Readmissions to Hospitals A hospital readmission occurs when a patient who has already been discharged within a predetermined timeframe goes back to the same or a different hospital. Ambulatory care can aid in lowering hospital readmissions when combined with the proper follow-up treatment and monitoring. Successful transitions from acute care to the community environment depend on continued assistance, careful monitoring of patients after hospital discharge, and medication changes. 7. Technology Integration Technology improvements like electronic health records (EHRs), telemedicine, and remote monitoring tools are embraced by ambulatory care. These developments enhance patient experience and efficiency by facilitating smooth communication among healthcare professionals, improving care coordination, and enabling remote access to healthcare services. 8. Health Education and Prevention Preventive care, screenings, and health promotion activities are prioritized in ambulatory care. Patients are better equipped to actively manage their health, prevent diseases, and adopt healthy lifestyle choices with the help of routine checkups, immunizations, and health education. Types of Ambulatory Care Various healthcare services offered as outpatients are included in ambulatory care. These services include anything from routine check-ups to specialized treatments to meet a variety of medical requirements. Following are some prevalent forms of ambulatory care: 1. Primary Care A fundamental part of ambulatory care, primary care concentrates on giving people of all ages comprehensive and ongoing medical care. These healthcare professionals, such as family doctors, internists, and pediatricians, serve as patients’ primary points of contact and take care of a range of medical requirements. Preventive care, health maintenance, disease management, and initial diagnosis of common ailments are among these services. 2. Urgent Care Ambulatory care is not complete without urgent care, which provides quick medical attention for non-life-threatening diseases that need to be treated right away. These care facilities are set up to treat a range of urgent medical requirements, such as minor diseases, infections, and injuries. When primary care doctors are not available or when people want prompt care after regular business hours, extended hours and walk-in appointments offer easy access to healthcare services. Additionally, X-rays and laboratory tests are available on-site at urgent care facilities, enabling quick diagnosis and effective treatment. 3. Specialty Clinics Specialty clinics, which provide specialist medical services for particular specialties or illnesses, are essential to ambulatory care. These clinics are staffed by medical specialists having training in a particular area, such as women’s health, dermatology, orthopedics, or cardiology. Patients seek consultations, diagnoses, treatments, and continued care for their ongoing medical requirements at specialized clinics. Specialty clinics make sure that patients obtain specialized expertise and treatment alternatives to maximize their health results by providing comprehensive care within a particular field of medicine. 4. Ambulatory Surgery Centers The provision of surgical operations on an outpatient basis is the primary emphasis of specialized healthcare facilities known as ambulatory surgery centers (ASCs). As patients can have treatments done there and be on their way home the same day, these facilities are intended to provide a practical and effective substitute for conventional hospital-based surgery. Modern surgical tools are available in ASCs, which also have highly qualified surgeons and medical personnel working there. They offer a wide range of operations, such as endoscopies, small surgeries, and pain management techniques. 5. Diagnostic Centers Diagnostic facilities are crucial to ambulatory care because they provide a range of services to identify and track medical disorders. To provide precise representations of inside body structures, these facilities make use of cutting-edge imaging technology like X-rays, ultrasounds, MRI scans, and CT scans. They also provide laboratory examinations to examine blood, urine, and other samples to find diseases and anomalies. Healthcare professionals rely on diagnostic centers to help them make accurate diagnoses, create effective treatment plans, and track the development of patients’ diseases. 6. Rehabilitation Services With a focus on assisting patients in recovering and regaining their functional abilities following accidents, operations, or the management of chronic diseases, rehabilitation services are a crucial component of ambulatory care. These services cover a range of therapies, such as speech, occupational, and physical therapy. Through exercises and manual approaches, physical therapy increases flexibility, strength, and coordination. The goal of occupational therapy is to improve daily living skills and foster independence in caring for oneself and performing job-related duties. Speech therapy treats issues with swallowing and communicating. Services for rehabilitation are customized for each client, fostering healing, maximizing independence, and enhancing general quality of life. 7. Telehealth services Patients can receive consultations, diagnosis, and follow-up care from the convenience of their homes because to telecommunications technologies. Numerous advantages come from using telehealth services, such as enhanced convenience, better access to healthcare for remote or underserved populations, decreased travel expenses and times, and the ability to get timely prescriptions and medical advice. Telehealth has developed into a crucial tool for providing effective and patient-centered treatment, improving healthcare accessibility, and extending the reach of healthcare providers through the combination of secure video conferencing, remote monitoring equipment, and digital health platforms. Outpatient Care vs. Ambulatory Care Outpatient care and ambulatory care are both interchangeable. Both of these refer to the same class of medical care. Both phrases refer to medical treatment that does not require an overnight stay at a clinic or hospital. The term “ambulatory care” can be used to describe anything from a quick diagnostic examination to a detailed rehabilitation program or even just regular preventative medical exams. Employment Opportunities in Ambulatory Care The non-emergency medical care that ambulatory care physicians offer is identical to that of their in-patient colleagues. They treat patients in places other than hospitals, like outpatient surgery facilities, walk-in clinics, pop-up stores, and online consultations. Nursing and healthcare management graduates are well-suited for jobs in community and outpatient care. Ambulatory care facilities need to manage and coordinate operations at a similar level to large hospitals and emergency rooms. In a number of outpatient settings, ambulatory care nurses concentrate on treating particular patient subgroups. This position may present you with the chance to specialize in a particular area of practice if you are a nurse. Ambulatory Care Nursing (ACN) is a branch of nursing that enables students to concentrate on being ready for a particular position in this industry. Frequently Asked Questions What distinguishes non-ambulatory patients from others? Non-ambulatory patients have restricted mobility and need assistance or a wheelchair, whereas ambulatory individuals can walk and move around on their own. What part does the nurse play in providing ambulatory care? Evaluating and keeping track of patients' health. administering treatments and drugs. patient education regarding self-care and their ailments. helping with procedures and exams. ensuring the comfort and safety of the patient while they are there. Organizing documentation and keeping thorough records. Are all medical conditions eligible for ambulatory care? The majority of non-life-threatening conditions, preventative treatment, regular check-ups, and follow-up visits are best handled by ambulatory care. However, some disorders could need inpatient treatment or specialist facilities depending on how severe and intricate they are. How do I get services for ambulatory care? Clinics, urgent care facilities, specialist outpatient facilities, ambulatory surgery centers, and even telehealth platforms frequently offer ambulatory care services. You can learn more about the ambulatory care choices in your region by contacting nearby hospitals or clinics. Ambulatory care, which emphasizes ease, accessibility, and patient-centeredness, has transformed how healthcare is provided. Ambulatory care enables people to retain their regular routines while receiving prompt, individualized medical attention since it provides a wide range of outpatient services. This strategy appeals to both people and healthcare professionals because of its adaptability and affordability. Learn more about the ambulatory care services in your area and how they can help you by speaking with your healthcare physician.
<urn:uuid:61443398-cc78-47f3-84a4-5617e9ef5eb8>
CC-MAIN-2024-10
https://worldscholarshipvault.com/what-is-ambulatory-care/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.935798
2,306
3.046875
3
The U.S. Army’s Special Forces are known to most as the Green Berets. These legendary soldiers have been honored in books, films, and songs. At any given time, Army Special Forces can be found in 80 to 90 countries around the world, conducting missions essential to U.S. and allied nations’ security. They are the shadow warriors, the “quiet professionals.” The training pipeline is long. Candidates must pass through several phases before they can earn the right to wear the Green Beret and bear the title. What makes these troops so unique? While the paragraphs below will spell out several key reasons, the short answer is: everything. History of Special Forces The Army’s Special Forces were officially founded on June 11, 1952, at Smoke Bomb Hill at Ft. Bragg, North Carolina, during the height of the Cold War. Col. Aaron Bank was the first commander and has been considered the “Father of Special Forces” since he formed the 10th Special Forces Group. The Army chose that designation – 10th SFG – to confuse the Soviet Union into believing that more special forces groups would meet them if they chose to invade Western Europe. Many of the original plank holders, Bank included, hailed from the World War II Office of Strategic Services, the first U.S. military/civilian intelligence agency and the forerunner of both the Special Forces and the CIA. In 1953, the 10th SFG was split, with Bank taking the 10th to Bad Tolz, Germany, while the troops that remained in Ft. Bragg formed the 77th Special Forces Group cadre. In 1960, that group was redesignated the 7th SFG. Special Forces went through a large expansion during the war in Vietnam. Special Forces A-camps were dotted throughout South Vietnam, where troops trained ethnic Vietnamese and Montagnard tribes in the Civilian Irregular Defense Group program. They also conducted special operations under the MACV-SOG (Studies and Observation Group). More than 20 Medals of Honor were awarded to special forces troops for actions during the Vietnam War. After a drawdown in the 1970s, SF was re-energized in the 1980s, and Special Forces became its own branch on April 9, 1987. The Special Operations Command, or SOCOM, was formed to place all SOF units under one umbrella organization. SOCOM has grown exponentially since the onset of the Global War on Terror, and Green Berets have served in the hot spots of both Iraq and Afghanistan. Special Forces and CIA paramilitary operators were the first on the ground in Afghanistan, just weeks after the 9/11 attacks. Long, Arduous Training The training for Green Berets begins with the SF Assessment and Selection Course. Once a candidate is selected for training, they begin the SF Qualification Course. The training can last anywhere between 55 and 95 weeks, depending on the occupational specialty. Green Berets are typically a bit older and more mature than their conventional counterparts. Special Forces medics are highly trained. In some cases, when operating in the Third World, they are better trained than some nations’ doctors. Medics are arguably the biggest rapport-builders when deployed. Their training pipeline is the longest of all the specialties. Special forces troops are trained in several different missions, but their bread and butter is unconventional warfare, an area where they have no peers in the U.S. military. Primary special forces missions include but are not limited to: – DIRECT ACTION – Direct Action missions are short-duration strikes used to seize, capture, recover or destroy enemy material, or recover personnel. – SPECIAL RECONNAISSANCE – Actions conducted in sensitive environments to collect or verify information of strategic or operational significance. – COUNTERINSURGENCY – Special Forces troops respond to terrorist activities and train other nations’ militaries in the basics of fighting insurgents. – UNCONVENTIONAL WARFARE – The primary Special Forces operation, unconventional warfare comprises activities conducted to enable a resistance movement or insurgency to coerce, disrupt, or overthrow a government or occupying power by operating through or with an underground, auxiliary, and guerrilla force in a denied area. – FOREIGN INTERNAL DEFENSE – This is the act of training and equipping foreign allied military forces to defend against insurgency, subversion, terrorism, and other security threats. – SECURITY FORCE ASSISTANCE – Special Forces soldiers train and develop the defense capabilities of friendly and developing nations. Special Forces troops serve in 12-man A-Teams, frequently in small, isolated bases away from conventional support. They must be able to adapt to and overcome obstacles on their own. The typical 12-man A-Team is comprised of: 18A – Special Forces Officer 180A – Special Forces Warrant Officer 18B – Special Forces Weapons Sergeant 18C – Special Forces Engineer Sergeant 18D – Special Forces Medical Sergeant 18E – Special Forces Communications Sergeant 18F – Special Forces Intelligence Sergeant 18Z – Special Forces Operations Sergeant Special forces groups are area-oriented toward a language and culture so that Green Berets can teach and train alongside partner-nation troops and speak to them in their own language. A-Teams are specialized, and each company will have designated Mountain, SCUBA (Combat Diver), Military Free Fall (HALO) teams, and other specialties. A Green Beret Is a Fighter and a Teacher Several years ago, I wrote an article about how teaching is an art for Green Berets. While the training of our allied partners isn’t as sexy as the door-kicking Direct Action missions, it is an essential task. Being able to reach and teach a foreigner in his own language is a tremendous boost to building rapport, earning trust, and creating a successful team with foreign allies. That’s where cultural awareness and language training become so important. There are many special operations forces in the U.S. military. But only one is designated Special Forces: The Army’s Green Berets. Steve Balestrieri is a 1945 National Security Columnist. He served as a US Army Special Forces NCO, and Warrant Officer before injuries forced his early separation. In addition to writing for 19fortyfive.com and other military news organizations, he has covered the NFL for PatsFans.com for over 11 years. His work was regularly featured in the Millbury-Sutton Chronicle and Grafton News newspapers in Massachusetts.
<urn:uuid:4722c905-fe1a-4e46-bb1e-f1d3c9b71d24>
CC-MAIN-2024-10
https://www.19fortyfive.com/2023/07/green-beret-70-years-of-greatness/?utm_source=pocket_mylist
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.952632
1,352
2.765625
3
Current society is a consumerist society (Rojek, 2004). Here people partially define their goals in life by the products that they buy and consume. This literally applies to the case of food products. Where other products find some use with time, food products are perishable and this leads to accumulation of wastage in food. The wastage of food is a growing problem in the United Kingdom. WRAP estimates suggest that the wastage of food is almost a third of the food that purchasers buy. At least half of the food is that which could have been consumed if there had been efficient food management practices. Research shows that the households in the United Kingdom waste as much as 4.2 million tonnes of food and drink which is estimated at a value of £12.5 billion (WRAP, 2013). The perishable nature of the food leads to wastage as there is a surplus of acquisition which does not match up to consumption. Here the food that is wasted are mostly vegetables, salads, and others that are priced very low (Allen, 2014). Food that is priced higher does not get wasted as much. The reasons that this wastage of food occurs is manifold. The primary of them is that food gets wasted because they are available cheaper, they are also accessible in an easier manner than before and more often the purchaser notices that there is very little storage space after buying it. An economic motivation to conserve food seems to be missing in this age of surplus (Smithers, 2013). The reasoning behind why this economic motivation is missed and if there is a relationship that can be traced between the competitive pricing of food by supermarkets and the value perception of the food by consumers forms the background for this research
<urn:uuid:b7202162-c0ac-4ae0-be5e-b04728109d70>
CC-MAIN-2024-10
https://www.advancedthesis.co.uk/ying-guo-bu-li-si-tuo-da-xue-lun-wen-dai-xie-shi-pin-lang-fei/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.780167
346
3.359375
3
Scammers use dishonest or illegal activities like phishing, fraudulent behaviour and threats to steal personal or financial information. AFCA sees a wide variety of complaints involving scams including investment, romance, invoice hacking, telecommunication, and Australian Government agency scams (such as those purporting to involve the police or the tax office). If you share or store personal information like credit card details or bank account passcodes online, you could be at risk of a scam. This page outlines what scammers can do with your personal information, how you can avoid a scam, and what to do if you think you are a victim. For more information, you can visit Scamwatch or the Australian Competition and Consumer Commission (ACCC). Why scammers want your personal information Your personal and financial information is valuable. Scammers can use this information to steal your identity for personal or financial gain. With your personal information, scammers will try to: - access your bank account and withdraw money - set up new bank accounts in your name - take out loans or sign up to credit cards in your name - sign up to phone plans or other services - purchase expensive goods in your name - steal funds from your superannuation - access your government online services such as MyGov - access your email to find more information or impersonate you - access your social media accounts to impersonate you – scamming your family and friends. How to avoid a scam Scammers target people of all backgrounds and ages. Always be alert to scams, especially online, and try keep personal information private. Scammers often use a sense of urgency to put pressure on people to send money and will often try to build trust with you over time. Simple ways to protect your personal information and avoid scams: - If you are contacted by someone purporting to be from your bank, telecommunications company or a government agency, before giving access to any of your personal details, contact the relevant body to check it was them who contacted you. - If someone is putting pressure on you to send funds or a deal seems too good to be true, you should pause; take time to review the suggestion and maybe discuss it with a trusted family member, friend or adviser. - Never send money or give credit card details to someone you don’t know, or a business you do not trust. - Always check a business is legitimate before sending funds or personal details to it – such as by searching its name on the ACCC’s Scamwatch website or ASIC’s MoneySmart website. - Never send online account details or copies of personal documents to anyone you don’t know or trust. - Lock your mailbox and use passwords for email. - Shred sensitive documents and store any digital versions using security software. - Do not forward or open strange or unreliable emails or website links. - Check your credit report at least once a year. You can use a reputable credit reference bureau to help you monitor and catch unauthorised activity. - Always report a scam to help others from falling victim. - If you have been making regular payments to an account and you get an email telling you the account details have changed, always call the recipient of the payment to check they made the change. What to do if you think you’ve been a victim of a scam If you’ve lost money, given personal information to someone you don’t know, or think you have been the victim of a scam, there are some steps you can take to protect yourself from further loss: - If you’ve sent money or shared your banking or credit card details with someone you don’t know, contact your financial firm or bank immediately. - If the scam occurred on social media, report it to the social media platform. - If you’ve given your personal information to a scammer, visit IDCARE – Australia and New Zealand’s not-for-profit national identity and cyber support service. - Ask for a credit report from a reputable credit reference bureau. - Take the time to warn your friends and family about scams and do not share or forward unreliable emails or website links. - Report a scam to Scamwatch. When to contact AFCA If you’ve sent money or shared your banking or credit card details with someone you don’t know, you should contact your bank or financial firm immediately. If you are not satisfied with their response, you can lodge a complaint with AFCA. AFCA is a non-government organisation providing free, fair and independent help with financial disputes. Our role is to assist consumers and small businesses to reach agreements with financial firms about how to resolve their complaints.
<urn:uuid:44feb686-07ea-4ff7-9b3d-7e9e149ad26f>
CC-MAIN-2024-10
https://www.afca.org.au/scams-things-to-look-out-for-and-how-to-protect-your-information
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.913641
985
2.546875
3
Mini Review - Journal of Diabetology (2023) Volume 7, Issue 2 Managing diabetes through proper diet and nutrition: A comprehensive guide.Harnarayan Yadav* Department of Pharmacology, All India Institute of Medical Sciences, Delhi, India - *Corresponding Author: - Harnarayan Yadav Department of Pharmacology All India Institute of Medical Sciences Received: 02-Mar-2023, Manuscript No. AADY-23-92587; Editor assigned: 04-Mar-2023, PreQC No. AADY-23-92587(PQ); Reviewed: 18-Mar-2023, QC No. AADY-23-92587; Revised: 22-Mar-2023, Manuscript No: AADY-23-92587(R); Published: 29-Mar-2023, DOI:10.35841/aady-7.2.137 Citation: Yadav N. Managing diabetes through proper diet and nutrition: A comprehensive guide. J Diabetol. 2023;7(2):137 Diabetes is a chronic disease that affects millions of people worldwide. While there are various treatment options available, proper diet and nutrition play a vital role in managing the condition. This comprehensive guide aims to provide information on the importance of a healthy diet and lifestyle changes in the prevention and management of diabetes. The guide covers topics such as the basics of diabetes, the impact of food on blood sugar levels, essential nutrients and their sources, meal planning, portion control, and healthy snacking. It also discusses the role of exercise and stress management in diabetes management, along with tips for dining out and managing diabetes while traveling. By following the recommendations outlined in this guide, individuals with diabetes can improve their overall health and reduce the risk of complications associated with the condition. Chronic disease, Blood sugar, Diabetes. Diabetes is a chronic condition that affects the way the body processes blood sugar or glucose. It is a widespread health problem that impacts millions of people worldwide. Proper management of diabetes is essential to prevent complications such as heart disease, kidney damage, and nerve damage. While medication and insulin therapy are available treatments, a healthy diet and lifestyle changes play a vital role in managing the condition. This comprehensive guide aims to provide valuable information on the importance of diet and nutrition in managing diabetes . It covers various topics related to food, nutrients, meal planning, and portion control, along with tips for dining out and traveling. It also discusses the role of exercise and stress management in diabetes management. Understand your nutritional needs The first step in managing diabetes through proper diet and nutrition is to understand your nutritional needs . This includes understanding the types of nutrients that your body needs to function properly, as well as the amount of carbohydrates, proteins, and fats that you should be consuming each day. A registered dietitian or certified diabetes educator can help you develop a personalized meal plan that takes into account your individual nutritional needs, as well as your personal preferences and lifestyle. Focus on complex carbohydrates Carbohydrates are an essential source of energy for the body, but not all carbohydrates are created equal. Complex carbohydrates, such as whole grains, fruits, and vegetables, are digested more slowly by the body and do not cause spikes in blood sugar levels. In contrast, simple carbohydrates, such as white bread, sugary drinks, and candy, are quickly absorbed by the body and can cause rapid spikes in blood sugar levels. Therefore, people with diabetes should focus on consuming complex carbohydrates as a source of energy. Whole grain bread, brown rice, and quinoa are all good choices for complex carbohydrates . In addition, fruits and vegetables are excellent sources of complex carbohydrates, as well as vitamins, minerals, and fibre. Limit saturated and trans-fats Saturated and Trans fats can increase the risk of heart disease, which is a common complication of diabetes. Therefore, it is important to limit your intake of these types of fats. Saturated fats are found in animal products such as meat, butter, and cheese, while trans-fats are found in processed foods such as snack foods and fried foods. Instead of consuming saturated and Trans-fats, try to include healthy fats in your diet. These include monounsaturated and polyunsaturated fats, which are found in foods such as nuts, seeds, and fatty fish. These types of fats can help improve heart health and reduce inflammation in the body . Include lean protein Protein is important for maintaining muscle mass and supporting overall health. However, not all protein sources are created equal . Lean protein sources such as chicken, fish, beans, and legumes are good choices for people with diabetes. These sources of protein are low in saturated fat and can help stabilize blood sugar levels. In contrast, high-fat protein sources such as red meat and full-fat dairy products should be limited. These types of protein sources can increase the risk of heart disease and can cause spikes in blood sugar levels. Monitor portion sizes Finally, it is important to monitor portion sizes when managing diabetes through proper diet and nutrition. Even healthy foods can cause spikes in blood sugar levels if consumed in excess. A registered dietitian or certified diabetes educator can help you develop a personalized meal plan that takes into account your individual nutritional needs, as well as appropriate portion sizes. Managing diabetes through proper diet and nutrition is an essential part of diabetes management. By focusing on complex carbohydrates, limiting saturated and Tran’s fats, including lean protein, and monitoring portion sizes, people with diabetes can help manage their blood sugar levels and reduce their risk of complications. A registered dietitian or certified diabetes educator can provide personalized guidance on how to develop a healthy eating plan that works. - Moore J, Fung J. The complete guide to fasting: Heal your body through intermittent, alternate-day, and extended fasting. Simon and Schuster. 2016. - Gray A, Threlkeld RJ. Nutritional recommendations for individuals with diabetes. Endotext [Internet]. 2019. - Lorig K, Ritter PL, Villa FJ, et al. Community-based peer-led diabetes self-management. Diabetes Educ. 2009;35(4):641-51. - Powers MA. Handbook of diabetes medical nutrition therapy. Jones & Bartlett Learning. 1996. - Greene B, Merendino Jr JJ, Jibrin J. The best life guide to managing diabetes and pre-diabetes. Simon and Schuster. 2009.
<urn:uuid:dbad4733-243e-48d1-8ed7-c790aeb5ad1c>
CC-MAIN-2024-10
https://www.alliedacademies.org/articles/managing-diabetes-through-proper-diet-and-nutrition-a-comprehensive-guide-24838.html
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.913269
1,347
2.6875
3
New academic research claims cricket is not English but was imported by immigrants from northern Belgium. A poem thought to have been written in 1533 has been uncovered, which suggests the game originates from Flanders. German academic Heiner Gillmeister and his Australian colleague, Mr. Campbell, say the discovery proves the quintessential English pastime is anything but English. Mr. Campbell has uncovered an apparent reference to cricket in the 16th Century work, The Image of Ipocrisie, attributed to the English poet John Skelton, which refers to Flemish weavers who settled in southern and eastern England. They are described as kings of Crekettes; wickets are mentioned too. It is thought the weavers brought the game to England and played it close to where they looked after their sheep, using shepherd's crooks as bats. Mr. Campbell's research was based on earlier investigations by Mr. Gillmeister, a linguist from the University of Bonn. He is certain cricket cannot have started in England. "I was brought up with Flemish children and I know the language well. I immediately thought of the Flemish phrase 'met de Krik Ketsen' which means to 'Hit a ball with a curved stick'." And Mr. Gillmeister's research does not end with cricket. Earlier studies of his suggest that whilst the spiritual home of golf might be Scotland - records indicate the Belgians were also playing a recognizable form of that sport before people in Britain. Source BBC News
<urn:uuid:6e3151a7-0748-4dac-82c2-6d8cb92afa8d>
CC-MAIN-2024-10
https://www.amazingbelgium.be/2017/02/cricket-was-invented-by-belgians.html
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.983129
312
2.875
3
Bookkeeping and accounting are often used interchangeably, but they are two different terms that have distinct roles and responsibilities in the financial management of a business. In this article, we will delve into the differences between bookkeeping and accounting. Their respective functions, and why they are both essential in maintaining accurate financial records. What is Bookkeeping? Bookkeeping and Accounting is the process of recording financial transactions on a day-to-day basis. It involves the systematic recording of all financial transactions, such as sales, purchases, receipts, and payments, in a ledger or a software program. The primary objective of bookkeeping is to ensure that all financial transactions are accurately recorded, and the financial statements, such as the balance sheet, income statement, and cash flow statement, can be prepared at any time. The role of a bookkeeper is to maintain a company’s financial records by recording all transactions, reconciling bank statements, maintaining a general ledger, and generating reports. The bookkeeper ensures that the company’s financial records are up to date and that all transactions are correctly classified and recorded. What is Accounting? Accounting is a broader concept than bookkeeping, which encompasses the entire financial management process. Accounting involves analyzing, interpreting, and summarizing the financial data provided by the bookkeeper to make informed decisions about the financial health of the business. The primary objective of accounting is to provide useful financial information to stakeholders. Such as investors, creditors, and management, to help them make informed decisions. The role of an accountant is to analyze the financial data generated by the bookkeeper and to prepare financial statements that accurately reflect the company’s financial position. The accountant may also provide financial advice, prepare tax returns, and develop financial strategies to help the company achieve its financial goals. Why are Bookkeeping and Accounting Both Essential? Bookkeeping and accounting are both essential components of financial management. Without accurate bookkeeping, it is impossible to have accurate financial statements. The bookkeeper ensures that all financial transactions are recorded and classified correctly. Which is necessary for preparing financial statements and tax returns. On the other hand, without accounting, it is impossible to make informed decisions based on financial data. The accountant interprets the financial data provided by the bookkeeper to prepare financial statements, analyze trends, and provide financial advice. Accounting helps business owners make informed decisions about investments, expenses, and strategies to achieve their financial goals. Bookkeeping and accounting are two different concepts that are essential components of financial management. Bookkeeping involves the systematic recording of financial transactions. While accounting involves analyzing, interpreting, and summarizing the financial data to make informed decisions. Both bookkeeping and accounting are essential for maintaining accurate financial records and making informed decisions about the financial health of the business. A good bookkeeper and accountant can help a business owner make informed decisions that can lead to success and growth.
<urn:uuid:831aaef7-37b1-490c-8c40-71ef61eac179>
CC-MAIN-2024-10
https://www.articlering.com/understanding-the-distinction-between-bookkeeping-and-accounting/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.949031
583
3.59375
4
Sexual harassment is a form of discrimination that refers to illegal sexual conduct in the workplace. It may be experienced by employees of any gender, sexual orientation, gender identity, and gender expression. According to the U.S. Equal Employment Opportunity Commission, sexual harassment is: Unwelcome sexual advances, requests for sexual favors, and other verbal or physical conduct of a sexual nature constitute sexual harassment when this conduct explicitly or implicitly affects an individual's employment, unreasonably interferes with an individual's work performance, or creates an intimidating, hostile, or offensive work environment. The U.S. Equal Employment Opportunity Commission (EEOC) is responsible for enforcing federal laws pertaining to various types of discrimination, including that which is based on sex (including gender identity and and sexual orientation). Sexual harassment is a form of sex discrimination that violates Title VII of the Civil Rights Act of 1964. Title VII pertains to organizations that employ 15 or more people, as well as federal, state, and local governments; employment agencies; and labor organizations. In addition, many states have sexual harassment prevention laws that pertain to the private sector, including organizations that employ fewer than 15 workers. Sexual harassment can occur in a variety of circumstances: - The victim and harasser may be any sex, and the victim and harasser may be the same or different sexes. - The harasser may be the victim’s co-worker, supervisor, a supervisor in another area of the organization, an agent of the employer, or a non-employee (3rd party sexual harassment). - The victim may be the person harassed, but could also be “anyone affected by the offensive conduct” (indirect sexual harassment). Sexual harassment may or may not cause economic injury or the victim’s discharge by the employer. What are the two types of Sexual Harassment? 1. Hostile Work Environment - Occurs when unwelcome comments or conduct based on sex unreasonably interfere with work performance or create an intimidating, hostile, or offensive work environment. - Can be unwelcome and offensive written/visual, verbal, non-verbal or physical conduct. - Can be either a pattern that is severe or pervasive or a one-time severe and egregious act. In some states and Washington DC, the pattern of behavior doesn’t need to be pervasive to be considered sexual harassment. Hostile Work Environment has two sub-categories: - Third Party Hostile Work Environment - Occurs when a non-employee creates an intimidating, hostile, and offensive work environment for an employee. - Non-employees can include customers, vendors, distributors, and contractors. - Indirect Hostile Work Environment - Occurs when an individual is negatively impacted by sexual conduct that does not happen directly to them. - For example, an employee can experience an offensive, hostile work environment based on sexual conduct that targets a co-worker. 2. Quid Pro Quo - Occurs when an individual in authority requests sex, sexual favors, or a sexual relationship. - Acceptance or rejection of the request can impact the victimized employee’s job, resulting in a tangible employment action (e.g., job perks, desirable work, promotion, undesirable work, demotion, and termination). - Can be either a direct or implied "this-for-that" element. What are the Effects of Sexual Harassment in the Workplace? When sexual harassment occurs at work, the harm done can reach far beyond the individuals immediately involved - Effects on the Victim: Psychological/Emotional Impact (anxiety, depression, fear, low self-esteem); Physical Impact (muscle aches, headaches, high blood pressure, digestive problems); Financial Impact if employee leaves due to harassment (loss of income, negative impact on earning potential and career trajectory); Potential negative impact on reputation - Effects on the Organization: Low employee morale/productivity; Financial impact; Loss of reputation - Effects on Witnesses: Low morale/productivity; Shame for not speaking up; Stress - Effects on the Accused Harasser: Loss of job/career; Loss of reputation; Financial Impact; Stress; Impact on Personal Relationships With so much at risk, effective prevention of sexual harassment in the workplace is vital to the health and survival of organizations and their workforces. Why is Sexual Harassment at Work a Continuing Challenge? Despite efforts like the #MeToo movement, and media coverage of sexual harassment, these behaviors still happen often in the workplace. Why is it so difficult to prevent sexual harassment? Contributing factors include societal attitudes and beliefs, workplace systems and structures, training content and design, and individual employee behavior 6 Roadblocks to Preventing Sexual Harassment In its ebook, From Awareness to Action: How to Stop Sexual Harassment Once & For All, Atana describes six roadblocks it says are “getting in the way of solving the issue.” Victims of sexual harassment may choose not to report incidents out of fear that speaking up will cost them their jobs (and income). They may think they won’t be believed, that their reports won’t be acted upon, or that they’ll be blamed for harassment. Some also fear retaliation by the harasser. Fear can paralyze witnesses to sexual harassment, too. Concerns about retaliation can keep bystanders silent. Witnesses also may fail to act because they don’t see others speaking out. This can create fear that taking action is not an appropriate response in the context or culture of their organization. 2. Poor Organizational Policies Responsibility for creating sexual harassment prevention policies is usually up to business organizations in which problems occur, formal and effective policies against harassment may be lacking. This can leave employees unsure about what constitutes sexual harassment and what to do about incidents when they occur. Ineffective policies also undercut victims’ abilities to take action and gain restitution. 3. Training Costs and Logistics Company leaders may refuse to insist on quality sexual harassment prevention training for their workforces due to implementation costs. This failure to act can put the organization at risk for millions of dollars in fines and legal judgments because of harassment-provoked litigation. 4. Prevention Training Fails to Drive Behavior Change Many learning and development professionals agree that prevention education has fallen short in positively shifting employee behaviors. Often the content fails to engage audiences and doesn’t present material that is relevant or practical. Even professionals who express satisfaction with training products often report poor results because training isn’t followed-up and reinforced systematically. 5. Employees Resist Prevention Training Research by Atana found that employee resistance is the leading challenge underlying sexual harassment prevention training. Differing personal perspective and discomfort in addressing sexual harassment may cloud employees’ views about prevention training. This ultimately makes them resistant to educational efforts and requires employers to take significant actions to change mindsets. 6. Confusion about Compliance When sexual harassment prevention training is required by government entities, confusion is a frequent result. With an increasing number of states taking action to mandate training, business leaders may be challenged to understand their legal obligations to provide appropriate training for their workforces. Making the Business Case for Sexual Harassment Prevention Making a business case for any organizational initiative relies on the ability to convince senior leaders that a genuine need exists—one that warrants the investment of people, time, and money. Metrics are the currency that demonstrates such needs, and may reflect conditions inside and outside an organization. The type of information that will be relevant in making the business case varies by company size, industry, and other variables. The following measurements are among those likely to be most helpful to human resources (HR) and learning and development (L&D) professionals. Bottom Line Results Impacted by Sexual Harassment Prevention Effective prevention of sexual harassment in organizations both contributes to and reflects the presence of a respectful workplace culture, so there is significant crossover in the internal metrics used to support the business case for both initiatives. When it comes to sexual harassment prevention specifically, these are some important internal metrics to consider: - Business Key Performance Indicators (KPIs) - Business costs - Productivity levels - Turnover and retention rates - Employee engagement levels - Talent acquisition measures - Diversity, Equity, and Inclusion measures - Legal costs to defend complaints, victim awards, and fines - Changes in individual/team performance ratings - Changes in customer satisfaction levels - Employee behaviors and performance - Employee engagement levels - Changes in individual/team performance ratings - Employee well-being measures - Absenteeism rates - 360-degree assessments - Job satisfaction levels - Net promoter scores - Employee experience measures - Supervisor/manager observations of learning applied on the job Sources of Statistics on Sexual Harassment in the Workplace For broader context and perspective, internal measures relevant to sexual harassment occurrence and prevention can be supplemented with data from credible external sources. The U.S. Equal Employment Opportunity Commission (EEOC) tracks and publishes extensive data on charges, enforcement, and litigation. The National Conference of State Legislatures (NCSL) offers information on sexual harassment and related training laws in the U.S and The Institute for Women’s Policy Research is another respected source of information. The University of Maryland Global Campus Library offers a free online checklist to aid HR and learning professionals in identification of credible online information sources. Trends in Offering Sexual Harassment Prevention Training Almost three quarters of organizations offer sexual harassment prevention training. That research revealed that just over 75% of employers that offered harassment prevention training required all employees to participate. Among companies that do provide training, 57% turn to their HR functions to take the lead. In the U.S., most states now recommend or encourage employers to provide training on prevention of sexual harassment in the workplace. These states (and cities) require prevention training: CA, CT, DE, IL, ME, NY, TX, WA and Chicago. For more information on these regional mandates see Atana's Sexual Harassment Training Compliance Guide and Requirements Matrix. How to Measure the Effectiveness of Sexual Harassment Training Key metrics related to sexual harassment prevention training might include: - Return on investment in training - Number of training completions - Evaluation of training by participants - Feedback/observation by managers of training participants’ behaviors - Application of concepts learned - Participation in follow-up interventions to sustain learning - Impact on business and employee behavior metrics These metrics can come through using an approach like the Kirkpatrick Evaluation Model. It is a four-level framework that encompasses how learners react to training, skills/knowledge gained, behavior/performance change, and business results. Data captured and reported by content vendors can provide relevant insights, too 7 Key Benefits of Sexual Harassment Training Prevention is the best tool to eliminate sexual harassment in the workplace. Employers are encouraged to take steps necessary to prevent sexual harassment from occurring. They should clearly communicate to employees that sexual harassment will not be tolerated. They can do so by providing sexual harassment training to their employees and by establishing an effective complaint or grievance process and taking immediate and appropriate action when an employee complains. —U.S. Equal Employment Opportunity Commission When organizations deliver effective sexual harassment prevention training, they are actively leveraging a core element in what the EEOC calls “the best tool to eliminate sexual harassment in the workplace” – prevention. Successful sexual harassment prevention training has the potential to drive far-reaching positive effects for organizations and their workforces, alike. Prevention training heightens awareness of behaviors, calling attention to what is and isn’t appropriate in the workplace. Effective sexual harassment prevention training delivered to all employees in an organization helps ensure consistent understanding of the actions that constitute harassment, educates individuals about their legal rights, and emphasizes personal empowerment, which equips bystanders to stand up for victimized co-workers. Surfacing those benefits for an organization adds support to the business case for providing sexual harassment prevention training. Further, identifying the potential risks that individuals and organizations face when sexual harassment prevention fails or is ignored, helps to quantify and highlight the true costs that may arise when workplaces lack commitments to respect and personal safety. Many research studies highlight the benefits of sexual harassment prevention training and the risks/costs of prevention failure. Some points to consider: 1. Stronger Organizational Culture Harassment prevention training, whether live or virtual, offers opportunities to talk about and reinforce company values and culture. Purpose-centered cultures, such as those focused on respect, bring people together to work toward common goals. Risk/cost avoided: In looking at costs of harassment, a U.S. government study found that only about a third of employees who’d experienced—or even observed—more than one instance of sexual harassment in their workplaces said they were satisfied with or approved of their organizations’ cultures. Almost six in 10 expressed satisfaction with cultures in organizations where no sexual harassment had been experienced or observed. 2. Improved Talent Retention Lower turnover is far more likely to occur in organizations where employees don’t feel at risk simply by being in the workplace. Risk/cost avoided: Studies have found that victims of sexual harassment are 6.5 times more likely than other workers to change jobs within two years. Further, 70% of those who sought legal help because of sexual harassment reported job loss as the most common form of retaliation. Latest estimates put the cost of just recruiting, hiring, and onboarding a new employee (which can take six months or longer, on average) at up to $4,425 per person. 3. Reduced Absenteeism Eradicating sexual harassment in workplaces (and the attendant mental and physical health issues harassment causes) can help organizations improve attendance. 4. Enhanced Productivity and Performance Loss of individual productivity, which contributes directly to loss of overall organizational output and performance, is a leading result of sexual harassment in the workplace. Consequently, successful prevention of that harassment is seen as a top strategy for improving both employee and enterprise performance. Risk/cost avoided: Decreased productivity is the single most likely result of sexual harassment at work, according to researchers who found that more than one in five victims (22%) said their productivity declined in the aftermath of a harassment incident. One study put the yearly cost of lost productivity due to sexual harassment at $2.62 billion. 5. Higher Employee Engagement and Job Satisfaction Levels When employees are free from worry about their personal safety at work, including having the belief that that they are protected from being sexually harassed, they report significantly greater satisfaction with their work and higher levels of engagement on the job.. Risk/cost avoided: Only about half of employees who saw or experienced sexual harassment on the job reported feeling inspired to do their best work (compared with more than seven in 10 of those who didn’t have those experiences). More than 60% of employees who’d witnessed or been victims of harassment expressed dissatisfaction with their levels of stress at work. 6. Higher Levels of Well-Being Since the pandemic, organizations have upped focus on and commitment to employee well-being, especially mental health. Ensuring that workplaces are free from sexual harassment is an important contributor to both physical and mental well-being. In turn, greater levels of employee well-being drive better organizational performance. Risk/cost avoided: Sexual harassment at work can lead to depression, post-traumatic stress disorder, other mental health issues and higher risks of long-term wellness issues for victims. Further, those who lose their jobs because of harassment are also likely to lose healthcare insurance, forcing many to forego needed therapy or other care. 7. Legal Compliance and Protection from Litigation Financial and time savings can be enormous when companies avoid investigations, fines, legal fees, expensive settlements, and awards for victims. Risk/cost avoided: In 2021, alone, the EEOC collected $61.6 million from employers for sexual harassment claims. Because the organization litigates only a small number of the harassment charges it receives, that figure represents only a small portion of potential employer cost risk. Victims of harassment suffer financially, too. Researchers note job loss and unemployment due to sexual harassment can cost women in high-end professions millions of dollars; and even costs for those in low-paying jobs can exceed $100,000. . More information on benefits of sexual harassment prevention training (and the costs of not training) is available in Atana’s ebook, From Awareness to Action: How to Stop Sexual Harassment Once & For All. Lasting Sexual Harassment Prevention: Focus on Culture Not Compliance Compliance with state and other mandates for sexual harassment prevention training is necessary, but training done only to meet legal requirements is unlikely to achieve meaningful behavior change and reinforce the kind of organizational culture in which sexual harassment is not tolerated. Achieving lasting success in sexual harassment prevention demands more. Remarks by past EEOC Commissioner Victoria Lipnic underscore the effectiveness of the approach designed by Atana that integrates sexual harassment prevention training for employees and managers into the broader idea of a respectful workplace: "Training needs to explore civility in general and how to have a respectful workplace. It shouldn't just focus on workers who experience harassment themselves. It needs to empower bystanders to speak up when they witness harassment and teach them how to intervene. Additionally, managers need to have the tools to respond to situations when they arise. If the front-line supervisors don't know how to respond when a worker complains about something another employee said or did, ‘things can go off the rails pretty quickly.’" The idea of organizational culture as the basis for a commitment to prevention of sexual harassment is particularly important in the wake of the dramatic shifts in employee work locations driven by the COVID-19 pandemic. Some industries and jobs can’t operate remotely, so many workers never left enterprise facilities. Others migrated to home offices. Further, many companies are returning to workplaces and considering, or are already moving toward, hybrid work models in which employees split time between remote and on-site work settings. Regardless of employees’ work locations, culture is a constant, and its health—and focus on respect—must be maintained. That means that the need for training that emphasizes a culture of respect, including sexual harassment prevention training, remains just as strong going forward as it was in the pre-pandemic business world. The Consequences of Ineffective Sexual Harassment Prevention Training For many organizations, implementation of prevention training hasn’t solved the problem of sexual harassment in the workplace. Writing in Harvard Business Review (HBR), sociology professors and researchers Frank Dobbin of Harvard and Alexandra Kalev of Tel Aviv University confirm that, in 2020, 40% of women and 16% of men still said they’d been sexually harassed at work. In the wake of #MeToo and despite “widespread grievance procedures and forbidden-behavior training,” harassment continues. In fact, harassment research by Dobbin and Kalev found that many existing training approaches, along with organizational grievance procedures, were compounding the problem and increasing employee dissatisfaction and attrition. Further, they say that training that centers on forbidden behaviors in the workplace negatively affects the numbers of women in management and actually creates a backlash that results in men being “more likely to blame the victims and to think that women who report harassment are making it up or overreacting.” The American Psychological Association (APA) agrees that ineffective training can exacerbate harassment problems, noting that many organizations resist training or just do so to satisfy mandates: “Conducting a one-time training for new employees is ineffective and is usually just window dressing by companies seeking protection from lawsuits.” Sexual Harassment Training Activities That Work Although many past efforts at sexual harassment prevention training haven’t produced the desired results, experts, including Dobbin, Kalev, and other experts cited by the APA, point to several best practices that characterize effective prevention training. - Turn Bystanders into Upstanders. Bystander Intervention training “may help increase a sense of accountability, where employees are expected to speak up and even file their own complaints when they witness sexual harassment involving another employee,” observes the APA. Dobbin and Kalev call bystander training “the most promising alternative we’ve come across,” and report its use by the U.S. Air Force. In addition, inclusion of bystander training has been mandated by the city of New York for its employee harassment training. - Provide Manager-Specific Training. “Companies that adopted distinct manager-training programs saw significant gains in the percentage of women in their managerial ranks,” say Dobbin and Kalev, adding that the approach is particularly effective because it emphasizes the fact that sexual harassment is a problem that every manager must handle. Targeted training teaches managers to recognize the early signs of harassment and how to quickly and constructively intervene so the problem doesn’t escalate. Dobbin and Kalev’s research found men more likely to respond to manager-specific training, in part, because male participants feel “they’re being given new tools that will help them solve problems they haven’t known how to handle in the past—and in part because they’re assumed to be potential heroes rather than villains.” SHRM, the Society for Human Resource Management, also urges HR and L&D leaders to train managers separately, even though organizations may lean toward a unified approach. Why? “Managers have special responsibilities and need to be educated on these responsibilities in addition to the information provided to all employees.” - Deliver Comprehensive and Engaging Training. Comprehensive encompasses “pre-training, training and post-training components at the individual and group levels,” according to the APA. Further, it recommends that training be interactive, and utilize multiple methodologies to engage employees. Studies show 1 out of every 3 employees says uninspiring content is a barrier to learning. - Follow Through. An especially important key to success in sexual harassment prevention training involves avoiding the trap of a one-and-done attitude. The APA goes so far as to recommend that follow-up after initial training be reinforced through the use of knowledge assessments and refresher training on an annual basis. 3 Ways to Make Your Sexual Harassment Training More Impactful For L&D and HR professionals seeking additional resources on topics that figure into sexual harassment prevention training outcomes, Atana suggests these assets: - Overcoming employee resistance helps address a major impediment to effectiveness in sexual harassment prevention training. Among the tactics HR and L&D professionals apply are: attention to training design, ensuring engaging content and presentation, addressing learners’ specific objections, and more. - Providing support for managers ensures that leaders on organizational frontlines are equipped with the skills they need to handle conversations about sexual harassment (and prevention training) constructively and to take fast, effective action when harassment incidents occur or complaints are made. - Choosing effective training designs, that meet recommendations by the Society for Human Resource Management, involves considerations about internal branding and marketing of sexual harassment prevention training, encouraging interactivity, involving senior leaders, and other strategies. To learn more about SHRM suggestions, read: Sexual Harassment Prevention Training Should Involve Real Conversations . In its From Awareness to Action: How to Stop Sexual Harassment Once & For All ebook, Atana explains how people at all organizational levels can heighten prevention training success. - Train everyone – deploying company-wide training has the potential to strengthen available defenses if the organization is subjected to legal action, helps ensure compliance, and supports stronger business and talent outcomes. - Include training that targets both current and next-generation managers to ensure that prevention is a mindset established early in leadership careers. - Lead by example should be a mandate not only for managers, but for leaders at all organizational levels. Role modeling is an especially effective reinforcer of learning for employees and encourages active and ongoing participation by leaders. - Inspire bystanders to be upstanders by ensuring that employees are comfortable speaking up about harassment. Managers are ideally positioned to openly talk about harassment during meetings and work to destigmatize conversations about harassment. - Take all reports of harassment seriously … and take action. Managers must listen attentively, avoid making judgements about employees, and take swift action to handle complaints according to prescribed procedures. - Be open to sexual harassment prevention training. Employees can strengthen training success by embracing the idea that prevention training is an opportunity to become part of a positive organizational movement for change. - Become self-aware. Workers can use sexual harassment prevention training to better understand the behaviors that constitute harassment, then apply their learning by intentionally monitoring and governing their own actions. - Resolve to be an upstander. Applying the concepts learned in sexual harassment prevention training culminates in bystanders becoming upstanders. Employees who make it clear that they are committed to speaking up when they see harassment are critical contributors to effective prevention. The Future of Sexual Harassment Prevention Training Laws are a Good Start, But There's More to the Equation Increasing legislation offers a key strategy to address workplace sexual harassment. And, the good news is that more and more states have followed (or will soon follow) in the trailblazing footsteps of California by passing laws to strengthen support for victims and to require sexual harassment prevention training in organizations. But multiple sources affirm that compliance as the core driver of sexual harassment prevention training doesn’t produce effective results, and often worsens the problem. Consequently, it’s clear that laws are only part of the solution to achieving a future free of workplace sexual harassment. Lasting Change will Only Come with a Shift in Culture Achieving true and lasting behavior change organization-wide will require a seismic shift in corporate culture—in essence, a holistic approach that includes sexual harassment prevention, along with other critical elements, to create a workplace atmosphere where safety, inclusion, and regard for others are paramount. Establishing and growing a culture of respect calls for broader educational initiatives—including comprehensive training in such topics as: - Diversity, equity, and inclusion - Minimizing the impact of bias, and eliminating bullying and harassment - Workplace violence prevention and conflict resolution - Leadership and management skills that build and sustain positive culture change - Communication skills, accountability, and other behaviors that characterize safe, respectful workplaces Sexual Harassment Prevention Training Can't be "One and Done" In addition to establishing and growing cultures of respect, organizations can add the final, crucial element in eliminating sexual harassment in its workplaces—effective sexual harassment prevention training. Experts on sexual harassment agree that the most effectual training: - turns bystanders into upstanders who watch out for and support their co-workers - is engaging and includes separate programming that specifically targets managers - is ongoing—with regular updates and opportunities to refresh the initial learning - includes follow up to ensure harassment prevention skills and knowledge are applied These two driving factors make it clear that the expertise and ownership of HR and L&D are critical to achieving lasting effectiveness in sexual harassment prevention training, now and going forward. Eliminating sexual harassment in workplaces requires a seismic shift in corporate culture—a holistic approach that includes sexual harassment prevention, along with other critical elements, to create a workplace atmosphere where safety, inclusion, and regard for others are paramount. This includes ongoing and comprehensive training on such topics as: • Diversity, equity, inclusion and belonging • Overcoming bias, harassment, and hostile work environments • Resolving conflict, and preventing workplace violence • Leadership and management skills that build and sustain positive culture change • Communication skills, accountability, and other behaviors that characterize safe, respectful workplaces Once & For All Stopping Sexual Harassment at Work Employee and Manager Courses End inappropriate behavior and empower employees to stand up for respect with this uniquely designed eLearning that maximizes learner engagement and meets sexual harassment training requirements in all 50 states. Atana Insights, our proprietary analytics engine, amplifies the impact of Once & For All by turning course engagement into data, data into insights, and insights into actionable next steps that improve key performance indicators directly tied to culture change and training ROI. Request a demo of our Atana Insights dashboard.
