
photo courtesy of Katinka Kober
On the one hand
Mercury levels in fish are getting higher and higher. It's at the point where the federal government has issued warnings to pregnant women and children to limit their consumption of fish.
On the other hand
You need the omega-3 that's found in fish. It's absolutely essential to your good health.
This is the dilemma we all face. As the world's oceans, rivers and lakes become more and more polluted with mercury, we risk losing our only source of fish. And we can't simply stop eating it. We need fish.
The Chicago Tribune has an excellent series of articles on the mercury contamination crisis. This is a must read. You will definitely want to be informed on this as mercury poisoning can cause headaches, fatigue, numbness in the extremities and concentration problems. And in children it can cause learning disabilities.
Another great resource is the Mercury Calculator at gotmercury.org. You can just enter your weight in the online form and it will tell you how much of any type of fish you can safely eat in a week.
Find more articles like these with Magatopia Article Search.
New To Magatopia
Modern Family Living has been added to the list of Family Magazines on Magatopia. Modern Family Living has articles on all aspects of family life including health & fitness, entertaining, home & garden, parenting and more.
Featured Online Magazine
One of Magatopia's Featured Magazines this month is Popular Science. We're all familiar with this magazine. It's been around for decades. But now it has many of it's great science articles free on the web. Popular Science reports on the intersection of science, technology and everyday life with an eye toward what's new and what's next.

If you're a business owner or someone responsible for network security within your organization, you want to understand how to prevent attacks and eliminate network weaknesses that leave your business exposed and at risk.
Vulnerability Management for Dummies is a free ebook that arms you with the facts and shows you how to implement a successful Vulnerability Management program. Whether your network consists of just a handful of computers or thousands of servers distributed around the world, this 5-part book will help you:
- Explain the critical need for Vulnerability Management (VM)
- Detail the essential best-practice steps of a successful VM Program
- Outline the various VM Solutions - including the pros & cons of each
- Provide a 10-point checklist for removing vulnerabilities from your key resources