<urn:uuid:aacbf9c1-d48e-46fb-bb65-2672baa2e0dc>
CC-MAIN-2024-10
https://www.atana.com/blog/post/sexual-harassment-prevention-training-your-guide-to-a-successful-result-atana
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.922948
5,884
3.046875
3
There’s a lot of emphasis on airframe corrosion, yet owners and technicians rarely consider the corrosion that plagues avionics—a system that can be more susceptible than the airframe. Big-airplane maintenance programs keep on top of it for good reasons. Corrosion can build on components that you might not give a second thought. This includes contact pins on radio connectors, antenna RF connectors (and the hidden skin at the base of the antenna—a real disaster in the making) and components that reside under the floor, inside the wing root and inside of radios. In this article, we’ll take a look at problem areas and what you and your shop might do to stop avionics corrosion before it begins. That might include some upgrades to the avionics cooling system and antennas. There is more than one face to corrosion and many types can grow on avionics equipment, depending on the environment, the material and the location within the airframe. It’s worth reviewing a few common types. The most common is surface corrosion and it results from a direct chemical attack on a metal surface. We’re talking about surfaces like mounting trays, connector backplates and the radio chassis to name a few. It’s often referred to as uniform surface corrosion and it can be difficult to spot in its early stages. The chemical elements that make up an alloyed metal are different and thereby become anodes and cathodes. The anodes and cathodes are quite small and constantly shift from one area of the surface to another. There are telltale signs. A dull or etched surface is usually the first indication of uniform surface corrosion. Continued attack is followed by roughness and a frosty or powdered surface. You’ve seen this before, although you might have to dig (teardown is the official word in shop talk) to find it on some avionics components. Pitting corrosion is a severe form of concentrated cell corrosion and is localized to a specific area. Pitting corrosion can be found on thin sheets of metal such as plated printed circuit board (PCB) paths, where the attack can be so severe that perforation of the plated PCB paths can occur. Pitting usually occurs along grain boundaries and at porous finished areas on the metal. Porous gold plating on copper contacts is a common location for pitting corrosion. The plating pores create small corrosion cells that continue to expand and deepen, forming a pit. Look at aging chrome wheels on a motorcycle or vehicle and you’ll likely see signs of pitting, especially in salty locations. Galvanic (or bimetallic) corrosion is an electromechanical process where one metal corrodes when it comes in electrical contact with another and an electrolyte. It’s characterized by a buildup of corrosion deposits on the mating active (anoxic) surface. The rate of corrosion of a galvanic pair is a function of the difference between the reactivity of the metals. The farther apart two metals are on the galvanic series chart, the faster the active (anode) metal will corrode in the presence of the electrolyte. Get that? Intergranular corrosion is a chemical attack that occurs at the grain boundaries of a metal. A highly magnified view of a metal surface shows individual grains. Along the grain boundaries of the primary metal are individual grains of the metallic elements that make up the alloy. These other metals have a different corrosion potential than the primary metal. Often, the grain boundaries are anoxic and tend to corrode more easily than the grains of the primary metal. When an electrolyte is present, rapid selective corrosion at the grain boundary occurs. One type of corrosion you can easily spot around steel fasteners, as one example, is exfoliation corrosion, which is an advanced form of intergranular corrosion. This causes the metal grains to separate at the grain boundaries due to the force of corrosive expansion. This is what makes the edges of an aluminum sheet swell or lift. These are just a few examples of corrosion that attack electrical components in the aircraft and none are good. The best defense is offense. Look It Over Like preventing the spread of cancer, inspection is the best way to catch corrosion in avionics before it gets out of hand. This is especially important in corrosion-prone climates—including moist hangars. Unfortunately, the avionics system in even the simplest GA aircraft isn’t easily accessed. If you’ve seen your panel torn open for an upgrade you know why. Focusing on problem areas is one place to start. More on that in a minute. Important tools in every avionics technician’s box are magnifying glasses, inspection mirrors and flashlights. You don’t have to tear the radio stack apart to catch corrosion, although accessing the wiring and connectors is a good idea, especially if the aircraft hasn’t seen an avionics upgrades in a while. For starters, remove the radios from their mounting racks to inspect the rear connectors and the chassis. If you’ve never done this, it’s a chore that can be simple or almost impossible, depending how tightly the radios are stacked. Many components, including Garmin and BendixKing radios, require a 3/32 hex wrench to loosen the locking mechanism, which is accessed on the bezel. Older Cessna/ARC components use a long flat-blade screwdriver. Once you have the radio in your hand, look closely at the RF antenna connections on the back, also paying close attention to the main connectors—which are generally attached to PCBs inside the chassis. Some radios have forged cooling ports that attach to cooling hoses. Shine a flashlight inside the hole and see if you can spot corrosion. If you spot light surface oxidation on an edge connector, use a simple pencil eraser and carefully erase it clean. ACF-50—a popular aerospace anti-corrosion penetrating fog—can sparingly be used for spot treatment. Lear Chemical (ACF-50’s manufacturer) said the product is endorsed by 27 aircraft OEMs and meets Mil-spec performance criteria, plus it’s recognized by the FAA as a suitable corrosion preventive. We’ve used the product on connectors and in other areas of the airframe with positive results and you can source it online. Use caution when reinstalling the radios because with some equipment it’s easy to bend a contact pin when you slide the radio back into the mounting rack. If there’s any doubt of your ability, grab an avionics tech for help. Worth mentioning is that even nonmetallic materials can be subject to corrosion. Culprits include water intrusion, fungal growth and UV light damage. Water cooling is a tongue-in-cheek shop term we used for avionics cooling systems fed by outside ram air. Some believe it’s better than nothing because heat can be a real problem for avionics reliability, even for otherwise modern equipment. Manufacturers wisely switched to surface-mounted circuit boards and modern designs that are engineered to draw less current, but radiant heat is the killer when it comes to longevity. Even though some avionics have internal fans, it’s the buildup of standing heat that does the expensive damage in hot-weather ops. That’s why it’s important to make sure the avionics cooling system is in top shape. It’s tough to imagine, but neglected ones can be a source of corrosion. While we always advocate the use of avionics cooling systems, we’ve forever frowned on systems that source outside air. This is a common system once used on older Beechcraft and other aircraft. The design is clever, but pretty crude and itself is susceptible to corrosion. The theory is to capture ram air through a vent in the leading edge of a wing, pipe it through scat tubing and ultimately into a plastic cooling pack/air box. Once in the box (which is mounted to the side of the radio stack), the ram air is dissipated through small holes in the side of the assembly. For one thing, the box gets in the way when you need to work on the radio stack. Plus, it hardly provides enough airflow to properly move stagnant air away from the radios. But it gets worse. When flying through heavy rain, the potential for introducing water, small bugs and other contaminants into the system is a major concern. We’ve seen plenty of radio backplates and chassis assemblies coated with corrosion and ugly green crust due to water ingestion. Damage aside, it’s hardly effective cooling. That’s because outside ram cooling is useless when the aircraft is stationary, like when you’re sitting in a baking runup area waiting for clearance on a 90-degree day. In an experiment we did for a previous Aviation Consumer article on cooling fans, we measured a temperature of 160 degrees F in the middle of a Piper Arrow’s radio stack. That’s the ragged edge of small component failure, rendering the ram air cooling system essentially useless. Eliminate the moisture-induced corrosion and consider installing an avionics cooling fan. By fighting the chimney effect (this is the buildup of radiant heat caused by units at the bottom of the radio stack), avionics cooling fans move standing hot air out the front of the stack. Your avionics may even be designed to work with a fan. Many avionics units have an air fitting on the mounting rack designed for mating with a cooling hose. One cubic foot per minute of airflow at a pressure equal to .01 inches of water does the job. The beauty of an avionics cooling fan that’s installed correctly is that it ingests dry cabin air and not moisture like ram air systems. Fans are available with single output ports or multiple ports to cool nearly all components in the stack. For aftermarket retrofit, Garmin markets the three-port GFC314/328 series, which are the ACF series made by Sandia Aerospace and move 25 cubic feet of air per minute. These fans use reliable and quiet brushless motors that are rated for 78,000 hours of continuous operation. Many shops prefer the Sandia/Garmin models because they are FAA and PMA approved, eliminating the need for a silly field approval. Sandia also makes a large-capacity five-port model. We’ll look at the avionics cooling fan market in an upcoming issue of Aviation Consumer. Antennas and Other Problem Areas One common problem is antenna systems and the way they’re mounted to the aircraft skin. Antennas coated with fiberglass can crack around the base area and also around the screw mounting holes, which can collect water. We’ve seen some awful antenna installations done with shortcuts and poor prep work that invite corrosion down the road. Along with manufacturer instructions, AC 43.13-2B has specific guidance for antenna work, but adherence to the advisory circular and instructions can vary by installer. A doubler plate strengthens the structure around the antenna so when the antenna vibrates in flight, it doesn’t cause damage to the skin. That same vibration is also a setup for corrosion to form. Fretting corrosion occurs when there is slight relative movement between two materials when an electrolyte is present. Fret corrosion is typical of close-fitting, highly loaded structures—like the antenna base and the aircraft skin. While you probably won’t easily spot corrosion that forms under an antenna, there are some clues. One thing you might try is moving the antenna, using caution to not stress the skin and/or crack the antenna. If there’s any give or hint of looseness you should dig deeper, which includes inspecting the doubler plate. Any evidence of weeping or discoloration from the base of the antenna to where it meets the fuselage is a sign to check further for corrosion. If the base gasket is deteriorated or the silicone seal is compromised the antenna should be removed, any corrosion treated and the antenna replaced. Chances are if there’s sizable corrosion, the antenna has seen better days. We’ve seen installations where the antenna wasn’t even sealed. It’s almost a definite chance for eventual corrosion due to water intrusion around the base. Build enough corrosion and you might pay for an expensive skin repair. Some areas of the aircraft (especially the tail) are essentially in a constant bath of moisture and dirt, which promotes corrosion. You might not give it a second look during preflight inspections (plus, you’ll need a ladder to access it), but VOR antennas have splitters and baluns that are often mounted in the tail, poorly protected by fairings. If you’ve ever chased a VOR reception problem, the culprit was likely corrosion built up on the antenna system. Corrosion can reduce receiver performance or cause intermittent reception as the corrosion worsens. In many cases, the only way you’ll be able to properly inspect the system is to remove inspection plates and tail fairings and look for signs of moisture intrusion and resulting corrosion. Other problem areas include RF antenna connectors and also grounding straps, which are placed around the airframe. Grounding straps electrically join control surfaces to the fuselage. Corrosion can contribute to decreased radio performance and RFI, or radio frequency interference. Coaxial cable connectors are also subject to corrosion and we think they’re worth replacing when installing new antennas. After all, they’re right in the technician’s hands, which is the best time to change them. These days, avionics manufacturers consider corrosion when designing components, using sealed connectors when appropropriate. More than one shop told us it’s seeing more avionics corrosion when it opens up panels for major retrofits. That makes sense because these days more aircraft sit for long periods of time. Plus, the fleet is getting older and with age comes corrosion, especially in salt-prone climates. Avionics corrosion control isn’t difficult when caught early. That means proactive replacement of antennas and connectors, upgrading the avionics cooling system and storing the aircraft in dry locations.
<urn:uuid:4270feba-00ea-4401-ba25-88c2a4fca153>
CC-MAIN-2024-10
https://www.aviationconsumer.com/maintenance/avionics-corrosion-moisture-is-the-enemy/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.920565
2,930
3.03125
3
Identity Theft Resource Guide Author: Andrew Lang Identity theft is one of the most rapidly growing crimes in America. In 2012 alone, about 16.6 million U.S. residents were victims of some kind of identity theft, according to the Bureau of Justice Statistics. These crimes can affect anyone: children, teens, adults, seniors and businesses. This page is intended to provide a brief overview of considerations and resources for securing your identity and information. One of the reasons why identity theft affects so many people is that there are many different ways for identity theft to occur. Some scams have been around for quite a while, including telephone and mail scams, whereas internet scams and hacking represent more recent developments in technology. Two valuable resources that provide links to additional information, statutes, and help resolving identity theft issues, are the Wisconsin State Law Library’s Resource Guide on Identity Theft and the Wisconsin Department of Agriculture, Trade & Consumer Protection’s Office of Privacy Protection. Some of the most effective ways to avoid identity theft are really simple precautions. Individuals should be mindful about their information, thinking about what information is out there, who has access to it, and where and how it can be accessed. Keeping tabs on your accounts and credit reports will help you keep aware of any suspicious activity. Different measures can help reduce the risk of exposure to certain kinds of scams, but the best defense is to think carefully before you give anyone else access to your information. Individuals can take steps to avoid telephone scams by putting their home phone numbers on the National Do Not Call Registry or taking an unlisted phone number. It is also wise to avoid mail and online offers that require you to submit information before receiving a “free” gift; these offers frequently result in your information making its way onto marketing lists. The Direct Marketing Association offers preference services for both mail and e-mail that can help you avoid junk messages. For more tips about avoiding junk mail and scams, see the Office of Privacy Protection’s How to Slow the Flow of Unwanted Communications. Social networking websites also create a large risk of identity theft, especially for children and teens, due to the large amount of personal information that is available through them. As a parent, it is important to talk with your kids about the dangers of identity theft and what level of information is safe to post online. One common method of “hacking” someone’s account is by using a site’s “I forgot my password” feature and using internet searches and social media to identify the answers to an individual’s security questions. For this reason, it is important to not only pick secure passwords and obscure security questions, but also to limit the amount of information available. For more about social networking, see the Wisconsin Bureau of Consumer Protection’s Consumer Facts: Social Networking. Sometimes individuals’ information can be leaked through a data breach, where the scam artists get information from a business’s records rather than going after an individual. If you are notified that your records may have been part of a data breach, it does not mean your identity has been stolen; however, it does mean you should pay close attention to your credit statements and that you may want to place a fraud alert on your credit report. Businesses have additional considerations because they need to protect not only their own information but also any information they might have about their customers. As mentioned above, a “data breach” refers to situations where scam artists have illegitimately acquired information about customers from a business’s records. If this happens, Wisconsin Law requires businesses to notify all potential victims of the breach. For more information about this law, see the Office of Privacy Protection’s guide to Wisconsin’s Data Breach Notification Law. To prevent data breaches or other invasions of customer privacy, businesses should adopt policies to promote information security. This requires assessment of the information the business possesses, both about customers and about the business. It is usually a good policy to keep only the information that is essential and to avoid collecting information that is not necessary, because holding onto a lot of personal information only creates a greater risk. Discarded information should destroyed; paper documents should be cross-shredded or burned and electronic information should be wiped, not just deleted. Good security for businesses requires good policies for information retention, good employee training that stresses the necessity of protecting information, and electronic security measures such as firewalls, password protection, and software for detecting any breaches. This information and more can be found in the Federal Trade Commission’s Protecting Personal Information: A Guide for Business. One important piece of equipment that may not immediately come to mind is digital photocopiers. Digital photocopiers often store the data that is copied or scanned on an internal hard drive. It is important to investigate a copier’s security features and, if replacing the machine, to make sure the hard drive is overwritten or removed. For more about Digital Copier security, see the Bureau of Consumer Protection’s Copier Data Security: A Guide for Businesses. What to Do: If you suspect someone has managed to obtain your information or identity, there are several steps you can take to minimize the damage. An excellent guide to this process is available through the Office of Privacy Protection. - Notify the three credit reporting agencies immediately and ask for a fraud alert to be placed on your report. - You may want to follow the fraud alert with a security freeze, which will stay in effect until you decide to lift it and will warn you of suspicious activity. - File a report with the police and keep a copy for yourself; you may need this report to maintain a fraud alert or security freeze. - The Office of Privacy Protection can help you work through the various steps of resolving an identity theft if you file an identity theft complaint. - Warn your creditors of the identity theft, close all your accounts and open new ones. You may also need to do this with your bank accounts. As a business owner, if you learn of a data breach or loss of information, there are steps you should take as well: - Immediately disconnect compromised computers from your network. - Investigate security lapses and take steps to secure vulnerable areas. - Notify customers of a data breach, per Wisconsin Law. This notice must be provided within a reasonable time after the breach is discovered, which cannot be more than 45 days. Depending on how many people may have had their information taken, the business may be required to notify the consumer reporting agencies. Andrew Lang is a library intern at Axley. For more information on resources regarding identity theft, please contact our librarian, Jane Crandall, at [email protected] or 608.283.6739. To subscribe to email alerts from Axley Law Firm, click here.
<urn:uuid:edc75907-a515-4835-a1df-1da7ee1c4c08>
CC-MAIN-2024-10
https://www.axley.com/publication_article/identity-theft-resource-guide/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.929939
1,415
2.78125
3
According to the current situation of fertilizer use and agricultural waste, it has become a hot spot of agricultural research at home and abroad to actively seek efficient and environmentally friendly fertilizer substitutes and explore ways to use agricultural waste resources. With its unique advantages, bio organic fertilizer and fertilizer production line equipment set up a bridge between agricultural waste and crop growth, and opened up a sustainable development path with the circulation mode of "agricultural waste bio organic fertilizer crop". 1. Firstly, the application of bio organic fertilizer is an important way to improve the basic soil fertility and the quality of agricultural products. The research and production of bio organic fertilizer is the combination of the advantages of organic fertilizer and bio fertilizer by fertilizer granulator. It is not only conducive to improving crop yield, but also conducive to soil fertility, regulating soil micro ecological balance, reducing the amount of inorganic fertilizer, fundamentally improving the quality of agricultural products, in line with the requirements of sustainable agricultural development and green agriculture.. 2. Secondly, organic fertilizer production and fertilizer equipment are important means for the utilization of agricultural waste resources. Agricultural waste is rich in nutrients and organic nutrients necessary for crop growth. Through the absorption and utilization of crops by microorganisms, the processing of fertilizer equipment, as a biological organic fertilizer, the organic matter is mineralized, humified and harmless. It can not only reduce the pressure of agricultural waste on the environment, but also become waste and wealth, and obtain certain economic benefits. In a word, bio organic fertilizer is an efficient, pollution-free, environmental protection product, fertilizer production line equipment is the inevitable choice of agricultural sustainable development.
<urn:uuid:25d3300c-733c-4929-90ff-26a0ced1e258>
CC-MAIN-2024-10
https://www.bestfertilizermachine.com/industry-info/bio-fertilizer-equipment-sustainable-agricultural-development.html
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.913682
325
2.515625
3
“For the life of the creature is in the blood, and I have given it to you on the altar to make atonement for your lives—for it is the blood that makes atonement because of the life.” –Leviticus 17:11 It is impossible to properly understand the book of Isaiah the prophet outside of the historical context of Isaiah’s life. The events occurring in the land of Israel and throughout the known world at the time of his ministry were tumultuous. Empires battled one another for possession of the Fertile Crescent and Isaiah spoke to God’s chosen people in the midst of the chaos. Therefore, we must ascertain to the best of our ability the approximate period of history in which the prophet lived and ministered. We also need to understand the art of Hebrew prophecy itself and the words used to convey the rich complexity of meaning combined within the Hebrew “Navi” (Prophet). In addition there is a need for the Spirit filled believer to resist the delusional approach of modern critical scholarship, which often sees no room for the miraculous or the impartation of divine knowledge concerning future events. To study Isaiah as we would any other historical work via historical analysis and literary device alone would be to miss the equally important revelation that is revealed by the Spirit of God and is beyond the reasoning of humanity. We must conclude that the book of Isaiah, like any other divinely inspired prophetic work within the canon of Scripture, can only truly be comprehended spiritually. The age Isaiah lived in seems to be best summed up by the words Isaiah attributes to the generation he’s addressing, “Let us eat and drink; for tomorrow we will die” (Isaiah 22:13). In many ways these words also reflect the present generation and remind us that the words of Isaiah are timeless, speaking to every subsequent generation that rejects God in favour of its own appetites. Isaiah lived at a pivotal time in Israel’s history, the two feuding kingdoms of Judah and Samaria were caught between the rival empires of Assyria and Egypt; each bent on consuming the known world and consolidating its territories into a single empire. The relatively small populations of Israel and Judah were in the path of both these kingdoms and represented the only monotheistic culture in the region at the time. In addition to the designs of military conquest, the two main powers of the Fertile Crescent also loosed a spiritual war between their gods and the God of Israel. While the God of Israel was calling His people to a life of love, justice and righteousness, the gods of Assyria and Egypt who personified the forces of nature, were constantly tempting Israel to forsake her God and pursue her own carnal desires. In the face of such mighty nations, the Israelites looked at their weak position and often concluded that the gods of their enemies must be more powerful than HaShem. Based on this false assumption many Israelites had turned to pagan worship, though rather than embrace it entirely they had simply syncretized their beliefs; offering sacrifices to both Hashem and their new pagan deities. This is seen in the actions of king Ahaz the king of Judah: “And in the time of his distress he trespassed even more against HaShem (YHVH: Mercy): this is that king Ahaz. For he sacrificed unto the gods of Damascus, which smote him: and he said, because the gods of the kings of Syria help them, therefore I will sacrifice to them, that they may help me. But they were the ruin of him, and of all Israel.” –2 Chronicles 28:22-23 Biblical Hebrew prophecy is primarily cyclical in nature. While it has a point of conception in time and space and within the chronology of history, it also sits outside of those boundaries and is often fulfilled multiple times throughout history, past, present and future. Ultimately, this is because Biblical Hebrew prophecy is seeded by the Spirit of God, Who transcends time and space and in Whom time and space exist. The book of Hebrews uses the Greek Prophetes to describe the prophets of the Tanakh (OT). This Greek word is a composite verb pro-phemi, which means “In advance, before” (pro) and “Speak, say, declare” (phemi). Thus it can be understood to mean either “To speak in advance” or “To speak for another”. This Greek word is a good representation of what the Hebrew Navi came to mean following the days when the term “Seer” was no longer used to describe Israel’s prophets. During Israel’s early history there were three words used to describe her prophets: Navi, Ro’eh and Chozeh. The word Navi, meaning “Prophet” comes from the root naba, meaning “To well up” or “Speak forth”. Both Roeh and Chozeh are translated “Seer”. There was at one time a distinction between the two types of seeing that a seer practiced, however, the true understanding of that distinction has been lost. Ro’eh comes from the root ra’ah, which means “To see”, and is generally applied to physical sight. Thus it can be understood to refer to a type of visual discernment of present events. On the other hand Chozeh comes from the root chaza, which also means “sight” but seems to infer inward vision, and the ability to see what the physical eye is unable to comprehend (Isaiah 22:1). Each of the three Hebrew terms for prophet are used in the following passage: “Now the acts of King David, the first and the last, behold, are written in the chronicles of Sh’muel (Hears God) the seer (Ro’eh), in the chronicles of Natan (Giver) the prophet (Navi) and in the chronicles of Gad (Troop) the seer (Chozeh)” -2 Chronicles 29:29 To some degree the lives of the prophets Samuel, Nathan and Gad reflect the meaning of each of the Hebrew words used to describe their roles. Samuel heard from God and was able to direct Israel according to divine discernment. Nathan’s ministry combined both divine foresight and contemporary discernment, and a harsh declaration in the form of a mashal (parable) directed at Israel’s king David. Thus he is named by the Hebrew word navi which combines ro’eh and chozeh, and adds proclamation. Finally, Gad is given a ministry that foretells or tells beforehand. The prophets of Israel were also frequently called “Man of God (The Judge)” Ish Elohim. Inferring “Man of Judgement” (1 Sam. 2:27a). They were less frequently called “Holy man of God” (2 Kings 4:9). Which adds holiness, a sense of being “set apart”. There are also times when HaShem calls them “My servants the prophets” (2 Kings 17:13). 1 Samuel 9:9 explains: “Formerly in Israel, when a man went to inquire of God, he said, “Come, let’s go to the seer”—for today’s prophet was formerly called a seer.” (TLV) In the end all three terms, ro’eh, hozeh and navi became interchangeable and eventually the term navi became the common designation of a Biblical Hebrew prophet of God. Therefore, the Hebrew navi, like its Greek equivalent prohetes, combines all the aforementioned attributes and functions of a prophet of God. For the Jew, Moses is the ultimate prophet. He is called Moishe Rabbeinu (Moses our great one). His humble, anguished, relational, holy and self-sacrificial character sets the bar high for Israel’s subsequent prophetic voices. Each prophet of Israel must exhibit the essential characteristics of her prophetic prototype Moses. Beginning with Moses and continuing throughout Israel’s prophetic journey there are key elements present in the lives of God’s prophets that distinguish them from the false prophets that God warned against (Isaiah 8:19-20). A prophet of God can be best understood when compared with his counterpart the false prophet: The Prophet of God is both a Preacher and a Messenger of Future Events The prophet of God has a twofold message: How does the Prophet of God Receive the Word of The Lord? The Word (D’var) of The Lord (HaShem) What the prophet spoke was D’var Elohim “The Word (D’var) of HaShem”, which was made manifest through the prophet’s: By far the most common method of delivery of God’s message was orally in the hearing of the people (Isaiah 1; Jeremiah 7:1-2; Ezekiel 17:1-2). Often the message was also written down, as is the case with the book Isaiah (Jeremiah 30:2; Isaiah 30:8; Habakkuk 2:2). The Life and Work of Isaiah Yishaiyahu (Isaiah: Salvation of YHVH [Mercy]) could almost be called the halfway prophet. That is, halfway between Moshe (Drawn out) and Yeshua (Salvation). Yishaiyahu (Isaiah) the son of Amotz (Strong) was a contemporary of Amos (Burden [Not the same as Amotz]), Hoshea (Salvation) and Micah (Who is like God?). God had placed each of these men throughout Israel during the 8th to 7th Centuries BCE as a warning and a hope for all the people. Few details are known about Isaiah’s life. There is a Jewish tradition claiming that Amotz his father was brother to Amaziah, However there is no way to verify this. From the text we can glean that Isaiah was probably a resident of Jerusalem and a member of a prominent family. We also know that Isaiah was married and referred to his wife as “The Prophetess” (Isaiah 8:3). Isaiah had two sons: Shear Yashub “Remnant shall return” and Maher Shelal hash baz “Hurry spoil, quickly loot” (Mentioned by name in Isaiah 7:3 & 8:1-3). It seems clear that Isaiah’s entire family were united in their devotion to HaShem and that their lives were in submission to the prophetic vocation of the head of their home. As a family they became a living testimony to the truth and faithfulness of God. “Now! Here I am, I and the children that HaShem (YHVH Mercy) has given me are signs and tokens of future events in Israel, from Hashem-Tzva’ot (YHVH over heavens armies) who dwells on Mount Tziyon (Parched place).” –Yishaiyahu (Isaiah) 8:18 Isaiah’s name unifies the message of all his prophecies. He brings the redemptive message that “YHVH [Mercy] Saves” (Yishaiyahu). Both his name and his message he shares in common with the future Messiah Whom he frequently alludes to in terms of a suffering servant and a victorious King, that is Yeshua (YHVH [Mercy] Saves). Like Eliyahu (Elijah) and Yochanan (John), Isaiah often wore a garment of hair cloth and sackcloth around his loins and sandals on his feet (Isaiah 20:2-6). Isaiah’s Birth and Death We can only approximate the dates of Isaiah’s birth and death. From Isaiah 1:1 we can deduce that the prophet’s ministry covered at least part of the reign of Uzziah during the period of his leprosy when his son Jotham was co-regent (2 Kings 15:5; 2 Chronicles 26:21), and all of the reign of Ahaz and that of Hezekiah. Tradition (Both Jewish and Christian) holds that Isaiah was murdered by the ungodly king Manasseh during his reign of terror. In all, Isaiah’s ministry spanned from approximately 750 – 680 BCE. The prophets of the Tanakh (OT) were usually called to ministry in their youth. It is therefore reasonable to assume that Isaiah was approximately 25-30 years of age at the time of Uzziah’s death (Isaiah 6:1 [740 BCE]). 2 Chronicles 32:32 indicates that Isaiah outlived Hezekiah (687 BCE) and recorded his deeds. Thus the latter years of Isaiah’s life are lived during the beginning of wicked Manasseh’s reign (687-642 BCE). The tradition concerning Isaiah’s martyrdom is based on 2 Kings 21:16a and some of the early Church fathers saw the means of Isaiah’s execution in Hebrews 11:37 “They were sawn in two”. If the ancient tradition is reliable, we can estimate that Isaiah lived to be approximately 92 years of age, 7 years of which were under the reign of Manasseh, making the date of his death approximately 680 BCE. By combining the internal Scriptural evidence and Jewish tradition we can make an educated guess that Isaiah lived approximately 90 plus years from 770 to 680 BCE. Isaiah the Historian In addition to the role of prophet it seems that Isaiah also acted as a historian. 2 Chronicles 26:22 reads, “Now the rest of Uzziah’s acts from beginning to end were recorded by Isaiah son of Amoz.” 2 Chronicles 32:32 reads, “Now the rest of the acts of Hezekiah, and his goodness, behold, they are written in the vision of Isaiah the prophet, the son of Amoz, and in the book of the kings of Judah and Israel.” The identification of Isaiah as a scribe within these two texts gives weight to the orthodox view that the prophet himself recorded the entire written form of the book that came to be called by his name. Who Wrote the Book of Isaiah? As alluded to earlier, I reject outright the assumption ridden theories of the so called “critical” theologians. Much of their conjecture has been disproved by archaeological evidence discovered subsequent to the publishing of their theories. Like the theory of evolution, the theory of multiple authors for Isaiah becomes more and more untenable with every passing year. One of the most compelling reasons for rejecting the multiple author theory is the fact that both Yeshua (Jesus) and His apostles understood Isaiah to be the author of the entire prophetic work named after him. They did not once attribute Isaiah’s words to an unknown author or authors, nor did they cite an unknown prophet or a disciple of Isaiah as being the author of the prophet’s words. The New Testament as a whole understands Isaiah to be the recorded words of the prophet Isaiah alone, quoting the book of Isaiah in 21 places and calling the prophet by name. The Jewish sages and the early Church fathers also affirm the singular authorship of the book. For an extensive and well-argued refutation of the critical multiple author theory please read the excellent work titled “The Prophet Isaiah” by the Messianic Jewish commentator Victor Buksbazen, Th.D. We must conclude that (in spite of the assumptions and circular logic of the critical school of theologians) the book of Isaiah in its entirety, contains the words of Isaiah the prophet alone and was either written down by Isaiah himself and or one of his disciples during Isaiah’s lifetime or completed within several years of his passing. The Literary style of the Book of Isaiah Isaiah’s book is the work of the one man (notwithstanding the contrary opinions of many theologians). The literary style of Isaiah’s work is characterized by a fondness for word play, alliteration and Hebrew poetic couplings. He also uses allegory and (parables) to emphasize particular points. His writing is not confined to Israel alone but speaks to all humanity, offering God’s mercy universally (Isaiah 19:24, 25). It’s probable that Micah the younger contemporary of Isaiah, who lived approximately 53 km south of Jerusalem in a town called Moreshet, was a personal friend and one with whom he cooperated. This would explain the almost identical texts of Isaiah 2:2-4 and Micah 4:1-3. It is also likely that both Jeremiah and Ezekiel, who lived after Isaiah, were familiar with the prophecies of Isaiah. Josephus the Roman Jewish historian says that Cyrus the Great, the conqueror of Babylon was so impressed by the accuracy of Isaiah’s prophecies, which mentioned him by name (Isaiah 45:1), that in 538 BCE, some 140 years after the prophet’s death, he permitted the Jews to return to Jerusalem. More than any other Hebrew prophet, Isaiah illuminated the transcendent figure of Israel’s Messiah in His dual role as God Anointed Reigning King and Suffering Servant, pouring out His life for the redemption of many. This 8th to 7th century BCE Seer from the small mountain kingdom of Judah spoke repentance, wrath and life into the ears of his own generation, and in his writings, his voice lives on to challenge us today, almost three thousand years later (Isaiah 34:1-2; 11:1-9). The Hebrew Text of Isaiah The manuscripts of Isaiah found in the Qumran caves in 1947, which are over 1000 years older than any previously known text of Isaiah (1st Century BCE), are essentially the same as the Masoretic text (916 CE/AD). Isaiah came of age during the reign of Uzziah (Also known as Azariah) in the years between 792 and 740 BCE. Uzziah was a “good king” who was overcome by his pride (2 Kings 15:1-7; 2 Chronicles 26:1-23). Uzziah was responsible for restoring the Red Sea port of Eilat to Judah, subduing the Ammorites and Philistines, and developed the agriculture and domestic product of Judah, increasing her ability to trade with other nations. However, during his reign the spiritual climate declined and genuine daily faith was replaced with the appearance of piety and tradition for tradition’s sake. The nation’s labourers and poor were exploited by the rich and Judah became much like her idolatrous neighbour Samaria (As recorded in Amos, Hosea, and Micah). The pagan influences of other stronger nations crept in to Judah’s culture and were soon attached to the worship practices of Judah. There was however a God fearing remnant within Judah. A remnant that inspired Isaiah’s hope in the ultimate regeneration and revival of Israel (Isaiah 6:13; 1 Kings 19:18; Romans 11:5). It seems that the military and economic success experienced by Uzziah went to his head. Unsatisfied with his role as king of Judah he sought to usurp the authority of Israel’s priesthood. “But when he (Uzziah/Azariah) was strong, his core being was lifted up to destruction: for he transgressed against HaShem (YHVH: Mercy) his Elohim (God: Judge), and went into the temple of HaShem to burn incense upon the altar of incense.” –2 Chronicles 26:16 Due to this sacrilegious action Uzziah contracted leprosy at the hand of God. He lived the final years of his life in isolation while his son Jotham ruled over Judah as co-regent. Upon Uzziah’s death in 740 BCE Jotham became king of Judah. It was at some point near the end of Uzziah’s life during the period of his leprosy that Isaiah began his public ministry (aged approx. 30 years) [Isaiah 6:1]. Prior to Uzziah’s death Assyria had been preoccupied with military campaigns to the north and south of the land of Israel, giving Judah a reprieve from the occupation of the Assyrian armies. However, when Tiglathpileser 3rd became the ruler of Assyria (745-727 BCE) things changed dramatically. The Bible uses Tiglathpileser’s native name Pul (2 Kings 15:19; 1 chronicles 5:26). In order to fulfil his dream to create a world empire Pul needed to consolidate the small kingdoms of the region which included Hamat, Arpad, Damascus, Sidon, Tyre, Samaria, Judah, the cities of the Philistines, Moab. This campaign would end with his seeking to take the land of Egypt. Pul defeated Hamat and Arpad and subdued Rezin of Damascus (750-732 BCE), and his ally Menachim of Samaria (752-742 BCE) [2 Kings 15:19]. During the reign of Pekah (740-732) of Samaria Pul annexed the Galilee and Gilead and deported the tribes beyond the Jordan to Assyria (2 Kings 15:27-31). By the time Ahaz succeeded to the throne of Judah (735-715 BCE) Rezin of Damascus and Pekah of Samaria (Both now vassal kings of Assyria) invaded Judah (2 Kings 16:5-6; Isaiah 7-8). Possibly in the hope of forcing Ahaz into an alliance against their Assyrian overlords. Ahaz made the fatal mistake of asking Pul for help. In order to seal the deal Ahaz made Pul a gift of silver and gold from the Temple of HaShem. However, "He (Pu“) helped him not” (2 Chronicles 28:21). Latter Shalmaneser (727-722 BCE) laid siege to Samaria. The city was eventual captured by his successor Sargon 2nd (722 BCE) and its inhabitants deported. At this time the independent kingdom of Assyria came to an end (2 Kings 17:4-6). The prominent families of Samaria were deported to Assyria and Sargon replaced them with colonists who brought their own native gods into Samaria and eventually syncretized their worship practices with the worship of HaShem, accepting an understanding of the Law of Moses that delegitimized Jerusalem and the temple mount replacing it with Mount Gerizim. They eventually became a mixed ethnic group of part pagan part Israelite people practicing a defiled form of Biblical Judaism (2 Kings 17:41; Jeremiah 40:7; 41:5). The new Samaritan nation with their rival centre of worship (Mt Gerizim) was a thorn in the side of the Jews from the very beginning. This historical knowledge helps us better understand the depth of hatred expressed between Jews and Samaritans at the time of Messiah (John 4:9, 8:48; Luke 9:51-53) [First Century CE]. With the fall of Samaria it was only a question of time before Judah would be overthrown. However the residents of Judah continued to behave as they had been for generations, as if the day of God’s judgement would never come (Isaiah 22:13). When we look back on the history of the divided kingdom during the lifetime of Isaiah we see that the leaders of Judah and Israel seem to have lacked political wisdom and were unable to properly discern the very obvious warnings of their impending doom. Only spiritual men like the prophets Amos, Hosea, Isaiah and Micah were afforded insight and a clear understanding of the events that were unfolding. These prophets warned the people of God’s coming judgement, calling all Israel to teshuva (Turn around in repentance). Regarding national politics both Isaiah and later Jeremiah counselled against becoming entangled with other nations. Isaiah warned his people that Israel’s salvation could only come from God. Early in his ministry Isaiah rebuked Ahaz for calling on the Assyrian Pul for help (Isaiah 8:5-8). Later Isaiah was equally outspoken concerning a proposed alliance with Egypt against Sennacherib (Isaiah 31:1-6). Isaiah’s message was consistent and clear, “For through the voice of HaShem shall the Assyrian who beat with the rod be beaten down” (Isaiah 30:31). However, the rulers of Israel and Judah ignored Isaiah’s warnings preferring their own human understanding to his godly perspective. They practiced a ritual form of syncretized Judaism that was really just a strange mix of paganism and atheism. In spite of Judah’s failure to repent the prophet’s earnest plea on her behalf stayed the hand of God for another century. Thus Jerusalem was spared the wrath of Sennacherib in 701 BCE. The reign of wicked Ahaz guided Judah toward her destruction but was followed by the God fearing (imprudent) Hezekiah. Under his reign Sennacherib invaded Judah and captured most of her cities with the exception of Jerusalem. The Assyrian history records these events from Sennacherib’s perspective: “As for Hezekiah the Jew, who did not submit to my yoke, 46 of his strong walled cities, as well as the smaller cities in their vicinity… I besieged and took… As for Hezekiah, the terrifying splendour of my majesty overcame him… his mercenary troops deserted him.” -[Luckenbill, Ancient Records of Assyria and Babylonia Volume 2, Section 240 (Chicargo 1926)] God answered the prayers of Isaiah and in response to Hezekiah’s humbling of himself HaShem delivered Jerusalem and destroyed the Assyrian army with a plague (701 BCE). However, Hezekiah’s pride, like that of his grandfather Uzziah, was eventually his undoing (2 Chronicles 32:25-26). Judah survived precariously for another century finally coming to the end of her independence when Babylon (Once a province of Assyria) became master of the Mesopotamian Empire stretching from the gulf of Persia and just shy of the banks of the Nile. For over half a century Isaiah witnessed all these events seeing by the revelation of God that which the physical eye could not see. By the Word of HaShem he was able to make detailed and specific prophecies concerning future events, including events that occurred many years after his death (each confirmed by history and or archaeology), the greatest of those being the accuracy with which he prophesied the events concerning Israel’s Messiah, a man who walked the earth approximately 640 years after Isaiah’s death. The Themes of Isaiah: Isaiah Chapter 1 The first chapter acts as an introduction to the entire book and forms a prologue to the collection of messages that Isaiah brings to Judah, Israel and the nations. Verses 2-9 bring the charges of ingratitude, apostasy and corruption against the nation. Verses 10-31 Describe Israel’s worship practices as hypocritical and an attempt to sweep her moral ineptitude under the rug of vain religious ritual. This is followed by a call to repentance before God’s wrath is unleashed upon the whole nation. A repentant remnant will escape judgement but the remainder of the nation will be destroyed. As a man who is indigenous to the land of Judah and a citizen of Jerusalem, Isaiah directs his prophecies primarily toward the people of his native land Judah and her spiritual capital Jerusalem. However, within the greater narrative of God’s redemptive purpose, Isaiah’s vision centred on Israel’s ultimate destiny, her restoration and redemption and the subsequent redemption of the nations. Text of Isaiah 1: 1:1 The chazon vision (perception, seeing) of Yishaiyahu (Salvation of YHVH [Mercy]) son of Amotz (Strength), which he chaza saw (perceived, beheld) concerning Yehudah (Praise) and Yeru-shalaiym (Downpour of Peace), in the days of Uzziyahu (My Strength is YHVH [Mercy]), (YHVH [Mercy] is Perfect, complete, innocent), Achaz (He has grasped), and Y’chezkiyahu (YHVH [Mercy] is my strength), kings of Yehudah (Praise): The words chaza (to see) and chazon (vision, revelation) are both from a root that describes spiritual perception revealed by God to His chosen servants the prophets of Israel. We could read, “The revelation given by God to Yishaiyahu (Salvation of YHVH)…” The opening line of the book of Revelation comes to mind: “The Revelation of Yeshua (Salvation of YHVH) the Mashiyach which God gave to him (John)…” (Revelation 1:1). The phrase “In the days of” means that Isaiah began his ministry in the (later) days of Uzziah (Approx. 750 BCE) and ministered for approximately 65 years, passing away (Possibly murdered by Manasseh) in 685 BCE. A reading using the meanings of the Hebrew names is illuminating: “The vision of Salvation from Mercy, son of Strength, which he saw concerning praise and a downpour of peace, in the days of my strength is Mercy, Mercy is innocent, he has grasped and Mercy is my strength, the kings of praise.” The fact that the book opens with the phrase “which he saw concerning Judah and Jerusalem” does not as Rashi suggests, mean that this was not the beginning of his ministry. Rashi and others cite 6:1 as evidence for their position along with the fact that Isaiah prophesied concerning other nations as well as Judah. However, we know from 1:1 that he began his ministry while Uzziah lived, whereas 6:1 tells us about a reconfirmation of Isaiah following the death of Uzziah. Why? Because a new king (Jotham) had come to power and the prophet’s authority was being re-established before the new monarch. With regard to the fact that Isaiah prophesied concerning other nations, there is no problem, for “Salvation is of the Jews” (John 4:22). 2 Shemu Hear, listen, receive, perceive and obey! Shamayim Heavens, v’ha’azini and use your ears, broaden your perspective, eretz earth, for Hashem (YHVH [Mercy]) d’var speaks: The alliteration employed here gives a strength of rhythm to the language that draws the attention of the Hebrew audience. The impact of Israel’s sin is so far reaching that HaShem calls out the heavens and the earth as witnesses (Deut. 17:6). These opening lines reflect the song of Moses: “Ha’azinu Give ear ha-shamayim you heavens v’a’dabeirah and I will speak, v’tishma and hear ha-etretz O earth, the words of my mouth.” –Deuteronomy 32:1 Moses begins by addressing the ears (ha’azinu) of the heavens and continues by addressing the hearing (v’tishma) of the earth. Whereas Isaiah reverses this order beginning by addressing the hearing (Shemu) of the heavens and continuing by addressing the ears (v’ha’azini ) of the earth. “The term ha-azinah, give ear, is reserved for the physically more distant listeners, whereas the term shemi-ah, hearing, is reserved for listeners close at hand. For this reason Moses uses the former term when calling on the Heavens and the latter when addressing the earth. When in contrast to Isaiah 1, 2, Moses refers to the origin of the message being himself not G-d, he emphasises the importance of what he is about to say rather than who is saying it. Moreover, “giving ear,” refers to listening done with the mind, whereas “hearing” refers to listening done with one’s senses, one’s physical ears.” –Akeidat Yitzchak 103:33 It seems that at least in a figurative sense Isaiah is alluding to the ability of the heavens (The host of Hashem) to perceive the spiritual message whereas the earth (symbolic of humanity and specifically Israel), is presently unable to hear in the spiritual sense and must therefore listen with the physical ear. Isaiah makes it abundantly clear that these are HaShem’s words. “Baniym Sons & daughters I have raised and brought up, but they have rebelled against Me. The Hebrew terms gidalti ve-romamti have a dual meaning. While they refer to the raising of children to maturity they can also be understood to mean, “I make great and of high stature”. In other words, “I’ve prospered you and given you a position of honour in the earth”. The Hebrew poshu meaning to “rebel, revolt, transgress, break away”, is from the root pasha which means to “stride or rush”. Thus the sense here is that the sons and daughters of Hashem (Israel/Judah) have not merely sinned, they have intentionally broken away from relationship to Hashem and have done so in haste in spite of His devotion toward them. This is the heart broken cry of the Father. A charge concerning broken relationship and its consequences. 3 The bull knows koneihu the one who purchased it, and the donkey its eibus feeding trough, B’alayn but his husband Yisrael (Overcome in God) does not know, Ami My people do not hit’bonan discern .” The couplets of knowledge and discernment are first pictured in the knowledge of the purchased bull and the discernment of the donkey. These dumb animals act more righteously than Israel, who has chosen to reject the authority and bride-price of her Husband Hashem and now lacks the ability to discern where her nourishment comes from. At this time Israel lacked the basic intelligence to acknowledge that she had been redeemed by HaShem and the discernment needed in order to show gratitude toward her Husband. None the less, in His Mercy Hashem calls her Ami (My people). We note that while the bull knows the price paid for him and the donkey knows where his food comes from, Israel, those who have overcome in God, not only fail to know their Husband (HaShem), they are also lack understanding. They have knowledge of the things of this world but because they are devoid of the knowledge of HaShem they lack the discernment needed to avoid destruction. 4 Hoy, a goy nation who chotei misses the way, a people weighed down with avon perversity, bent, evil, iniquity, guilt zera (seed) offspring m’reiym (gone bad) of evildoers, baniym sons and daughters mash’chiytiym decaying (dealing corruptly)! The alliteration again emphasizes the weighty charge against Israel. HaShem had called Israel to be a Goy kadosh, a holy nation, but she had become a Goy chotei, a nation who has lost the way. As a people (Am), Israel’s collective actions were beyond generic sin, they were perverse, heavy with guilt. More than that they had become generationally wicked, the progeny of those who have turned a once God fearing culture into a syncretized pagan abomination. Thus they were decaying both physically and spiritually. They have forsaken Hashem (YHVH [Mercy]) They have shown contempt for k’dosh the Holy One of Yisrael (Overcome in God) Nazru achor Estranged at the rear (They have turned backwards). Once more the charge of relational abandonment is levelled against Israel. She has forsaken the Husband of her youth. What’s more she has squeezed lemon juice into the wound by showing contempt for the holy and faithful character of God. In doing so she also shows contempt for her own role as the nation set apart (made holy) for His redemptive purpose. As a result she has become disconnected from the rich spiritual sustenance HaShem offers and has chosen instead to walk in the opposite direction toward the rear, an idiom that conveys the sense of being behind cattle, walking in their excrement. 5 Upon what will you be struck continually, increasing your turning away more and more? This text is often mistranslated, taking the Hebrew phrase al mei “On what?” to mean lamah “Why?” In fact the author is not asking “Why are you being struck?” but “For what reason do you continue to allow yourself to be struck?” This is an incredulous statement which emphasizes again the stupidity and lack of discernment alluded to in verse 2. A dumb animal will respond to being struck by turning in the right direction, whereas Israel has responded to God’s discipline by continuing to turn away in spite of repeated blows. The whole head is sick, the whole l’vav core being (heart) faint. The whole head refers to both the kings and priests of Israel. The political and spiritual leaders of God’s people have become corrupt and are leading the people toward physical and spiritual destruction. Thus the core morale of the people has dropped to an all-time low and their national identity has been made vulnerable to assimilation. The “Heart of the nation” as it were, has become sick due to the wickedness of her leaders and her own acceptance of that same wickedness. Which is at its core, rebellion against God, the sin of idolatry. 6 From the base of the foot to the head there is no soundness. Israel is covered entirely in wounds that are the consequences of her sin. From the base of her sinful human nature to the heights of her spiritual pride there is no good in her (With the exception of the remnant). Blows, bruises and open sores: no pressure applied, not bandaged, nor softened with oil. This description of the lack of care for Israel’s wounds is the counterpoint to the method of care employed in Israel at this time in history. Wounds were often pressed out to clear them of infectious material and then oil was used as a salve prior to the bandaging of the wound to protect from further infection. Isaiah is using this figurative language to express the idea that Israel’s spiritual condition mirrors that of a person whose entire body is affected by infectious open sores that have not been treated in any way. Israel had not acted to cleanse her spiritual wounds when they were first made manifest, nor has she sought to soften her wounds with oil (the Ruach Ha-Kodesh) and as a result her wounds (which represent the consequences of sin) have not been covered (bandaged) and therefore remain as a testimony against her. 7 Your land is desolate; your cities are burned with fire; your ground in front of you, overthrown by strangers. Having described the decaying state of the nation of Israel, the prophet now describes the desolation of the land. He makes a connection between moral decay and physical decay. This verse seems to describe the state of the land of Judah during the reign of Hezekiah prior to the birth of Isaiah (701 BCE) soon after Nebuchadnezzar withdrew from Jerusalem having decimated the cities of Judah. 8 So the Daughter of Tziyon (Parched land) is left as a sukkah temporary dwelling in a vineyard, like a hammock in a garden of cucumbers, like a besieged city. Judah (Jerusalem) had lost the security of her surrounding cities (Ransacked by Nebuchadnezzar) and had been made vulnerable to future invasion. Therefore the prophet explains Israel’s precarious situation in terms of a watchman’s temporary shack positioned in a vineyard to keep an eye on the crop, and a hammock in a cucumber patch that can only be used when the weather is fine. Jerusalem and Mount Zion have become like a besieged city. 9 Unless HaShem (YHVH [Mercy]) Tzva’ot (Host, goes forth) had left us a small sarid (group of survivors), we would have been as S’dom (burning), we would have resembled Amorah (Submersion). In these lines Isaiah identifies with his people saying, “Unless Hashem of Hosts had left us a small group of survivors”. The comparison to Sodom and Gomorrah recognizes that these towns were completely wiped out whereas Israel is being left a small holy remnant. In the midst of the charges levelled against her Israel is offered the seed of redemption in the small group of survivors (fugitives). While some translate sarid as remnant, Isaiah uses a different Hebrew word for remnant, shear (Isaiah 10:21-22; 11:11, 16), even naming one of his sons “Shear–Yashub” A remnant shall return (Isaiah 7:3). 10 Shemu Hear, listen, receive, perceive and obey the d’var Word of HaShem (YHVH [Mercy]), you rulers of S’dom (burning)! Give ear to the Torah (Instruction) of our Elohiym (God, Judge), you people of Amorah (Submersion)! Here the call to Shemu hear is made again, this time rather than calling the heavens and the earth as witnesses, Isaiah calls on the people to pay attention to the two witnesses of HaShem: His living Word (D’var emet) and His written (ketvi) Instruction (Torah). The prophet uses the poetic coupling technique in order to equate the Word (D’var) and the Instruction (Torah). The rulers are challenged to hear (Shemu) the Word of Mercy that they might be delivered from their burning and the people are challenged to give ear (ha’azinu) to the written Instruction (Torah) of Hashem so that they might be delivered from submersion. In other words, the leaders, both political and spiritual, are to listen to the spiritual instruction of HaShem and encourage the people to hear and practice the written moral code of HaShem. The former is Aggadah (Telling) and the latter is Halakhah (the way we walk) born of Ha-d’var emet (The Word of Truth) and ha-k’tuvim (the writings). God is described as the Merciful YHVH and as the Judge Elohiym. Israel are being called to return to a washing in the Word and actions that are weighed righteous before the Judge. Thus the call to repentance comes first and the rebuke follows. 11 “For what is it to Me— many sacrifices?” Says Hashem (YHVH [Mercy]). “I’ve received an excessive amount of burnt offerings of rams and fat of well-fed animals. And in the blood of bulls, or of lambs or he-goats, I do not delight. Isaiah has just called for a return to the Torah, the same Torah that commands the sacrificial offerings. Therefore when HaShem says, “What is it to Me” and “I’ve received an excessive amount”, He is saying that the offerings being brought, though technically correct, are not being offered with pure hands or with a right heart. HaShem is not saying that He despises offerings and sacrifices but rather He despises vain tradition practiced by wicked men. “Woe to you, scribes and P’rushim, hypocrites! for you pay tithe of mint, anise and cumin, and have omitted the weightier matters of the Torah: judgment, mercy, and trust: you should have done the former without leaving the latter undone.” –Matthew 23:23 12 When you enter to l’raot to perceive panay My face, who has required this at your hand-- trampling My courts? “When you come to appear before me” refers to the Aliyot regalim (The going up festivals) Pesach, Shavuot and Sukkot (Exodus 23:17). All the men who were of age and their households were to go up to Jerusalem three times a year to celebrate these holy convocations with reverence and awe. Instead Israel had made a foolish spectacle out of their practices at the Aliyot festivals. “Who has required this?” is a way of saying, “Why do you bring extra sacrifices and offerings instead of appearing before me with contrite hearts in repentance and awe?” The trampling of the courts of Hashem brings to mind the incredulity expressed by Yeshua when He saw traders profiteering in the outer courts of the temple during His earthly ministry (Matthew 21:12). 13 Don’t bring an increase of offerings of emptiness! Incense that is an abomination to Me. The text is very clear. It is empty piety that God rejects, and incense that bears the stench of sin that He abhors. Chodesh New Moon and Shabbat, the calling of holy gatherings, —I won’t stand for it (accomplish it)-- avein wickedness, idolatry and iniquity with solemn assembly. Why does Hashem refuse to stand for the holy convocations He has previously commanded? It is because they have been defiled by other gods and the festering sin of Israel’s priests, rulers and the common man. Israel had mixed idolatry and sin with her solemn assemblies, thus making them an aberration. 14 Chad’sheichem Your New Moons and your Festivals My nefesh soul (All that I am) hates! They have become upon me a burden. I am weary of bearing them. We note that the text says that it is “Your New Moons and Festivals” which Hashem hates. He does not hate the festivals but the idolatrous syncretized practice that Israel has made of them. 15 When you spread out your hands palm up, I will conceal My eyes from you. Also though your prayers are many, I will hear nothing. Your hands with bloods will be filled!” Standing with arms outstretched and palms facing upward was a traditional prayer practice of ancient Judaism. In and of itself there was nothing wrong with the symbolic nature of this position of prayer. However, as the text says, “Your hands with bloods (plural) are filled”. Meaning that those approaching Hashem have shed innocent blood and have come before Him without remorse, nor did they have any intention of changing their behaviour. Thus their religious practices were nothing more than a performance meant for the eyes of men. 16 “Rachatsu Wash and be hizaku pure. Turn away from your evil practices those made conspicuous before My eyes. Cease doing evil. The Hebrew rachatsu refers to physical cleanliness, used here as a metaphor regarding the need for the people to cleanse themselves from their filthy actions. Whereas hizaku refers to inward cleanliness. The need to examine one’s self with sober moral judgement. The phrase “made conspicuous” is a way of saying, “You’re flaunting your sin practices in front of Me. Stop it!” 17 Study how to do what is good, seek mishpat judgement, advance the cause of the oppressed, defend the orphan, plead for the widow.” The Scriptures often use the threefold figures the oppressed, orphan and widow to represent all those who in some unique way need the protection and special care of the community. “You must not mistreat any widow or orphan. If you mistreat them in any way, and they cry out to Me, I will surely hear their cry. My wrath will burn hot, and I will kill you with the sword. So your wives will become widows and your children will become orphans. If you lend money to any of My people, to the poor among you, you are not to act like a debt collector with him, and you are not to charge him interest.” –Shemot (Exodus) 22:21-24 However, in the present case Israel has clearly neglected to pay attention to the weightier matters of the Torah. Failing to protect and care for the destitute has meant that those in need have been crying out to God and He will answer the greed of their oppressors with discipline. The Hebrew lim’du means to study. The opening phrase, “Study how to do what is good” is both an instruction and a rebuke. Anyone who does not know how to do what is good is not walking in right relationship with Hashem. “Seek judgement” can also be read, “Seek justice”. Both are needed: sober self-judgement and justice for the oppressed. 18 “Come now, let us reason/decide together,” says Hashem (YHVH [Mercy]). L’cho-na “Come now” is a familiar formula for approaching a reasoned conversation regarding volatile issues. Notice that it is Hashem the Merciful One Who offers this opportunity to parlay. “Though your sins are like scarlet, they will be as white as snow. Though they are red like crimson, they will become like wool. The use of the colours scarlet, crimson and red is meant to convey both the death (blood loss) that results from sin and the life (blood infusion) that produces life (a reprieve from death) through the sacrificial shedding of the blood offered on the altar. “For the life of the creature is in the blood, and I have given it to you on the altar to make atonement for your lives—for it is the blood that makes atonement because of the life.” –Leviticus 17:11 “In fact, the Torah requires that nearly everything be cleansed with blood, and without the shedding of blood there is no forgiveness.” –Hebrews 9:22 We know that the blood of animals was never enough to cleanse us entirely (Hebrews 10:4) and that therefore Hashem sent His Son Yeshua to be the innocent lamb Who would sacrifice Himself in order to impart the gift of eternal life through His own life giving blood. The white snow refers specifically to newly fallen snow and is a metaphor symbolizing purity. Likewise the wool is that of an innocent lamb. 19 If you accept and hear, understand and obey, you will eat the good of the land. 20 But if you refuse and rebel, you will be eaten with the sword.” For the mouth of Hashem (YHVH [Mercy]) has spoken. Moses said something similar to the children of Israel when he challenged them to live according to the Instruction of God. He had placed before them the two outcomes of blessing and curse. The former would be experienced by the repentant and obedient, whereas the latter would be the fate of the wilfully sinful and disobedient. “This day I call the heavens and the earth as witnesses against you that I have set before you life and death, blessings and curses. Now choose life, so that you and your children may live…” –Devarim (Deuteronomy) NIV The blessing is offered first “You will eat the good of the land”. This is a twofold blessing, a promise that if Israel is obedient she will remain in the land and eat of its good crops. The counter to the blessing gleaned through obedience is the curse that comes as a consequence of disobedience: “You will be eaten by the sword”. This is also a twofold certainty for the disobedient: they will be taken from their land by the sword of their enemies and their very way of life will be consumed, including the crops they had grown for their own consumption. Thus in obedience to God we eat and are secure but in disobedience to God we are devoid of security and are eaten up. 21 Eiychah How has it come to pass that the Faithful City has become a whore! She once was full of justice, righteousness dwelt in her-- but now merachetzim professional murderers! Eiychah has a sighing quality. It is the opening word of Jeremiah’s Lamentations and here conveys the great mourning in Isaiah’s heart as he begins his lament over Jerusalem. Jerusalem has been wept over by many of God’s prophets, not the least being Yeshua our King Messiah: “Yerushalayim (Flood of Peace), Jerusalem, you who kill the prophets and stone those sent to you, how often I have longed to gather your children together, as a hen gathers her chicks under her wings, and you were not willing.” –Matthew 23:37 By definition a Harlot is not faithful. The words of the prophet seek to break through the delusion created by the people of Israel with their syncretised worship practices and their pretentious false piety. A nation is in the depths of darkness when it has gone beyond murdering out of blind rage and has sanitized the mechanisms for the murderous elite by allowing for the hire of professional murderers. This may be considered by the rich and powerful to be a sanitary practice, but it is not a pure one. A sanitary sin is the ultimate sin of regression. 22 Your silver has become dross, your wine diluted by water. It is literally true that Jerusalem’s riches had been diminished at this point in her history. It is also spiritually true that those symbols of purity and abundance had been replaced with waste and dilution. 23 Your princes are rebellious and friends with ganavim professional thieves. Everyone loves a bribe They don’t defend the orphan, nor is a widow’s case brought before them. Rav Victor Buksbazen renders this text well when he translates, “Your leaders are misleaders”. Israel’s rulers had become rebellious toward God and as a result had made friends of those who do evil. Her disgraceful and unjust behaviour toward the poor is now spelled out, “You love taking bribes and pursue unjust rewards. Not only do you intentionally refuse to defend the orphan in his distress, you also refuse to hear the widow’s pleas for justice.” 24 Therefore says ha-Adon the Lord Hashem (YHVH [Mercy]) Tzva’ot (Host, going to war) the Avir Mighty One of Yisrael (Overcome in God): “Hoy! I will get relief from My foes and avenge Myself on My enemies. The title Ha-Adon is used in order to name Hashem as the Lord over all the lords of Israel, which included wicked men, priests, false gods etc. We can read the Hebrew text as, “Therefore says The Lord over all lords, Mercy Himself, bringing heavens armies to wage war. The Mighty One of those who overcome in Him. Hoy, listen up, I will take out my foes and avenge My enemies Myself!” 25 Then I will turn My hand on you, purge away your dross, and remove all your alloy. Dross/alloys are removed from metals through smelting in a furnace. Therefore, Israel will go through a period of severe disciplining and great suffering in order to have her dross (sin) removed. 26 I will return your judges to the head, your counsellors as at the beginning. Thus you will be called City of Righteousness, Faithful City. Following the removal of the sin and moral corruption of the Jewish nation Hashem will return righteous judges to the head of Israel’s justice system. Those who give good counsel in the manner of the former days when Israel had once honoured Hashem, will be with her again just as they were with Moses and the righteous kings of Israel. Once a harlot and a rebel, now cleansed, Jerusalem will again be known as righteous and faithful. 27 Tziyon (Parched land) will be delivered with justice, her returning with righteousness.” Tziyon is a proper noun that is used in many different ways to describe numerous aspects of Israel’s identity and her connection to God. Mount Tziyon is the Temple mount, but Tziyon is also the land and the people, even the people themselves. Therefore, the returning of Tziyon is of great significance. The Mount will be returned into the hands of the Jewish people. Likewise the land. And in order for both these things to happen the Jewish people themselves will have to be returned from any exile resulting from her sin. 28 But there will be a breaking of rebels and sinners together. Forsaking Hashem (YHVH [Mercy]), they will be consumed. The former promise of return is for the repentant remnant alone. The wilfully wicked are now warned of what awaits them if they continue in their rebellion against Hashem. They will be broken as a result of their own sin. Forsaking Hashem is an act of the will. It is the intentional and continued walking away from relationship with God. Those who continually reject God will be consumed by their own sin and will suffer the just judgement of Hashem. In a very real sense no one is sent to eternal punishment, to the contrary, the one who enters eternal punishment has chosen it for himself. 29 For they will be ashamed of the eilim sacred oaks that you’ve desired, and ashamed because of the gardens that you have chosen. The Hebrew Eilim means both oaks or terebinths and idols. The Hebrew text interchanges plural and singular forms in order to show that these sins are both corporate and individual. The oaks are sacred oaks/idols worshipped by the surrounding nations, a practice that Israel had adopted and syncretized with the worship of Hashem. The gardens are likewise places that are designed to honour false gods. 30 For you will become like an oak with languishing leaves, like a garden that has no water. Isaiah makes couplets of the oaks and the gardens. In the former verses the oaks and gardens are objects of worship but in the present verse the Israelite himself is called a languishing oak and a waterless garden. In other words the Israelites have not only worshipped false gods they have also taken on the identities of those gods. In the modern vernacular of the new age movement, they had realised the god within them. This is of course the root of all sin, Idolatry, the desire to usurp HaShem. However, in realizing their own deity they had also been met with the weakness of that same realisation. They may be gods (elohiym), but they were languishing feeble gods without the ability to sustain themselves. 31 And it will come to pass that the strong one will become like a dry strand of flax, and his work will kindle fire-- both will burn together, and nothing will put it out. The “Strong one” chozen, is a reference to one who makes an idol and his “work” is a reference to the idol itself. This is an illuminating verse. It is the work (idol) of the strong one (the maker of the idols [eilim] who finds his strength in temporary idolatrous things) that will ignite his own destruction. Both the wicked (idol makers) and their works (idols) will burn together. In conclusion we have a description of a fire that will never cease to burn because “nothing will put it out”. This is not possible in the physical realm, for eventually the fire will burn itself out. Therefore, this is a description, not of the temporary consequence of wicked physical deeds but of the eternal consequences of uncovered wicked spiritual deeds. © Yaakov Brown 2017 Founder of the Beth Melekh International Messiah Following Jewish Community,
<urn:uuid:321ff554-1c72-432f-a7de-06851b59cfa3>
CC-MAIN-2024-10
https://www.bethmelekh.com/yaakovs-commentary/introduction-to-isaiah-isaiah-chapter-1
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.965181
13,012
2.953125
3
The study was commissioned by German bathroom and kitchen fixtures company Hansgrohe in 2014, and surveyed 4,000 people aged 18 to 64 across eight different countries. Of the 4000 people surveyed, 72% reported that they gained new insights and ideas while standing in the shower. In fact, the study revealed that people aged 18 to 34 actually had a shower with the specific purpose of dreaming up a new idea, for fresh thinking or for problem solving. “It’s both surprising and fascinating to learn that people are more creative in the shower than they are at work, with Hansgrohe’s findings reinforcing existing research on the importance of relaxation for creative thinking,” says Kaufman. Why are showers good for generating ideas? The theory is this: when humans are relaxed, and in a relaxed state of mind, our body produces more dopamine, a naturally occurring hormone that improves mood (among other things). Activities such as exercise, listening to music and having a shower can all trigger this bodily response. And once our mind and body are relaxed, we allow our minds to freely wander, which means our brains are more capable of gaining fresh insights, making new connections and thinking about problems creatively. Thus – great ideas! So, next time you’re trying to wrap your head around a particularly challenging problem – your best bet for solving it is having a shower!
<urn:uuid:e698de11-0c88-460f-a4e3-6a8aa068d3de>
CC-MAIN-2024-10
https://www.bhg.com.au/people-get-best-ideas-in-the-shower
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.954585
281
2.859375
3
Bear Information Index - Bear Habitat There is quite a bit of diversity when it comes to the habitat and distribution of bears. For example only the Polar Bear is able to live where it is extremely cold. - Bear Feeding Bears are animal that eat a great volume of food on a daily basis. Most of them consume both plants and animals. - Bear Reproduction There is plenty to learn in the area of bear reproduction. The age of maturity can range from 2 to 10 years of age depending on the type of bear. - Bear Anatomy The overall anatomy of a bear makes it simple enough to identify out there. Some of them are only about 100 pounds though while others can be more than 1,000 pounds. - Bear Communication The sounds of bears can be exciting as well as scary when you hear them in the wild. - Bear Predators Due to the size of bears and their strength, they don’t have to worry too much about predators in the wild. - Bear Social Structure The bear social structure is one that is very simplistic due to the fact that almost all of the bears out there are solitary in nature. (Visited 392 times, 1 visits today)
<urn:uuid:2c23e26b-e7d9-43c7-9a9a-4078e3a91824>
CC-MAIN-2024-10
https://www.bioexpedition.com/bear/bear-information/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.942837
252
3.609375
4
What Is Peripheral Arterial Disease? Peripheral arterial disease affects the arteries of the legs, kidneys and other body parts besides the brain and heart. It narrows or blocks arteries, reducing blood flow. An estimated 202 million people worldwide are living with the disease.1 Since many people are not aware of the disease, it is often not recognized in time and therefore treated too late. The most important cause of peripheral arterial disease is the accumulation of fatty plaque in the arteries, called arteriosclerosis. The plaque is made of cholesterol, blood fats, cellular waste products, calcium and a sticky protein called fibrin. By narrowing or even closing the arteries, the plaque reduces normal blood flow (ischemia). Without enough oxygen-rich blood, organs and tissue stop working. The most common type of peripheral arterial disease is critical limb ischemia. Fifty to seventy-five percent of peripheral arterial disease patients also suffer from cerebral and/or coronary arteriosclerosis, which may cause stroke or heart attack.2 - Age (those over 50 are at higher risk) - Family history of heart or vascular disease - High blood pressure (140/90 or higher) - High level of cholesterol (total blood cholesterol over 240 milligrams per deciliter) - High level of blood fat - Sedentary lifestyle and lack of physical activity - Obesity (body mass index over 30) Some risk factors such as age and a family history of the disease are uncontrollable. Others, such as smoking, weight and activity level, can be changed. In the beginning, the circulatory disorder causes discomfort in half of patients. Later on, leg pain may occur while walking or during other physical activity. Advanced peripheral arterial disease may also cause leg pain and other symptoms while at rest. Early detection of peripheral arterial disease is crucial for effective therapy. Consult your physician if you notice any of the following symptoms: - Tired and weak arms and legs - Leg pain (usually in the calves) - Arm or buttocks pain (less common) - Burning or tingling sensation in the feet - Numbness in the hands and feet - Cold skin and/or changes in skin color (reddish, bluish or pale) - Sore legs and feet, or poor wound healing - Intermittent and severe pain while walking that subsides with rest (claudication) - Erectile dysfunction Symptoms including chest pain, headache, vertigo and sight disturbances can indicate cerebral and/or coronary circulatory disorders. Patients with risk factors should regularly undergo check-ups. These tests are used to confirm peripheral arterial disease: - Ankle-brachial index (ABI): a physician measures blood pressure in the ankle and in both arms. Usually, blood pressure in the ankles is the same or slightly higher than blood pressure in the arms. If blood pressure in the ankles is significantly lower or higher than in the arms, there is strong evidence for peripheral arterial disease. If the result is unclear, measurements are repeated before and after physical activity (exercise stress test). - Ultrasonography: an ultrasound exam that shows narrowed or blocked blood vessels and evaluates blood flow through the arteries. - Magnetic resonance imaging (MRI): Very high-quality 3D-images show vessels and existent lesions in a non-invasive exam - Computed tomography (CT): X-ray scans show the arteries from different angles. - Angiography: a contrast dye is injected in the arteries before X-rays are taken. Angiography is a minimally invasive method that provides detailed information on the location and extent of arterial blockage. Find out more about the treatment of peripheral arterial disease . 1 Fowkes F, Gerald R, et al. Comparison of global estimates of prevalence and risk factors for peripheral artery disease in 2000 and 2010: a systematic review and analysis. The Lancet. 2013; 382 (9901): 1329–1340. http://www.thelancet.com/journals/lancet/article/PIIS0140-6736%2813%2961249-0/abstract 2 Hallett John W. Peripheral Arterial Disease. Merck Manuals Professional Edition. 2014.http://www.merckmanuals.com/professional/cardiovascular-disorders/peripheral-arterial-disorders/peripheral-arterial-disease 3 Olin Jeffrey W et al. Peripheral Artery Disease: Current Insight Into the Disease and Its Diagnosis and Management. Mayo Clin Proc. 2010; 85(7): 678-692. http://www.ncbi.nlm.nih.gov/pmc/articles/PMC2894725/
<urn:uuid:13302d08-6fcd-45d1-81c2-dd8e340ac806>
CC-MAIN-2024-10
https://www.biotronik.com/en-de/patients/health-conditions/peripheral-arterial-disease
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.876815
1,005
3.71875
4
In his twenties, Mike Merzenich dreamed of mapping the neurobiology of the soul. “I was interested in the genesis of the self,” he says. “It’s the kind of thing you think about when you’re young and dumb.” Four decades later, he has scaled back his ambitions. Now a graying 64, he hopes merely to reverse the toll of aging on the brain and cure schizophrenia. Without surgery or drugs. Merzenich, a neuroscience professor at the University of California at San Francisco, aspires to “fix” brains with a series of innovative computer programs that he and his colleagues have designed, most notably his new Brain Fitness Program to help buff up gray matter that has turned flabby with age. The technique relies on a process called plasticity—the brain’s innate capacity to reshape itself and even increase its complexity throughout a lifetime, depending on experience. Merzenich’s faith in harnessing plasticity could change the way we think about mental health. “We’re going to revolutionize the way an older person looks at the end of life,” he vows. The concept of brain plasticity first came into vogue in the 1960s and 1970s. Back then, it referred mainly to the major developmental leaps seen in very young brains. Scientists assumed that adult brains were entrenched in their operating modes. Over the past two decades, however, a wave of studies—including Merzenich’s own seminal research on monkeys—has shown that adult brains can also significantly change, producing new and modified interneuronal connections and even a limited number of new neurons. Although these changes are far less striking than those in young brains, the potential has inspired a burst of optimism about the human condition and launched a new era of neuroscience. The genial, stocky Merzenich is this era’s foremost apostle. “He’s the father of neuroplasticity research,” says UCLA research psychiatrist Jeffrey Schwartz, who has written widely on the topic. Merzenich may also be its most prolific entrepreneur, as he shuttles between his university lab and the two companies he has cofounded: the Scientific Learning Corporation in Oakland and Posit Science in San Francisco. His sometimes awkward straddling of the corporate and nonprofit worlds has placed him squarely in the middle of a heated debate over the issue of conflict of interest in the research world. Some colleagues, even while lauding his seminal early work in brain plasticity, charge that he cannot be objective about his research while promoting the fruits of it. The counterargument is that research advances do not matter unless they reach the people they are supposed to help, and Merzenich has been extraordinarily successful at making that happen. The first of his companies—the Scientific Learning Corporation, launched in 1996—markets Fast ForWord, a much-publicized computer regimen for children with learning disabilities. Merzenich coinvented Fast ForWord with Rutgers University neuroscience professor Paula Tallal and her university colleagues. The original software and its sequels have since been used by more than 800,000 children in 22 countries, bringing Scientific Learning some $40 million in revenue in 2005. But Merzenich’s greatest commercial hit could come with a $395 treatment called the Brain Fitness Program, marketed by Posit Science, in which he has a minority interest. If clinical tests currently under way confirm his predictions, the treatment could become a must-have for many of the 77 million baby boomers in the United States alone, who are already on Orange Alert for any minor memory lapse that might foreshadow cognitive breakdown. The first of these boomers turned 60 last year. Many of them have already watched their parents decline and are eager to do whatever they can to avoid joining the more than 50 percent of Americans who end up with significant cognitive impairment, including full-blown dementia, by age 85. Merzenich says that some 80-year-olds who have used his program have shown gains that bring their performance into the realm of someone decades younger. “Pre- and post-testing documented a significant improvement in memory within the training group” as opposed to a control group, he reported in an August 2006 paper in Proceedings of the National Academy of Sciences. This finding has yet to be independently confirmed in a peer-reviewed journal. But in recent, as-yet-unpublished research, MIT neuroscientist John Gabrieli has discovered an exciting, plausible explanation for the improvement Merzenich reported. In a controlled, double-blind study sponsored by Posit Science, Gabrieli subjected 12 patients with mild cognitive impairment to fMRI brain scans. Half of the group’s members had used the Brain Fitness Program as prescribed, and the other half had not. Gabrieli found that the group who had used the program showed greater blood flow in the hippocampal region, important in memory, compared with controls. Posit Science is now planning a larger study. Merzenich says his program works by reversing what he calls the “negative plasticity” of aging. “Older people tend to want an easy life,” he says. “They don’t realize how bad that is for them.” Normal wear and tear gets compounded by sloth and pessimism in this scenario: As people age, the brain starts to shrink, and the cerebral cortex thins. There is a drop in the chemical neuromodulators that speed information across the synapses, and even in the elaboration of dendrites and axonal arbors, the neuronal architecture that supports learning. An older person suffers what Merzenich calls “noisy processing”: bad signal reception, like a radio tuned between channels. Pretty soon, Grandpa finds it increasingly difficult to understand Junior’s rapid speech and in frustration begins to avoid the kid completely. His confidence ebbing, he ducks other kinds of challenges, and his skills slowly erode from disuse—unless he does something to build them back up. This, of course, is the goal of the Brain Fitness training, which begins with a series of fine-tuning exercises, targeting the rudimentary workings of the auditory system. The intensive and highly repetitive practice—a much more targeted and disciplined exercise than, say, doing crossword puzzles—is meant to overhaul the way the brain receives and interprets information, which Merzenich contends ultimately helps improve the efficiency of how that information is stored. His suggestion is that it is like cleaning the portals of perception, making subtle adjustments that sharpen attention to small or rapid details, building more clarity and focus. The first exercise plays one of two swooping bird whistles—whooEE! or WHEEoo!—after which the user must mouse-click to indicate whether the sound is moving from low to high or high to low. Next comes another simple test called Tell Us Apart, which requires the user to distinguish between sounds that are closer to human language, like “bo” and “do.” The exercises start out quite easy, growing in difficulty over time. They eventually include drills geared toward improving sustained attention and memory by requiring users to remember the details of long stories. Success is lavishly reinforced during the training process. A cheery bell rings with each correct answer, while a garbage-can plunk notes mistakes. The program also features two cartoon scientists in lab coats who call out at frequent intervals: “Good job!” “Fantastic!” “Excellent!” and “Now you’re cooking!” Merzenich insisted on these coaches, but after many people found them intolerable, he grudgingly included a feature to mute them. His theory is that the benefit of all this practice and encouragement can be seen inside the user’s skull. The user’s brain is engaged, and his neuronal connections strengthened, while the novelty and reward inherent in the program improve the release of neurotransmitters like dopamine, serotonin, and norepinephrine, which enable plasticity. His signal-to-noise ratio improves. Maybe he finds he is actually interested in what Junior is saying. A dozen or more companies are promoting methods of memory-saving stimulation. Few have the stature of Merzenich, though. Spend any amount of time with Merzenich and you start to see reflections of his worldview in his software, which goads users to spare no effort in reaching for their maximum cerebral potential. Even the progressively quicker pace, as users acquire deeper skills, recalls Merzenich’s teaching style. He is famous among his students for a one-word motivational speech: “Faster!” When I visit Posit Science’s headquarters, which occupies most of two floors in a high-rise in the heart of San Francisco’s financial district, the inventor in chief is in typical form. Roving through the company’s computer-filled incubator, he spurs along a small group of twenty- and thirty-something engineers. He had put them to work on a program called Hawkeye, a series of exercises designed to pump up visual-processing capacity, much as the Brain Fitness Program works on the auditory system. “I want this accelerated,” he tells them. “Getting it to a commercial form is not that far away.” The work ethic comes naturally to Merzenich, the third of six children of a foreman at a lumber mill in the small town of Lebanon, Oregon. His grandfather immigrated to America from a hilly region near Cologne, Germany. As Merzenich recalls in his self-published memoir, A Childhood in the Sticks, his parents raised their children with the expectation that they would all do something for the greater good. In high school, Merzenich was a voracious reader and the kind of tinkerer who built his own radio. He was also an energetic social networker: president of the science club and leader of the concert and dance bands. “I was a nerd for sure, but was successful at it and had good nerd connections,” he writes. Merzenich has long been as interested in engineering and the physical sciences as he is in basic biology and neuroscience. As an undergrad at the University of Portland, he impressed John Brookhart, the distinguished neuroscientist who would become one of his first mentors, with his efforts to record the electrical output of the nervous system of an insect. But it was Merzenich’s groundbreaking experiments with owl monkeys, in the 1980s and 1990s, that cemented his reputation in the emerging field of plasticity. In a series of studies, he and his collaborators demonstrated dramatic changes in the adult monkeys’ somatosensory cortex (the part of the brain that responds to sensory information) as a product of varying kinds of input. In one famous experiment, researchers severed a nerve responsible for bringing information from a part of the hand to a specific area of the cortex. They found that once that nerve’s input stopped, that same patch of real estate in the brain somehow began responding to other parts of the hand. Yet while Merzenich continued this basic research, his own career was reorganized by his decision, made several years earlier, to collaborate on the development of one of the world’s first cochlear implants—a medical device that has helped thousands of deaf people hear. Rather than amplifying sound as a hearing aid does, a cochlear implant electrically stimulates the auditory nerve, sending signals to the brain, which recognizes those artificial signals as sound. This alternate way of hearing takes time to learn, but eventually the brain is able to interpret this totally novel type of signal. For Merzenich, watching his patients adjust amounted to yet another impressive demonstration of plasticity, this time in humans. The neuroscientist Vernon Mountcastle, Merzenich’s grad school mentor at Johns Hopkins University, warned him not to join the world of business. Yet Merzenich’s experience convinced him of the power of commerce to speed the availability of scientifically inspired products that can reduce human suffering. Conveniently for him and for UCSF, an amendment to U.S. patent law called the Bayh-Dole Act, passed in 1980, allows universities to license inventions without jeopardizing their federal research grants. Merzenich proceeded to craft a career that has kept him exploring, and exploiting, the potential of one of the most stunning propositions of our time: We create ourselves, from the inside out, each day of our lives. The idea has echoes in existentialism, with its emphasis on freedom and responsibility, and in Buddhism, which teaches that willed attention can improve concentration and general mental health. But for Merzenich it is a rigorous piece of scientific insight. One of the newest and most surprising investigations at Posit Science involves treating people suffering from schizophrenia with exercises similar to those already in use for learning-disabled children and the elderly. Merzenich is developing a 120-hour regimen that starts with the same training of the auditory system used in the Brain Fitness Program, adds the Hawkeye visual-processing component, and ramps up to more complex tests of information processing in a segment christened Aristotle. Merzenich’s work with schizophrenia may at first seem like a surprising detour. It is one thing to imagine that repetitive computer exercise might help restore brain “muscles” that have atrophied with age; it is something else entirely to speculate that such training could help people suffering delusions and hallucinations. Yet even though schizophrenia is popularly seen largely as an emotional illness, it is primarily about disordered thought. Merzenich says he was thinking about treating schizophrenia with cognitive training years before he came up with the Brain Fitness Program. Today he has increasing reasons for optimism. Psychiatry professors Bruce Wexler, at Yale University, and Sophia Vinogradov, at UCSF, have independently found in randomized, controlled trials that people with schizophrenia have shown marked improvement after intensive and progressive cognitive training. Wexler’s studies, begun in the mid-1990s, have shown the improvements to be lasting—up to 12 months—and capable of affecting real-life work performance. Patients with schizophrenia have long been known to have major problems with auditory processing, working memory, and language, similar in some ways to what happens to a brain ravaged by age, Wexler explains. Just like an elderly person who learns bad habits while attempting to cope with a decline in ability, a person with schizophrenia frequently slides from bad to worse. A potentially aggravating factor is that the severe memory problems accompanying the disorder mean that much of what happens to a person with schizophrenia seems surprising. A constant state of surprise triggers surges of the neurotransmitters dopamine and norepinephrine, which gradually poison the brain, according to Merzenich. Merzenich is currently supervising clinical trials of his program for schizophrenia, conducted by Vinogradov and Wexler at UCSF and Yale. Pending the results, he plans to apply for approval of this use from the Food and Drug Administration. Merzenich is hopeful that the right kind of training could ultimately free people with schizophrenia from drugs. Although Wexler suspects that this goal is overly ambitious, he does believe the training could greatly improve patients’ lives. Scientists who specialize in schizophrenia also agree that Merzenich’s regimen could have a great impact on prodromals, high-risk adolescents who have yet to have a psychotic break. Vinogradov has been awarded a grant by the Stanley Foundation to test Merzenich’s programs on young people at this stage. The hope is that such intervention could prevent the first psychotic episode. For now, the Brain Fitness Program remains Posit Science’s main and most profitable focus. It got a major vote of confidence last summer, when Humana, the big insurance company, made it available either for no cost or for a reduced price to its Medicare-eligible plan members. Yet despite the enthusiastic testimony I heard from senior citizens who have tried the program, there are no formal studies published in peer-reviewed journals that demonstrate the program’s effects. In their report in Proceedings of the National Academy of Sciences, Merzenich and his coauthors say Brain Fitness Program users in controlled studies showed an average improvement roughly equal to 10 years of memory performance, as assessed with a standardized test for memory and cognition known as RBANS (Repeatable Battery for the Assessment of Neuropsychological Status). Posit Science is now sponsoring additional evaluations by outsiders, including a team at the Mayo Clinic. Glenn Smith, the principal investigator on that project, declined to comment on the work. But one of Smith’s colleagues, Ron Petersen, director of the clinic’s Alzheimer’s Disease Research Center, called Merzenich’s theory “enticing,” then added: “Would I bet the farm on it? Not right now.” Among a list of caveats, Petersen questioned the suitability of the control method in Posit Science’s study, in which a group of age-matched subjects watched educational DVDs on computers. That relatively passive activity, he pointed out, matches up poorly with the interactive program, which would be much more stimulating, especially for someone without a lot of computer experience. “Why didn’t they at least play Donkey Kong for eight weeks?” he asked. Merzenich counters that Posit Science tested subjects in an unpublished study with video games that he says would be a more useful comparison than Donkey Kong. He says those subjects saw no improvement. Petersen also questioned whether the RBANS test represents a meaningful improvement in real-world functioning and noted that the Posit Science team had not tested the longevity of the improvements past three months. “Cautious optimism is probably appropriate,” he said. “But I’d bet they’re being a lot more enthusiastic than that in their marketing materials.” He is right about that. Posit Science’s Web site last fall featured a photo of an attractive, smiling, white-haired couple on a motorcycle and enjoined visitors to “Be sharp. Stay sharp. For a vibrant life.” A second considerable hurdle for the Brain Fitness Program is the time and devotion it demands: an hour a day, five days a week, for eight weeks, of often tedious, repetitive drills. (Booster sessions are also recommended to keep the connections between neurons toned.) “As it stands, this is a barrier,” acknowledges Avram Miller, a financial guru and adviser to Posit Science. “But I think the time it takes could be reduced significantly.” Hearing this, Merzenich frowns and shakes his head. Cutting back on the hours is not in his plans. “It takes time to change the brain,” he says. “You’ve got to think of it like going to a regular gym.” Merzenich’s brilliance inspires many of his colleagues, but there are still questions about how far he can take his ideas. Harvard neurobiology professor John Maunsell, who has studied plasticity in the visual cortex, says he has not found the same degree of change as Merzenich has reported in the somatosensory and auditory systems. The discrepancy could be due to differences in how his team carried out its research, even the different species of monkeys involved, he says, but “there’s a question here that needs to be answered.”? Maunsell credits Merzenich as a pioneer in brain plasticity, yet adds: “The scientist is supposed to be this model of objectivity and completely disinterested in the outcome. You can’t do that when you’re promoting a product, so he has to sort of walk a line. And there are going to be compromises on both sides.” Merzenich dismisses the rap with a smile. “I don’t give a shit if the academic community criticizes this,” he says. “My feeling is simple. If you have something that can impact tens of millions of people, it’s a responsibility to deliver it. And the only way you can effectively deliver it is in the real world. The simple fact is that if things don’t work in the real world, ultimately they don’t go very far. In the real world, people commonly measure things. If they don’t work, they don’t buy them and don’t use them. That’s really what matters to me.” ?
<urn:uuid:b0f2f665-4521-476e-a13e-fc1ed257254c>
CC-MAIN-2024-10
https://www.brainhq.com/news/latest-news/the-elastic-brain/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.964533
4,291
2.703125
3
As housing density in some suburbs increases, walking, wheeling and public transport will become even more critical for getting around efficiently, so we can retain our health and connect with the outdoors. More people today are walking and cycling for recreation and to stay healthy. Research shows physical activity not only strengthens muscles but protects the brain, lowering the risk of disease such as Alzheimer’s disease as we age¹. Through neighbourhood planning, Council and residents are identifying the most used pathways between homes and the places people need to get to every day, such as bus stops, schools, parks and shopping centres. This will guide future pathway enhancements so that everyone can use them safely. Council will continue widening pathways, installing further seating and shade, and separating bikes and electric scooters from pedestrians on busy paths. Knowing which routes are accessible by wheelchair and installing braille signs, audio and vibrating signals at select crossings is also vital. New technologies, combined with traditional paper-based information, could help people of all abilities to confidently navigate the city by highlighting the most accessible routes. Exploring the role of accessible electric and three-wheeled bikes may also provide access for people previously unable to cycle. Council acknowledges that cars will continue to have a role in the way residents get around and will continue allocating accessible parking bays and safe set-down areas. Changes to residential permits are already making parking easier for carers, cheaper for seniors and simpler for everyone. The Transport Plan for Brisbane - StrategicDirections highlights further commitmentsto improve mobility options for all residents, including: - prioritising the provision and upgrade of pedestrian pathways and footpaths - developing more walking and wheeling tourist activities - assessing public transport accessibility to identify areas of low public transport access - improving options to get to and from public transport - supporting projects that encourage people to use their local streets for community purposes including car-free days and road closures for community events. Over the next 10 years, connecting all modes of travel will increase seamless end-to-end journeys for all residents and visitors. "Smooth footpaths with shade and rest stops help me get out and about, and access more public transport."- Dianne, Forest Lake 1. R Petersen, Alzheimer’s disease: Canexercise prevent memory loss?, Mayo Clinic,Minnesota, 2014, viewed 27 July 2019, https://www.mayoclinic.org - Lord Mayor's message - Achievements so far - Outcomes so far - Our changing city - Council's role - Draft plan consultation - Planning for an inclusive city - Five pillars to make Brisbane a city for everyone - 01 Travel - 02 Work - 03 Live - 04 Enjoy - 05 Connect - Thank You
<urn:uuid:c719333c-b291-4886-93a6-d7f245efe604>
CC-MAIN-2024-10
https://www.brisbane.qld.gov.au/community-and-safety/community-support/disability-access-and-inclusion/inclusive-brisbane-plan-2019-2029/a-city-for-everyone-inclusive-brisbane-plan-2019-2029-online/a-city-for-everyone-inclusive-brisbane-plan-2019-2029-01-travel/a-city-for-everyone-0
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.923035
567
2.859375
3
Website development is a term that includes almost all tasks that are required to build a website. This includes everything from coding and makeup to scripting, CMS development, and network configuration. Though website development usually refers to web coding and markup, it still includes some other web development-related tasks like server-side scripting, client-side scripting, network and server security configuration, CMS development, and even eCommerce development. Thus, it is important to trust a reliable company that offers excellent website development services in India. So, to know more, let us dive deep into the basics of web development below. What is the importance of web development? Nowadays, the internet has become a primary method of connection, research, entertainment and education in the world. As of 2021, more than half the population of the world is using internet. Thus, it is no surprise that website development is an industry that is expanding at a rapid speed. What is an IP address? In order to access a website, you should know the IP or Internet Protocol address of the site. It is a unique string of numbers, and hence, each device has this address to distinguish itself from numerous devices and websites that are connected through the Internet. If you need to find the actual IP address of your device, you can type “what’s my IP address” into your search browser. What is a website? Websites are mainly important files that are stored on servers, which are computers that host websites. All these servers are connected to a large network known as the Internet. Browsers are mainly computer programs that load websites through the internet connection, like Internet Explorer or Google Chrome, while the computers that are used to access these sites are called “clients.” What is HTTP? HTTP or HyperText Transfer Protocol connects your website request and you to the remote server that contains all website data. It is mainly a set of rules or protocols that explains how messages need to be sent over the Internet. It enables you to jump between websites and site pages. What is coding? Coding is the procedure of writing codes for applications and servers with the help of programming languages. Those are known as “languages” because they include grammatical rules and vocabulary for interacting with computers. The codes even include abbreviations, special commands, and punctuation that can be read only by programs and devices. All software needs to write in a minimum of one coding language; however, languages vary based on the operating system, platform, and style. Almost all languages fall into one of two categories, which are back-end and front-end. What are front-end and back-end? Front-end, also known as client-side, is the side of a software or website that clients can see and interact with as an Internet user. When the information of a website is transferred from a certain server to a browser, these front-end coding languages enable the website to work without the need to “communicate” continuously with the Internet. These types of codes allow users to play videos, interact with a site, highlight text, expand images, and many more. On the other hand, the back-end or server side is the side that clients cannot see while using the Internet. As it is a digital infrastructure, hence, to non-developers, it will look like a bunch of letters, numbers, and symbols. CMS: What is it? A content management system is a specific series of programs or web applications that are used to develop and manage web content. Though CMS is not required to create a website, still using a CMS can make the procedure much easier. It offers the building blocks and even allows you to create the structure with your code. Thus, these CMSs are usually used for blogging and eCommerce, but they are beneficial for almost all types of websites. Types of website development services in India There are several types of website development services in India, such as: Therefore, website development is always important to ensure the accurate functionality of your website. Hence, for some of the best website development services in India, you can trust CHL Softech.
<urn:uuid:2507b740-d6c3-4489-aca6-8a860646d99f>
CC-MAIN-2024-10
https://www.chlsoftech.com/blogs/complete-guide-to-website-development.html
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.945315
863
3.109375
3
Welcome to Term 4! I do hope you all havd a happy and restful week. In English this term we will be using our version of Lost and Found by Oliver Jeffers to invent our own voyage and return stories. The children have loved learning the words and actions by heart using our story map (below). We have created mag-pie books where we can store words, phrases and ideas that other writers have used that we really like. We can then use them in our own wrting. This is one of the key strategies that is part of the Talk4writing ethos. In maths we will be focusing on place value (within 20). The children will learn each number from 11 to 19 has '1 ten and some more'. They will see 10 and 20 as having just tens and no ones, and they will still need to understand that numbers can be seen in different ways (e.g 1 ten being equal to 10 ones). The children will continue to use numicon and ten frames but we will also introduce Base 10 (below). It is key that children fully understand place value before they move onto adding and subtracting two-digit numbers.
<urn:uuid:d43643c5-8742-438e-b068-c9136d55f0db>
CC-MAIN-2024-10
https://www.churchill.kent.sch.uk/term-4-2/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.945325
235
4.3125
4
Tunneling is a way to move packets from one network to another. Tunneling works via encapsulation: wrapping a packet inside another packet. After reading this article you will be able to: Copy article link In the physical world, tunneling is a way to cross terrain or boundaries that could not normally be crossed. Similarly, in networking, tunnels are a method for transporting data across a network using protocols that are not supported by that network. Tunneling works by encapsulating packets: wrapping packets inside of other packets. (Packets are small pieces of data that can be re-assembled at their destination into a larger file.) Tunneling is often used in virtual private networks (VPNs). It can also set up efficient and secure connections between networks, enable the usage of unsupported network protocols, and in some cases allow users to bypass firewalls. Data traveling over a network is divided into packets. A typical packet has two parts: the header, which indicates the packet's destination and which protocol it uses, and the payload, which is the packet's actual contents. An encapsulated packet is essentially a packet inside another packet. In an encapsulated packet, the header and payload of the first packet goes inside the payload section of the surrounding packet. The original packet itself becomes the payload. All packets use networking protocols — standardized ways of formatting data — to get to their destinations. However, not all networks support all protocols. Imagine a company wants to set up a wide area network (WAN) connecting Office A and Office B. The company uses the IPv6 protocol, which is the latest version of the Internet Protocol (IP), but there is a network between Office A and Office B that only supports IPv4. By encapsulating their IPv6 packets inside IPv4 packets, the company can continue to use IPv6 while still sending data directly between the offices. Encapsulation is also useful for encrypted network connections. Encryption is the process of scrambling data in such a way that it can only be unscrambled using a secret encryption key; the process of undoing encryption is called decryption. If a packet is completely encrypted, including the header, then network routers will not be able to forward the packet to its destination since they do not have the key and cannot see its header. By wrapping the encrypted packet inside another unencrypted packet, the packet can travel across networks like normal. A VPN is a secure, encrypted connection over a publicly shared network. Tunneling is the process by which VPN packets reach their intended destination, which is typically a private network. Many VPNs use the IPsec protocol suite. IPsec is a group of protocols that run directly on top of IP at the network layer. Network traffic in an IPsec tunnel is fully encrypted, but it is decrypted once it reaches either the network or the user device. (IPsec also has a mode called "transport mode" that does not create a tunnel.) Another protocol in common use for VPNs is Transport Layer Security (TLS). This protocol operates at either layer 6 or layer 7 of the OSI model depending on how the model is interpreted. TLS is sometimes called SSL (Secure Sockets Layer), although SSL refers to an older protocol that is no longer in use. Usually, when a user connects their device to a VPN, all their network traffic goes through the VPN tunnel. Split tunneling allows some traffic to go outside of the VPN tunnel. In essence, split tunneling lets user devices connect to two networks simultaneously: one public and one private. Generic Routing Encapsulation (GRE) is one of several tunneling protocols. GRE encapsulates data packets that use one routing protocol inside the packets of another protocol. GRE is one way to set up a direct point-to-point connection across a network, for the purpose of simplifying connections between separate networks. GRE adds two headers to each packet: the GRE header and an IP header. The GRE header indicates the protocol type used by the encapsulated packet. The IP header encapsulates the original packet's IP header and payload. Only the routers at each end of the GRE tunnel will reference the original, non-GRE IP header. IP-in-IP is a tunneling protocol for encapsulating IP packets inside other IP packets. IP-in-IP does not encrypt packets and is not used for VPNs. Its main use is setting up network routes that would not normally be available. The Secure Shell (SSH) protocol sets up encrypted connections between client and server, and can also be used to set up a secure tunnel. SSH operates at layer 7 of the OSI model, the application layer. By contrast, IPsec, IP-in-IP, and GRE operate at the network layer. In addition to GRE, IPsec, IP-in-IP, and SSH, other tunneling protocols include: Cloudflare Magic Transit protects on-premise, cloud, and hybrid network infrastructure from DDoS attacks and other threats. In order for Magic Transit to work, the Cloudflare network has to be securely connected to the customer's internal network. Cloudflare uses GRE tunneling to form these connections. With GRE tunneling, Magic Transit is able to connect directly to Cloudflare customers' networks securely over the public Internet.
<urn:uuid:afdade9c-3f0a-4cc9-ac43-96c95cecec7b>
CC-MAIN-2024-10
https://www.cloudflare.com/it-it/learning/network-layer/what-is-tunneling/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.921235
1,088
4.3125
4
Over the years, African Americans have been through more turmoil and strife than any other race. This is simply not a claim, but a proven fact. While slavery and indentured servitude involved other ethnicities, Black people are the only race where an entire population had their lives interrupted and brought to another country where they were bought, sold, beaten, and raped for a lifetime of unmerited service. Patrick Manning, Historian and Professor Emeritus at the University of Pittsburgh, estimate that about 12 million people were brought over from Africa, and some 1.5 million died in transit, while either starving on the ship or falling overboard. Even after slavery ended and the Civil War came to a close with Black people given the right to vote and full citizenship per the United States Constitution, there was an uphill battle to climb after President Rutherford B. Hayes removed the troops from the South, thus sending African Americans down a spiral of racism and discrimination that is still being fought in today’s age and culture. African Americans have made great strides over the years, with representation being shown in many faces of the world including politics, law, entertainment, education, industry, entrepreneurship and the arts. Contrarily, that same race could also argue that just as they have taken two steps forward, they get pushed 5 steps back. They are plagued with poverty, police brutality, struggles to remain represented and the like. Additionally, one cannot rule out the internal struggles such as Black-on-black crime and the crabs-in-the-bucket syndrome, which truly contradicts W.E.B. Dubois’s Talented Tenth Theory. With so much that African Americans are facing and that they have gone through, one would believe that it is past due for the United States to pay attention to the Black agenda and its needs. Just one question: What is the Black agenda? That question is not rhetorical nor is it a euphemism. What is the Black agenda? Do Black people want reparations for Slavery? Do they want true consequences for police officers who strike down unarmed black people? Do they want better opportunities when it comes to jobs and education? Do they want safer streets in neighborhoods where crime and drugs are at an all-time high? The LGBTQQIAP communities have made it clear their agenda is to influence legislation that will protect their civil liberties in the country. The Native American community have expressed that they are pushing for protection of their remaining Native American tribes. One of the reasons that Hillary Clinton was not successful in being elected the 45th President of the United States was because Black people chose to stay at home. When asked, they will say that Clinton was not trustworthy nor was she true to the Black agenda. The question was asked then, “What do you want?” As the world turns into the second half of the twilight zone known as Donald Trump’s presidency, many candidates are beginning to throw their hats into the ring for the upcoming 2020 election. Already, many candidates are facing unnecessary scrutiny and have been written off by Black people as not getting their vote. So, the question must be asked again….WHAT DO YOU WANT? Instead of bashing the perspective candidates for their past, the voter electorate should be spending more time embracing their platform and challenging them to ensure that they will cater to the needs of all people and their various agendas. However, until the Black community can be able to come together and identify what they truly want, things can not and will not be improved. There are so many issues facing Black people, so it is important to move past the internal bickering so that the Black agenda (whatever it may be) can be made loud and clear. More candidates will be throwing their hats in the election ring. Do not support anyone now. Do not condemn anyone now. Remember, the first question, above all, needs to always be, WHAT DO I WANT?
<urn:uuid:e0bfd5d3-e669-47bc-adea-ab6ab52ffc0d>
CC-MAIN-2024-10
https://www.collinsp3.com/post/the-black-agenda-or-lack-thereof
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.975763
797
3.15625
3
Retinitis Pigmentosa (RP) is part of a group of rare genetic disorders that cause slow but progressive degeneration of photoreceptor cells in the retina. RP symptoms typically begin in childhood with decreased night vision, followed by loss of peripheral vision, and can eventually lead to complete loss of vision. There is currently no cure for RP. Since 1992, doctors in Cuba have offered a treatment for RP at an initial cost of just over $10 000 CDN. The Cuban treatment comprises eye surgery, ozone therapy, electric stimulation, and drugs. However, no independent, peer-reviewed studies have been conducted to date that demonstrate the Cuban treatment improves or stabilizes retinal function. The Canadian Ophthalmological Society does not recommend the Cuban treatment for patients with RP due to the absence of objective, peer-reviewed evidence to support its efficacy, safety, and the fact that in some cases the treatment appears to have worsened patients’ RP symptoms. Full Position Statement Retinitis Pigmentosa (RP) refers to a group of rare genetic disorders that cause slow but progressive degeneration of photoreceptor cells in the retina. RP affects approximately 1 in 3500 Canadians.1 RP symptoms typically begin in childhood with decreased night vision, followed by loss of peripheral vision, and can eventually lead to complete loss of vision. RP typically affects both eyes and ranges in severity from no visual problems in some families to early blindness in others. There is currently no cure for RP. Since 1992, doctors in Cuba have offered a treatment for RP, which is available at a cost of $10 000 CDN for the initial treatment, plus $4900 CDN for each subsequent annual ozone treatment.2 The Cuban treatment is open to anyone seeking treatment, both locally and internationally, and is comprised of the following: - Eye surgery: A flap of orbital vascular adipose tissue is inserted into a sclerochoroidal pocket at the temporal side of the eye. The theory behind the surgery is that it will increase blood flow, which will stabilize the progression of RP. However, our current knowledge, based on continued research, indicates that RP is a cellular disease, not a disease of blood circulation.2 Several complications have been reported, including photophobia, strabismus with diplopia post-operatively, and inadvertent rupture or perforation of the scleral wall during surgery.3,4 - Ozone therapy: Post-surgery, ozone is administered to patients for 14-21 days, either rectally or via the bloodstream. The theory behind the ozone therapy is that it boosts antioxidants, which minimizes damage caused by lipid peroxidation. The rationale here remains contentious in the scientific community.5 In addition, ozone is an unstable molecule and may break down even before it is administered into the body. When ozone is infused into human blood, it produces reactive oxygen species which has the potential to cause an opposite effect, inducing oxidative stress and damage to the cell.6 - Electric stimulation: Post-surgery, patients undergo multiple sessions of electrical stimulation of their head, neck, soles, and palms over a period of 14-21 days.7 - Drugs: Post-surgery, patients are occasionally administered a mixture of antiplatelets, antioxidants, immunomodulators, vitamins, and minerals. Information on the precise dosages and names of the medications is not readily available and varies on an individual basis.3 Despite the fact that the Cuban treatment has been available for more than 20 years, its proponents have failed to demonstrate the scientific reasoning behind the treatment, and they have not demonstrated their techniques to any peers in the field outside of their own clinic. Furthermore, the results of pre- and post-operative outcomes have not been published in any peer-reviewed medical journal, nor have any longitudinal studies been conducted, even though the Cuban treatment has been offered since the early 1990s.7 The few studies on RP that have been performed report an absence of any evidence that the Cuban treatment for RP improves or stabilizes retinal function. In fact, according to a 1996 study conducted by Berson et al., in some cases, the treatment resulted in a 12.9% decline in patients’ visual fields.8 Given the lack of objective, independent, peer-reviewed medical studies, the Canadian Ophthalmological Society does not recommend the Cuban treatment for patients with RP. Furthermore, the Canadian Ophthalmological Society strongly advises that patients with RP avoid the Cuban treatment due to the absence of evidence to support its efficacy, safety, and the fact that in some cases the Cuban treatment appears to have worsened patients’ RP symptoms. - Foundation Fighting Blindness. http://ffb.ca/learn/eye-diseases/ - Richard F. Tourisme médical. Hôpital sous les tropiques. Journal de la rue 2009;1er août. http://journaldelarue.wordpress.com/2009/08/01/tourisme-medical-hopital-sous-les-tropiques/. - Parmeggiani F, Sato G, De Nadai K, Romano MR, Binotto A, Costagliola C. Clinical and rehabilitative management of retinitis pigmentosa: up-to-date. Current Genomics. 2011, 12, 250-259. - Berger RW, Haase W, Gerding H. Original papers: Ocular motility disorders after surgery for retinitis pigmentosa ‘Cuba-therapy’. Strabismus 1995;3(1): 13-20. - Copello, M, Eguía, F, Menéndez, S, Menéndez, N. Ozone therapy in patients with retinitis pigmentosa. Ozone: Science & Engineering. 2003, 25(3), 223-232. - Fishman GA. A historical perspective on the early treatment of night blindness and the use of dubious and unproven treatment strategies for patients with retinitis pigmentosa. Survey of Ophthalmology 2013;58(6):652-663. - Duquette J. Is there evidence supporting the Cuban treatment for RP? Institut Nazareth & Louis-Braille, 2010. http://www.inlb.qc.ca/recherche-publ/is-there-evidence-supporting-the-cuban-treatment-for-rp/. - Berson EL, Remulla JC, Rosner B, Sandberg MA, Weigel-DiFranco C. Evaluation of Patients with Retinitis Pigmentosa Receiving Electric Stimulation, Ozonated Blood, and Ocular Surgery in Cuba. Arch Ophthalmol. 1996;114(5):560-563. doi:10.1001/archopht.1996.01100130552009.
<urn:uuid:70ab0700-7f87-4cff-af84-52f09988efc7>
CC-MAIN-2024-10
https://www.cosprc.ca/cuban-treatment-for-retinitis-pigmentosa/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.899494
1,421
2.953125
3
Lieutenant Halsell of the Detroit Fire Department visited Mann to talk about the importance of fire safety. With the winter months quickly approaching coupled with growing independence at home, Lt. Halsell presented tips and stories to teach students how to safely heat their homes and rooms and how to cook and use the kitchen safely. Students also learned what to do and how to respond in an emergency should they experience at fire at home. The presentation ended with 5th grade student Saniyah M helping Lt. Halsell show how firefighters get dressed and what their gear does during a fire. Tips from Lt. Halsell included keeping areas clear where electronics are plugged in, never leaving the kitchen while cooking and practicing an escape plan with their families at home, both for standalone homes and apartments. We appreciate and thank Lt. Halsell and the DFD for helping our students prevent fires while also planning and being prepared in case of emergency,
<urn:uuid:4b8d347c-c317-4e18-8860-f8e1e73e5d49>
CC-MAIN-2024-10
https://www.detroitk12.org/Page/18045
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.972887
188
2.625
3
How does the census impact economic development? The census is an essential tool in our system of government and private enterprise. Many of the most important decisions made by government and business leaders are based on the information that is provided by the census combined with interim community surveys. Census data is an invaluable tool for our business community. It stands as the single best source of information about the demographics and growth potential of area’s growth.1 Almost all commercial databases require benchmarking data to set and analyze reliable population parameters provided that is provided by the census. While businesses collect their own data or make use of data generated by other private sources, this data can be supported by the often complementary public data gathered by the Census Bureau. This provides business leaders and those interested in invested and expanding into our county with vital information about demographic and economic changes that facilitate more informed and forward-looking business decision- making.2 Entrepreneurs both large and small rely on census information to make decisions about a wide variety of investments, including new real estate developments and office or store locations, the construction of hospitals and urgent care facilities, and expansions of distribution services and warehouse facilities. The Census 2020 will shape many different aspects of your community. Everyone is counted. For the first time, you can choose to respond online, by phone, or by mail. Respond today. Your Response Matters. Vital for Your Community. Shape Your Future. - DeVere Kutscher, “Businesses Cannot Afford a Failed Census,” Insidesources.com, March 8, 2018. - The Hamilton Project and American Enterprise Institute, “In Order That They Might RestTheir Arguments on Facts: The Vital Role of Government-Collected Data,” Economic Facts, March 2017, 4-5.
<urn:uuid:03bfd625-3e98-4160-a831-76f7d2990e1c>
CC-MAIN-2024-10
https://www.developmentauthority.com/2020/05/13/be-counted-census-2020/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.940967
361
2.984375
3
Chinese New Year Chinese New Year is the most popular of all Chinese festivals and is celebrated all over the world, wherever there are Chinese communities. Officially it is called the Spring Festival, but people still call it New Year. Chinese New Year falls on a different date each year, between 21st January and 21st February. The Chinese use a lunar (moon) calendar which is different to the solar (sun) calendar used in the West. Each year is connected to one of 12 animals and people are supposed to have different characters depending on which animal year they were born in – more information coming soon!
<urn:uuid:8282a115-d57a-47d9-979b-e971dbdce920>
CC-MAIN-2024-10
https://www.discoveringbristol.org.uk/glass/learning-journeys/chinese-new-year/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.973866
123
2.84375
3
Welding is a process that is never simple, regardless of what type it is, and besides your inherent skill and experience, one thing that can greatly determine how sturdy the weld will be is the tool that you’re using for your job. Of course, there are many types of welding, and each requires a different type of tool. For example, if you’re into spot welding, you will require a top-tier spot welder, and that’s precisely what we will be showcasing in the following article. We will be explaining some of the ins and outs of spot welding while also suggesting 5 very good spot welders that you could try since the market is so full of them that choosing one that is actually good can get rather confusing. The entries on our list were chosen based on their specs, special features, price, and user popularity, and we hope that after you reviewed them all, you can make a more informed decision regarding which is the one best suited for your needs. Table of Contents What Is Spot Welding? In short, spot welding is the process of welding two overlapping metal pieces via the application of localized pressure along with a strong electrical current to the two pieces of metal. During the welding process, your spot welder creates thermoelectric heat, and this is then applied to specific areas on the metal called circular points. Almost all sport welders use copper allow electrodes because of the copper’s natural electrical conductivity. This process can be used on most types of metal, and the only real limitation is the thickness of the area where you need to do the welding, as it can be anywhere between 0.02 inches to 0.118 inches. What Is a Spot Welder? Most spot welders feature the same base design, and the only real difference between the models consists of the materials used in the construction, minor design changes, and different power supplies. As such, most spot welders consist of a workstation that is made out of the following: - A power supply - The weld head - The welding electrodes. Spot welders are most frequently used in the automotive industry, as well as any other industry where you need to turn two separate pieces of metal into a single one. In fact, spot welders are even used by contemporary artists that like to create abstract metallic sculptures, so they also have somewhat of a creative value as well. Although not as common as other types of welding devices, at least not for non-professionals, spot welders are easy to learn and even master. In fact, you can go ahead and try out a spot welder on different pieces of metal just to see how it works, eventually evolving to the point where you can actually start using it for its intended purpose. Where Can I Buy a Good Spot Welder? Knowing where to buy the right product, especially when it’s a piece of electrical equipment that is inherently pretty expensive can be very difficult, especially if something happened during transport and it got damaged, or if it just doesn’t meet your expectations, and that is when returning it becomes the only option. Besides, if you go to a dedicated manufacturer’s website, you’ll notice how they all advertise their products as being the best, at which point choosing one becomes even more confusing. Because of that, whenever we want to browse for products, we like to go to a website where not only can we see what other users think about them (both the pros and the cons), but in case something goes wrong, we can always simply return the product and get a refund immediately, and that website is called Amazon. Besides, Amazon has a wide selection of products from manufacturers around the world, and their delivery times are pretty good as well, although it does depend on the area where you are living. Which Are the Best Spot Welders? Topping off our list is the Stark Professional Spot Welder, a top-tier portable spot welder with a single-phase design that makes it easier to weld a wide variety of materials together, including uncoated mild, galvanized, or stainless sheet steel, with a thickness of up to up to a maximum of 0.118 inches. The welding tips abandon the traditional copper alloy in favor of more durable stainless steel ones but don’t worry about how this will affect welding quality since you will never be able to tell the difference. It comes with a very simple welding mechanism that makes inserting materials very easy, and with a single push of the button, you can go ahead and start the welding process, thus saving up a lot of time you would otherwise waste with material preparation. All you have to do is insert the two pieces of metal between the two 0.6-inch thick tongs and then press down on the clamp to lock them together before actually starting the machine Carrying this spot welder around is made all the easier thanks to a handle that is attached to the top of the machine, so you can move from one corner of the house to another easily, or carry it around if you’re on the road. As for the package itself, if you do decide to buy this spot welder, you’ll also receive an extra pair of welding tips for multiple users, so you save a bit of money on consumables as well. Whenever you’re done with your welding, or when you need to replace them, simply twist the tips off and screw on the new ones. Because of the overall simplicity of this product, we highly recommend it if you’ve never had or used a spot welder before since it is extremely beginner-friendly. Besides, even if you won’t actually be using this spot welder for any actual welding, it makes for a great practice tool if you have an apprentice that’s just learning the trade. Besides, this product’s price tag is very accessible, so buying it as a practice tool will not leave a big dent in your budget. Speaking of budget, if you made up your mind and decided to give this product a try, simply go to the Stark Professional Spot Welder’s Amazon page, read up what other users have to say about it, and then decide on whether you’ll press Add to Cart or not. - Welding thickness: 0.118 mm - Power output: 120/240 V - Work Cycle: 50% - Power source: AC - Size: 18.5 x 4.5 x 7.5 inches - Weight: 28.4 pounds - Works on a wide variety of materials - Easy to use and beginner-friendly - Handle makes it easier to carry - Press and release mechanism - A bit heavy The next entry on our list is the DEKO MMA ARC Welding Machine, a manual metal arc welding machine that showcases incredible levels of welding power, being easily capable of handling mild steel, weld steel, stainless steel, and even cast iron thanks to the use of advanced insulated-gate bipolar transistor (IGBT) inverter technology. However, we also choose this welding machine because regardless of how much power it showcases, it comes with a very compact design, as well as an easy-carry handle, making it both easy to transport and store in places where there’s not much room to spare. It’s built with high-endurance materials that make it very durable, so you know that investing in this spot welder is going to be beneficial in the long run. As far as features go, it has closed-loop feedback control, and because the output voltage is stable, it features great adaptability with any electrical network, and they also designed this product to be energy efficient. This spot welder is also very quiet thanks to the high-performance fully mute fan motor that comes with an instant cooling function that promotes body heat dissipation Thanks to its features, this spot welder is an ideal choice for use in plumbing, construction work, thin metal precision welding, automobile manufacturing, metal processing, and more. Lastly, this spot welder comes with several fittings that can make your job easier before, during, and after the welding is done. These include an electrode holder with a strong clamping force, an input power adapter, and a brush to remove any welding debris. Before you decide on whether this is the right machine for you or not, go to the DEKO MMA ARC Welding Machine’s Amazon page and check out the customer feedback to get a hands-on approach to what this machine is all about. - Welding thickness: N/A - Power output: 110/220 V - Work Cycle: 40-60% - Power source: AC - Size: 11.4 x 4.92 x 7.87 inches - Weight: 12.1 pounds - Sturdy build - Portable design - Uses advanced IGBT technology - Very silent and good at dissipating heat - Not suited for beginner If versatility is what you are after in a spot welder, look no further than the Forney 140 FC-i Welder, since it comes with everything that both a DIY enthusiast and a professional welder can ever need. For example, it has infinite voltage and wire feed speed control, so it can adapt to any type of weld and material that you need, and the 140 A power output allows this little device to handle mild steel of up to 1/4 inches thickness. Of course, all that raw power may make you think that this machine is rather bulky, but you couldn’t be any further from the truth, since it only weighs around 19 pounds, and the handle that it has makes carrying it around to be very easy. More so, you don’t have to worry that carrying it around will lead to more wear and tear than would be necessary since this spot welder is encompassed entirely in an all-metal case. Another reason why this spot welder deserves a spot on our list is that if you do decide to get it, you will not only get the machine itself but also a ton of other accessories and materials as well, basically like a welder’s starter kit. As such, the welder also comes with an 8-inch MIG gun, an 8-inch ground clamp, an integrated handle with a torch wrap, and a 20A-15A adapter, and if you have problems with the base product or any of the aforementioned accessories, know that everything is backed by an extensive 1-year warranty. Overall, this Forney welder impressed us by being a very efficient flux-core capable welder that is ideal for first-time welders, as well as professionals. If you’re into DIY projects, metalwork, automotive repair, or other endeavors where binding pieces of metal is a core aspect, then you should definitely go ahead and consider the Forney 140 FC-i Welder. - Welding thickness: 0.25 inches - Power output: 140V - Work Cycle: 25-100% - Power source: AC - Size: 16.7 x 12 x 8.1 inches - Weight: 19 pounds - The package comes with plenty of accessories - Flux-core capable - Easy to transport - Has a cable wrap - The wire that comes with the welder isn’t all that great We’re getting close to the end of our list, but that doesn’t mean that the products listed are getting worse and worse, and you can convince yourself about that just by looking at the YESWELDER ARC-205DS, a high-powered and very powerful spot welder. It features dual power inputs, one of 110V for a 150A output, and another of 220V for a 205A output, each with its own compatible types of rods. The design of the welder is made to be as compact as possible, with a weight of only around 14 pounds, and it comes with a very convenient handle for easy transportation, as well as slots where you can insert the ends of a belt if you prefer carrying it on your shoulder. Using it will be a walk in the park because it makes arc starting very easily, and it also incorporates technology that ensures good arc stability, making it ideal for delicate welding jobs where very thin sheets of materials need to be handled. Safety is yet another area where this welder gets bonus points from us since it comes with features like automatic compensation for voltage fluctuation, overload protection, a good temperature control via fan dormancy, and over-current protection. If you decide to get this spot welder, know that you will also be receiving several other accessories within the same package, such as an electrode holder with cable, and a ground clamp with both of which are 10-feet each. To find out more details about this product, see pictures of it, and read user reviews, simply visit the YESWELDER ARC-205DS’s Amazon page. - Welding thickness: 0.5 inches - Power output: 110V/220V - Work Cycle: 60% - Power source: AC - Size: 15.51 x 13.19 x 7.64 inches - Weight: 13.82 pounds - Starts arcs easily - Dual power output - Plenty of safety features - Easy to carry and postable - Powerful against very thick sheets of steel - You need to buy an adapter if you need to buy materials for TIG welding Closing our list of best spot welders is the Mophorn 737G Battery Spot Welder, a machine that’s ideal for those of you that are on a tight budget but don’t want to cheap out on quality either. It’s great for a wide variety of jobs or at least anything that involves welding nickel-plated steel strips of up to 0.03-0.2 mm in thickness, and you don’t have to worry about powering this machine up, since it works with a lot of battery types, including 18650, 14500 and any other rechargeable lithium batteries. It comes with a dual-pulse mode, and each of these modes has its own separate displays, both current and pulse display, and they are made so that the welder can get clear and instant information about the machine’s current power settings, which alsoincludespulse quantity and current when you are at work with this machine. The separate panels also panel allow you to set current and pulse efficiently, so you’re workflow will be greatly optimized, and using this tool is also extremely easy since all you need to do is push the fixed head up, or use the foot pedal. another thing we liked about this product is something that a lot of welding machines have to deal with, and that is heat management. Well, this Mophorn spot welder has that covered thanks to the radiator. Not only does it come with a built-in smart chip to prevent overheating damage to the welder, but it also features automatic short-point protection, so the welding is also protected from overheating. This product’s biggest highlight, however, is the fact that it is so portable, thanks to the compact body shape, as well as the ergonomic handle that makes it light and easy to move, so welding jobs on the go will be much easier. If you’re impressed by what this small yet powerful spot welder can do, go ahead and check out what other people think about it by visiting the Mophorn 737G Battery Spot Welder’s Amazon page and going to the Reviews section. - Welding thickness: 0.03 – 0.2 mm - Power output: 110V - Power source: AC/Battery - Size: 9.1 x 5.5 x 8.3 inches - Weight: 11.84 pounds - Great for nickel, iron, nickel-plated iron, and more - Dual welding mode with separate LCDs - Very portable - Doesn’t work well with aluminum or copper How to Choose a Good Spot Welder? If you’re never had a spot welder of your own before, chances are that even after we showcased the 5 products above you might still be a bit confused regarding which is best for you. That’s why we went ahead and created this little guide where we will be explaining the most important features to look after when shopping for a new spot welder, so that you know precisely what each product focuses on, and therefore which is the best for you. We already talked at the beginning of the article about how spot welding can be used on metals that are within a certain interval of thickness, but you need to understand that not all spot welders can be used on those precise values, as some can only work with thinner sheets while only the most powerful ones can piece together the thicker ones. Thankfully enough, the welding thickness range is one of the first things that any spot welder will display in its spec sheet, since for many users, professionals included, it’s also the only thing that they are interested in. However, if you’re not a professional welder and you’re just interested in doing some minor DIY projects, a spot welder with a welding range between 0.05 and 0.2 mm will suffice. An important aspect to consider when buying a spot welder is to check out what power output since this effectively dictates the spot welder’s entire performance, including the above-mentioned welding thickness. Because of that, the next spec you should always check out when browsing for a spot welder is a feature called welding power. The average spot welders have a welding power anywhere between 50A to 800A, and those of you that want to work with really thick sheets of metal should opt for a model with even higher power output. Power dictates the spot welder’s temperature range, and the temperature range dictates the welding thickness and what kind of metals the welder can be used on, and that is why this is yet another important criteria that one needs to consider when buying a spot welder. Typical spot welders have temperature ranges between 100 to 400 degrees Celcius or 150 to 500 degrees Celcius, although higher temperature ranges mean that the welder can handle more metals, and is, therefore, less limited. Since welding is all about outputting a large about of power and creating a lot of heat, it goes without saying that no welding tool can work indefinitely without overheating and damaging itself, and that is where the work cycle ) also known as duty cycle) comes into play. Without going into details, a welding machine’s work cycle is basically the percentage of time that a machine will safely operate, or in this case weld, within a certain time frame, and the value is usually represented as a percentage, and higher work cycles (percentages) are always better. For example, if a spot welder states that it has a work or duty cycle of 200 Amps at 30%, it means that it will operate at 200A for 3 minutes within a 10 minute time period. Now that we talked about the more important features that directly impact a spot welder’s performance, it’s time to look for the additional specs that can be treated as more like secondary criteria. For example, spot welders can be both battery-powered or can work while connected to an AC power source. Sure enough, if you’re going with battery-powered spot welders, you need to know that they are usually more limited in terms of welding thickness, power output, temperature range, and work cycle, although this difference is dictated purely by the spot welder’s own design, as well as the batteries. Speaking of the batteries, there are a lot of battery types that are available for spot welders out there, but two of the most popular ones available on the market are 14500 and 18650 batteries, and most mainstream battery-powered spot welders are compatible with these particular models. We already talked about how simple spot welding actually is once you get the hang of it, but for those of you that do it for a living, having a wider range of control options available can greatly improve the speed and quality of your work. Typical spot welders come with dials and switches, but more modern models have big display modules, built-in control panels, and more. Spot welders are the type of machine that need a lot of accessories to perform a wide range of jobs. Many manufacturers will usually include several such accessories in the package when you buy a spot welder by default. For example, the typical spot welder kit will usually contain the following: - The spot welder - Welding needles - A battery holder (for battery-powered models) - Nickel platings - A foot pedal - Fuse tubes Sure enough, other accessories can be included in a package deal, but if you manage to find a product that comes with such a bundle, you should take advantage of it. Not only is it a good value for your money, but if a package contains all the right tools and accessories, you can start welding without any further preparations. Speaking of value for your money, the price of a spot welder also plays an important role. In fact, for many users out there, the price tag is the determining factor whenever they judge whether to buy a product or look for another one, especially since a spot welder is not inherently cheap. Sure enough, prices differ based on the brand and the spot welder’s specs. However, this also means that if you’re not going to do any heavy-duty spot welding, or if you’re only ever going to do it once in a while, investing too much would be useless. The same cannot be said if you’re a professional, since you’ll presumably be using this machine a few good hours a day, every single day, si buying a more expensive piece of equipment that will do a great job and last you for a very long time is actually recommended. Once you’ve paid quite a hefty sum of money for a spot welder, you’ll probably feel better if you know that you’re investment is covered by warranty, and this is something that many manufacturers will offer. More so, if you have the option to get an extended warranty, we recommend that you go right ahead and get one. Pros and Cons of Spot Welding There are many types of welding that you can try, and they all have their own advantages and disadvantages. Spot welding isn’t perfect, and you can’t always use it either, so before you even think about making any kind of purchase, take a look at these pros and cons of spot welding, and see whether this is actually what you want or need. Pros of Spot Welding - No extra metal needs to be used to create the welds since this method uses an electrical current that is conducted through the electrodes. - Spot welding creates some of the most durable welds available, making it the ideal choice whenever you want long-lasting results above all else. - Spot welders are easy to move around, making them great when you have DIY projects throughout the entire house, or if you’re on the road. - This welding process takes very little time, so when you need to perform a time-sensitive job, spot welding is an ideal choice. - You have very few requirements in terms of consumables since all you need is an electrical power source. - You don’t need to work with high heat levels, so there’s no fear of burning any of your extra materials. - Spot welding as a process is very easy to learn and thus recommended for beginners as well. Keep in mind that no matter how simple we make spot welding sound like, it’s still something that requires your utmost attention, and even some practice before you engage in any serious projects. Cons of Spot Welding Now that we’ve listed the many advantages of spot weldings, we now want to let you know about the few (albeit relevant) disadvantages of using this method. - Spot welding is not effective on all materials. For example, it’s recommended that you use this welding method when using materials like: - Nickel alloys - Stainless steel - Low-carbon steel - Spot welding works best when you’re able to work on a completely flat surface at a precise angle. The angle at which the electrodes are pointed as opposed to the metal can greatly influence whether or not you can use this method, and if you’re working with pieces of metal that feature angles and odd shapes, you’re better off using a different welding method. Spot Welding Safety Concerns It doesn’t matter if you’re doing spot welding, TIG welding, Flux-core welding, or any other type of welding, since they all involve high electrical currents, extremely high temperatures, molten splatter, sparks, and all kinds of other hazards you do not want to be in direct contact with. Because of that, you must always do a little research either online or by using the safety instructions and the user’s guide of whatever welding machine you bought. Spot welders can come in a variety of shapes and sizes, so it’s best if you always follow the manufacturer’s exact guidelines. However, there are a few general safety procedures that you should always follow if you want to engage in any type of welding. For starters, after you’re done with your spot welder, the electrodes will be extremely hot, so remember to let them cool off before removing them and depositing them anywhere, especially if there are other flammable materials in the area. Speaking of removing the electrodes, remember to wear safety gloves at all times so that you don’t burn your hands and fingers. Special welding gloves are recommended, and there are plenty of options for you to buy. All welders create sparks and molten spatter, so always remember to wear personal protection equipment (PPE) that covers your face, especially your eyes. This can come in the form of a full welding mask or a pair of welding goggles. These will not only protect your face from flying debris, but the lens will protect your eyes from the intense light and invisible UV radiation. One very common safety concern when using spot welders is that the electrodes can easily get stuck during the welding process, and that is not something that you’d want to happen. This can happen due to a wide variety of reasons, including: - Improper alignment - Insufficient force - Dirt and debris - Too much heat All of these can be prevented through proper maintenance, frequent cleaning of your work environment, routine checkups before every welding job, gauging the temperature correctly, and more. Besides, whenever you store the electrodes, make sure that there is no risk of them corroding, so avoid humid environments. As an added layer of protection, you can apply some corrosion protective solutions, which can be bonders, sealers, primers, or paint coats. Best Spot Welders: Closing Thoughts This brings us to the end of the article, and we hope that it was as informative and as simple for you as possible, both in terms of what sport welding is as a process, as well as what spot welders you should use. The 5 entries on our list were chosen so that they covered a lot of particular needs, from powerful spot welders used by professionals to lighter ones that any DIY enthusiasts can use once in a while because, in the end, the choice is solely up to you and your need. However, whether you will choose the more premium Stark Professional Spot Welderor the more affordable Mophorn 737G Battery Spot Welder, remember that a spot welder is a good investment, so if you do find a model that perfectly meets the criteria, disregard the fact that you need to pay a few extra dollars. Last but not least, don’t forget to stay safe while you’re welding, so if you’re on the market for a new spot welder, might as well start browsing for some welding gloves, boots, jackets, and other important safety gear, since they can not only keep you out of harm’s way, they may even save your life.
<urn:uuid:43b56c2c-d6b4-4087-a48d-86f6dd4da553>
CC-MAIN-2024-10
https://www.diys.com/best-spot-welders/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.94493
5,967
2.90625
3
DC Load Line Analysis of Semiconductor Diode: Figure 2-13(a) shows a DC Load Line Analysis of Semiconductor Diode in series with a 100 Ω resistance (R1) and a supply voltage (E). The polarity of E is such that the diode is forward biased, so a diode forward current (IF) flows. As already discussed, the circuit current can be determined approximately by assuming a constant diode forward voltage drop (VF). When the precise levels of the diode current and voltage must be calculated, graphical analysis (also termed DC Load Line Analysis of Semiconductor Diode) is employed. For graphical analysis, a dc load line is drawn on the diode forward characteristics, [Fig. 2-13(b)]. This is a straight line that illustrates all dc conditions that could exist within the circuit. Because the load line is always straight, it can be constructed by plotting any two corresponding current and voltage points and then drawing a straight line through them. To determine two points on the load line, an equation relating voltage, current,and resistance is first derived for the circuit. From Fig. 2-13(a), Any convenient two levels of IF can be substituted into Eq. 2-3 to calculate corresponding VF levels, or vice versa. The relationship between the diode forward voltage and current in the circuit in Fig. 2-13(a) is defined by the device characteristic. Consequently, there is only one point on the dc load line where the diode voltage and current are compatible with the circuit conditions. That is point Q, termed the quiescent point or dc bins point, where the load line intersects the characteristic. This may be checked by substituting the levels of IF and VF at point Q into Eq. 2-3. From the Q point on Fig. 2-13(b), IF = 40 mA and VF = 1 V. Equation 2-3 states that E = (IF R1) + VF. Therefore, So, with E = 5 V and R1 = 100 Ω, the only levels of IF and VF that can satisfy Eq. 2-3 on the diode characteristics in Fig. 2-13(b) are IF = 40 mA and VF= 1 V. Note that, although VF = 0 and VF = 5 V were used when, drawing the dc load line, no functioning semiconductor diode would have such forward voltage drops. These are simply convenient theoretical levels for constructing the DC Load Line Analysis of Semiconductor Diode. Calculating Load Resistance and Simply Voltage: In a diode series circuit [see Fig. 2-14(a)), resistor R1, indicates the slope of the dc load line, and supply voltage E determines point A on the load line. So, the circuit conditions can be altered by changing either R1 or E. When designing a diode circuit, it may be required to use a given supply voltage and set up a specified forward current. In this case, points A and Q are first plotted and the load line is drawn. R1 is then calculated from the slope of the load line. The problem could also occur in another way. For example, R1 and the required IF are known, and the required supply voltage is to be determined. This problem is solved by plotting point Q and drawing the load line with slope 1/R1. The supply voltage is then read at point A.
<urn:uuid:49d52447-e200-4272-9f60-5326559865f1>
CC-MAIN-2024-10
https://www.eeeguide.com/dc-load-line-analysis-of-semiconductor-diode/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.912956
725
3.984375
4
The Westpark was the starting point for urban development in Bochum’s western inner city. Implementation of the development project started with the approximately 38-hectare park, the first construction phase of which was completed in 1999. The park’s special potential lies in the existing topographical structures, which are a legacy of industrial use and which form the basic framework of the park’s design. At the centre of the park is the Jahrhunderthalle, a hall which has been converted into an event centre. With its airy steel construction, the Jahrhunderthalle is considered to be one of the first examples of a purely purpose-orientated engineering building. Following its careful conversion, it has come to symbolise activity at the interface between the traditional and the modern and has thus become a symbol of the new Ruhr area. The beginning of industrial use occurred with the siting of the Mayer cast steel factory on Alleestrasse in 1842. For 160 years, steel products ranging from church bells and cannons to wheel rims for inter-city express trains were manufactured here. Access to the area was prohibited for non-workers and they were unfamiliar with the terrain. The blast furnaces and steel works were switched off in 1985 and work with steel now only continues in the eastern part of the area. The unnatural topography was accentuated and further developed by the creation of supporting walls, steep paved embankments and areas on differing levels. The park, most of which is at a height of 90 metres, provides visitors with a unique opportunity to look outwards at the nearby areas of the town and inwards at the Jahrhunderthalle. Pioneering plants such as birch, willow, poplar and summer lilac (buddleia) with its intensive perfume have settled on the terrain and have grown into an impressive industrial wood over the last twenty years. This wood continues to be tended and developed. Uwe Belzner’s careful lighting gives the park its “night face”. This part of Bochum, which has been a hive of activity both day and night for over 160 years, thus continues to provide opportunities for night-time activities in its role as a public park.
<urn:uuid:5f25ad71-76b4-4b6a-8f42-3205297fc4b8>
CC-MAIN-2024-10
https://www.eghn.org/en/jahrhunderthalle-within-the-westpark-bochum/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.970948
465
2.59375
3
Do you want to Download PDF & All files of these? - LED Flashers Circuits and Projects using transistor - 10 Key Code Lock Switch Circuit - TDA2822 stereo amplifier circuit with PCB & datasheet - LM386 Audio Amplifier circuits with PCB - What is a capacitor? Principle working, types, and how it works - What is Zener diode? Its principle working and example usage - Learn Voltage Divider Circuit Works with Rule and Calculating We love Power supplies! - 0-50V 3A Variable power supply - Variable DC Power Supply, 1.2V to 30V 1A using LM317 - Working Principle of Unregulated Power Supply in Simple Ways - 12V to 5V Step-Down Converter Circuits Let’s make Amplifier Projects - 20 watts TDA2005 Bridge Amplifier Project with tone control Circuit - 30 watts OCL Amplifier circuit diagram with PCB using 2N3055 - 40W Transistor Audio Amplifier Circuit with PCB - Hi-Fi audio tone control circuit using low noise transistors What you will get from this E-Book. - A4 size PDF, can be read easily on every screen size. - Higher-resolution circuit diagram, PCB layout, Illustration, and other images. - Updates and error corrections about the content in this E-book via your email. For example, if one of the articles got updated we would send an entire article as a PDF to your email. For more information contact: [email protected] All are compiled in this eBook. Thanks for your support.
<urn:uuid:173ad17a-554e-4484-8a44-f8f1ff815cb2>
CC-MAIN-2024-10
https://www.eleccircuit.com/eleccircuit-book-v-01/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.743933
340
2.734375
3
Radon is a colorless, tasteless, radioactive gas. It occurs naturally and is produced by the breakdown of uranium in soil, rock, and water. It can also dissolve into your water supply. Radon can be removed from water by using one of two methods: Aeriation treatment – spraying water or mixing it with air and then venting the air from the water before use, or GAC treatment – filtering water through granular activated carbon. Radon attaches to the carbon and leaves the water free of radon. Disposing of the carbon may require special handling if it is used at a high radon level or if it has been used for a long time.
<urn:uuid:fab0b5d0-3ee4-4f11-a1a4-813e25b2117e>
CC-MAIN-2024-10
https://www.ew-water.com/services/radon/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.933162
139
3.65625
4
Google's new patent idea for an adhesive vehicle that would limit the injuries of struck pedestrians in auto accident was granted last week. The idea of the glue-covered vehicle is to prevent a secondary blow to the pedestrian by allowing them to become stuck to the hood of the car upon being struck. This would lead to fewer injuries, as there would be fewer impacts made by hitting the vehicle's windshield, roof, or the road after the initial collision. The adhesive coating would be beneath an outer shell that would break at the time of a collision. Pedestrian safety is an important topic in recent times. In December 2015, the National Highway Traffic Safety Administration announced that it is expanding its safety ratings in order to better assess how well a vehicle protects pedestrians in an auto accident. The patent supports the notion that existing car bumpers are generally designed to absorb energy to protect the vehicle, but do not provide much protection for a pedestrian. This new adhesive vehicle front would change that. Read the full story here.
<urn:uuid:85f626af-83ec-4fc8-ae8e-d1b2e29c194c>
CC-MAIN-2024-10
https://www.faraci.com/blog/2016/may/googles-new-patent-will-glue-pedestrians-to-cars/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.973471
205
2.53125
3
This paragraph begins with what is known as a drop cap. It is a large decorative letter signaling the beginning of a new section. The next paragraph begins after a short break. Each sentence begins with a capital letter, and each one ends with a mark signaling the purpose of the sentence and how we should read it. Typography is simply visual language. It’s the way we represent what we say. Typography is drawing the faces of the letters, typesetting the words, punctuating the sentences, and printing the paragraphs. The whole point is to make the reading experience as clear and enjoyable as possible. This is never more necessary than when it comes to the very words of God. So, why do we have spaces between our words or paragraphs or question marks or quotation marks? It wasn’t always this way. It all began with a pugnacious group of people, as much now as they were thousands of years ago—Bible scholars. It was Bible scholars throughout the millennia who have punctiliously propelled proper printing. In typesetting, the area with all the text on it is called a text block. Let’s look at this tiny block to see how the Bible became what it is today. Editor’s note: Many of these arguments are drawn heavily from Shady Characters by Keith Houston, one of the best books I’ve read in a while. Nearly flawless. A traditional book review will follow in the coming weeks. The New Testament was written in ancient Greek. Back then, they didn’t have spaces between words, lowercase letters, or really any marks of punctuation. Take this passage from Acts 1, for example. If we wrote it with the English alphabet, it would look like this. SOWHENTHEYHADGATHEREDTOGETHERTHEYBEGANTO ASKHIMLORDISTHISTHETIMEWHENYOUARERESTORING THEKINGDOMTOISRAELHETOLDTHEMYOUARENOT PERMITTEDTOKNOWTHETIMESORPERIODSTHATTHE FATHERHASSETBYHISOWNAUTHORITYBUTYOUWILL RECEIVEPOWERWHENTHEHOLYSPIRITHASCOMEUPONYOU ANDYOUWILLBEMYWITNESSESINJERUSALEMANDINALL JUDEAANDSAMARIAANDTOTHEFARTHESTPLACESOFTHE EARTH This is called scriptio continua. Of course, it’s difficult to read. So, scholars and orators needed a way to see a pause in their texts. The first person to separate words, to move away from scriptio continua, was a librarian at the famous Library of Alexandria, a Greek scholar named Aristophanes of Byzantium in the fourth century BC. He placed dots・in・between・the・words, which you might have seen on some ancient inscriptions. These dots took on various shapes and were used for intermittent pauses in speech, called the komma, kolon, and periodos. You may have seen these terms before. The next revolution began appearing in the second and third centuries AD. The text needed to be broken up into sections to understand the flow of thought. Some old manuscripts have the letter K, for kaput or “head,” just outside the text block to mark the beginning of a new section or argument. As an interesting side note, the letter marking the beginning of a new section eventually became a C for capitulum, or “chapter,” and finally became the shape of a pilcrow (¶). You still see these pop up on Microsoft Word if you turn on the hidden characters. In the production process of a book way long ago, the scribe copied the text as best he could and was careful to leave spaces where he saw this sign, which sat before each new section. For the next stage of the process, an artist called a “rubricator” drew detailed capital letters in red ink—rubrico in Latin means “to color red”—to guide the reader’s eye to important section breaks, much like the drop cap at the beginning of this article. As the demand for books increased, there was less time for the rubricator’s artwork, and many books passed by him on their way out the door, leaving spaces just before each new section. And this is where the modern paragraph indent comes from. With these little quirks in the visual representation of a text, it was only a matter of time before Christianity, a primarily textual religion, began to “change the face of written language on a grand scale.” The new religion had two driving forces behind its typographic transformation. First, Christians were under tremendous persecution by the Roman government. Second, they believed in inspiration, the technical term used for God personally revealing himself through written words. They needed this inspiration codified in order to unify and overcome the persecution. “After all, the Word of God had to be transmitted with as little ambiguity as possible.” After Constantine announced Christianity a legal religion with the Edict of Milan in 313, Bible scholars were free to share and elucidate texts like never before. Over the next several centuries, Christian manuscripts exploded throughout the Greco-Roman world. Scholars debated, copied, and explored texts with greater and greater clarity, and their counterparts refuted arguments and clarified their writing with the same precision, creating the need for clearer typographic standards. The next revolution came by way of Saint Isidore of Seville, known as the last great theologian of the ancient world, in the seventh century. Before then, how would a scholar note a quotation from another sacred text? How would he note a question? In his classic book Etymologies, Isidore described a new system of punctuation, reorganizing the placement of periods and commas, and introducing the punctus interrogativus, known today as the question mark, and the diple (>), which later gave rise to quotation marks and guillemets (« »). Remember, books were extremely expensive and valuable during this time, getting passed down from generation to generation. With each new edition, there were “wildly different approaches to the same text.” Through these marks, our text from earlier starts to take a recognizable shape. Scholars were able to pinpoint arguments and quotations at great speed and clarity, but it wasn’t until the next century where we see even greater achievements in our written heritage. After the ancient world began to fade into the medieval era, writing became increasingly easier to read and cheaper to produce. The Word of God was spreading quickly throughout Europe, which meant it had to be translated into multiple languages. Not everyone was blessed with the gift of tongues. During the eighth century, Irish priests spread the words out across the page, finally bringing an end to scriptio continua. The space between words made the reading experience simpler and more pleasing to the eye. This was the goal of many Bible scholars then as now—letting the reader experience the text with greater pleasure. They wanted the Bible in the hands of the common person, which had cataclysmic effects later during the Reformation. By the eighth century, four out of every five manuscripts in the Western world were of Christian origin. One technological advantage made this transition even easier. The eighth century saw not only new spacing but also new paper. Papyrus had been the material of choice until then, but religious scholars in northern Europe began using animal skin, known as parchment or vellum. The smoother, more durable material gave scribes more freedom in their writing, since it was easier to draw the quill across the smooth skin. It’s like giving a modern letterer an iPad Pro when she was using a coloring book. The new technology brought new opportunities. The Frankish king Charlemagne saw these opportunities and capitalized on them by decapitalizing the alphabet. The big blocks of a capital alphabet, like our ROMAN LETTERS, were best suited for the stone mason’s chisel. But after several centuries and technological innovations, it was time for a gifted letterer to use his quill. This letterer was Alcuin of York, a deacon of the church and a liberal arts scholar whom Charlemagne commissioned to write our lowercase letters, known as minuscules. Through the advancements of the eighth century, our text from earlier is virtually indistinguishable from its modern form. So when they had gathered together, they began to ask him, “Lord, is this the time when you are restoring the kingdom to Israel?” He told them, “You are not permitted to know the times or periods that the Father has set by his own authority. But you will receive power when the Holy Spirit has come upon you, and you will be my witnesses in Jerusalem, and in all Judea and Samaria, and to the farthest parts of the earth.” The typography of the Bible changed very little from the eighth century to the fifteenth. As everyone knows, the printing press introduced in 1440 revolutionized not only the way we read the Bible but how we as humans communicate to one another. I’ll wait to communicate that in the next issue. Keith Houston, Shady Characters (New York: W. W. Norton, 2013), 4–5. Ibid., 13–14. Ibid., 9. Ibid., 10. Ibid., 11–12. Ibid., 191. Ibid., 190. Ibid., 13.
<urn:uuid:c17580b4-2828-47ec-abb7-220c1bf28a72>
CC-MAIN-2024-10
https://www.fathommag.com/stories/typography-the-secret-power-of-christianity
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.944857
2,012
3.265625
3
The Lake Auburn data buoy was launched in July (Credit: Kate Paladin) The water in Lake Auburn in Southwest Maine is so clear that drinking water managers don’t have to filter it before sending it through the faucets in the cities of Auburn and Lewiston. But a recent uptick in algae blooms–including one in 2012 that resulted in early fall anoxia and the death of more than 200 trout–has the water district concerned it could one day lose the waiver that exempts it from filtering requirements. “They’re really worried about maintaining water quality to keep the filtration waiver and to be able to continue to deliver high quality water,” said Holly Ewing, an associate professor of environmental studies at Bates College in Lewiston. “Building and maintaining a filtration plant would require borrowing money and in the end likely more than quadruple the cost of our water,” A collaboration between the Auburn Water District and Bates College this summer brought a water quality monitoring buoy to the lake that should bolster scientific understanding of how the waterbody functions. The continuous data will give researchers a better grasp of process that affect the water’s clarity and the health of the coldwater fishery. The project came about after Ewing’s research collaborations on buoy-equipped lakes in the region demonstrated the value of long-term, high-resolution data. She contributed to a study on the effect of Hurricane Irene on nine lakes throughout New England. Strings of temperature sensors suspended from buoys helped show the how the extreme weather altered the lakes’ thermal structures. Ewing also has experience with one of the algae species causing trouble in Lake Auburn: Gloeotrichia echinulata. Blooms of this cyanobacteria have become much larger recently both in Lake Auburn and other northeastern lakes where scientists have not previously noticed them. “It’s a species that normally shows up in lakes with higher nutrient concentrations and it’s showing up in these low-nutrient lakes,” Ewing said. The species fixes nitrogen and removes phosphorous from the sediment, and so may be able to change the way nutrients move in the lake. To get a better picture of what’s happening in the lake and how it relates to issues such as anoxia, algal blooms and lake mixing, Ewing worked with the water district to install a buoy monitoring system. The buoy supports a string of thermistors that measure temperature at 13 depths ranging from a half-meter to 32 meters down. Dissolved oxygen concentration and saturation is measured at three depths. They also added a photosynthetically active radiation sensor to the district’s weather station. By combining the data from the buoy with other parameters already monitored by the water district, the researchers hope to understand the thermal structure of the lake, where and when it becomes anoxic, and what happens with nutrients when that happens. The continuous data from the sensors will open the door to a study of the lake’s metabolism, the balance between oxygen-producing primary production and oxygen-consuming respiration. Eventually, they’ll be able to connect the dots between the lake’s metabolism, thermal structure and drinking-water related issues like transparency and turbidity. That will all be possible thanks to what Ewing calls a “remarkable partnership” between Bates College and the Auburn Water District “This is an important lake. It’s really valuable as a drinking water source,” Ewing said. “We need to see what we can do to better understand the processes that are occurring in this lake that we can only understand with continuous data.” Top image: The Lake Auburn data buoy was launched in July (Credit: Kate Paladin)
<urn:uuid:17be797d-72e7-4ab1-911f-ca89e7c28c98>
CC-MAIN-2024-10
https://www.fondriest.com/news/data-buoy-maines-lake-auburn-tracks-important-drinking-water-source.htm
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.939331
784
3.078125
3
All Science News Ambient air THz source shines bright A major frontier in strong field laser physics and nonlinear optics is the interaction of powerful terahertz (THz) pulses with matter. A plethora of scientific challenges and applications are presently under study, like table-top electron acceleration, THz-enhanced attosecond pulse generation and strong electric and magnetic THz field interactions with matter. Nevertheless, despite the rapid development of THz science during the last two decades, the majority of available table-top THz sources remain rather weak limiting the interactions of THz radiation with matter mostly in the realm of linear optics. In a significant breakthrough, an international team of physicists from the Ultrashort Nonlinear laser Interactions and Sources (UNIS) laboratory at the Institute of Electronic Structure and Laser (IESL) of the Foundation for Research and Technology-Hellas (FORTH) in Crete, led by Prof. Stelios Tzortzakis, and from the Ultrafast Laser Group at TU Wien in Vienna, led by Prof. Andrius Baltuška, have developed a novel THz source that exceeds in power performance and conversion efficiency any other THz source known to date. Currently, the most powerful table-top THz sources are based on the interaction of ultrashort laser pulses with electro-optic crystals through optical rectification and with gases and liquids through two-color filamentation. The first one presents relatively high laser to THz conversion efficiencies reaching values of the order of the percent, but the damage threshold of the material limits the maximum laser energy that one can deposit on the crystal preventing a significant increase of the output characteristics. In turn, two-color filamentation of near-infrared laser pulses offers ultrashort THz pulses (tens of femtoseconds) with a corresponding spectral bandwidth exceeding 50 THz while it is not restricted by any damage threshold since the gas or liquid media recover in-between laser shots. The breakthrough of the scientific team at FORTH-IESL and TU Wien was the use of intense ultrashort mid-infrared laser pulses to drive laser beam filamentation in ambient air. The researchers report, in their Nature Communications paper, generation of sub-millijoule single-cycle THz pulses with unprecedented THz conversion efficiency of a few percent, exceeding by far any previously reported experimental values for plasma-based THz sources. Moreover, due to the large bandwidth of the generated THz radiation (~ 20 THz) the peak THz electric and magnetic fields exceed the 100 MV/cm and 33 Tesla, respectively. Based on the reported experimental findings and theoretical estimates, it is projected that soon multi-millijoule THz pulses with peak electric and magnetic fields in the gigavolt per centimeter and kilotesla level, respectively, will become available. Quasi-static ultrashort electric and magnetic bursts at these intensities will enable extreme nonlinear and relativistic science. The paper is published in Nature Communications: 10.1038/s41467-019-14206-x
<urn:uuid:428bbcf8-c857-4cff-a36c-df7ebb03425e>
CC-MAIN-2024-10
https://www.forth.gr/en/news/show/&tid=1657&cat=1
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.873915
640
2.578125
3
1. Gully erosion, a form of soil erosion, is a complex system controlled by the migration of a gully head, incision of the gully bed, and widening of the channel sidewalls. 2. Experiments were conducted to examine gully widening rates based on channel slope and overland flow discharge. 3. The results from this study will improve soil erosion prediction technology for use in agricultural regions and aid in the development of conservation practices to reduce pollutant loads from fields. The article titled "An empirical investigation of gully widening rates in upland concentrated flows" provides an overview of the processes involved in gully erosion and presents experimental findings on gully expansion rates. While the article offers valuable insights into the topic, there are several areas where critical analysis is warranted. One potential bias in the article is its focus on agricultural regions and the impact of gully erosion on arable land. This narrow focus may limit the generalizability of the findings to other landscapes or contexts. The article does not adequately address the potential impacts of gully erosion on natural ecosystems or infrastructure outside of agriculture. The article also relies heavily on empirical data from experiments conducted in a controlled laboratory setting. While these experiments provide valuable information, they may not fully capture the complexity and variability of real-world gully erosion processes. The lack of field-based data or validation limits the applicability of the findings to natural settings. Furthermore, the article does not thoroughly explore alternative explanations or counterarguments to its findings. It presents a simplified view of gully sidewall expansion, assuming that only channel walls expand laterally while the channel bed remains fixed as a non-erodible layer. This assumption may oversimplify the dynamics of gully widening and neglect other factors that could influence channel morphology. The article also lacks discussion on potential risks associated with gully erosion and its implications for soil productivity, water quality, and ecosystem health. While it briefly mentions these impacts in passing, it does not provide a comprehensive analysis of their significance or potential mitigation strategies. Additionally, there is limited discussion on existing conservation practices or policies aimed at reducing gully erosion in agricultural regions. The article does not critically evaluate their effectiveness or discuss potential limitations or challenges in implementing these practices. Overall, while the article provides valuable insights into gully widening rates and their relationship with slope and discharge, it has several limitations that should be considered when interpreting its findings. These include a narrow focus on agricultural regions, reliance on laboratory experiments, lack of field validation, oversimplification of gully widening processes, and limited discussion of potential risks and mitigation strategies.
<urn:uuid:bd271426-c74d-40c8-844f-0fa600497ef6>
CC-MAIN-2024-10
https://www.fullpicture.app/item/de4841cd5fa0ed981d6841d52aaeddc3
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.928094
531
3.765625
4
New research demonstrates that improving a woman’s access to water, sanitation, and hygiene (WASH) provides a multitude of indirect and positive impacts that often are overlooked in traditional development interventions. Benefits of this water access “ripple effect” go beyond the time savings and health outcomes that are well known across the sector. Referred to as “pathways to empowerment,” these now-quantifiable impacts cover a range of outcomes, including a more than 50 percent increase in female community leadership positions and shifts in gender norms within the community. In 2018, USAID’s long-running partnership with The Coca-Cola Company, the Water and Development Alliance (WADA), collaborated with global research firm Ipsos to explore the intersection of water and women’s empowerment. Referred to as the Ripple Effect Study, this research rigorously assessed the role of water in enabling women’s empowerment and promoting gender equality. During a World Water Week showcase event in Stockholm in late August, WADA, USAID, The Coca-Cola Company, Women + Water Alliance, Gap Inc., and Global Water Challenge (GWC) shared the details of this research publicly for the first time. USAID Acting Global Water Coordinator, James Peters provided opening remarks for the panel, stating that USAID focuses on three key concepts regarding women’s empowerment: “The use of metrics to assess the impacts of our efforts, the necessity to continue to collaborate with our friends in the private sector, and the absolute need to include all members of communities in their journey to self-reliance.” The research aligns with USAID’s Water and Development Plan as part of the U.S. Global Water Strategy, which provides more comprehensive metrics for improved monitoring, evaluation, and learning that will sharpen the Agency’s activities promoting the empowerment of women and girls. Kaitlin Love, director of Public Affairs at Ipsos, provided an overview of the Ripple Effect Study findings. She highlighted the eight pathways to empowerment that can result from women’s improved access to water and sanitation. These pathways identified through the research represent the multi-dimensional ripple effects, or indirect impacts, that water access programming can provide to support women and their empowerment. The pathways include increases or improvements in women’s health, income, nutrition, safety and security, education, leadership and skills, time savings, and shifts in community roles and gender norms. A research hub including documentation can be seen here. To highlight the role of research and evaluation in advancing gender equality, representatives from the World Bank, IHE Delft Institute for Water Education, Ipsos Public Affairs, and the Water Supply & Sanitation Collaborative Council joined a panel focused on research trends and priorities shaping the water sector’s gender equality and empowerment programming. Rolf Luyendijk, Executive Director of the Water Supply and Sanitation Collaborative Council, remarked on the importance of understanding the local context in cases where harmful practices--such as prohibiting girls from bathing or eating during menstruation--are accepted before deciding how to support empowerment of women and girls in that environment. Further emphasizing the need to understand context, Jennifer Sara, Director of the Global Water Practice at the World Bank, explained that her organization does extensive analytical work to evaluate gender gaps prior to program design. Sara described the evidence that results from this analysis as a driver of policy decisions and gave several examples the World Bank has compiled around laws and regulations that limit opportunities for women. According to the dataset Women, Business and the Law, 2.7 billion women globally are legally restricted from having the same choice of jobs as men. In the case of WASH, this might be legal prohibitions against working as plumbers or divers. All panelists agreed that research and evaluation play a critical role in decision-making and programming, particularly when addressing issues as context-specific as gender equality and WASH. Following the first panel, presenters from the “spotlight” portion of the session, Gretchen Steidle, founder and president of Global Grassroots, and Eliza Lesale, fellow at Young Water Solutions, both shared their unique experiences working towards women’s empowerment in communities across Africa. Gretchen remarked that “if you invest in women's leadership from the beginning (of an activity), you see women develop solutions that are aligned with the needs of the community. The community is then that much more deeply impacted by these solutions and vested in their success.” Rounding out the session discussions, a panel of experts had a conversation about the role that public-private partnerships can play at the intersection of water and women’s empowerment. The panel included representatives from USAID; Ulrike Sapiro, Senior Director, Water Stewardship & Agriculture, The Coca-Cola Company; and Una Hrnjak-Hadziahmetovic, Senior Manager, Global Sustainability, Gap Inc. Ella Lazarte, USAID’s Senior WASH advisor, remarked that public private partnerships between USAID and companies like Coca-Cola and Gap Inc. are not just about unlocking financing, but about unlocking the unique solutions and inputs companies can provide, such as Gap Inc.’s P.A.C.E. program and Coca-Cola’s 5by20 initiative. Neil Jeffery, chief executive, Water & Sanitation for the Urban Poor, closed the session with a call to action encouraging the promotion of women leaders across WASH institutions. “Leadership of women is fundamental in the institutions we work with - such as utilities, regulators, and municipalities - and their ability to achieve change is a critical part of improving delivery of services.” By Drew Slattery, Communications Manager for the WADA Secretariat
<urn:uuid:fc22f849-2037-40b4-a2d9-7dc299b883ec>
CC-MAIN-2024-10
https://www.globalwaters.org/resources/blogs/wada/ripple-effect-supporting-womens-empowerment-through-water
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.940115
1,180
2.6875
3
Hand-knotted rugs are a beautiful and luxurious addition to any home or space. The process of creating these rugs is intricate and time-consuming, involving skilled weavers who use their expertise and knowledge to create unique and beautiful designs. In this blog, we will explore the process of hand-knotted rug weaving and the techniques used to calculate the number of knots per square inch. The Process of Hand-Knotted Rug Weaving Hand-knotted rug weaving is a process that involves creating knots using strands of wool or silk that are woven into a cotton or wool foundation. This process is usually done on a loom, which is a large frame that holds the warp (vertical) threads in place. The weaver then ties knots around the warp threads, creating a dense and durable rug. The process of creating a hand-knotted rug involves several steps, including: - Design: The design of the rug is first created on paper, with each knot and colour carefully planned out. - Warping: The loom is set up by wrapping the vertical threads (warp) tightly around the loom's frame. - Weaving: The weaver then begins to tie knots around the warp threads, using a specific technique that varies depending on the style of the rug. The weaver uses a special tool called a knotting comb to push the knots tightly together, creating a dense and durable rug. - Trimming: Once the weaving is complete, the rug is trimmed to create an even surface. - Finishing: The rug is washed, stretched, and brushed to bring out its full lustre and beauty. Calculating the Number of Knots per Square Inch One of the key factors that determine the quality of a hand-knotted rug is the number of knots per square inch. This measurement is used to determine the density and durability of the rug, as well as its overall quality and value. To calculate the number of knots per square inch, the weaver first counts the number of knots in a linear inch of the rug. This is done by counting the number of knots across the width of the rug, then dividing that number by the width of the rug in inches. For example, if there are 100 knots across the width of a rug that is 10 inches wide, the number of knots per linear inch would be 10. Once the weaver has determined the number of knots per linear inch, they can then calculate the number of knots per square inch. This is done by multiplying the number of knots per linear inch by the number of knots per linear inch again. For example, if there are 10 knots per linear inch, the number of knots per square inch would be 100 (10 x 10). Hand-knotted rug weaving is a time-honoured craft that requires skill, patience, and attention to detail. The process of creating these beautiful rugs is intricate and involves many steps, including design, warping, weaving, trimming, and finishing. The number of knots per square inch is an important factor in determining the quality and value of a hand-knotted rug, and weavers use specific techniques to calculate this measurement accurately. By understanding the process of hand-knotted rug weaving and the techniques used to calculate the number of knots per square inch, we can appreciate the beauty and craftsmanship that goes into creating these stunning pieces of art.
<urn:uuid:5680e3c3-ad04-4c26-88bd-3a9166b6abf9>
CC-MAIN-2024-10
https://www.goochluxuryrugs.com/blogs/news/the-art-of-hand-knotted-rug-weaving
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.936346
697
3.046875
3
The signs and symptoms can be controlled with early diagnosis and treatment. Early diagnosis of ankylosing spondylitis (AS) and prompt institution of treatment can control its signs and symptoms. However, early diagnosis presents clinicians with a challenge because radiographic changes-the hallmark of the disease-tend to take about 7 to 10 years to develop. Sound decision making and patient interaction, such as with screening questionnaires, can help the diagnosis and result in more effective treatment. AS is the prototype of a group of inflammatory arthritides characterized by involvement of the axial skeleton and the absence of seropositivity for antibodies, such as rheumatoid factor and antinuclear antibodies.1 Clinically recognizable subtypes grouped under the heading of seronegative spondyloarthritides also include reactive arthritis, arthritis associated with inflammatory bowel disease (IBD), psoriatic arthritis (PsA), and undifferentiated spondyloarthritis (SpA). A common feature is the tendency to involve the sacroiliac joints, large joints of the lower extremities, attachment sites of tendons and ligaments (enthesitis), and the body's skin and mucous membranes. The seronegative spondyloarthritides are thought, incorrectly, to be less common than rheumatoid arthritis. However, they may be underdiagnosed and go unrecognized as chronic back pain or possible degenerative joint disease. Advances in MRI have helped the diagnosis of AS before radiographic changes set in. Another clue to the diagnosis is the tendency of AS to occur within families and share some genetic markers among those who are affected. In addition, primary care physicians often see patients with back pain or diffuse body pain; recognizing features of inflammatory back pain (IBP), which is common in AS, provides an important clue to proceed with diagnostic testing. Screening patients for AS is another important diagnostic tool. In this article, we offer a clinical case scenario of a patient with AS. We use it to explore the 5 key questions that are involved in AS diagnosis and treatment decision making. Clinical case scenario. Robert, a 24-year-old college student, was seen in the student health center with symptoms of low back pain (LBP) that had been present for about 2 weeks. The pain was present in the buttocks area and alternated from the right side to the left.The pain worsened at night and occasionally forced Robert to get out of bed and walk around. He also complained of stiffness in his lower back, especially in the first 2 hours after he arose from bed in the morning. The back pain and stiffness improved after progressive activity during the day. Robert reported that he had had this back pain twice during the previous 6 months and attributed the previous episodes to athletic activity. He took over-the-counter ibuprofen and had significant pain relief. His review of systems was negative for recent bowel or genitourinary infections, and he denied any abdominal pain, diarrhea, or fever. Robert's family history does not show any history of inflammatory arthritis of the spine. His physical examination results were unremarkable except for tenderness over the lower back on flexion. No restriction was present when he underwent a modified Schober test or when chest expansion was measured. The modified Schober test was performed by measuring the increase in length, while bending forward maximally, of an imaginary vertical line between 2 points placed 10 cm apart, the first at the midpoint between the dimples of Venus (corresponding to the lumbosacral junction) and the second 10 cm vertically above it in the midline. The measurement was 7 cm (normal, more than 5 cm).The maximal chest expansion on inspiration was measured at the level of the nipples; it was 6 cm (normal, more than 5 cm). Clinical signs and symptoms of AS and the related diseases. The patient presented with the classic symptoms of IBP, a common early symptom of AS and the related diseases when they involve the spine. The characteristics of IBP are outlined in Table 1.2,3 Because the incidence of IBP is about 15% in young, healthy adults who exercise, the presence of IBP alone is insufficient to make the diagnosis of AS. Various criteria have been developed to classify patients as having AS or SpA for research purposes (Tables 2, 3, and 4).4-6 These criteria are not useful for the diagnosis of an individual patient because they lack the sensitivity required to identify the disease reliably at an early stage. Other symptoms and signs need to be present before a physician can be confident that the patient has AS.7 These symptoms and signs vary in their ability to predict whether AS is present (Table 5).The disease also may present with many other symptoms,either as the initial symptom or in association with spinal pain. In some situations, a patient may present with swelling and pain in a few large joints in the lower extremity as the first symptoms. Swelling of an entire digit in a hand or foot, known as a sausage toe, may be the initial symptom. Tenderness at attachment sites of tendons and ligaments, such as the Achilles tendon and plantar fascia, is common. Involvement of the sacroiliac joint on x-ray films and of the lumbar spine may occur later; if so, the patient is classified as having AS. Lack of involvement of these areas and the absence of psoriatic rash or IBD classifies the patient as having undifferentiated SpA. Other important symptoms to ascertain in the patient's history are recurring eye redness suggestive of uveitis and a family history of AS, psoriasis, PsA, or IBD. Another characteristic feature is that at least 50% of the joint pain and stiffness symptoms present are relieved with the use of NSAIDs, such as ibuprofen and naproxen.8 For some patients, physicians may arrive at a clinical diagnosis with a good history taken along with the presence of clinical findings, such as restricted mobility, swollen joints or fingers, psoriatic rash, or clinical symptoms of Crohn disease or ulcerative colitis. For most patients, other tests need to be performed to support the clinical findings suggestive of SpA, especially when the disease is in the early stages. Clinical case scenario. Because Robert had no signs of restricted spine mobility on examination and no specific signs of other forms of SpA, his physician decided to obtain laboratory and imaging studies. Results of a routine blood cell count, erythrocyte sedimentation rate (ESR), and chemistry panel were normal. The result of an HLA-B27 gene test was positive, but an imaging study of the sacroiliac joints using a Ferguson view was negative for sclerosis or sacroiliac joint erosions. There was no confirmation of the illness even though the HLA-B27 test result was positive. Therefore, Robert's physician ordered an MRI scan with short tau inversion recovery (STIR) images (fat-suppressed images) of the sacroiliac joints.The MRI scan demonstrated edema on the ilial aspect of the sacroiliac joint on the right side consistent with the early inflammation of sacroiliitis of SpA. His physician was then confident that the patient had an SpA, but he was hesitant to call it AS because the characteristic erosive changes on x-ray films necessary to classify a patient as having AS were not present. The physician labeled the patient as having preradiographic AS. Clinical investigations performed to establish the diagnosis of AS and the related illness. Blood tests currently available may help establish the diagnosis. Although the ESR and C-reactive protein level may be elevated in AS, that is not the rule, and these tests are not useful for screening.9 Most studies show that the prevalence of the HLA-B27 gene in white patients with AS is between 70% and 90%.10 However, because the gene is present in up to 8% of the white population and only about 0.5% to 1% of persons in the United States have AS, it follows that up to 23 million HLA-B27– positive patients do not have SpA. Therefore, there is a greater chance that the presence of the HLA-B27 gene represents a false positive test result in the general population and in patients who have mechanical back pain. However, in the combination of the presence of IBP and the HLA-B27 gene, the individual patient has a 59% chance that he or she has AS.9 Therefore, the presence of IBP and a positive test result increase the likelihood ratio to a clinically significant level for a specific patient having AS. Erosions and sclerosis in the sacroiliac joints (Figure 1) take up to 10 years to evolve.Therefore, they are not useful for establishing the disease when a patient has AS in the early stages.9 An MRI scan of the sacroiliac joints with fat-suppressed images (Figure 2) can clearly show evidence of inflammation, which is a specific way to establish the diagnosis. In some patients, the disease may begin in the thoracolumbar spine. Therefore, a similar MRI protocol may be needed in this area using T1 and STIR images to look for inflammation in the facet joints or along the vertebral edges (Romanus lesions). Figure 1 – A conventional radiograph of the pelvis of a 32-year-old man with stage II/III ankylosing spondylitis shows bilateral sacroiliitis (A). In another patient, a 50-year-old man with advanced disease, both sacroiliac joints are fused (B). In addition, inflammatory arthritis affects the right hip joint (arrow). Symptoms of IBD should prompt referral for the performance of an endoscopy or colonoscopy to establish the disease. Figure 3 shows an algorithm that may be followed to establish the diagnosis of either preradiographic AS or an SpA.11 Figure 2 – An MRI scan with short tau inversion recovery sequence of the sacroiliac joints is shown here. The dotted arrows show bone marrow edema in the left sacroiliac joint, which indicates that active sacroiliitis is present. The solid arrows show areas of sclerosis in the right sacroiliac joint, which indicate that chronic sacroiliitis is present. Clinical case scenario. Robert's family accompanied him to his visit to the rheumatologist. His mother was concerned about the risk of AS in her 3 younger children (daughters aged 17 and 19 years and a son aged 14 years). Her other children had no LBP or stiffness. Her 17-year-old daughter had had an evaluation for chest wall and upper back pain, which was attributed to stress. The rheumatologist assessed the risk of AS and the related diseases in the family to be about 20%. He recommended that the 17-year-old daughter have an MRI scan of the thoracic spine with views of the costovertebral joints, because they often are the initial sites of involvement in women affected by AS. Clinical and genetic features of AS. The genetic contribution to this disease has been estimated to be 90%.12 About 40% of that risk is contributed by the presence of the HLA-B27 gene. About 25% of the remaining genetic risk is thought to occur because unknown polymorphisms of 2 recently discovered genes are present, the interleukin 23 receptor gene and the ARTS1 gene.13 The rest of the risk is thought to result from environmental factors. The sex ratio for AS was thought to be skewed 10 to 1 with a significant predominance of men. As better diagnostic modalities have become available, the male to female ratio is thought to be about 3 to 1. Women with AS may differ in their initial presentation.14 They may have more peripheral joint, upper spine, and costovertebral joint involvement, but they may progress to having severe spine involvement similar to that in men. Juvenile-onset disease may occur in patients younger than 18 years.15 Patients often present with peripheral joint disease and only later progress to spine involvement. Clinical case scenario. Robert's primary care physician prescribed ibuprofen, 800 mg 3 times a day, and advised him to participate in stretching exercises supervised by a physical therapist. Although the symptoms of pain and stiffness improved significantly at first, the ibuprofen was not helping after 6 months. The physician switched the patient to indomethacin, 50 mg 3 times a day; this agent was not successful after 3 months. Robert returned to the rheumatologist to consider other treatment options.His rheumatologist recommended a tumor necrosis factor α (TNF-α) inhibitor. Robert chose a biweekly self-injection treatment option for his AS. A skin test was performed for tuberculosis, and the results were negative. A detailed history found no exposure to infections. Robert started the treatment regimen and continued with the stretching exercises. He experienced marked symptom relief at 6 weeks, and it continued even a year after he started the treatment. Treatment of patients who have AS with NSAIDs or biologic agents. About 50% of patients with AS can control their joint and spine pain and stiffness with daily use of an NSAID.9 The remaining 50% of patients require the use of a stronger agent, such as a TNF-α inhibitor. Some of these agents and their dosage, frequency, and adverse effects are described in Table 6.16 Some patients with AS have symptoms of psoriasis or IBD. These conditions need to be assessed separately and should be managed with an agent that covers both the spinal pain and inflammation and the extraspinal manifestation. The influence of the biologic medication on the extraspinal manifestation is shown in Table 6. Some patients with AS and peripheral arthritis can manage their pain well with the addition of methotrexate (MTX) or sulfasalazine, although there is less evidence of their efficacy than for the biologic agents. Monitoring patients who are receiving biologic agents and MTX involves watching carefully for infections, including opportunistic infections, and stopping the respective treatment temporarily until the infection is adequately managed and resolved. Guidelines have been published for choosing appropriate patients for the prescription of TNF-α inhibitors (Table 7). Clinical case scenario. Further inquiry into Robert's family history revealed that a distant relative of his father had had spinal arthritis resulting from AS for more than 30 years and that severe spine deformities had developed with a fixed flexion deformity of the thoracic and lumbar spine.The relative had consultations with rheumatologists and spine surgeons to discuss various treatment options. Overthe previous 6 months, the pain in the relative's spine had improved dramatically with the use of intravenous infusion therapy with a TNF-α inhibitor.The fixed flexion deformity of the relative's spine has not changed, and various surgical treatment options have been recommended. Treatment of patients who have AS with advanced stages of illness and deformity. Fusion of the vertebral column and a fixed flexed posture in the neck and thoracic and lumbar spine may develop in patients who have had AS for 20 years or longer. X-ray films of the spine may show a fused spine, also known as a bamboo spine. Even though the fusion or the flexed posture is not reversible with the use of TNF-α inhibitors, the pain in the spine and joints still can be improved because there is always some ongoing inflammation.17 A physician should not hold off on giving patients a biologic agent because of the notion that the disease is too advanced. The flexed posture certainly places the patient at risk for falling and interferes with normal day-to-day activities, but various operative techniques have evolved and improved over time to correct these abnormalities.18 After the degree of the flexion deformity is estimated, various combinations of osteotomies may be performed that will correct the degree of flexion deformity measured. The 3 operative techniques that have been described to correct thoracolumbar kyphotic deformity resulting from AS are opening edge, polysegmental wedge, and closing wedge osteotomy. Primary care physicians should strive to identify patients in their practice who have IBP and assess their risk for AS and the related diseases. Research designed to develop screening questionnaires for patients with back pain to assess their risk for AS is ongoing. In addition, new genes are being identified that will dramatically alter the current view of the pathogenesis of this illness and provide more diagnostic clues to an early preradiographic diagnosis. It is hoped that early treatment can prevent the occurrence of the flexion deformities in patients with AS. Whether early treatment with the TNF-α inhibitors will prevent fusion and flexion deformities from developing is uncertain right now. However, it remains intuitive that such dramatic relief of symptoms and improvement of inflammation (demonstrated on MRI) in the early stages of AS should have a downstream effect on disease progression; investigation for proof of this concept is active.
<urn:uuid:3af271af-b7e9-4bda-8e99-7141fb28b103>
CC-MAIN-2024-10
https://www.hcplive.com/view/effective-decision-making-ankylosing-spondylitis
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.950854
3,555
2.53125
3
I had recently talked with an online friend who is a medieval history buff. In our conversation I asked her somethings about prisons as I was trying to work through some plot issues I had in a new novella I have contracted. Much to my surprise, she informed me that prison in medieval times were not the punishment. They were actually just a holding place while the accused awaited a trial. So, that sent me digging a little more in another direction. |Poultry Compter Operated from medieval times-1815 What I did learn is though prison was not used as punishment for crimes, there was one thing a person could do that would keep them incarcerated and that was to owe a debt, many times to the government. I found that interesting. Crimes were dealt with by punishments other than prison, while owing an unpaid debt could have your thrown in debtor's prison. Kind of seems like defeating the purpose of what they were seeking after. |The Clink- Southwark, England. Operated from the 12th century through 1780. This is the prison that gave us the term, "in the clink". By Spudgun67 - Own work, CC BY-SA 4.0, https://commons.wikimedia.org/w/index.php?curid=35676810 |Fleet Prison, London. Operated 1197-1844 "Pray remember ye poor debtors" inmates of the Fleet Prison beg passers by for alms Public Domain, https://commons.wikimedia.org/w/index.php?curid=235905 |King's Bench Prison- Operated medieval times -1880 Debtor's prison didn't end with the medieval time period. Imprisonment for debt continued on into the 19th century. The Debtor's Act of 1869 reduced the numbers of those being incarcerated for debt, however it did not stop it all together. If a person had the means to pay a debt but refused to he could be thrown in debtor's prison for up to six weeks. And if a person owed a debt to the court, then once again he could find himself in debtor's prison. What's your opinion on debtor's prison? Did it seem to defeat the purpose? Had you heard about debtors prison before this post? If you had what did was there anything that surprised you? Answer one of the questions or ask me a question for a chance to win choice copy of one of my books and in choice of format (Sword of Forgiveness comes in audio, too!). Waking in a makeshift hospital, Olivia Macqueen finds herself recovering from a head injury. With amnesia stealing a year of her memories, she has trouble discerning between lies and truth. When her memories start returning in bits and pieces, she must keep up the charade of amnesia until she can find out the truth behind the embezzlement of her family’s business while evading the danger lurking around her. Debbie Lynne Costello has enjoyed writing stories since she was eight years old. She raised her family and then embarked on her own career of writing the stories that had been begging to be told. She and her husband have four children and live in upstate South Carolina. She has worked in many capacities in her church and is currently the Children's Director. Debbie Lynne has shown and raised Shetland Sheepdogs for eighteen years and still enjoys litters now and then. In their spare time, she and her husband take pleasure in camping and riding their Arabian and Tennessee Walking horses.
<urn:uuid:c65abadc-cf84-48ca-b190-e6f2f1dcf47e>
CC-MAIN-2024-10
https://www.hhhistory.com/2017/12/medieval-debtors-prison-plus-giveaway.html
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.98302
740
2.765625
3
Burkette History, Family Crest & Coats of Arms The Burkette name has descended through the generations from the ancient Anglo-Saxon culture. Their name comes from having lived in Cheshire, where they held a family seat near Birkenhead at the estuary of the River Birket. It is from the name of the river that their name is derived. Early Origins of the Burkette family The surname Burkette was first found in Cheshire, where they held a family seat from ancient times, long before the Norman Conquest in 1066. Early History of the Burkette family This web page shows only a small excerpt of our Burkette research. Another 78 words (6 lines of text) covering the years 1650, 1666, 1700, 1703, 1746, 1838 and 1908 are included under the topic Early Burkette History in all our PDF Extended History products and printed products wherever possible. Burkette Spelling Variations Only recently has spelling become standardized in the English language. As the English language evolved in the Middle Ages, the spelling of names changed also. The name Burkette has undergone many spelling variations, including Birket, Birkett, Bircket, Burkett, Birckett, Burket, Burkert and many more. Early Notables of the Burkette family Another 50 words (4 lines of text) are included under the topic Early Burkette Notables in all our PDF Extended History products and printed products wherever possible. Migration of the Burkette family to Ireland Some of the Burkette family moved to Ireland, but this topic is not covered in this excerpt. Another 37 words (3 lines of text) about their life in Ireland is included in all our PDF Extended History products and printed products wherever possible. Migration of the Burkette family To escape the unstable social climate in England of this time, many families boarded ships for the New World with the hope of finding land, opportunity, and greater religious and political freedom. Although the voyages were expensive, crowded, and difficult, those families that arrived often found greater opportunities and freedoms than they could have experienced at home. Many of those families went on to make significant contributions to the rapidly developing colonies in which they settled. Early North American records indicate many people bearing the name Burkette were among those contributors: David Birket who arrived in New York State in 1803; John Birkett settled in Virginia in 1650; Samuel Birkett settled in New England in 1750; Joe Burkett settled in Barbados in 1635.
<urn:uuid:76a0c03c-1d5f-438f-ac93-353283e90935>
CC-MAIN-2024-10
https://www.houseofnames.com/burkette-family-crest
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.956713
526
2.9375
3
How to Grow Jackfruit? The Jackfruit is a huge melon-sized oblong fruit native to tropical Asia that is grown in tropical portions of South-East Asia. Its fruits are consumed raw and fresh as well as cooked. How to Grow Jackfruit? 1. Planting to Grow Jackfruit Choose a large open place in your garden that gets plenty of suns, clear it of weeds, and dig a hole. Mix 1/3 part compost, sand, perlite, and organic matter into the garden soil to make a rich, permeable potting soil for planting. Plant your healthiest plant in the dug space, water it, and cover it with mulch. When planting a grafted plant, do not cover the bud patch with dirt. Otherwise, it will rot and perish. 2. Watering and Fertilizing to Grow Jackfruit The jackfruit tree grows in Asia’s hot and humid climates, where excessive rainfall is prevalent. It means you should water it frequently because it prefers moist, well-drained soil, but avoid over-watering, especially during the first two years of growth. Spread compost or farm manure around the plant once a year, when the growing season begins (in India, this occurs at the beginning of the rainy season in July or August). Feed it twice a year with slow-release, balanced fertiliser. When the plant begins to bloom, feed it with 8-3-9 fertilisers at the amount and pace recommended by the manufacturer. The jack tree begins to flower three to six years after planting, and immature and unripe green-skinned fruits are ready to be plucked as a vegetable two to three months after blossoming. After four to five months of blossoming, mature fruits release a fragrant perfume and their skin transforms from green to yellowish in colour. It grows fruits all year in its native habitat, but the peak harvest season is summer. 4. Pests and Diseases The jackfruit borer, fruit flies, and birds are the most prevalent pests that attack it. The jackfruit borer attacks all sections of the plant, although organic insecticide is effective in repelling it. Covering the fruits, on the other hand, is a convenient way to protect them from fruit flies and birds. Jackfruit Tree Care & Tips - If you live in a cool location, mulch generously around the tree when the temperature drops below 35 degrees Fahrenheit in the winter to protect the roots from cold. - Pruning should be done on a regular basis to keep the tree’s height around 20 feet. Reduce its main trunk to 8 feet when it reaches 12 feet in height to foster the formation of thick branches. - After 3-4 years, the jackfruit tree will have established itself. If it produces blooms during this time, clip them off to promote growth. - Remove weeds around it once a month to clear up the growing area, as weeds leach critical nutrients from healthy soil. - Mulch it in the summer to save moisture and reduce weed growth. Jackfruit Tree Size Some jackfruit kinds can grow to be 100 feet tall, while others, such as black gold, can only grow to be 10-20 feet tall. Jackfruit Planting Distance For this fruit crop, a 10m × 10m spacing with 40 plants per acre will suffice. Pits of 1 m x 1 m x 1 m are dug at least 10 days before planting. Growing Jackfruit in Pots To prevent water from collecting at the bottom, the pot should contain drainage holes. Even though jackfruit flourishes in moist, humid settings, the developing seeds do not tolerate excessive moisture. Put three seeds in the pot and press them down one inch. How Many Years For a Jackfruit Tree to Bear Fruit? The jackfruit tree has a lifespan of more than 100 years. It produces the largest fruits in the world, weighing anything from 10-110 lb. Also Read: How to Grow Strawberries in Pots?
<urn:uuid:2888d4df-6d93-4541-8af9-3471a5d65e7d>
CC-MAIN-2024-10
https://www.howtofarming.com/how-to-grow-jackfruit/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.922943
833
3.328125
3
In a previous one of these columns I basically crushed your dreams about owning a flying car by pointing out just some of the reasons they're actually a terrible idea that causes more problems than they solve. An alternative low-altitude short-range form of human transportation, one that's more likely to take off (pun intended), is taxi drones. These differ from flying cars in that they're not meant for roads or tracks. I make that distinction because I'm employed as a writer and therefore a professional pedant when it comes to using language properly. Going back to Anglo French and Old North French we find the word carre which refers to a wheeled vehicle. That stems from the Latin word carrus which, as a noun, meant a wagon or wheeled baggage cart or a unit of measure (so it meant a cart load). That's why trains can also use the word car for their carriages, and why I say that anyone calling a flying machine that will have skids or similar a car is actually fishing for headlines and marketing their concept to a self-centric non-collectivist audience. The saddest part is, this PR tactic usually works on newsrooms. Anyway, taxi drones, or other uses for small helicopter derivatives, will just fly, which reduces the engineering compromises, especially weight which in turn affects carrying capacity and range. Being a flying machine and nothing else means there's a bit less of an aerodynamic compromise too, which also affects range and speed. Plus, being drones with no pilot to carry would increase their load capacity a bit as well. That's not to say they would be free of all the problems flying cars (a very old existing invention that's meant to transit across land as well, remember) would also face. Bad weather, especially wind, will cause the entire network to be grounded. In fact, the smaller a craft the more affected it will be. Drones wouldn't need quite as much personal space as human-flown craft, but still way more than cars need, so traffic capacity is still finite. They'd also need to use certain paths, although the ability of drones to communicate among themselves to avoid each other will help. Complicating matters though would be human-controlled craft also trying to use this low-altitude airspace. With vertical take-off they will only need a helipad not a runway, but they'll still need them, and these will have to be built in designated places to account for the noise and the obtrusive blustery air disruption they'll cause so they can't be too close to where people are trying to live or work. Hopefully those designated landing sites are still reasonably close to where you are and want to go though, or at least very nearby to other services to complete your journey efficiently (and therefore make the taxi flight worth bothering with in the first place). Also, being taxis (not private vehicles) the issue of finding somewhere to park after landing doesn't present itself either; they'll just keep working until they're low on stored energy. That brings us to the next point. Taxi drone designs being worked on currently seem be electrified in some way, so if, and it's a big if, they copy Tesla and spend up big bringing their own renewable electricity generation online for recharging (or for producing hydrogen, which is another source that can power electric motors) then they can claim them not to be changing the climate and poisoning the air we breathe. However, if they're on the grid at all (even during production) they'll be increasing the still-colossal usage of coal, especially since flying requires way more energy than driving. Regenerative deceleration (like electric cars) would be token at best, and current-tech thin solar panels on their modest surface area would only run non-propulsion systems. Another point to consider, even if the problems of landing sites, noise, safety and energy sources are resolved, not to mention exorbitant cost, is whether we actually need them or just want them for the sake of it. To be anything more than a novelty experience for tourists they need to solve some problem, in this case commuting. But since we now know that working from home is something millions of Aussies can do whether they're plebs like me or CEOs, it seems helicopter-style commuting for the masses became redundant even before it became a thing.
<urn:uuid:486c67ef-2cab-4bfd-a949-8c6f42398cbb>
CC-MAIN-2024-10
https://www.huntervalleynews.net.au/story/7451240/how-useful-would-taxi-drones-be-for-regular-commuters/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.973468
900
2.59375
3
Continuing and Distance Education Continuing education are courses that let you develop your knowledge and skills in a specific area. They are offered by local school boards, colleges and universities. If you already have a university degree or college diploma, you may take continuing education courses to upgrade your skills. Distance education is taking a course or a degree program on the internet or by mail. Sometimes the classes are called correspondence courses, meaning that you are not taking the courses in a classroom setting. Many accredited Canadian universities and colleges offer distance education. Most people who take these courses are working full-time and are trying to upgrade their skills or make a career change.
<urn:uuid:50b8a4ba-361d-452d-9765-0b397fbc1c49>
CC-MAIN-2024-10
https://www.immigrationcornwall.ca/learning/education-in-cornwall/continuing-and-distance-education/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.97183
132
2.890625
3
Schools with healthy reserves face budget pressure as they contend with higher electricity bills and the need to pay staff. Ysgol Friars, in Bangor, Gwynedd, carried over £974,000 from last year as figures show the pandemic left school reserves across Wales. One union called the figures a “smoke screen” because most funds are ring-fenced for specific projects. The Welsh government said it recognised the pressure on public services. A recent survey of head teachers has suggested that pressures on school budgets will continue into the next academic year. Read the rest of the article here: https://www.ipgce.com/even-schools-with-healthy-reserves-struggle Contact us here: https://www.ipgce.com/contact-us According to the head teacher of Ysgol Friars, the school’s healthy reserve is not enough to offset all the budget pressures they face. The school’s electricity bills have gone up, and they need to find money to pay their staff. Most reserves are ring-fenced for specific projects, so they may only be able to access some of the money they need. The Welsh government has said that it recognises the pressure on public services, but it is unclear what, if any, additional support will be provided to schools. Headteachers are concerned that budget pressures will continue into the next academic year and beyond. In addition to increased costs, schools are also facing decreased income due to the pandemic. Many parents are opting to keep their children home from school, which has reduced school funding. Some head teachers have suggested that cutting staff and resources is the only way to offset these budget pressures. However, this would undoubtedly hurt the quality of education that students receive. It is clear that something needs to be done to ease the financial pressure on schools, or else the quality of education in Wales will suffer. The Welsh government needs to provide additional support to schools to help them offset the increased costs and decreased income they face. Without this support, many schools will be forced to make cuts that will impact students’ quality of education. The Welsh government should also considering-fencing funds specifically for schools so that they can access the money they need without having to redirect funds from other projects. By taking these steps, the Welsh government can help ensure that schools have the resources to provide a high-quality education for all students. What do you think of this article? Let us know your thoughts in the comments section below. Contact Us Directly on Wechat or WhatsAppNeed to find out more? Click Here To find out about the courses we have on offer: Click Here Join the Course: Click Here
<urn:uuid:7f9de023-553d-4aa2-a34f-a36cf3eeaf19>
CC-MAIN-2024-10
https://www.ipgce.com/even-schools-with-healthy-reserves-struggle/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.971633
559
2.53125
3
As a parent, you probably have a lot to worry about. You want your child to grow up happy and healthy. You hope they will get a good education and choose a stable, profitable career. Maybe you hope to have grandkids someday. Children have plenty to worry about, too. They have to deal with getting bullied in school. They have to learn about the world around them while their brains continue to grow. Like adults, kids may develop anxiety or other disorders. Learning to cope with these disorders is key to their successful future as an adult. If your child has certain disorders, they may benefit from an emotional support animal. This article will outline ways to discover if your child has any such issues, how an emotional support cat or dog may help them, and more. Does your child need professional help for mental challenges they may be facing? There are several signs to look for. Ask yourself these questions: If you find yourself answering “yes” to any of these questions, you may want to schedule a visit to a therapist who specializes in working with children. They will help you determine whether your child has any issues that need attention. The therapist can also suggest ways to reduce anxiety and moderate other conditions. One of those ways may be with an emotional support animal. People often think of emotional support animals as a coping mechanism for anxiety triggers people may encounter. That is true, but it’s not the only benefit. Emotional support animals offer other benefits for your child. If your child has a pet to interact with, they will learn responsibility. They will learn the needs of a pet. They will also learn empathy and to respect the feelings of someone other than themselves. Empathy is a valuable skill and is often different to teach to children. Having a pet may help your child develop this skill much faster and easier. Your child may find it easier to bond with an animal on an emotional level. Pets don’t judge or criticize. An emotional support animal will accept your child for who they are and offer unconditional love. Receiving and giving love is a key need for any person to have healthy relationships in life. The right pet for your child will depend on many things. How energetic is your child? A dog may be a good choice. Dogs have a lot of energy and love to play. Both your child and the dog can burn excess energy. Dogs aren’t the only option. Is your child more quiet and reserved? An emotional support cat might be the better choice. If you live in a small apartment, a smaller animal like a rabbit or hamster might work. Therapists may only tout dogs and cats as good emotional support animals, but kids can bond with almost anything. You may think that simply having a family dog or cat is enough to help your child. However, having your child’s pet registered as an ESA offers several benefits. If your housing does not allow pets, under the Fair Housing Act, animals registered as ESAs are exempt from policies that normally prohibit pets to live in such buildings. Your landlord won’t be able to say “no pets” if you have a registered ESA. To get an emotional support animal, you’ll need an emotional support animal letter. To qualify, your child’s therapist will need to sign off on an ESA as a viable form of treatment for your child. Certain conditions typically qualify someone to have an emotional support animal. Some of these conditions include: Once your therapist determines your child has a qualifying condition, they can provide you with an ESA letter. To use your letter, submit it to your landlord or any places where you want to bring the emotional support animal when you travel. Some landlords will want to see your emotional support animal registration. The ESA letter is the only proof you require, and landlords who demand proof of registration do not understand the law. There are no regulations or certifications to deem an animal as an ESA. The only qualification comes from your therapist and a properly written ESA letter. Other businesses may not allow animals, even if they are ESAs. More and more airlines are ending policies that allow emotional support animals to fly for free. If you want to fly with your pet, you will have to pay a fee as ESAs are not classified as service dogs and require no specialized training. An emotional support animal can be a wonderful way for your child to cope with and reduce anxiety. Emotional support animals can help your child with a variety of conditions. Getting an emotional support animal for your child is as easy for your child as it is for an adult. A good ESA can also help your child grow and develop critical social skills that will benefit them as they become adults. Introduction It can be intimidating to leave the gym for a beginner. Getting out of… Read More There can be little doubt that carving out a haven for family fun and learning… Read More In a world where our four-legged friends hold a special place in our hearts, finding… Read More Your children need 10–14 hours of sleep to charge their bodies; therefore, it is vital… Read More
<urn:uuid:5373eefd-0499-4ddd-ab21-23476201c5b0>
CC-MAIN-2024-10
https://www.kidsworldfun.com/blog/benefits-of-esas-for-your-child/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.958264
1,054
2.734375
3
Why a UNESCO site and a golf course share the same place in Ohio Ohio now has its first United Nations Educational, Scientific and Cultural Organization World Heritage site. UNESCO recently recognized eight ancient sites in the state, known as the Hopewell Ceremonial Earthworks. Indigenous people created the sites more than 1,500 years ago. Ohio was once the home of many different tribes, but all were forced to surrender their land after the Indian Removal Act passed in 1830. “The people may have been forced to leave, but we did not want the things that our ancestors created and built and loved and protected, to be destroyed,” says Chief Glenna Wallace, leader of the Eastern Shawnee Tribe of Oklahoma. Chief Wallace helped secure the UNESCO designation. One location features an octagon shape that perfectly matches an 18.6-year lunar cycle. But that site also hosts an active golf course. The Moundbuilders Country Club has leased the land for more than 100 years. And the club has said it’s willing to give up the lease. The Ohio Supreme Court also ruled the club had to relinquish the lease less than a year ago, but the parties involved can’t agree on the cost of buying out the lease. Octagon Observatory Circle. (Courtesy of John Hancock via the Ohio History Connection) On how she learned about the earthworks in Newark, Ohio “I was elected chief in 2006. One of the most famous Shawnee warriors was Tecumsah, and I had read a biography of Tecumsah, written by John Sugden, a famous English author. And the Ohio State University was sponsoring an Indigenous series of different lecturers each month, and this particular month, John Sugden was presenting a program on the biography he had written, of Tecumseh. “I had traveled deliberately from Oklahoma to Ohio just to hear John Sugden. Never once did I think about the mounds. “So when I went to hear John Sugden speak, I did not know that it is a requirement of the university that the lecturer and any who wanted to attend would go to Newark, which is within about 30 minutes of Columbus to see the Newark Earthwork Mounds. I had never heard of the Newark Earthwork Mounds, and I went simply because John Sugden was going to be there and it was another day that I could spend talking and listening to him. “So I was as shocked as anyone. Whenever I went to the Newark Earthwork Mounds, I had no idea that there was a golf course on top of the mounds, which is very disrespectful.” On what people thousands of years ago did at these sites “These mounds range from four feet high up to 14 feet high. They are all man-made with Mother Earth, and it’s important to us to use the term Mother Earth rather than soil or dirt. “They were built by Indigenous people who came here as a religious pilgrimage every single year. And they came for spiritual reasons, for thanksgiving, for worship, for fellowship. And as they came from all parts of the United States, they always brought with them baskets full of Mother Earth from the area where they came. Therefore, there are objects, qualities, rocks, and minerals in this Mother Earth wall that differ from place to place. “They were built voluntarily because people wanted to build them, and they took quite some time to build. But as there are eight different mounds there in Ohio, each would be somewhat different.” On what getting the UNESCO designation felt like “We were in Saudi Arabia a week ago, and it was unbelievable because we were told that we had the best nomination that they had seen in years and years. So two nominations before, they spent two hours making comments and making amendments to that particular nomination. “When they came to ours, there were absolutely no comments. There were absolutely no amendments. From the moment that it was brought up until the moment that it was approved as a World Heritage Site, it was less than three minutes, probably more like two, minutes. “That is definitely a compliment, but at the same time, I sat there and thought: this can’t be happening this quickly. There are so many people in this room that I’m sure not all of them have read the nomination and not a word has been said about what this nomination is about. “So there was exhilaration tinged with disappointment at the same time.” What she wants people to remember when they look at the earthworks “The people who built these had to be geniuses. They had to have total mastery of mathematics, total mastery of astronomy. They had to know geology. They had to know about architecture. They had to have an aesthetic knowledge about themselves. They were not only geniuses, but I say uncommon geniuses. And I want people to realize that. The tribes may have been removed from Ohio, but it’s not taught in the history books. It’s not taught in the schools, and many people there actually believe that the Indians died and that they disappeared whenever they left Ohio. “That’s not true. I want them to know that those are our ancestors. That they are geniuses. They are not savages, and we as a race still exist today and we are still maintaining our culture, still maintaining our language, still maintaining the pride that our forefathers had.” This article was originally published on WBUR.org. Copyright 2023 NPR. To see more, visit https://www.npr.org.
<urn:uuid:2d08c44c-e36f-4f37-b558-37213b44c6a7>
CC-MAIN-2024-10
https://www.klcc.org/2023-10-05/why-a-unesco-site-and-a-golf-course-share-the-same-place-in-ohio
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.98777
1,180
3
3
Watermelon is not only a delicious and refreshing fruit but also offers several health benefits. Here are some of the key benefits of watermelon. Benefits Of Watermelon Watermelon has a high water content, which makes it an excellent fruit for hydration. Staying hydrated is crucial for maintaining bodily functions, regulating body temperature, and promoting overall well-being. Watermelon is low in calories and fat but rich in essential vitamins and minerals. It is an excellent source of vitamin C, which helps boost the immune system and promotes healthy skin. It also contains vitamin A, which is essential for good vision, and potassium, which helps maintain proper heart function. Watermelon is a rich source of antioxidants, including vitamin C and lycopene. Antioxidants help neutralize harmful free radicals in the body, which can protect against chronic diseases, such as heart disease and certain types of cancer. The lycopene content in watermelon has been associated with cardiovascular benefits. Lycopene is a powerful antioxidant that may help lower blood pressure, reduce cholesterol levels, and improve overall heart health. Due to its high water content, watermelon can help keep you hydrated, especially during hot summer months or intense physical activity. Proper hydration is essential for maintaining optimal bodily functions, supporting digestion, and regulating body temperature. Watermelon is a low-calorie fruit that can be beneficial for weight management. It provides a satisfyingly sweet taste without packing in excessive calories or fat. Additionally, the fiber content in watermelon can help promote feelings of fullness and reduce overall calorie intake. Watermelon contains a significant amount of fiber, which aids in digestion and promotes regular bowel movements. Consuming an adequate amount of fiber can help prevent constipation and maintain a healthy digestive system. Watermelon contains beta-carotene, which is converted to vitamin A in the body. Vitamin A is essential for maintaining good eye health and may help reduce the risk of age-related macular degeneration and night blindness. Watermelon contains citrulline, an amino acid that has been shown to help reduce muscle soreness and improve exercise recovery. It may also enhance athletic performance by increasing nitric oxide levels and improving blood flow. The high water content and vitamin C in watermelon can contribute to healthy, radiant skin. Vitamin C is essential for collagen production, which helps maintain the elasticity and youthful appearance of the skin. Remember to consume watermelon in moderation as part of a balanced diet. It is a naturally sweet fruit, so individuals with diabetes or specific dietary restrictions should monitor their intake accordingly. Watermelon is a nutrient-dense fruit that provides a variety of essential vitamins, minerals, and antioxidants. Here is a breakdown of the approximate nutritional composition of watermelon per 100 grams: - Calories: 30 - Water: 91% - Carbohydrates: 7.6 grams - Sugars: 6.2 grams - Fiber: 0.4 grams - Protein: 0.6 grams - Fat: 0.2 grams - Vitamin C: 8.1 milligrams (14% of the daily recommended intake) - Vitamin A: 569 international units (11% of the daily recommended intake) - Potassium: 112 milligrams (3% of the daily recommended intake) - Magnesium: 10 milligrams (2% of the daily recommended intake) It’s important to note that these values are approximate and can vary depending on the specific variety and ripeness of the watermelon. Watermelon is low in calories and fat, making it a suitable fruit for those watching their weight. Its high water content helps with hydration, while its natural sugars provide a refreshing sweetness. The fruit is also a good source of vitamin C, an antioxidant that supports the immune system, and vitamin A, which is important for vision health. The potassium content in watermelon contributes to proper heart function and fluid balance in the body, while the small amount of magnesium helps with various physiological processes. Watermelon is a delicious and nutritious fruit that can be enjoyed on its own, in fruit salads, smoothies, or as a hydrating snack during hot weather or after physical activity. Watermelon Side Effects Watermelon is generally safe and well-tolerated for most people. However, there are a few considerations and potential side effects to be aware of: Although rare, some individuals may be allergic to watermelon. Allergic reactions to watermelon can manifest as itching, hives, swelling, difficulty breathing, or even anaphylaxis in severe cases. If you experience any allergic symptoms after consuming watermelon, seek medical attention immediately. Watermelon contains a high amount of water and fiber, which can be beneficial for digestion. However, consuming excessive amounts of watermelon or eating it too quickly may cause digestive discomfort, such as bloating, gas, or diarrhea. Moderation is key to avoid such issues. Blood sugar levels While watermelon is relatively low in calories and sugars compared to some other fruits, it still contains natural sugars. People with diabetes or those closely monitoring their blood sugar levels should be mindful of their watermelon intake. It’s advisable to consult a healthcare professional or a registered dietitian for personalized guidance. Interactions with medications Watermelon contains a compound called citrulline, which can interact with certain medications. For example, citrulline can have a mild blood pressure-lowering effect. If you’re taking medications for high blood pressure or other conditions, it’s prudent to consult your healthcare provider to ensure there are no potential interactions. Like any fresh produce, watermelon can be contaminated with bacteria such as Salmonella or E. coli, especially if it’s not handled or stored properly. To minimize the risk of foodborne illnesses, it’s important to wash the watermelon thoroughly before cutting into it and store it in a clean and cool environment. As always, individual reactions may vary, and it’s wise to listen to your body. If you have any concerns or experience adverse effects after consuming watermelon, it’s best to consult a healthcare professional for personalized advice.
<urn:uuid:1d5544c7-3e22-48d5-b191-c05effa3d465>
CC-MAIN-2024-10
https://www.kobmel.com/benefits-of-watermelon/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.902034
1,274
2.6875
3
“I think that the job of imagining how it feels to be other than oneself is a useful vocation. By trying to understand and narrate the lives of others, artists hope to bring about the small leaps of empathy that allow societies to bridge divides of heritage.” — Chris Cleave, author of Everyone Brave Is Forgiven (hat tip to PJ Coldren) (And what says empathy better than a live cat kissing a stone one?) “Story is all about how someone’s worldview changes. … What this means is that you must begin with empathy for every single character you create, even characters who do things you’d never ever do. After all, what people do isn’t what gives us empathy for them. Why they do it is where empathy comes from. In fact that’s what empathy is. To wit: empathy is the ability to feel what other people feel about a situation for the same reason they feel it. In other words, empathy is giving dignity and weight to their feelings, even if you disagree with the conclusion they’ve drawn.” – Lisa Cron, Writer Unboxed, 12/8/16 “To engender empathy and create a world using only words is the closest thing we have to magic.” — Lin-Manuel Miranda I adore Meryl Streep, and I loved two things she said in her speech accepting a lifetime achievement award from the Golden Globes. “An actor’s only job is to enter the lives of people who are different from us, and let you feel what that feels like. … As my friend, the dear departed Princess Leia, said to me once, take your broken heart, make it into art.” What she said about the role of empathy is equally true of writers. In fact, I believe we could make a good case that practicing empathy should be a primary goal of us as humans, and that the world would be a better place as a result. And when we practice art, we grow our empathic souls. (And so, empathy in the arts is my theme for March quotes.) Here’s a link to the full text of Meryl’s speech, from the New York Times. (Photo by Leslie; Avalanche Creek, Glacier National Park) The novel “breaks down the barrier between the self and the other, which is the basis for democracy, the basis for humane society. … It’s epistemological. It tries to deal with one key question: How do we know what we know? Basically, it’s trying to validate the subjective experience of an individual. That’s why it’s the most democratic form in literature, because it raises up to the level of significance the subjective experience of an ordinary human being.” – Russell Banks, quoted in The Missoulian 10/9/11, on the novel’s power to evoke empathy for others
<urn:uuid:71de995b-96ff-4e2f-af60-167fb15947b6>
CC-MAIN-2024-10
https://www.lesliebudewitz.com/tag/empathy/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.930449
623
2.515625
3
The Effectiveness Of The Remedies For Copyright Infringement, A Global Concern When is infringement said to have occurred? The rapid growth of the internet has become worrying for the copyright owners. People can now copy large amounts of protected work instantly. The Internet has made this possible. The effect of this ease of copying material is that doubts have risen that if copyright is dead or is it eveneffective. It is undeniable that the internet poses great challenges for the copyright industry and its aim to protect creative expression. The Acts which contribute to infringement of a copyright are as follows: - When the whole or a substantial part of the copyright work is used without proper authorization from the owner of the work; - When a work is displayed or exhibited in public as a way trade or importing or distributing the copyright work also constitutes infringement; - If a place is permitted for carrying on infringing work, then it is also said to be an infringement of copyright. Remedies available against the infringement There are three remedies available against copyright infringement: (i) Civil Remedies- under this remedy, suit can be filed seeking interlocutory injunction, account rendition, pecuniary remedies, to destroy the infringed copies and damages. (ii) Criminal Remedies- this includes imprisonment, fines, seizure and it may also require to deliver the infringed copies to the owner. (iii) Administrative Remedies- this remedy is used for banning the import of infringed copies and to deliver the copies that have been confiscated to the owner. The statute of limitations for bringing a lawsuit for copyright infringement damages is three years from the date of the infringement. Other provisions under The Copyright Act, 1957 The Copyright Act of 1957 established a set of punitive penalties under Chapter 13 of the Act to enforce copyright. The primary punitive provisions of the Act are as follows: - Under section 63, anyone who knowingly infringes or aids in the infringement of a work’s copyright or any other right protected by the Copyright Act, 1957 (broadcast reproduction rights, performers’ rights, moral rights, etc.) can be sentenced to a minimum of six months in prison and a maximum of three years in prison, as well as a penalty of between 50,000 and 200,000 rupees. - Section 65A makes it illegal to circumvent effective technological safeguards that can be applied to copies of a work in order to preserve any of the Act’s rights (ie, copyright, performance rights). This provision carries a penalty of up to two years in prison as well as a monetary fine. The Copyright (Amendment) Act of 2012 added Section 65A. - Unauthorized removal or alteration of “rights management information” is punished under Section 65B by up to two years in prison and a fine. If the person is aware that electronic rights management information in the copy has been removed or altered, the clause renders unlawful distribution, transmission, or communication to the public of copies of the work punishable in the same way. The Copyright (Amendment) Act of 2012 added Section 65B. - On a second or subsequent conviction under section 63, the punishment is increased under section 63A. - Other parts of the chapter include penalties for using infringing copies of a computer program, producing or having plates for the purpose of making infringing copies of works, and falsifying entries in the Register of Copyrights. Remedies for online copyright infringement Certain provisions pertaining to copyright infringement and the internet were incorporated as part of the Act’s 2012 amendment. Section 52(1)(b) of the Act’s fair use provision states that temporary or incidental storage of a work or performance solely for the purpose of electronic transmission or communication to the public does not constitute copyright infringement. What Section 52(1) (c) provides is that, unless the person responsible is aware of infringement or has reasonable grounds to believe the storage is of infringing copy, transient or incidental storage of a work or performance for the purpose of providing electronic links, access, or integration that is not expressly prohibited by the rights holder is not a copyright infringement. If the owner of a copyright work complains in writing to the person responsible for digitally storing an infringing copy of the work that such transient or incidental storage is an infringement, the person responsible is required by section 52(1) to refrain from facilitating access to the infringing copy of the work for a period of 21 days (c).If the person who is responsible does not receive an order from a competent court ordering him or her to desist from giving access within 21 days, access may be restored at the conclusion of that period. Apart from the clauses listed above, the Copyright Act’s overall scheme makes it abundantly apparent that all of the Act’s provisions must be applied to electronic and digital media in the same way that they are applied to traditional media. In several countries, the Copyright (Amendment) Act of 2012 clarified this. The provisions of that Act adequately encompass all sorts of work exploitation, including internet exploitation, and copyright infringement penalties would apply to the online platform in the same way they would to any some other medium or platform. Although no amount of care will guarantee an ‘infringer-free’ environment, copyright owners must take certain preventative measures, such as: - a record of occasions of use; - copyright registration; - copyright notice; - tracking the activity of repeat infringers; - requiring secrecy from independent contractors and employees; - having appropriate licensing agreements with a proper control mechanism in place; and - Announcing the outcome of a victorious infringement trial. Protection under International legislation - TRIPS establishes criteria for judicial review, the protection of confidential information during legal procedures, and the gathering of evidence and obtaining discovery.Members must also allow judicial authorities the power to award injunctions, order the payment of damages sufficient to compensate the injured party for the infringement, and grant alternative remedies such as the destruction of infringing items, according to TRIPS. - Although, the Berne Convention and TRIPS appear to cover similar ground, however Berne and TRIPS are described in more general, broad language.Certain clauses of the WIPO treaties, on the other hand, appear to be specifically geared to address Internet or digital-related issues, and hence could be valuable to copyright owners dealing with online infringement. Although, there are sufficient provision for protection of copyright, but with the rapid growth of the internet, it is doubtful whether these provisions will be enough. Even, the WIPO treaties are insufficient in combating Internet-related infringement. They don’t deal with the complicated and thorny questions of jurisdiction and law selection. They also don’t add anything to the enforcement mechanism against countries that don’t provide the necessary degree of protection. TRIPS looks to be the most significant instrument currently in place to ensure that intellectual property rights are recognized and enforced around the world.As a result, a copyright owner who is unable to seek effective remedies through judicial or political systems in a country that serves as a sanctuary for infringement has few legal options. Contributed by:– Nidhi Jha, Legal intern at LLL
<urn:uuid:d6a5cffc-c2ca-4e3e-a994-22c927332f57>
CC-MAIN-2024-10
https://www.letslearnlaw.com/the-effectiveness-of-the-remedies-for-copyright-infringement-a-global-concern/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.926551
1,477
2.625
3
Owning a dog is an exciting and rewarding experience, filled with shared adventures, unspoken bonds, and unconditional love. However, it also comes with a spectrum of responsibilities; ensuring the optimal health and happiness of your canine companion is one of the most crucial among these. This guide aims to provide you with insightful information and practical tips to help you navigate the sometimes challenging terrain of dog care. From diet and exercise to mental health and preventative care, we will explore the many facets of dog wellness. Let’s embark on this journey towards a healthier, happier life for your furry friend. Feed your dog a balanced, nutritious diet to maintain their overall health. Seek veterinary guidance for specific dietary needs based on your canine’s age, breed, and health status. With the right food, your dog will be able to have more energy and maintain a healthy weight. Supplementing their diet with essential vitamins, minerals, and fatty acids can also help ensure that they get all the nutrients they need. Moreover, with amazing supplements for dogs that one can find online, it is now easier than ever to provide your pet with a balanced and complete diet. This supplementation should always be supervised by a professional veterinarian. Maintain your dog’s physical health by engaging them in regular exercise. This can include daily walks, play dates with other dogs, or participation in dog sports. Exercise allows your pup to expend energy, stay fit, and get the mental stimulation they need to thrive. Regular physical activity is also beneficial for preventing obesity and mitigating chronic illnesses that can afflict dogs with an inactive lifestyle. For example, canine arthritis is often caused by a lack of exercise and can even be prevented through frequent activity. Exercise also helps to build a strong bond with your dog and is the perfect time to spend quality time together. A great place to start is with a daily walk, and from there, you can explore the many options for canine fitness. Stimulate your dog’s mind with puzzles, toys, and training sessions to avoid boredom and promote intellectual development. Dogs are intelligent creatures and need mental stimulation to stay engaged and content. Puzzles can be a great way to occupy your pup, while training exercises provide them with an outlet for their natural instincts. Additionally, toys like Kongs that hold treats offer a novel way for your dog to practice problem-solving skills. Investing in activities such as these will not only help keep your pup’s mind active but also strengthen your relationship and foster trust. Regular Veterinary Check-ups Visit your vet for regular check-ups to detect any potential health issues early and keep your dog’s vaccinations up-to-date. Vaccinations help protect your pup from a variety of diseases and are an essential part of preventative care. Aside from vaccinations, regular visits can also alert the vet to any underlying health problems or concerns that should be monitored. Stay up-to-date on your pet’s medical history, and never hesitate to consult with their doctor if something doesn’t seem right. Developing a relationship with your vet can help you stay ahead of any potential issues and ensure that your dog remains in optimal health. Grooming and Hygiene Regular grooming, including brushing, bathing, and cleaning teeth and ears, will help prevent any skin or dental issues. Proper hygiene is key to keeping your pup healthy and comfortable. Brush their coat regularly to remove any loose fur, debris, or mats that may irritate the skin. Bathe them with a shampoo formulated for dogs as often as needed; bathing too frequently can dry out their skin, so consult your vet on how often it should be done. Additionally, clean your dog’s teeth and ears regularly to avoid plaque buildup and infection. Take the time to properly groom your pup, and you will both reap the rewards of a happy and healthy dog. Encourage your dog to interact with other animals and people to foster positive social behaviors and prevent anxiety or aggression. Dogs need time to socialize and interact with others, which helps them build trust and develop better communication skills. Introduce your canine pal to other animals or people in a calm environment over the course of several meetings. This may include playdates, walks around the neighborhood, or trips to the dog park. Socializing can help your pup learn how to be comfortable around different stimuli and better handle new situations. Proper socialization will help ensure the safety of your pup as well as those they encounter in their surroundings. In conclusion, taking care of a dog is no small feat – it requires time, patience, and love, but the rewards far outweigh the effort. The joy that a dog brings into your life is immeasurable, and your dog’s optimal health and happiness should always be a priority. Remember, a balanced diet, regular exercise, mental stimulation, veterinary check-ups, proper grooming, and positive socialization are the pillars of optimal dog care. As you continue on this journey with your dog, keep these tips in mind to ensure their health and happiness. After all, a healthy dog is a happy dog, and a happy dog makes for a happy owner. Here’s to a lifetime of wagging tails, sloppy kisses, and unconditional love with your furry friend.
<urn:uuid:bcfb6eb6-7758-4be1-b234-3abe15981a27>
CC-MAIN-2024-10
https://www.littledoggiesrule.com/dog-health/dogs-optimal-health/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.94542
1,078
2.59375
3
How to predict record-shattering weather events - Meteorologists are trying to work out just how common they will become The heatwave that struck parts of North America’s Pacific coast in 2021 propelled temperatures in Lytton, a village in British Columbia, to 49.6°C—4.6° higher than the previous record. On the fourth day of this torment the place erupted in flames and was almost completely destroyed. These events were so out of the ordinary that, in a press conference held some weeks later by climate modellers, they struggled to explain how circumstances had conjured them.
<urn:uuid:f68c1f78-c1e7-47a4-86b4-4b3553ce1ded>
CC-MAIN-2024-10
https://www.livemint.com/specials/how-to-predict-record-shattering-weather-events-11701504429583.html
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.975933
124
2.828125
3
There are coding camps, programs and lesson plans for children as young as six years old. But how can kids learn to code before they learn to write? Visual programming is a way for kids to graphically write code, usually with drag-and-drop “building blocks.” The focus is on overall structure, methods and programmatic thinking instead of specific rules. For example, the loop below is shown in both graphical code and regular Python. The fundamentals remain the same, but the visual version is similar to a puzzle. The pre-made pieces can be modified but need to be moved into place. This starting point makes it easier for young and beginner programmers to build algorithms that would otherwise seem hidden behind text. Versions of these kinds of languages are often bright and colorful to help engage children. Also, the pre-made blocks mean that kids don’t have to worry about typing, spelling or syntax errors. For the youngest coders, the focus should be on getting them excited about problem solving and creativity. CSTA recommends that students start learning algorithms by modeling step-by-step processes and working on sequencing. By fifth grade, these coders should be able to create variables and basic events. Visual programming is suitable for this age because it is colorful and engaging. It also does not require typing skills, so there is a lower barrier to entry than traditional coding. Middle Grade Students CSTA recommends these students begin addressing more complex algorithms and structures through pseudocode. They should also begin trying new data types, nested loops and functions to make code easier to reuse. Visual programming can graphically display new, more complex concepts such as nested loops and compound conditionals. These languages can also help students start to plan and implement larger projects at a high level before working out the details. High School Students At this level, CSTA says students should be able to create algorithmic prototypes and begin implementing object-oriented programming strategies such as arrays. They should engage in informed decision making about the readability, efficiency and performance of their code. Students can use visual programming tools as a complementary system to text-based coding languages. Much like an artist uses thumbnails or a web designer creates wireframes, visual programming can be used to pseudocode a project and outline the larger idea. Visual programming languages can also be a good resource to build the basics of a complicated loop or coding problem before adding more syntactically complex lines. What Visual Programming Languages and Editors Are Available for Kids? Scratch From The Scratch Foundation and MIT A free coding community and visual coding interface for kids to create digital stories, games and animations. Primarily meant for kids ages six to 18, Scratch is available in more than 70 languages and does not require an internet connection. ScratchJr is for children younger than seven years old. Pencil Code From The Pencil Code Foundation A programming site and code editor that uses visual programming to draw art, make games and play music. This editor primarily imitates the CoffeeScript language. Alice From Carnegie Mellon University A free visual programming software with an accompanying library of how-tos, lessons, exercises, projects, textbooks and curriculums. Alice also has an audio library available for users to code things such as music videos. What Resources Are Available to Teach Children Visual Programming? There are games, apps and lesson planning services available to help teach visual programming languages. Browse some of the options below to find kid-friendly options. Blockly Games: A series of educational games that get progressively more complex using Blockly programming. CodaKid: A set of coding courses with hundreds of challenges centered around video and gamification using games like Minecraft. Google CS First: One-hour lessons using Scratch to build stories and games or to augment existing coding curricula. Daisy the Dinosaur: Available for iPad, a drag and drop interface application for children to animate a dinosaur using code blocks. Game Builder Garage: Available on the Nintendo Switch, step-by-step lessons on the foundations of game design and visual programming. iRobot Coding App: An app that allows students to program physical responses from the accompanying robot, progressing from graphical to text coding. micro:bit: A miniature computer that connects to the Microsoft MakeCode platform to animate the display, code rhythm or make a compass. ITCH Lessons: Coding courses and a lesson building platform for educators using Scratch. SAM Labs: Wireless blocks and coding platform featuring lesson plans and dedicated educator support. Kai’s Clan: A toolset compatible with Blockly and micro:bit that allows users to collaboratively code their robots. GameSalad: A professional visual programming platform that allows users to create games from scratch and share them with the community. LearnToMod: Minecraft modification software where users can learn how to create their own mods, texture packs and schematics for the Minecraft community. Programming Terms and Definitions Object-oriented programming: A programming style in which code is formulated into sections of data, or “objects;” programmers create objects to modularize complex programs. Pseudocode: A plain language description or plan for code that can help with outlining or determining the overall structure of a program. Algorithm: Instructions that explain to the computer how to make a calculation or process information. Algorithms use ordered directions and are written in a language meant for computers (programming languages). Variable: A reference or given name for a set of information. For example, a variable can represent an entire file of data, a single character or a list of numbers Event: Something that happens and triggers code to run. This is often user-driven—for example, when a user clicks a button or enters text into a text box. Function: A named set of instructions that can be created and reused by a programmer. For example, you could create a function titled “append_A,” which tacks the letter “a” to the end of a specified word. Once defined, “append_A” can be called or executed throughout a program. Conditional statement: Decision-making logic for a computer to check circumstances before executing code. Conditional statements always contain an “If” portion; “If” the condition is met, the computer will continue running the code that follows. Loop: A set of code that is repeated for a predetermined number of iterations or until a set of given conditions is no longer met. Array: A data storage and access method that contains a series of objects of the same type. For example, an array of characters (c, o, d, e) or floats (1.2, 5.7, 9.4, 10.2). Nested and compound code: Code performing a function that is contained within the confines of another function—for example, a loop that executes inside another loop.
<urn:uuid:f03712cc-4b03-441a-93d4-5a3022dc9263>
CC-MAIN-2024-10
https://www.mastersindatascience.org/resources/visual-programming-resources/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.889542
1,432
4.75
5
A cancer diagnosis affects every family member — including children. If you or a loved one has been diagnosed with cancer, make sure to let the children in your life know. Using simple and direct language is often the best way to tell children, no matter their age, about a cancer diagnosis. Find tips on talking to kids about cancer below. Telling a child that you or a loved one has cancer is an incredibly challenging, but also an important, step after a diagnosis. By letting a child know, you can better support their feelings and emotions in the wake of the news. The American Cancer Society (ACS) has outlined some basic tips for talking about cancer with kids. These tips include: Ultimately, it’s important to let children know that they will always be loved and taken care of, no matter what. Mesothelioma is a particularly aggressive type of cancer caused by asbestos exposure. If your or a loved one has mesothelioma, it’s important to share the news with the children in your life when the time is right. Telling children about a mesothelioma diagnosis can be particularly challenging because this cancer is quite hard to treat. Patients may also have shorter lifespans than other types of cancer. That said, explaining the situation to children can help them cope more effectively than if you had hidden it from them. Here are some tips when talking about mesothelioma with kids: Many leading health organizations recommend telling children about a cancer diagnosis sooner rather than later. Parents may want to hide a cancer diagnosis at first. However, children are more intuitive than we may think. Most often, kids will be able to tell that something bad is being kept from them. This, in turn, could cause them to worry and stress — often silently since their loved ones are not discussing it openly — even more than if they had been told outright. Ultimately, when you tell your child about a cancer diagnosis is up to you. “Some parents know immediately that they will tell their kids about their diagnosis at the earliest opportunity. Others know they will eventually discuss the diagnosis with their children, but may delay until they have more information about the cancer and its treatment, or until the children are a bit older.” — Dana-Farber Cancer Institute When the time comes to talk, the MD Anderson Cancer Center recommends meeting as a family in your home or a comfortable private setting. The Dana-Farber Cancer Institute also notes that you can share more information in follow-up conversations. Doing so can help children understand the situation more easily and encourage them to come to you with questions or other tough topics. Mesothelioma Resource Group is dedicated to helping all who are impacted by mesothelioma, including the children and grandchildren of mesothelioma patients. Learn how we can assist you and your family with a Free Mesothelioma Guide. How kids react after hearing a loved one has cancer can vary depending on their age, their relationship with the cancer patient, and other factors. It’s important to know that children may not act how you’d think they would after sharing the news. Some may hide their emotions on the outset, only for their feelings to come out in different ways. After sharing news of cancer, kids may: All of these behaviors are normal, but can present long-term problems for a child. If you notice your child is struggling, you can look into support resources that can help them. There is a wide range of options to support kids whose loved ones are facing cancer. Learn about ways to help your child manage their emotions more effectively and cope with the news. Telling children about cancer is one of the most important conversations you’ll have. Though difficult, sharing the news can help children prepare and get answers to their concerns. Further, if you or your child are struggling after a cancer diagnosis, emotional support resources can ease some of the burdens. The Mesothelioma Resource Group can also help if you or a loved one has an asbestos-caused cancer. Medical care, financial aid, and peace of mind may be available. We can help those with these asbestos-caused cancers: Call (888) 360-2406 or get a free case review now to learn how we can assist you. Yes. You might not want to tell a child about a cancer diagnosis since this news is devastating. However, the ACS notes that children can typically sense when something is wrong. Not telling a child can make them feel scared. City of Hope also notes that trying to hide a cancer diagnosis from children can put even more stress on you and your loved ones. It’s best to explain a cancer diagnosis simply to a 10-year-old child and others around that age. The ACS recommends using children’s books about cancer to help explain what’s happening. Knowing a loved one has cancer is never easy, and each child will react to news of cancer differently. Young children might need help if they start regressing (i.e. wetting the bed). Children who start having violent or angry outbursts, depression, or physical symptoms like headaches may also need assistance. In these cases, getting support from teachers, therapists, social workers, and more can all help a child cope more effectively. Hello, we’re sorry to barge in, but we are available to answer your questions. Would you like to speak to a live person?
<urn:uuid:82b4933d-a046-4e52-8bd5-a0d2ce185947>
CC-MAIN-2024-10
https://www.mesotheliomasymptoms.com/resources/children
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.95886
1,149
3.125
3
1 Institute of Geochemistry, Mineralogy and Mineral Resources, Charles University, Albertov 6, Prague 2, CZ-12843, Czech Republic. 2 Institute of Geology of the Czech Academy of Sciences, Rozvojová 269, Prague 6 – Lysolaje, CZ-16500, Czech Republic. As enstatite-rich meteorites, we (scientists) refer to meteorites from distinct clans, although they share some common characteristics. Enstatite-rich meteorites include enstatite chondrites (EH and EL groups), enstatite achondrites, and some anomalous ungrouped chondrites and achondrites. Enstatite-rich meteorites are relatively rare, constituting ~ 1% of all meteorite collections. Enstatite chondrites form most of these percentages, as enstatite achondrites are around six times less numerous than enstatite chondrites. The enstatite chondrite clan belongs to the undifferentiated meteorites (chondrites). It consists of two groups EH (high iron) and EL (low iron). The dividing into these groups was first dependent on the bulk chemical composition (from these times, we have the group names); afterward, it became more dependent on mineralogy, particularly on the chemical composition of (Mg,Mn,Fe)-monosulfides, etc. Like other chondrites, the enstatite chondrites have categories referred to as the petrologic types, representing the degree of thermal metamorphosis or aqueous alteration. The number from 1 to 7 assigns the petrologic type. The most pristine (unaltered) are the chondrites of the petrologic type “3”. The enstatite chondrites consist only of the petrologic types from 3 to 7 (no aqueous alteration hasn’t been known for them). Some enstatite chondrites are classified as anomalous as they don’t fit in any group or petrologic type. Only aubrites and ungrouped enstatite achondrites represent the clan of enstatite achondrites. One of their shared common characteristics is their mineralogy. They consist of Mg-rich pyroxene: enstatite, which has given them the name. We believe that they formed under similar highly reducing conditions. Their mineralogy reflects these conditions. Due to the reducing conditions, they consist of some rare minerals with compositions that have not been discovered on Earth yet. These minerals include sulfides of lithophile elements (on Earth) such as calcium (oldhamite: CaS), magnesium (niningerite: MgS), etc. Reducing mineralogy is also reflected in the composition of other minerals: Si-bearing kamacite (iron metal), chromium- and titanium-bearing troilite (FeS), manganese-bearing daubréelite (FeCr2S4), etc. Enstatite chondrites and achondrites are not objects of interest only for their unique mineralogy but also for their isotopic similarities to the Earth-Moon system. The isotopic similarities (notably primitive enstatite chondrites) make them the closest potential material available to study conditions and processes in the protoplanetary disk in the region of formation of the terrestrial planets. Due to their all similarities, widespread discussion of their common origin has been going on for many years. Although some evidence supports this claim, scientists have tended to think they did not share a common parent body in recent years. It is unclear how many parent bodies existed only for enstatite chondrites. To summarize, we do not know much about these mysterious meteorites. What were the conditions of their parent bodies’ formation? How many parent bodies did they have? Some of these questions may have answers hidden within the minerals’ chemical composition and their mutual relations. During my Ph.D. research, I have the privilege to study various meteorites from the enstatite chondrite and aubrite groups. I would like to mention some of the most interesting ones. I had an opportunity to study well-known aubrites such as Mayo Belwa, classified as impact melt breccia, or Bustee, where some scarce minerals such as osbornite (TiN) and previously mentioned oldhamite occurred for the first time. In addition, I was able to study a very famous enstatite chondrite Yamato 691 (EH3) and anomalous enstatite chondrites Yamato 86004 (EH-impact melt) or Yamato 793225 (EH6-an). Since I focus on mineralogy, I mostly use optical microscopy, scanning electron microscopy (SEM), electron probe microanalysis (EPMA), and Raman micro-spectroscopy in my study, which mainly focuses on mineral troilite (FeS) and its variability in chemical composition, focusing mainly on the variation of chromium and titanium concentrations. During the extensive search for troilites and measuring their chemical composition by EPMA, I found some exciting variability in chromium concentration within the individual grains of some enstatite chondrites. Such variability could indicate the unequilibrity of these troilites in contrast to the equilibrated composition of the silicates. Similarly, in addition to the chromium concentration variation, I found the titanium concentration variation in some studied aubrites. Considering that this could lead to additional information about the formation of the parent bodies of these mysterious meteorites, I decided to look into this issue closely. Is the variability of chromium and titanium concentrations an indicator of the troilite unequilibrity, or is the cause of these phenomena hidden somewhere else? First, I decided to try more precise micro-scale observation, hoping to get some answers. Although the presence of unevenly distributed fine particles might be one of the possible answers, I was still pretty surprised when I saw the microscopic lamellas of other minerals, which were unobserved during the previous measurements, in troilite grains with a high concentration of chromium or titanium. I found less than micron-wide lamellas of mineral daubréelite as a cause of the high chromium concentration in some of the enstatite chondrites (Fig. 1) and aubrites (Fig. 2). Similarly, I found sub-micron-sized inclusions of titanium-rich sulfide heideite in the grains with high titanium concentrations in aubrites (Fig. 2). However, the elevated chromium concentration in some of the enstatite chondrites remained unexplained as I could not find any similar lamellas or inclusions. Could be the lamellas or inclusion even smaller? I needed to use an analytical technique with an even higher spatial resolution to resolve this. Transmission electron microscopy (TEM) allows observation at the nano-scale. Preparation of the samples for TEM is quite complex and time-consuming as they must be electron-transparent. Because I needed to sample the selected troilite grains, I required the technique that allowed me to choose the exact location for the TEM sample preparation. Therefore I used the focused ion beam (FIB) technique. So, I prepared a set of samples consisting not solely of troilites from enstatite chondrites with unexplained high concentrations of chromium but also of troilites with the daubréelite lamellas for comparison. The observation by TEM gave some new exciting results. For example, in the cases of troilites with daubreelite lamellas observed by SEM, the daubreelite lamellas are also present at the nano-scale (Fig. 3). In contrast, otherwise, no daubréelite lamellas are found. However, the amount of data that needs to be subsequently processed is enormous. Therefore only a sample from the meteorite Asuka 881314 has been processed. Thanks to electron diffraction patterns, I determined the mutual crystallographic orientation of troilite and daubréelite. I simulated the combined electron diffraction pattern in that mutual orientation to confirm it. This mutual orientation causes the perfect overlap of some diffraction. The exact crystal lattice parameters are required to gain such perfect overlaps. The crystal lattice parameters from electron diffraction correlate well with the simulated ones. To follow this study’s outcomes, I plan to investigate this mineral assemblage of troilite-daubréelite further. To investigate their possible conditions of origin, I intend to execute experiments to synthesize troilite and daubréelite analogs and examine the extent of FeS-CrS solid solution. In conclusion, investigating minerals at their nano-scale can bring difficulties. Still, the outcomes can shed light on mineral assemblages and their texture formation. By studying such things, we can contribute to revealing the mysteries of the Universe’s creation. Acknowledgment: This research was supported by the Charles University Grant Agency project No. 1090119 and the Institutional Research Plan No. RVO 67985831 of the Institute of Geology of the Czech Academy of Sciences, Prague. I thank Akira Yamaguchi (NIPR) for the sample loan. Also, great gratitude goes to Petr Harcuba for the preparation of lamellas and SEM observations and to Jozef Veselý for conducting the TEM study. And last but not least, the considerable gratitude belongs to the Brian Mason Travel Award sponsored by the International Meteorite Collectors Association for the 2022 85th Annual Meeting of the Meteoritical Society held in Glasgow, UK, because thanks to this award, I was able to attend this conference in person for the first time.
<urn:uuid:80bc3092-b1c7-486a-9de3-563e3362ca8f>
CC-MAIN-2024-10
https://www.meteorite-times.com/nano-scale-investigation-meteorites-terrestrial-planets-formation/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.908415
2,042
2.875
3
UPTAKE of COVID-19 vaccines in Australia has been fast, with vaccination rates for younger children initially mirroring that of adults and adolescents, but plateauing in March 2022, with only 51% of Australian children aged 5–11 years receiving a first dose by October 2022. General practice, argue the authors of a Perspective published today by the Medical Journal of Australia, is the ideal setting for promoting an increase in the vaccination rate of children. “Although the reasons for plateauing are unclear, increasing paediatric infection rates since early 2022, mostly associated with mild COVID-19, may have reduced parental perceived urgency or need for vaccination,” wrote the authors, led by Dr Katelyn Barnes, a Senior Research Officer with the Australian National University. “The proportion of Australian children vaccinated against COVID-19 is much lower than for longstanding scheduled childhood immunisations, with more than 95% of all Australian children (5 years of age or older) vaccinated against diphtheria, tetanus, pertussis, and poliomyelitis,” Dr Barnes and colleagues wrote. “However, the COVID-19 vaccination rate among Australian children (5 years of age or older) is greater than the proportion vaccinated against influenza (approximately 30% in 2020, up 3% from 2019), suggesting COVID-19 vaccine promotion has rapidly gained traction despite challenges. “Greater vaccine coverage among Australian children is important to reduce the potential for COVID-19 related disruptions in child development. Accordingly, strategies are needed to counter relative delays in COVID-19 vaccine uptake for children.” Dr Barnes and colleagues listed several reasons for COVID-19 vaccine delay in children, including caregiver concerns regarding the safety and effectiveness of vaccines, or misunderstanding of the risks of COVID-19 infection and benefits of vaccination for children; communication challenges and changing information may be problematic in high-risk culturally and linguistically diverse groups; access to vaccination and follow-up for subsequent doses has proved challenging for socio-economically disadvantaged groups. “General practice is the ideal setting to promote childhood COVID-19 vaccine acceptance and uptake in Australia,” they wrote. “To date, Australian primary care settings have delivered over 60% of COVID-19 vaccines administered nationally, with 6884 sites located in general practices (n = 3896), community pharmacies (n = 2776), Aboriginal Community Controlled Health Services (n = 136) and Commonwealth vaccination clinics (n = 76) led by GPs. “About 50% of Australia’s total 63 million vaccine doses were administered through general practices. “GPs and general practice nurses are trusted vaccine providers and information sources, who have established relationships with children and their family members. “They are trained in techniques for difficult vaccinations, such as needle phobia or sensory sensitivities, have the capacity and experience to manage complications, and can coordinate care and referral for patients who require increased support or specialised interventions.” Dr Barnes and colleagues said broader strategies to help general practice reduce vaccine hesitancy included “primary care sites partnering with community leaders and local media (when possible) and even social media (when relevant) to support tailored but consistent messaging about the importance, safety and effectiveness of COVID-19 vaccines alongside individual and community benefits of being vaccinated”. “Messaging should be clear and presented in multiple formats and languages. Partnering with community leaders will help to shape clear and meaningful messages and inspire trust, particularly for culturally and linguistically diverse groups. “Consistent messaging to promote COVID-19 vaccine acceptance should be provided in all health settings (general practice, community pharmacy, and hospitals) as well as general community settings (schools and community centres). “Primary care has an important role in supporting childhood COVID-19 vaccine acceptance and access,” Dr Barnes and colleagues concluded. “General practice is a key setting in which trusted relationships with patients, families and the community can be leveraged to increase and sustain COVID-19 vaccine acceptance and uptake among Australian children.”
<urn:uuid:71a6e966-8209-4d1b-8042-3738a104ffe5>
CC-MAIN-2024-10
https://www.mja.com.au/journal/2022/gps-key-lifting-covid-19-vaccination-rates-children
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.942276
848
2.8125
3
Having a chronic illness isn\’t like having the flu or a broken leg, where you know you will get better in a set amount of time. Having a chronic illness means that you don\’t have any certainty of when you may get better; in fact your illness may never go away. When suffering from a chronic illness you are often tired and in pain; it can affect your physical appearance or your physical abilities. It may prevent you from working, causing you financial anxiety and stress. You may also feel angry, questioning why this has happened to you. And of course, it doesn\’t just affect you. Family members and friends are also affected and influenced by the persistent health changes of a loved one. It is easy to become isolated in these circumstances-the changes to your body and your abilities can affect your positive self-image, making it hard for you to interact with others. Stress can build and become prolonged which then leads to frustration, anger, hopelessness and sometimes even depression. Seek help as soon as you can When diagnosed with a chronic illness one of the first things you should do is to seek help. Don\’t leave it until you are already struggling with the ramifications of your new health status. You should be building a support network as soon as you feel less able to cope and before you feel helpless. There are several forms of help available to someone in your position. A trained counselor or mental health care provider can help you develop strategies to regain a feeling of control and draw up a treatment plan to meet your specific needs. They can also determine if depression is present and can get you to the right medications to help regulate your mood. Support groups are also useful, providing an environment where you can learn new ways to deal with your illness. You can share approaches that you have discovered with others, enabling you to be proactive in your illness not just reactive. Soon you will also gain the necessary strength to realize that you are not facing your illness alone. Top Five Tips for Taking Control - Accept your illness. This may sound defeatist, but if you make an effort to adapt then you can acknowledge your loss of happier times when you were physically able and emotionally strong. Accepting will help you face the new challenges in your life. - Love yourself as you are today-your looks, your illness, your problems and your limitations. Take pride in what you can accomplish NOW. - Take total responsibility for your health and never overlook all the help you can get. - Become an expert on your illness. Research it, discuss it with fellow sufferers, always go to your medical appointments prepared with questions. - Let go of the “Why me?” attitude so you can look forward and not backwards. Once you leave the past behind, you can solve the problems you are experiencing right now such as how you can still exercise despite the new weakness in your legs. And remember, you are still “YOUâ€; the illness should not have control over your life Learning how to manage a chronic illness is hard but once you find a way to do this while still being “you,†the strength you will gain from this journey will enable you to get back the positive physical, emotional and spiritual outlook that you had in life before your illness.
<urn:uuid:d666635e-474a-48e0-8ec0-162dfd79ccae>
CC-MAIN-2024-10
https://www.nancyscounselingcorner.com/coping-with-chronic-illness/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.966972
687
2.578125
3
Written and narrated by Peter Bejger A quiet village set amidst rolling hills, forests, and ravines. A revered monastery. And four stories of salvation. A compelling article by Oksana Sikorska in the Ukrainian journal Zbruch outlines the remarkable role of the small western Ukraine village of Univ during the horrors of the Second World War and the Holocaust. These are stories of resilience and triumph in the face of daunting odds and incredible danger. In the 1930s Univ had a little over a thousand souls and a village school. And by the time of the German occupation in 1943, a little boy was peering out a window from the attic of the schoolhouse onto the world outside. To leave the attic was to invite disaster. Most of the local Jewish population had already been deported and/or killed. Public signs posted everywhere warned that anyone assisting Jews would be executed. This boy, Roald Hoffman, who was to become the Nobel Laureate in Chemistry, found shelter in the one room schoolhouse, which was also the home of the village schoolteacher Mykola Dyuk and his wife Maria. What is even more astounding is that Roald’s mother, two uncles, and an aunt were also in hiding at the same location. The group of five remained together there for eighteen months until the end of the German occupation. Mykola and Maria Dyuk were conferred the title of Righteous Among the Nations by Yad Vashem in Israel. The lonely boy Roald gazed upon the forbidden world outside as his mother lifted his spirits with fantastic stories of overseas adventures. And down the road from the schoolhouse a group of other boys he would never get to meet played freely outside. The boys were from the orphanage of the Holy Dormition Lavra, the mother monastery of the Studite Order of Monks of the Ukrainian Greek Catholic Church. Historic documents date the Lavra to the fourteenth century. It became a renowned religious publishing and printing center in the seventeenth century. The Studite monks were—and are—a working and praying order with doors open to everyone. They were self-supporting, lived simply on the verge of poverty, and ran orphanages and workshops where they trained young peasant boys in crafts. Their dynamic leader, the Archimandrite Clement, was the brother of the head of the Ukrainian Greek Catholic Church Andrei Shteptytsky. Kurt Lewin, the son of a rabbi in Lviv, lived in hiding among the Studites in a number of locations for most the war thanks to the effort of the Sheptytsky brothers. He left a vivid account of their daily lives. He wrote, “At six o’clock the working day was over, with the monks changing into habits and assembling for the evensong. A simple meal in the refectory was followed by the Povecheria, a short night service, consisting of reading psalms…one that I always found especially moving. It beseeched the Lord to take care of travelers on sea or land, to heal the sick, to console the dying in their hour of agony, to protect the oppressed and imprisoned, the soldiers on the battlefield, all people suffering and in mourning, to protect everyone everywhere. The priest pronounced the pleading sentences of the litany and the community answered “Hospody podaj I pomyluj” (O Lord, grant it and have mercy on all). Then the monks approached the superior one by one to be blessed. Each monk approached him, kissed an extended hand and left in silence for the monastery and his cell.” Among the orphans cared for by the Studites at Univ were several Jewish boys. They included the former Minister of Foreign Affairs of Poland Adam Daniel Rotfeld, now professor of Warsaw University. There was also Dr. Leon Chameides, also a rabbi’s son, who became Director of Pediatric Cardiology at Connecticut Children’s Medical Center and Clinical Professor of Pediatrics at the University of Connecticut School of Medicine. During the war the dense forests surrounding the Univ monastery were the scenes of fierce battles. In a gripping account told in his interview with the United States Holocaust Memorial Museum, Dr. Chaimedes recounted, “We had one healer, I don’t know whether he was a physician but I managed to become his helper at the ripe age of nine and we set up a hospital in the church and we brought in the wounded…one of my jobs was after the battles, to run into the forest and to rummage around, find dead soldiers, particularly if they were German, because they would usually have bandages and first aid material on them, and get as much of that material as possible. I would take the bandages off and then run back and wash them, so we could use them—on the Ukrainians.” After the war the hidden Jewish boys of Univ left a shattered Ukraine to fulfill their destinies in the outside world. The Studite Order was suppressed by the Soviets, the Univ Lavra closed, and the monks went underground to secretly serve the church. Clement Sheptytsky was arrested and died in the Gulag in 1951. When the Soviet Union collapsed the Studites returned and the Univ Lavra was reopened. Clement Sheptytsky was recognized as Righteous Among the Nations by Yad Vashem and was beatified by Pope John Paul II in 2001. Kurt Lewin recalls the timeless nature of the refuge offered in Univ and elsewhere by the Studites. He wrote, “…the incense, the chant of the monks, and the dimly lit icons created an atmosphere of peace and serenity, conducive to meditation and prayer. It was a deeply spiritual experience that at the time appealed to one’s senses… [it] was like stepping into a different world, leaving horror and fear behind. This indeed was the Lord’s sanctuary.” This has been Ukrainian Jewish Heritage on Nash Holos Ukrainian Roots Radio. From San Francisco, I’m Peter Bejger. Until next time, shalom!
<urn:uuid:bc217d2f-4e3c-41b3-9c3c-7183c57aa802>
CC-MAIN-2024-10
https://www.nashholos.com/ukrainian-jewish-heritage-ukrainian-village-univ-offers-sanctuary-and-salvation-during-the-holocaust/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.973704
1,258
2.890625
3
North-East Asia Clean Air Partnership (NEACAP) Air pollution has been one of the primary work areas of NEASPEC, starting with technical cooperation on mitigation of air pollution from coal-fired power plants in North-East Asia in three phases during 1996-2011. As an outcome of the project and to complement other regional mechanisms and cooperation, member States agreed to strengthen the science-to-policy linkages and take a holistic approach to address challenges faced by national and air pollutant management. Subsequently member States launched the North-East Asia Clean Air Partnership (NEACAP) at SOM-22 in 2018 to ensure protection of the environment and human health from air pollution in North-East Asia, following a step-wise approach as the completeness of relevant emission inventories and modeling capacities in member States vary. NEASPEC work on air pollution and process towards NEACAP The NEACAP would serve as a voluntary framework to address air pollution in North-East Asia, covering multiple pollutants: Particulate Matter (PM2.5 and PM10) and Ozone as well as other relevant pollutants including Sulfur Oxides (SOX), Nitrogen Oxides (NOX), Black Carbon, Ammonia (NH3) and Volatile Organic Compounds (VOCs). The partnership is expected to - Promote science-based and policy-oriented collaboration; - Enhance and further develop information and experience exchange; - Act as the key voluntary frameworks in addressing transboundary air pollution issues in North-East Asia; - Contribute, as appropriate, to the development of relevant national and subregional policies; - Promote knowledge on environmental and human health aspects of air pollution. Platform for all stakeholders to promote science-based, policy-oriented cooperation on air pollution
<urn:uuid:66659362-2a3f-49f4-ba40-b9bb5357791d>
CC-MAIN-2024-10
https://www.neaspec.org/our-work/air-pollution/overview
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.927066
372
2.640625
3
The Olympic short-tailed weasel is endemic to the Olympic Peninsula. Though short-tailed weasels are found elsewhere in the northern hemisphere, the ones in the Olympics do not turn white in preparation for winter. They have a brownish coat with a yellowish-colored underside year-round. These creatures are long and slender, allowing them to fit into nests and burrows of their prey. Despite their short legs, weasels are fast and strong creatures, often preying upon mammals larger than themselves. Their shorter tail distinguishes them from the long-tailed weasel. The Olympic short-tailed weasel inhabits the lowland forests, up into the subalpine zone. Thee excellent swimmers that they are, weasels are most often found in open habitats near water, living in burrows of squirrels, chipmunks, and other small rodents that became prey to the weasel. Weasels are carnivores, feeding mainly on small rodents. They are fast and strong, and have the capability of catching snowshoe hares which easily outweigh them. If given the chance, weasels will kill more than they can eat and store the remainder by burying it and enjoying it later.
<urn:uuid:6134e0f2-a3ce-4dcb-bebc-c323845b4ccf>
CC-MAIN-2024-10
https://www.nps.gov/olym/learn/nature/short-tailed-weasel.htm
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.967375
248
3.5625
4
Using data from multiple cycles of the U.S. government-run NHANES What We Eat in America survey, researchers from Michigan-based consulting firm Nutrition Impact used a sample size of 16,774 women who were not pregnant or lactating and 18,784 adults over the age of 60. Within each subgroup, the study compared nutrient and food group intake as well as diet quality between consumers and non-consumers of mango, a fruit known for its high fiber, calcium, magnesium, potassium, folate and vitamin C content. Published in the journal Nutrients, the observational research was funded by the National Mango Board. A life-stage approach The study noted that the life-stage approach introduced by the Dietary Guidelines for Americans (DGA) in the 2020-2025 cycle recognizes nutritional equity as a priority in nutrition research to adjust dietary pattern recommendations for subpopulations. Two of these are pregnant and lactating females (PLFs) and older adults due to their unique nutritional needs and chronic health conditions. The DGA encourages PLFs to increase consumption of iron, folate, calcium, magnesium, protein, fiber, potassium and vitamin D since current intakes among women between the ages of 19 to 50 years are low, and more than 20% of the population is below the estimated average requirement for calcium, magnesium and vitamin D. For older adults, over 25% of those 71 and older fall short for calcium, magnesium, zinc and vitamins A, C, D and E, according the NHANES data. “Both groups have low intakes of several nutrients, including those of public health concern, and suboptimal diet quality, underlining the importance to improve their dietary intakes,” the researchers wrote. “Incorporating fruit into their diets could help alleviate these gaps.” While they acknowledged that women of childbearing age (WCA) are not equivalent to PLFs, this proxy was used to expand the limited sample size of PLFs in NHANES. Alleviating the gaps The analysis of the data showed that both WCA and older adult mango consumers had over 20% higher intakes of fiber and vitamin C, and WCA consumers had over 10% greater folate, magnesium and potassium intakes compared to the non-mango consumers. Both mango-consuming subgroups also had lower intake of saturated fat, and older adults had lower intakes of protein and vitamin B12. Diet quality was 16% higher in WCA and 13% higher in older adults compared with non-consumers. In addition, mango consumers in both subgroups had lower beef, poultry, fish and solid fat intakes, and WCA consumers had higher whole grain intakes compared with non-consumers. “[B]oth WCA and older adults who consumed mangos had higher intakes of nutrients important in those life stages, in addition to higher diet quality and diet quality components,” the study concluded. “Identifying individual fruits that help to ward off common health conditions in WCA could give multiple options for this subpopulation who are prone to food aversions.” They also reported that older adults who consumed mangos had lower intake of protein, vitamin B12, riboflavin and niacin, as well as lower intakes of protein foods —suggesting that improving protein intake of older adults while increasing fruit intake could decrease potential risk of malnutrition and prevent chronic health conditions. “Future research could focus on examining the nutrient intake benefits of mango and individual fruits independent of dietary supplement usage in PLC and older adults,” the study noted, adding that analysis stratified by demographic variables could also be important for future study. “Mango Consumption Was Associated with Higher Nutrient Intake and Diet Quality in Women of Childbearing Age and Older Adults” Authors: Kristin Fulgoni and Victor L. Fulgoni III
<urn:uuid:376e0469-c117-4600-85a6-81bc8969328a>
CC-MAIN-2024-10
https://www.nutraingredients-usa.com/Article/2024/01/30/Mango-linked-to-higher-nutrient-intake-in-certain-Americans
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.949865
798
2.53125
3
Assessment at Our Lady & St Werburgh's On this page you can find information about how we assess the progress and achievement of your children. There have been significant changes to the assessment of children in primary education with the removal of Levels from Key Stages 1 and 2. Please find our Assessment Policy below: The Early Years Children in the Nursery and Reception are taught through the Early Years Foundation Stage Framework. We have prepared a guide for parents about the EYFS and how assessment is used at Our Lady & St Werburgh's. To view a copy of the guide please use the link below: Key Stages 1 and 2 From Year 1 to Year 6 the children are taught the National Curriculum. Throughout their journey through the school, the children's progress and achievement are carefully monitored. We track all children in our classes after formal assessments in English and Mathematics, on a termly basis, using a tracking tool called Insight. This enables us to access and analyse data frequently and drill into the progress and attainment of all groups and individual children, highlighting children who re not making at least expected progress and ensuring timely interventions are put in place to support these children. As a core subject in our Catholic school, children are also assessed at least termly in Religious Education. Additional assessment also take place throughout the year in Science. All children are assessed in all foundation subjects annually.
<urn:uuid:130eeeab-050b-42bf-a832-356a476c7fc2>
CC-MAIN-2024-10
https://www.ourlady-st-werburghs.staffs.sch.uk/key-information/assessment-guide-for-parents
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.947381
284
3.03125
3
Amaranth (Amaranthus hypochondriacus) was a food staple among the ancient civilizations of Central and South America that has recently received increased attention due to the high nutritional value of the seeds, with the potential to help alleviate malnutrition and food security concerns, particularly in arid and semiarid regions of the developing world. Here, we present a reference-quality assembly of the amaranth genome which will assist the agronomic development of the species.Utilizing single-molecule, real-time sequencing (Pacific Biosciences) and chromatin interaction mapping (Hi-C) to close assembly gaps and scaffold contigs, respectively, we improved our previously reported Illumina-based assembly to produce a chromosome-scale assembly with a scaffold N50 of 24.4 Mb. The 16 largest scaffolds contain 98% of the assembly and likely represent the haploid chromosomes (n?=?16). To demonstrate the accuracy and utility of this approach, we produced physical and genetic maps and identified candidate genes for the betalain pigmentation pathway. The chromosome-scale assembly facilitated a genome-wide syntenic comparison of amaranth with other Amaranthaceae species, revealing chromosome loss and fusion events in amaranth that explain the reduction from the ancestral haploid chromosome number (n?=?18) for a tetraploid member of the Amaranthaceae.The assembly method reported here minimizes cost by relying primarily on short-read technology and is one of the first reported uses of in vivo Hi-C for assembly of a plant genome. Our analyses implicate chromosome loss and fusion as major evolutionary events in the 2n?=?32 amaranths and clearly establish the homoeologous relationship among most of the subgenome chromosomes, which will facilitate future investigations of intragenomic changes that occurred post polyploidization. Journal: BMC biology
<urn:uuid:1f616474-f71f-4736-bddf-210ffe48e854>
CC-MAIN-2024-10
https://www.pacb.com/publications/single-molecule-sequencing-and-hi-c-based-proximity-guided-assembly-of-amaranth-amaranthus-hypochondriacus-chromosomes-provide-insights-into-genome-evolution/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.888228
388
2.6875
3
A group of physics students are conducting an experiment in projectile motion. They want to launch a ball into a bucket that is 8 m away from their spring-loaded launcher. They have hypothesized that by setting their launcher to its long-range setting and placing the launcher barrel at a 35 degree angle that they can consistently hit the bucket when they fire the launcher. Ignoring air resistance, calculate the time of flight for the ball in their experiment. The Attempt at a Solution Not sure but I know this is simple. I am just brain dead right now because I am really sick but I need to get this done for tomorrow. I think you find the time using the y-components...
<urn:uuid:8289cf18-3adc-42c7-9f21-eed93cb5b87f>
CC-MAIN-2024-10
https://www.physicsforums.com/threads/simple-projectile-motion-im-sure.292915/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.944925
139
2.875
3
Back into the Past: Political Reforms Borne of the French Revolution What used to be one of the strongest royal families in Europe found themselves at the end of their run. Today, we take a look at what political reforms were borne out of the French Revolution. What is the French Revolution? One of the stark examples of how people can topple long established governments, the French Revolution is often heralded. It was at a time when the people of France long starved and taxed, and lived in horrid squalor had finally had enough. At this point in time, France was bankrupt. This was in part due to the many wars they have had and the massive expenditures that the royal family had made toward their lavish parties and lifestyles which were—quite sadly—expected of them. The largest expenditure was the Palace of Versailles. The economic standing of France was bleak. Wars are expensive and this also meant that a lot of the men who could have been used for local labor were sent off to secure borders and went on random skirmishes. It also did not help that for several years before the spark of the revolution, the agricultural sector was not doing good as well. There was not enough harvest to meet demand. Infrastructure was bad as well, making the roads difficult. Transportation was also terrible—this is something that also led to whatever crops being harvested spoiling before reaching its proper destination. It was, a terrible political powder keg waiting to be struck. If you are a fan of Broadway Musicals, Les Miserables is based off of that time period. You can have a pretty firm grasp of how utterly miserable it was to not be part of the upper echelon of French society. The way that the hierarchy of governance and living was made meant that the rich barely felt the hunger and misery. It was the middle and lower classes that were progressively decaying into a truly impossible state of living. What Political Reforms Were Made? Failed Constitutional Monarchy The authority of the royal family was stripped. They were some that hesitated to completely abolish the monarchy. The idea of a constitutional monarchy was floated around. However, tensions were high and people demanded justice. The popular notion at the time was for a more Republic style of governance. Abolishment of Tithes One of the first things that happened after the revolution was to nationalize the lands and holdings of the Catholic Church upon French soil. The monies that were gained from this move were used to pay off any debt that was owed to the public. Standardized Prices for Goods As there was more money going around for the procurement of goods, it was inevitable that there would be an inflation of prices. One of the reforms was to set a regular price for all goods regardless of its availability or lack thereof. This helped keep the economy from creating a bubble that would burst from unsustainable market practices. How Did the Reforms Affect the French Populace? At the time when the monarchy was completely abolished and the Republic was established, people were generally high on victory. Before the revolution, the masses did not hold any sway whatsoever regarding political policies. All the major decisions were left entirely up to the monarchy and their advisers. This had meant that people who had no idea what it was like to be of the lower class were making decisions that had great impacts upon the lives of people they would never meet. Now that the revolution was successful, the people now felt hope that their lives would now be better. What they had to go through first was a severe decline in their economic state. It was only until the real work trickled in that France was subjected to many other wars in the colonies and a continued lack of food. There was a lot of changes that had to be done like the addressing of the lack of employment and fair wages. The right to suffrage was also discussed. After the revolution, a lot of the men from the masses were given the right to vote—normally, the votes were for the nobles and the monarchy. The success of the revolution helped to empower the masses. It gave them the solid proof example that the people could rise up and enact reforms and counteract reforms that were made by unsuited rulers. Masses were now able to truly experience freedom in terms of thought, speech, faith, and even the something so simple as owning land. After the revolution, the Declaration of Rights of Man enabled the concept of human rights. All men, even the slaves in the colonies, were declared free men. They were now able to voice their opinions and criticism of those in power—something that could have had you killed when the monarchs were in charge. How Did the Reforms Affect Other Countries? When King Louis XVI and his wife were executed, the other monarchs of the surrounding countries were scandalized. The murder of a ruling family was pretty much unheard of—especially since it was the masses that enabled this to happen. It was understandable that the monarchs of the nearby countries felt threatened over what had happened with France and France’s ruling family. The idea of if it happened to them, it could truly happen to them as well. While at first, Britain supported the French Revolution (why wouldn’t they) this support eventually turned sour when reports of what happened to Louis XVI started to spread. There was a massive emigration that also occurred during the revolution. As such, a lot of surrounding countries experienced an influx of immigrants. There was now a sort of domino effect that trickled outward from France to other parts of Europe. Even after Napoleon Bonaparte established his dictatorship, the groundwork was already made for a revolution to oust him. A lot of historians often point to the French Revolution as a pivotal moment in our collective history.
<urn:uuid:46c68a49-f9db-4059-8edc-8b4d6caa0afb>
CC-MAIN-2024-10
https://www.politicscounter.com/political-reforms-borne-of-the-french-revolution/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.991345
1,182
3.34375
3
Satyakāma jābāla (Chāndogya) In the past, education would mean learning the vedas and allied branches like vyākaraṇa (grammar). The student had to leave his home and had to stay in the gurukula. There were no facilities for food and other amenities. One had to go around to get alms and live on that. One had to also serve the ācārya of the gurukula with utmost diligence, that would help to attain ācārya’s affection, only then one would get knowledge. The Guru would test the śiśya for qualities like vinaya (conduct), śraddhā (faith), arjana (capability of acquisition), gurubhakti (devotion towards the guru), only if the guru is convinced that the student is deemed fit education would happen. Only after the guru was convinced that the student has the prerequisites would he impart higher knowledge and bestow upon him everything he had learnt. There lived a brāhmaṇa widow by named Jabālā in a village, where she was leading a life of hardship. She was an orphan and was extremely poor. She had a son named Satyakāma. All his friends were being initiated to education through upanayana and they started leaving the village to join gurukula to study. Seeing them Satyakāma also desired to do so. But his upanayana had not yet happened. But his enthusiasm knew no bounds. Anyone joining a gurukula had to introduce themself by their kula (lineage) and gotra (progenitor of the lineage). Satyakāma approached his mother, prostrated before her and asked for permission to attend gurukula. Then he asked, “O mother, there the guru will ask for the kula and gotra. Can you tell me what gotra I belong to?” A teary eyed Jabālā replied, “My dear child, I got married at an early age. Once your father came I’d always be busy with daily chores. We were poor, had work to earn livelihood, homely chores, looking after my husband, attending to guests–these took up my whole life. There was no time to think about anything. When I was in my youth you were born. It's our misfortune that your father passed away. I don’t know any of his relatives. I don’t know the gotra. What shall I do now?” Satyakāma asked, “What should I tell the guru then?” she replied, “Tell him the truth. I’m Jabālā, you are my son, so you are Jābālā. Tell him you are Satyakāma, of unknown gotra. Tell him that’s what your mother told you to do." Satyakāma took leave and reached a guru. The guru was the son of Haridrumata, Gautama, he approached him, prostrated, and introduced himself thus, “Bhagavan, I’ve come to you desirous of learning. Please accept me as your śiśya.” Gautama replied, “Saumya, what is your gotra?” Satyakāma said, “Svāmin! I don’t know. I don’t have my father. I asked my mother. She said, ‘we are poor. Always engaged in work to earn livelihood, hardly had time amidst daily chores. Your father passed away. I didn’t ask him about the gotra. So I don’t know the gotra.’ My mother is Jabālā. I’m her son Satyakāma-Jābālā.” Gautama thought for a while and then said, “You are indeed a brāhmaṇa. Or else you’d never be able to reconcile with such brutal truth and state it as a matter of fact. Good. Have you undergone the initiation through upanayana?” Satyakāma said that he has not been initiated. Gautama replied, “You have again told the truth. Always treading on the path of truth. Good. I’ll conduct upanayana. Bring samit.” Then Gautama conducted the upanayana as prescribed. Then he separated four hundred cows which were emaciated from the herd of cows which belonged to the gurukula and assigned Satyakāma to tend to them, “O child, you should tend to them. You should ensure that they are fed well and make them grow with utmost care.” Satyakāma happily agreed, “I’ll look after them personally and will not come back to the gurukula till I’ve a thousand cows.” He took those cows to the forest. Then he reached the grasslands where food was abundant and took great care of the cows. Years passed. The cows grew well. They begot calves. Their numbers grew steadily and reached a thousand. He not only tended to the cows meticulously, he also didn’t falter from his nitya-karma (daily routine), sandhyopasanā, agnikārya etc and remained steadfast in brahmacarya. Pleased by his śraddhā and tapas, Vāyu possessed one of the bulls in the herd and addressed Satyakāma thus, “O Satyakāma, we have now reached the target which was a thousand, now take us back.” He also said, “Saumya, We deities are pleased. So I’ll impart you with the first pāda (quarter) of the knowledge of parabrahman.” Satyakāma agreed, “Bhagavan, as it pleases you” Vāyu said, “Satyakāma, the east is one kalā of the brahman, so is the north, a kalā is one fourth of a quarter, and so on. Thus a pāda is made up of four kalās. It is called as ‘prakāśavān’ One who knows this secret and performs upasanā of this quarter ‘prakāśavān’ consisting of four kalās, he would gain all the fame in this world and would attain higher worlds later. Another quarter will be revealed to you by Agni” The next Satyakāma took the herd in the direction of the gurukula as instructed by Vāyu. It was dusk. He stopped, finished his sandhyopasanā, continued with agnikārya, and sat near the Agni in the east. Agni, pleased, said, “Satyakāma I’ll impart you with the second pāda (quarter) of the knowledge of parabrahman.” Satyakāma agreed. Agni replied, “Pṛthvī is one of the kalās, antarikṣa is one, paramākāśa and samudra are others. Saumya! This pāda composed of these four kalās is called ‘anantavān’ ; one who knows this secret and performs upasanā of this quarter ‘anantavān’ consisting of four kalās, he would become that. He would get an unbroken lineage of progeny. Finally he would attain the eternal puṇyaloka. The next quarter will be revealed to you by Āditya who is in the form of haṃsa.” To be continued... This is the seventh part of the multi-part translation of the Kannada book "Upanishattina Kathegalu" by Mahamahopadhyaya Vidwan Dr. N Ranganatha Sharma. Thanks to Dr. Sharada Chaitra for granting us permission to translate this wonderful work. Thanks to B. N. Shashikiran for timely and appropriate edits. The original in Kannada can be read here
<urn:uuid:99c1cedd-826c-4276-9de6-89657cf05cac>
CC-MAIN-2024-10
https://www.prekshaa.in/stories-from-the-upanishads-part-7
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.981131
1,812
2.546875
3
Capital gain is an increase in the value of a capital asset (investment or real estate) that gives it a higher worth than the basis of the asset. Capital gains can also be thought of as the profit from the sale of a capital asset where the sale price exceeds the asset’s adjusted basis. Short-term capital gains, which generally applies to assets held for less than one year, are taxed at an investor’s ordinary income rate. Long-term capital gains, which generally applies to assets held for greater than one year, are subject to capital gains tax, which is generally lower than the ordinary income rate. As an example capital gain calculation, if a taxpayer purchased an investment property for $1,000,000 and claimed $200,000 of depreciation over their holding period (resulting in an $800,000 adjusted basis), and subsequently sold the asset for $1,200,000, the taxpayer’s capital gain would be $400,000 (sales price less adjusted basis).
<urn:uuid:09e22e2c-8bf3-4f21-87ba-953d23713106>
CC-MAIN-2024-10
https://www.realized1031.com/glossary/capital-gain
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.943144
208
2.828125
3
According to recent government data, 64% of adults in England are obese or overweight. And carrying too much fat - especially around the middle - impacts our health in many ways, increasing the risk of conditions such as high blood pressure (hypertension), type 2 diabetes and heart disease. Being obese or overweight can play a part in poor circulation, too. Luckily, there are lots of achievable ways to lose weight - we’ll take a look at those later. But first, let’s explore body fat and how it impacts health in more depth.
<urn:uuid:fc758dfd-012b-4c09-81a6-c5ecc83a85bd>
CC-MAIN-2024-10
https://www.revitive.com/the-causes-of-poor-circulation-overweight
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.923962
116
2.828125
3
What program from the New Deal era is still in effect today? – The federal housing administration was created as a part of new deal in 1934 to help people obtain loans that they need to buy a house. They also help the citizens in regulating the standards of safety for building and creating policies to stabilize the mortgage market. learn more about FHA (Federal Housing Administration) loans and that they are widely used by first-time homebuyers and people with. Home | Federal Housing Finance Agency – Respect We strive to act with respect for each other, share information and resources, work together in teams, and collaborate to solve problems. Excellence We aspire to excel in every aspect of our work and to seek better ways to accomplish our mission and goals. Integrity We are committed to the highest ethical and professional standards to inspire trust and confidence in our work. The Federal Housing Administration, or FHA, is a government agency that originated as part of the 1934 National Housing Act. Congress designed it to help facilitate growth in mortgage loan. RELEASE: New CAP Analysis Uncovers Persistent Discrimination Against African American Borrowers in the Housing Market – Washington, D.C. – New analysis from the Center for American Progress uncovers numerous signs of persistent residential segregation among African American home mortgage borrowers, a troubling finding. Federal Housing Administration – The New York Times – The Obama administration, struggling to get the housing market running again for low-income and first-time homebuyers, will lower the premium that the Federal Housing Administration charges on. The FHA, or Federal Housing Administration, provides mortgage insurance on loans made by FHA-approved lenders. FHA insures these loans on single family and multi-family homes in the United States and its territories. It is the largest insurer of residential mortgages in the world, insuring tens. Fha Lender Requirements The FHA insures loans offered by private lenders, and do not offer mortgage loans directly. The low credit score and down payment requirements allow more homebuyers to qualify for home loans. Borrowers are required to pay mortgage insurance (MIP) monthly, usually around 0.85 percent of the loan amount annually.Fha Loan To Build A Homes What Does Not Fha Approved Mean An FHA loan is a home loan that the U.S. Federal Housing Administration (fha) guarantees. private lenders like banks and credit unions issue the loans, and the FHA provides backing: If you don’t repay your loan, the FHA will pay the lender instead.Can I Buy a Manufactured Home with FHA Financing? – All FHA loans must have an FHA home inspection completed before closing by a licensed FHA inspector that will verify that the home meets HUD standards. One of the benefits of purchasing a new Clayton Built prefabricated home is that all Clayton homes are built to hud federal manufactured home construction and Safety Standards.Fha Financing Rules Guidelines Fha Appraisal Loan – Ceilingtilesexpert – While FHA used to reject the site, current guidelines allow for the seller to repair the problems and, if completed, the loan can move forward. References (4) FHA Handbook: fha appraisal. 2019 What are the FHA Appraisal Guidelines? – FHA.co – The FHA appraisal guidelines might seem unfair or as if the FHA doesn’t want you to have a loan. FHA Mortgage Limits – United States Department of Housing and. – FHA Mortgage Limits Welcome to the FHA Mortgage Limits page. This page allows you to look up the FHA or GSE mortgage limits for one or more areas, and list them by state, county, or Metropolitan Statistical Area. The results page will also include a Median Sale Price value for each jurisdiction. Fha Loans Near Me Low Down Payment Loans Give Homebuyers Hope, But Is It Too Risky? – "Buy a Home, 1% Down, Free Recorded Message," reads a sign at the edge of a vacant lot in the scrappy working-class town of Bloomington near Riverside. low down loan type of programs and they fit. Trump administration to house migrant children at Fort Sill, which once served as a Japanese internment camp – This is not the first time the federal government has used military bases for migrant housing. The Obama administration used Fort Sill and other bases to house migrant children from Central America. Federal Housing Administration – usa.gov – The Federal Housing Administration (FHA) provides mortgage insurance on single-family, multifamily, manufactured home, and hospital loans made by FHA-approved lenders throughout the United States and its territories.
<urn:uuid:18d79148-6c75-4f9f-9644-9fce542dab04>
CC-MAIN-2024-10
https://www.rileadsafe.com/the-federal-housing-administration-2/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.937119
953
3.046875
3
Most patients feel fully recovered from wisdom teeth surgery in three to four days. If you have impacted teeth or any other wisdom teeth complications, it may take up to a week to feel better. What Are Wisdom Teeth? Wisdom teeth are your third set of molars. Normal, healthy wisdom teeth emerge in the back of the mouth at some point during the late teens or early adulthood. Why Do Oral Surgeons Remove Wisdom Teeth? Wisdom teeth can cause many dental problems, including pain, decay, infection, impacted teeth, and the movement of other teeth. Most people do not have the space to allow these teeth to erupt naturally. If you have any questions about whether your wisdom teeth should come out or can safely be left alone, please call us for a consultation. The Wisdom Teeth Removal Process You will receive local anesthesia on your teeth and gums. You may also choose to receive IV sedation or general anesthesia for your comfort. The oral surgeon cuts a small incision in your gums, through which they remove the bone that may be covering your tooth. Then they use special dental tools to loosen and remove the tooth. If you have impacted teeth, the surgeon may need to break them into pieces to extract them. The oral surgeon will put sutures in your gum to protect the area. Typically, wisdom teeth surgery takes only a short time, perhaps 20 to 30 minutes per tooth. Healing After Wisdom Teeth Surgery In general, the younger you are during the surgery, the faster your healing will be. If you wait until your thirties, forties, or beyond to have your wisdom teeth out, you may experience more discomfort and complications. You may experience bleeding, bruising, facial swelling, jaw soreness, and other mild to moderate symptoms that should respond well to medication and home care. The sutured areas and tooth sockets should heal completely in about six weeks. During this time, follow our at-home care instructions to ensure a comfortable recovery. Tips For a Smooth Recovery Ice packs are key to reducing swelling. Combining ice packs with a prescription or over-the-counter pain medication should control your discomfort. Start with cool or room-temperature liquids and gradually add other foods as you can tolerate them. Stay away from hard, crunchy, or chewy foods for at least two weeks after surgery or eight weeks if you have lower wisdom teeth removed. Call Rio Grande Oral Surgery Wisdom teeth surgery may be intimidating, but most people tolerate it well and feel recovered within a few days to a few weeks. If you need wisdom teeth surgery, please call our Albuquerque, NM office at 505-821-2111. We can schedule a consultation, evaluate your teeth, and let you know how we can help.
<urn:uuid:754f4506-084b-403f-84aa-a7079a03900c>
CC-MAIN-2024-10
https://www.riograndeoralsurgery.com/how-long-does-it-take-wisdom-teeth-to-heal/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.927366
575
2.765625
3
Planting trees is a clear and cost-effective avenue towards tackling climate change. Only last year, scientists from the Swiss university ETH Zürich suggested that planting billions of trees across the world would be a neat way of taking carbon dioxide out of the atmosphere. As trees grow, they absorb and store the carbon dioxide emissions which are driving global heating. New research estimates that a worldwide planting programme could remove two-thirds of all the emissions from human activities which remain in the atmosphere today. As President of Rotary International between 2017-18, Ian Riseley wanted 1.2 million trees planted during his year in office – one for every Rotarian in the world. That challenge continues to be met by Rotarians across Great Britain & Ireland, under the umbrella of the Environmental Sustainability Rotary Action Group (ESRAG). There is a wide variety of projects within ESRAG’s portfolio such as beach and river clean up, plastic removal, recycling and energy conservation, but tree-planting remains at the heart of those activities. New research estimates that a worldwide planting programme could remove two-thirds of all the emissions from human activities which remain in the atmosphere today.” Many Rotary clubs new to environmental actions may wish to begin with something relatively small. A good example of this would be Halifax Rotary’s annual tree-planting. Each year they link with a local school or firm to plant 420 free saplings from the Woodland Trust. This time, the lockdown ruled out the local school but with Sowerby Bridge Rotary and Business Network, they enjoyed fresh air and exercise, carefully separated, to carry out the planting. In Scotland, Kirkcudbright Rotary has similar experience of tree-planting, having worked with schools and the local council on a number of small tree-planting projects. It’s a great opportunity for Rotarians to work with youngsters on an issue of mutual interest. However, Kirkcudbright Rotary is not just considering small schemes. Rotarian Keith Bruce said: “The Borders Forest Trust started forest restoration 20 years ago in the south of Scotland. “The town of Langholm has recently reached agreement for a community buy-out from the Buccleuch Estate with the ambition of turning the land on its doorstep into a large nature reserve. This is where significant volunteer tree planting is programmed for 2021/22. “Trees will be predominantly Alder, Birch, Oak, Hawthorn and Hazel. Rotary clubs in Southern Scotland, working with the Borders Forest Trust, will aim to provide many volunteers for these extensive planting operations.” In North Yorkshire, Harrogate Rotary has a similar scheme to restore woodland in Nidderdale. Terry Knowles said that they have already planted 20,000 trees, with people donating more than £50,000 to help balance their carbon output. In Sussex, Lewes Rotary is working on a project not in a rural area, but in the market town itself. Ruth O’Keeffe explained: “Lewes Urban Arboretum is a project developed by the Friends of Lewes Civic Society Trees Group and now supported by Lewes Rotary. “It has resulted in planting 80 mature street trees and several hedgerows to improve the natural environment and biodiversity of this small market town. “Supported by residents and local councils there are plans to plant many more trees in identified areas, as a continuing project that other similar towns up and down the country could replicate.” When planning a tree-planting activity, many Rotary clubs have chosen to provide funding for tree-planting overseas. During Ian Riseley’s tenure as President, 44 Rotary clubs gave financial support to the development group Sustainable Global Gardens (SGG) who implemented the planting of 41,475 trees in East Africa. This work was carried out through informal partnerships with 11 Tanzanian Rotary clubs (feature image) as well as with hundreds of farmers in Kenya. The great advantage of tree-planting in East Africa is that trees can greatly increase the productivity of small-scale farms and the income of poor households, so the initiative carries the twin benefit of poverty and hunger alleviation. SGG currently has a project to plant 100,000 trees in Africa for both community development and carbon capture. The great advantage of tree-planting in East Africa is that trees can greatly increase the productivity of small-scale farms and the income of poor households.” So far, SGG has recorded the planting of an estimated 30,000 new trees, and it is looking for continued Rotary support to reach its goal by the end of 2021. Many of the tree-planting projects have involved youngsters. Embracing the environment presents a perfect opportunity to showcase Rotary to the younger generation; through schools, Interact and Rotaract clubs. They represent both the future of Rotary and the future of our planet. Let’s think about our young, let’s think about our future and let us plant trees.
<urn:uuid:8bb09806-2633-4771-919a-607b09cd23b7>
CC-MAIN-2024-10
https://www.rotarygbi.org/magazine/february-march-2021/plant-trees-better-world/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.950735
1,061
2.875
3
Department of Neurology, University of Calgary, Alberta, Canada Received: 29-May-2023, Manuscript No.neuroscience-23-100273; Editor assigned: 31-May-2023, Pre QC No. neuroscience-23-100273 (PQ); Reviewed: 14-Jun-2023, QC No. neuroscience-23- 100273; Revised: 21-Jun-2023, Manuscript No.neuroscience-23-100273 (R); Published: 30-Jun-2023, DOI:10.4172/neuroscience.7.2.009 Citation: Kawa Y. Causes and Imaging of Creutzfeldt–Jakob Disease. 2023;7: 009. Copyright: © 2023 Kawa Y. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Visit for more related articles at Research & Reviews: Neuroscience Creutzfeldt–Jakob Disease (CJD) also known as subacute spongiform encephalopathy or neurocognitive dysfunction caused by prion disease, is a deadly degenerative brain condition. Early signs may include visual abnormalities, behavioural changes, memory issues, and poor coordination.Dementia, uncontrollable movements, blindness, weakness, and coma are some of the later signs. 70% of patients pass within one year after receiving a diagnosis. After the German neurologists Hans Gerhard Creutzfeldt and Alfons Maria Jakob, Walther Spielmeyer first coined the term "Creutzfeldt-Jakob disease" in 1922. A prion is a class of aberrant protein that causes CJD. Misfolded proteins called infectious prions can alter the way that regularly folded proteins fold. Approximately 85% of CJD cases are caused by unknown factors, while 7.5% are caused by autosomal dominant inheritance. Spread may also occur when exposed to brain or spinal tissue from an infected person. There is no proof that sporadic Creutzfeldt-Jakob disease can spread through regular contact or blood transfusions, notwithstanding the possibility in variant Creutzfeldt-Jakob disease. Diagnosis entails eliminating any more probable reasons. The diagnosis may be supported by an electroencephalogram, a spinal tap, or magnetic resonance imaging. Since the majority CJD is not specifically treated. Clonazepam or sodium valproate may be used to treat uncontrollable movements, while opioids may be used to treat pain. One in a million persons are affected by CJD each year. Onset normally occurs at the age of 60. The illness was initially explained in 1920.This form of transmissible spongiform encephalopathy is categorized as such. One in ten cases of prion disease is inherited CJD. Sporadic Creutzfeldt-Jakob Disease (CJD) is distinct from Variant Creutzfeldt-Jakob Disease (vCJD) and bovine spongiform encephalopathy (mad cow disease).CJD is a form of TSE (Transmissible Spongiform Encephalopathy), which is brought on by prions. Proteins that have been improperly folded are known as prions, and they can develop in Central Nervous System (CNS) neurons. They are believed to interfere with signalling pathways, harming neurons and causing degeneration that gives the diseased brain its spongiform appearance. The CJD prion is harmful because it encourages natural prion protein to refold into the diseased state. Protein molecules that are misfolded will multiply exponentially, which results in a significant amount of insoluble protein in the affected cells. This accumulation of improperly folded proteins impairs neuronal cell function and results in cell death. Misfolding of the predominately alpha helical regions into beta pleated sheets can result from mutations in the prion protein gene. Because of this alteration in structure, the protein can no longer be digested. Upon prion transmission, the damaged proteins enter the brain and cause additional prion protein molecules to misfold in a self-sustaining feedback loop. These neurodegenerative conditions are frequently referred to as prion diseases. Additionally, individuals who have a mutation in the PRNP gene, which codes for the prion protein, are susceptible to CJD. Approximately 5–10% of CJD cases involve this. The misfolding of the prion protein is a process that is thought to happen in rare cases as a result of aging's impact on cellular machinery, which explains why the disease frequently manifests later in life. According to an EU research, "87% of cases were sporadic, 8% of them genetic, 5% of them iatrogenic, and less than 1% of them variant.During a medical examination, brain imaging may be done to both rule out other explanations and to gather data to support a diagnosis. Both the appearance and the sensitivity and specificity of imaging findings might vary. While imaging is less important in the diagnosis of CJD, some brain MRI findings may occasionally appear before the beginning of clinical symptoms. The most effective imaging technique for CJD-related alterations is brain MRI. Diffuse-weighted imaging sequences are the most sensitive MRI sequences.
<urn:uuid:d1d5bae9-f359-4111-a0f5-03689b55e727>
CC-MAIN-2024-10
https://www.rroij.com/open-access/causes-and-imaging-of-creutzfeldtjakob-disease.php?aid=93237
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.917995
1,106
3.09375
3
The various layers in the atmosphere are distinguished, by what happens to the temperature in that particular layer. In this post we shall learn about the layers of the atmosphere which are classified according to their thermal charecterestics. In our previous lesson, we had understood about the Thermal Structure of Atmosphere. TROPOSPHERE AND TROPOPAUSE The lowest layer of the atmosphere is called as Troposphere. In the troposphere, temperature falls with height as a result of which temperature reduces with increasing height. The height of troposphere is between 16 to 18 kilometres at the Equator and 8 to 10 kilometres near the Poles. The average height of troposphere is considered as as 11 kilometres. Tropopause which defines the upper limit of troposphere is the next layer of the atmosphere. Tropopause is an isothermal layer which means the temperature would remain constant with increase in height. STRATOSPHERE AND STRATOPAUSE The next layer is called a Stratosphere which extends from the end of tropopause to about 50 kilometres above the earth’s surface. In the stratosphere, temperature tends to increase with height. The next layer is called as Stratopause which signifies the upper limit of stratosphere. In the Stratopause, the temperature stops increasing any further and is therefore called as an isothermal layer where the temperature remains constant. MESOSPHERE AND MESOPAUSE The next layer is called as Mesosphere which extends from the upper limit of Stratopause to about 80 kilometres above the earth’s surface. In the mesosphere, temperature again starts falling with height. By now, you would have guessed that the next layer. The next layer is called as Mesopause, which is an isothermal layer where the temperature remains constant. THERMOSPHERE – EXOSPHERE Above the Mesopause, we have the Thermosphere where temperature again starts increasing with height. And finally, we have Exosphere which extends above 700 kilometres from the Earth’s surface. In the Thermosphere, the air density is very low and atmosphere can be considered to be almost absent. There is a layer called Ionosphere, which is found in the upper levels of Stratosphere. In the Ionosphere, you would find a lot of free ions or free electrons. This Ionospheric layer is responsible for many types of radio wave transmissions and would be discussed in great detail in Radio Navigation. In this post we have understood about the various layers of the atmosphere. We shall understand about Troposphere and Tropopause in detail in our next lesson where most of our flying activity takes place.
<urn:uuid:0c765e22-0a3f-4f60-9bf8-66273d7ea112>
CC-MAIN-2024-10
https://www.rudderpoint.com/layers-of-the-atmosphere/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.944463
546
4.375
4
Ask any South American dinosaur which way the Amazon River flows and she would have told you east-to-west, the opposite of today. That's the surprising conclusion of researchers studying ancient mineral grains buried in the Amazon Basin. The once westward roll of what is now the world's largest river was caused by a long-gone highland near what today is the river's mouth. That highland was created by the breaking away of South America from Africa and the creation of the Atlantic Ocean during the Cretaceous Period, 65 to 145 million years ago. Later, when the Andes rose up on the western side of South America, the river had no choice but to drain into the new ocean. "It just happened in a way that the current Amazon could take advantage of where an old river and ocean basin used to sit," said geologist Russell Mapes, a doctoral candidate at the University of North Carolina in Chapel Hill. Previous Brazilian and U.S. researchers have proposed smaller scale reversals and splits in the Amazon Basin, but nothing on the scale of the entire basin, said Mapes. The evidence for the Amazon's ancient switcheroo comes in the form of tiny crystals of a mineral called zircon, as well as telltale signs of the river flow direction captured in the structure of old river sediments. Zircons are stubbornly long-lived and tend to be recycled over and over without stopping their internal uranium-lead radioisotope clocks that started ticking when the minerals first formed. As a result, they are tiny windows for peaking at long-lost mountains and entire continents. The zircons in old sands studied by Mapes, his UNC faculty advisor Drew Coleman, and their Brazilian colleagues Afonso Nogueira and Angela Maria Leguizamon Vega, stand out because they do not appear to come from the Andes at all. In fact they date to about 1.3 to 2.1 billion years ago. So they had to have been formed in rocks that solidified in mountains that eroded away into the earliest Amazon. Mapes is scheduled to present the team's findings on Wednesday, 25 October, at the Annual Meeting of the Geological Society of America in Philadelphia. What he won't have time to describe to other researchers is the adventure they underwent to gather up those little zircons. "It was a pretty exotic trip," said Coleman. "We took planes and aluminum small boats. In the first year we took a two-and-a-half week cruise up the river from Manaus. We sampled young and old sediment outcrops on the river. We traveled about 500 kilometers." "In the second year, we did three small hops -- plane flights downstream then rented small boats at each stopping point," recalls Mapes. "One night in a boat we ran out of gas in an electrical storm. Luckily, it was the one place in the basin where my cell phone worked. We called the man who rented the boat to us and he came out and got us. We just bobbed around. It was a place where the river is several miles wide." In the end, said Mapes, it was worth it to finally be able to see back further in time. "When I got the actual data back, I was happy." Cite This Page:
<urn:uuid:adb0c558-7a15-447f-ac62-52fdaa945114>
CC-MAIN-2024-10
https://www.sciencedaily.com/releases/2006/10/061025085229.htm
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00799.warc.gz
en
0.974359
683
4
4